Eyeballing the NSA 043 (HTML & UTF-8 Embedded) »
http://3f74555297f19f6c.paste.se/
Eyeballing the NSA 043 (PDF) »
http://upstore.net/NV5koS
“Defeat adversary cyber-security practices
in order to acquire the SIGINT data we need
from anyone, anytime, anywhere.”
- NSA ; SIGINT Strategy 2012 - 2016
¤ ICWATCH: This Database Gathers the Resumes of 27,000
Intelligence Workers ::
https://github.com/TransparencyToolkit/ICWATCH-Data
https://transparencytoolkit.org/project/icwatch/
https://firstlook.org/theintercept/2014/08/25/icreach-nsa-cia-secret-google-crisscross-proton/
https://motherboard.vice.com/read/this-database-gathers-the-resumes-of-27000-intelligence-workers
mirrored: #!gQ8EgbxZ!2hgGLnsfEK-Nss4nUImGL5nDr3QqxUhpqZZNd6TJL3o
_______________________________________
¤ US Government Designated Prominent Al Jazeera Journalist
as “Member of Al Qaeda” ::
The document cites Zaidan as an example to demonstrate the
powers of SKYNET, a program that analyzes location and
communication data (or “metadata”) from bulk call records
in order to detect suspicious patterns.
In the Terminator movies, SKYNET is a self-aware military
computer system that launches a nuclear war to exterminate
the human race, and then systematically kills the survivors.
According to the presentation, the NSA uses its version of
SKYNET to identify people that it believes move like couriers
used by Al Qaeda’s senior leadership. The program assessed
Zaidan as a likely match, which raises troubling questions
about the US government’s method of identifying terrorist
targets based on metadata.
It appears, however, that Zaidan had already been identified
as an Al Qaeda member before he showed up on SKYNET’s radar.
That he was already assigned a watch list number would seem
to indicate that the government had a prior intelligence
file on him. The Terrorist Identities Datamart Environment,
or TIDE, is a US government database of over one million
names suspected of a connection to terrorism, which is
shared across the US intelligence community.
The presentation contains no evidence to explain the designation.
https://firstlook.org/theintercept/2015/05/08/u-s-government-designated-prominent-al-jazeera-journalist-al-qaeda-member-put-watch-list/
¤ NSA SKYNET Cloud Analytics-Courier Detection ::
http://cryptome.org/2015/05/nsa-skynet-intercept-15-0507.pdf
_______________________________________
¤ How the NSA Converts Spoken Words Into Searchable Text ::
Most people realize that emails and other digital communications
they once considered private can now become part of their
permanent record.
But even as they increasingly use apps that understand what
they say, most people don’t realize that the words they speak
are not so private anymore, either.
Top-secret documents from the archive of former NSA contractor
Edward Snowden show the National Security Agency can now
automatically recognize the content within phone calls by
creating rough transcripts and phonetic representations that
can be easily searched and stored.
The documents show NSA analysts celebrating the development
of what they called “Google for Voice” nearly a decade ago.
https://firstlook.org/theintercept/2015/05/05/nsa-speech-recognition-snowden-searchable-text/
... the real solution is end-to-end encryption, preferably of
the unbreakable kind. https://whispersystems.org/
https://firstlook.org/theintercept/2015/05/08/keep-nsa-computers-turning-phone-conversations-searchable-text/
¤ NSA Converts Spoken Words Into Searchable Text Documents ::
http://cryptome.org/2015/05/nsa-black-budget-sid-rt10-wg-language-intercept-15-0504.pdf
_______________________________________
¤ Declassified Report Shows Doubts About Value of NSA
Warrantless Spying ::
The secrecy surrounding the National Security Agency’s
post-9/11 warrantless surveillance and bulk data collection
program hampered its effectiveness, and many members of the
intelligence community later struggled to identify any
specific terrorist attacks it thwarted, a newly declassified
document shows.
The document is a lengthy report on a once secret NSA
program code-named Stellarwind. The report was a joint
project in 2009 by inspectors general for five intelligence
and law enforcement agencies, and it was withheld from the
public at the time, although a short, unclassified version
was made public. The government released a redacted version
of the full report to The New York Times on Friday evening
in response to a Freedom of Information Act lawsuit.
http://www.nytimes.com/2015/04/25/us/politics/value-of-nsa-warrantless-spying-is-doubted-in-declassified-reports.htm
¤ NSA Stellar Wind OIG Analysis ::
http://cryptome.org/2015/04/nsa-stellar-wind-oig-nyt-15-0424.pdf
_______________________________________
¤ NSA Torus Receivers of 35 Satellite Signals ::
At three satellite facilities, in Britain, Cyprus and New Zealand,
there's a special antenna that allows NSA's partner agencies a
significant increase in their capability to collect satellite
communications.
This antenna is called Torus, and while conventional parabolic
dish antennas can only view one satellite at a time, one single
Torus antenna is able to receive the signals from up to 35
communications satellites.
These rare and expensive Torus antennas are used by some television
networks, but a close look at photos of the Five Eyes satellite
stations has now revealed the locations where Torus antennas are
also used for gathering signals intelligence.
http://electrospaces.blogspot.com/2015/04/torus-antenna-to-significantly-increase.html
_______________________________________
¤ CSEC Cyberwarfare Toolbox Revealed ::
Top-secret documents obtained by the CBC show Canada’s
electronic spy agency has developed a vast arsenal of
cyberwarfare tools alongside its US and British counterparts
to hack into computers and phones in many parts of the
world, including in friendly trade countries like Mexico
and hotspots like the Middle East. ... ...
The CSE toolbox includes the ability to redirect someone
to a fake website, create unrest by pretending to be
another government or hacker, and siphon classified
information out of computer networks, according to experts
who viewed the documents. ... ...
But the latest top-secret documents released to CBC News
and The Intercept illustrate the development of a large
stockpile of Canadian cyber-spy capabilities that go beyond
hacking for intelligence, including:
• destroying infrastructure, which could include electricity,
transportation or banking systems;
• creating unrest by using false-flags — ie. making a target
think another country conducted the operation;
• disrupting online traffic by such techniques as deleting
emails, freezing internet connections, blocking websites and
redirecting wire money transfers.
http://www.cbc.ca/news/canada/communication-security-establishment-s-cyberwarfare-toolbox-revealed-1.3002978
https://firstlook.org/theintercept/2015/03/23/canada-cse-hacking-cyberwar-secret-arsenal
¤ CSEC Cyber Threats / Cyberwarfare Toolbox ::
http://cryptome.org/2015/03/csec-cyber-threats-cbc-15-0320.pdf
¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯
¤ NSA Releases William Friedman Papers ::
http://cryptome.org/2015/03/nsa-friedman-15-0323.pdf
_______________________________________
¤ The CIA Campaign to Steal Apple’s Secrets ::
https://firstlook.org/theintercept/2015/03/10/ispy-cia-campaign-steal-apples-secrets/
http://www.infowars.com/new-snowden-documents-cia-has-spent-10-years-hacking-iphones-ipads/
¤ NSA-CIA Apple DPA Cryptanalysis ::
http://cryptome.org/2015/03/nsa-apple-dpa-intercept-15-0309.zip
_______________________________________
¤ Leaked Snowden Files Show Most of GCSB’s Targets Are NOT
Security Threats to New Zealand (UPDATED SEVERAL TIMES) ::
New Zealand’s electronic surveillance agency, the GCSB, has
dramatically expanded its spying operations during the years
of John Key's National Government and is automatically funnelling
vast amounts of intelligence to the US National Security Agency,
top-secret documents reveal.
Since 2009, the Government Communications Security Bureau
intelligence base at Waihopai has moved to “full-take collection”,
indiscriminately intercepting Asia-Pacific communications and
providing them en masse to the NSA through the controversial
NSA intelligence system XKeyscore, which is used to monitor
emails and internet browsing habits. ... ...
New Zealand is selling out its close relations with the Pacific
nations to be close with the United States, author Nicky Hager
has said.
Hager, in conjunction with the New Zealand Herald and the
Intercept news site, revealed today how New Zealand’s spies
are targeting the entire email, phone and social media
communications of the country’s closest, friendliest and
most vulnerable neighbours.
This morning, Hager told Radio New Zealand that the documents
revealed even more countries which New Zealand was spying on,
and more information would come.
“The Five Eyes countries led by the US are literally trying
to spy on every country in the world ... and what we’re going
to be hearing about in the next few days is New Zealand in all
kinds of very surprising ways playing a role in that,” he said.
http://cryptome.org/2015/03/gcsb-xkeyscore-nz-herald-15-0305.pdf
http://cryptome.org/2015/03/gcsb-xkeyscore-nz-herald-15-0306.pdf
http://cryptome.org/2015/03/gcsb-xkeyscore-nz-star-times-15-0308.pdf
http://cryptome.org/2015/03/nsa-nz-nz-herald-15-0310.pdf
http://cryptome.org/2015/03/gcsb-solomons-nz-herald-15-0314.pdf
http://www.nzherald.co.nz/nz/news/article.cfm?c_id=1&objectid=11411759
http://www.nzherald.co.nz/nz/news/article.cfm?c_id=1&objectid=11411730
http://media.nzherald.co.nz/webcontent/document/pdf/201513/WTO%20document.pdf
https://firstlook.org/theintercept/2015/03/04/new-zealand-gcsb-surveillance-waihopai-xkeyscore/
https://firstlook.org/theintercept/2014/09/15/new-zealand-gcsb-speargun-mass-surveillance/
https://firstlook.org/theintercept/2015/03/07/new-zealand-ironsand-waihopai-nsa-gcsb/
https://firstlook.org/theintercept/2015/03/22/new-zealand-gcsb-spying-wto-director-general/
http://www.stuff.co.nz/national/67082905/snowden-files-inside-waihopais-domes
https://leaksource.files.wordpress.com/2015/03/gcsb-asia-pacific-spying-five-eyes-nsa-xkeyscore.pdf
https://leaksource.files.wordpress.com/2015/03/gcsb-provide-nsa-nz-data.pdf
https://leaksource.files.wordpress.com/2015/03/gcsb-xks-ironsand-access-multiple-choice-test-check-box.pdf
https://leaksource.files.wordpress.com/2015/03/gcsb-asd-nzsis-asis-south-pacific-spying-high-priority.pdf
http://www.radionz.co.nz/news/national/267923/gcsb-in-mass-collection-of-pacific-data-ferguson
http://www.bbc.com/news/world-asia-31741564
_______________________________________
¤ How NSA-GCHQ Stole the Keys to the Encryption Castle ::
AMERICAN AND BRITISH spies hacked into the internal computer network
of the largest manufacturer of SIM cards in the world, stealing
encryption keys used to protect the privacy of cellphone communications
across the globe, according to top-secret documents provided to The
Intercept by National Security Agency whistleblower Edward Snowden.
The hack was perpetrated by a joint unit consisting of operatives
from the NSA and its British counterpart Government Communications
Headquarters, or GCHQ. The breach, detailed in a secret 2010 GCHQ
document, gave the surveillance agencies the potential to secretly
monitor a large portion of the world’s cellular communications,
including both voice and data.
http://cryptome.org/2015/02/gchq-pcs-harvesting-intercept-15-0219.pdf
https://firstlook.org/theintercept/2015/02/19/great-sim-heist/
http://www.democracynow.org/2015/2/20/nsa_british_gchq_hacked_sim_card
https://firstlook.org/theintercept/2015/02/20/gemalto-heist-shocks-europe/
¤ Gemalto Government National Mobile ID Schemes / Partners ::
http://cryptome.org/2015/02/gemalto-gov-national-mobile-id.pdf
http://cryptome.org/2015/02/gemalto-partner-list.htm
¤ Gemalto Responds After SIM Encryption Key Heist Exposed ::
http://www.gemalto.com/press/Pages/Information-regarding-a-report-mentioning-a-hacking-of-SIM-card-encryption-keys.aspx
http://www.infowars.com/sim-card-producer-denies-any-real-risk-from-nsa-hacking-its-encryption-keys/
¤ White House Responds After SIM Encryption Key Heist Exposed ::
MIRROR #1 http://postimg.org/image/yj37iju33/
MIRROR #2 https://pbs.twimg.com/media/B-U0B20CIAASRpq.png
_______________________________________
¤ NSA’s “Equation Group” Firmware-imbedded Malware Found ::
NSA stores secret imbedded malware inside the firmware of
harddrives and USB(s).
Malware can be used as a beacon once plugged into an air-gapped
system and data can be accessed remotely while OFFLINE.
Kaspersky’s reconstructions of the spying programs show that
they could work in disk drives sold by more than a dozen
companies, comprising essentially the entire market. They
include Western Digital Corp, Seagate Technology Plc, Toshiba
Corp, IBM, Micron Technology Inc and Samsung Electronics Co Ltd.
Western Digital, Seagate and Micron said they had no knowledge
of these spying programs. Toshiba and Samsung declined to comment.
IBM did not respond to requests for comment.
http://cryptome.org/2015/02/nsa-equation-group.pdf
http://www.stuff.co.nz/technology/digital-living/66279485/nsa-hiding-equation-spy-program-on-hard-drives
https://news.yahoo.com/russian-researchers-expose-breakthrough-u-spying-program-194217480--sector.html
http://arstechnica.com/security/2015/02/how-omnipotent-hackers-tied-to-the-nsa-hid-for-14-years-and-were-found-at-last/
_______________________________________
¤ NY Times’ David Carr Snowden Interview Hours Before Death ::
http://timestalks.com/laura-poitras-glenn-greenwald-edward-snowden.html
http://www.newsmax.com/Newsfront/David-Carr-died-New-York-Times-Snowden/2015/02/13/id/624700/
_______________________________________
¤ NSA Claims Iran Learned from Western Cyberattacks ::
http://cryptome.org/2015/02/iran-gchq-intercept-15-0210.pdf
https://firstlook.org/theintercept/2015/02/10/nsa-iran-developing-sophisticated-cyber-attacks-learning-attacks/
_______________________________________
¤ White House Spy “Reform” - Increase Spying! Flaunt It! ::
An in-you’re-face attitude is now considered “reform.”
http://cryptome.org/2015/02/ic-ppd-28-15-0203.zip
https://firstlook.org/theintercept/2015/01/29/one-year-major-report-nsa-still-collecting-bulk-domestic-data-still-clueless-much-good-surveillance/
_______________________________________
¤ Hypocrisy of Youtube’s CitizenFour Censorship ::
http://piratetimes.net/new-snowden-documentary-censored-online/
¤ Citizenfour Snowden Documentary (7-Zipped MP4) ::
http://cryptome.org/Citizenfour.7z
¤ Citizenfour Snowden Documentary HD (7-Zip MP4) ::
http://cryptome.org/Citizenfour-HD.7z
¤ Citizenfour Screengrabs, 87 PDFs in 13 Files ::
http://cryptome.org/2015/01/Citizenfour-Screengrabs-pdfs.7z
¤ Citizenfour Screengrabs, 87 JPGs in 13 Folders ::
http://cryptome.org/2015/01/Citizenfour-Screengrabs.7z
_______________________________________
¤ Western Spy Agencies Secretly Rely on Hackers for Intel ::
http://cryptome.org/2015/02/gchq-lovely-horse-intercept-15-0204.pdf
https://firstlook.org/theintercept/2015/02/04/demonize-prosecute-hackers-nsa-gchq-rely-intel-expertise/
¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯
¤ CSEC Eyeballs File Sharing Host User Data ::
http://torrentfreak.com/canadian-government-spies-on-millions-of-file-sharers-150128/
http://www.cbc.ca/news/cse-tracks-millions-of-downloads-daily-snowden-documents-1.2930120
https://firstlook.org/theintercept/2015/01/28/canada-cse-levitation-mass-surveillance
http://motherboard.vice.com/read/how-canadian-spies-infiltrated-the-internets-core-to-watch-what-you-do-online?
¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯
¤ NSA MORECOWBELL HTTP GET Attacking ::
http://cryptome.org/2015/01/nsa-morecowbell.htm
http://cryptome.org/2015/01/MORECOWBELL.pdf
http://cryptome.org/2015/01/MORECOWBELL-Analysis-Grothoff-etal.pdf
http://cryptome.org/2015/01/Wertheim-NSA-and-Encryption-NotiAMS-Feb15.pdf
http://www.lemonde.fr/economie/visuel/2015/01/24/cowbells-nouvelles-revelations-sur-les-pratiques-de-la-nsa_4561547_3234.html
_______________________________________
¤ Compilation of Snowden Documents - January 30, 2015 ::
https://github.com/nsa-observer/documents/archive/master.zip
https://github.com/nsa-observer/documents/tree/master/files/pdf
_______________________________________
¤ How GCHQ Prepares Interception of Phone Calls From Satellites ::
http://electrospaces.blogspot.com/2015/01/how-gchq-prepares-for-interception-of.html
_______________________________________
¤ NSA Documents Expose NSA’s Digital Arms Race for Cyber Warfare ::
The NSA’s mass surveillance is just the beginning. Documents from
Edward Snowden show that the intelligence agency is arming America
for future digital wars -- a struggle for control of the Internet
that is already well underway.
Normally, internship applicants need to have polished resumes,
with volunteer work on social projects considered a plus. But at
Politerain, the job posting calls for candidates with significantly
different skill sets. We are, the ad says, “looking for interns who
want to break things.”
Politerain is not a project associated with a conventional company.
It is run by a US government intelligence organization, the National
Security Agency (NSA). More precisely, it’s operated by the NSA’s
digital snipers with Tailored Access Operations (TAO), the department
responsible for breaking into computers.
Potential interns are also told that research into third party
computers might include plans to “remotely degrade or destroy
opponent computers, routers, servers and network enabled devices
by attacking the hardware.” Using a program called Passionatepolka,
for example, they may be asked to “remotely brick network cards."
With programs like Berserkr they would implant “persistent backdoors”
and “parasitic drivers.” Using another piece of software called
Barnfire, they would “erase the BIOS on a brand of servers that
act as a backbone to many rival governments.”
An intern’s tasks might also include remotely destroying the
functionality of hard drives. Ultimately, the goal of the internship
program was “developing an attacker’s mindset.”
The internship listing is eight years old, but the attacker’s mindset
has since become a kind of doctrine for the NSA’s data spies. And the
intelligence service isn’t just trying to achieve mass surveillance
of Internet communication, either. The digital spies of the Five Eyes
alliance -- comprised of the United States, Britain, Canada, Australia
and New Zealand -- want more.
http://www.spiegel.de/international/world/new-snowden-docs-indicate-scope-of-nsa-preparations-for-cyber-battle-a-1013409.html
¤ Der Spiegel Releases NSA’s Plans for Cyber Warfare ::
http://cryptome.org/2015/01/spiegel-15-0117.7z
_______________________________________
¤ Prying Eyes: Inside the NSA’s War on Internet Security ::
US and British intelligence agencies undertake every effort imaginable
to crack all types of encrypted Internet communication. The cloud, it
seems, is full of holes. The good news: New Snowden documents show that
some forms of encryption still cause problems for the NSA. ... ...
As one document from the Snowden archive shows, the NSA had been
unsuccessful in attempts to decrypt several communications protocols,
at least as of 2012. An NSA presentation for a conference that took
place that year lists the encryption programs the Americans failed to
crack. In the process, the NSA cryptologists divided their targets
into five levels corresponding to the degree of the difficulty of the
attack and the outcome, ranging from “trivial” to “catastrophic.”
Monitoring a document’s path through the Internet is classified as
“trivial.” Recording Facebook chats is considered a “minor” task,
while the level of difficulty involved in decrypting emails sent
through Moscow-based Internet service provider mail.ru is considered
“moderate.” Still, all three of those classifications don’t appear to
pose any significant problems for the NSA.
Things first become troublesome at the fourth level. The presentation
states that the NSA encounters “major” problems in its attempts to
decrypt messages sent through heavily encrypted email service providers
like Zoho or in monitoring users of the Tor network, which was
developed for surfing the web anonymously. Tor, otherwise known as
The Onion Router, is free and open source software that allows users
to surf the web through a network of more than 6,000 linked volunteer
computers. The software automatically encrypts data in a way that
ensures that no single computer in the network has all of a user’s
information. For surveillance experts, it becomes very difficult to
trace the whereabouts of a person who visits a particular website or
to attack a specific person while they are using Tor to surf the Web.
The NSA also has “major” problems with Truecrypt, a program for
encrypting files on computers. Truecrypt’s developers stopped their
work on the program last May, prompting speculation about pressures
from government agencies. A protocol called Off-the-Record (OTR) for
encrypting instant messaging in an end-to-end encryption process also
seems to cause the NSA major problems. Both are programs whose source
code can be viewed, modified, shared and used by anyone. Experts agree
it is far more difficult for intelligence agencies to manipulate open
source software programs than many of the closed systems developed by
companies like Apple and Microsoft. Since anyone can view free and
open source software, it becomes difficult to insert secret back doors
without it being noticed. Transcripts of intercepted chats using OTR
encryption handed over to the intelligence agency by a partner in
Prism -- an NSA program that accesses data from at least nine American
internet companies such as Google, Facebook and Apple -- show that
the NSA’s efforts appear to have been thwarted in these cases: “No
decrypt available for this OTR message.” This shows that OTR at least
sometimes makes communications impossible to read for the NSA.
Things become “catastrophic” for the NSA at level five - when, for
example, a subject uses a combination of Tor, another anonymization
service, the instant messaging system CSpace and a system for Internet
telephony (voice over IP) called ZRTP. This type of combination results
in a “near-total loss/lack of insight to target communications, presence,”
the NSA document states.
ZRTP, which is used to securely encrypt conversations and text chats
on mobile phones, is used in free and open source programs like RedPhone
and Signal. “It’s satisfying to know that the NSA considers encrypted
communication from our apps to be truly opaque,” says RedPhone developer
Moxie Marlinspike.
http://www.spiegel.de/international/germany/inside-the-nsa-s-war-on-internet-security-a-1010361.html
¤ NSA Attacks on VPN, SSL, TLS, SSH, Tor ::
http://cryptome.org/2014/12/nsa-spiegel-14-1228.rar
_______________________________________
¤ Operation Socialist ; How GCHQ Spies Hacked Belgium’s Largest Telco ::
https://firstlook.org/theintercept/2014/12/13/belgacom-hack-gchq-inside-story/
¤ GCHQ Belgacom Telecom Hacking (ZIP) ::
Slides show Canada’s intelligence agency, CSEC, was involved in helping
GCHQ intercept Belgacom communications. It also proves 3rd party cookies
are very much instrumental in being used to exploit information about IPs.
http://cryptome.org/2014/12/gchq-belgacom-intercept-14-1213.zip
_______________________________________
¤ Keith Alexander’s Anti-spy Patent Leaked ::
http://cryptome.org/2014/12/nsa-alexander-patent-14-1125.pdf
¤ Keith Alexander Now Works To Secure Banking Networks ::
http://www.bloomberg.com/news/2014-06-20/ex-nsa-chief-pitches-advice-on-cyber-threats-to-the-banks.html
_______________________________________
¤ Operation AURORAGOLD: How the NSA Hacks Cellphone Networks Worldwide ::
Codenamed AURORAGOLD, the covert operation has monitored the content of
messages sent and received by more than 1,200 email accounts associated
with major cellphone network operators, intercepting confidential company
planning papers that help the NSA hack into phone networks.
One high-profile surveillance target is the GSM Association, an influential
UK-headquartered trade group that works closely with large US-based firms
including Microsoft, Facebook, AT&T, and Cisco, and is currently being
funded by the US government to develop privacy-enhancing technologies.
Karsten Nohl, a leading cellphone security expert and cryptographer who
was consulted by The Intercept about details contained in the AURORAGOLD
documents, said that the broad scope of information swept up in the operation
appears aimed at ensuring virtually every cellphone network in the world is
NSA accessible.
https://firstlook.org/theintercept/2014/12/04/nsa-auroragold-hack-cellphones/
¤ NSA Operation AURORAGOLD Slides ::
http://cryptome.org/2014/12/nsa-aurora-gold-intercept-14-1203.pdf
¤ NSA OPULANT PUP Circumventing Strong Cryptography ::
Last year, the Washington Post reported that the NSA had already managed
to break the most commonly used cellphone encryption algorithm in the world,
known as A5/1. But the information collected under AURORAGOLD allows the
agency to focus on circumventing newer and stronger versions of A5 cellphone
encryption, such as A5/3.
http://cryptome.org/2014/12/nsa-opulant-pup-intercept-14-1203.pdf
_______________________________________
¤ Germany’s Intelligence Agency, the BND, Spies On Civilians Too ::
German MPs examining the surveillance activities the US National
Security Agency have found a legal loophole that allows the Berlin’s
foreign intelligence agency to spy on its own citizens.
The agency, known by its German acronym BND, is not usually allowed
to intercept communications made by Germans or German companies, but a
former BND lawyer told parliament this week that citizens working abroad
for foreign companies were not protected.
The German government confirmed on Saturday that work-related calls
or emails were attributed to the employer. As a result, if the employer
is foreign, the BND could legally intercept them.
Angela Merkel pretends to be outraged about industrial espionage by
the NSA while condoning illegal surveillance itself.
http://www.theguardian.com/world/2014/nov/29/german-loophole-allows-bnd-agency-spy-own-people
http://www.infowars.com/like-the-nsa-and-gchq-germanys-foreign-intelligence-agency-uses-a-legal-loophole-to-spy-on-its-own-citizens/
https://www.techdirt.com/articles/20141202/09513729296/like-nsa-gchq-germanys-foreign-intelligence-agency-uses-legal-loophole-to-spy-its-own-citizens.shtml
_______________________________________
¤ How Vodafone-Subsidiary Telecom Aided GCHQ’s Spying Efforts ::
Previously unpublished documents show how the UK telecom firm Cable
& Wireless, acquired by Vodafone in 2012, played a key role in
establishing one of the Government Communications Headquarters’
(GCHQ) most controversial surveillance programs.
A joint investigation by NDR, WDR, Süddeutsche Zeitung and Channel 4
based on documents leaked by whistleblower Edward Snowden, reveals
that Cable & Wireless actively shaped and provided the most data to
GCHQ mass surveillance programs, and received millions of pounds in
compensation. The documents also suggest that Cable & Wireless
assisted GCHQ in breaking into a competitor’s network.
In response to these allegations, Vodafone said that an internal
investigation found no evidence of unlawful conduct, but the company
would not deny it happened.
http://www.channel4.com/news/spy-cable-revealed-how-telecoms-firm-worked-with-gchq
http://www.tagesschau.de/ausland/snowden-vodafone-101.html
http://www1.wdr.de/daserste/monitor/videos/videovodafonederlangearmdesbritischengeheimdienstes100.html
http://international.sueddeutsche.de/post/103543418200/snowden-leaks-how-vodafone-subsidiary-cable
¤ GCHQ’s Vodafone Cable Master List ::
https://netzpolitik.org/2014/cable-master-list-wir-spiegeln-die-snowden-dokumente-ueber-angezapfte-glasfasern-auch-von-vodafone/
¤ GCHQ Vodafone Gerontic Cables & Slides ::
http://cryptome.org/2014/11/vodafone-gchq-slides.pdf
http://cryptome.org/2014/11/vodafone-gchq-netzpolitik-slides-14-1125.pdf
http://cryptome.org/2014/11/vodafone-gchq-netzpolitik-cables-14-1125.pdf
¤ GCHQ Vodafone Gerontic Cables & Slides ZIPPED ::
http://cryptome.org/2014/11/Gerontic_GCHQ_SZ.zip
¤ INCENSER: How NSA and GCHQ Are Tapping Internet Cables ::
http://electrospaces.blogspot.fi/2014/11/incenser-or-how-nsa-and-gchq-are.html
_______________________________________
¤ Microsoft SkyDrive (aka OneDrive) Gateway Into NSA PRISM ::
http://cryptome.org/2014/11/ms-onedrive-nsa-prism.htm
NOTE: Anything uploaded to “the cloud” is going to be available
for the government to snoop through, the new Apple iphone gadgets
automatically upload all users’ personal files into “the cloud”
and yes, looks like Microsoft is also doing it as well.
You might want to avoid using these new systems, go back to using
older desktop computers which are rather easy to fortify. As for
phones, you can buy an old jitterbug phone - it’s a basic cellphone
without all the other crap included - just plain oldschool, mofos!
And add one more thing - a “Blockit Pocket.” ;)
_______________________________________
¤ German Investigation of the Cooperation Between NSA-BND Part 1 ::
http://electrospaces.blogspot.fr/2014/11/german-investigation-of-cooperation.html
_______________________________________
¤ UK Lawyers Spied by GCHQ Spies ::
http://cryptome.org/2014/11/uk-lawyers-spies-intercept-14-1106.pdf
https://firstlook.org/theintercept/2014/11/06/uk-surveillance-of-lawyers-journalists-gchq/
_______________________________________
¤ The German Operation Eikonal Part of NSA’s RAMPART-A Program ::
Just over a week ago, the regional German paper Süddeutsche Zeitung
and the regional broadcasters NDR and WDR came with a story saying that
between 2004 and 2008, the German foreign intelligence service BND had
tapped into the Frankfurt internet exchange DE-CIX and shared the
intercepted data with the NSA. As not all communications of German
citizens could be filtered out, this is considered a violation of the
constitution.
Here we will give a summary of what is currently known about this BND
operation and we will combine this with information from earlier reports.
This will show that it was most likely part of the RAMPART-A program of
the NSA, which includes similar interception efforts by foreign partner
agencies. Finally, we will look at where exactly the BND interception
might have taken place.
http://electrospaces.blogspot.fr/2014/10/the-german-operation-eikonal-as-part-of.html
---------------------------------------
¤ How Secret Partners Expand NSA’s Surveillance Dragnet ::
https://firstlook.org/theintercept/article/2014/06/18/nsa-surveillance-secret-cable-partners-revealed-rampart-a/
https://www.techdirt.com/articles/20140619/08062627624/nsa-working-with-denmark-germany-to-access-three-terabits-data-per-second-overseas-cables.shtml
http://www.infowars.com/nsa-uses-33-countries-to-intercept-web-traffic-snowden-files/
http://gigaom.com/2014/06/20/governments-let-nsa-tap-cables-on-their-territory-latest-snowden-revelations-show/
¤ Foreign Partner Access to Black Budget FY 2013 ::
https://s3.amazonaws.com/s3.documentcloud.org/documents/1200866/foreignpartneraccessbudgetfy2013-redacted.pdf
¤ Overview Presenting the RAMPART-A Spy Program ::
https://s3.amazonaws.com/s3.documentcloud.org/documents/1200860/odd-s3-overviewnov2011-v1-0-redacted-information.pdf
¤ Three RAMPART-A Slides ::
https://s3.amazonaws.com/s3.documentcloud.org/documents/1200865/uodds2overview-v1-1-redacted-information-dk.pdf
¤ Black Budget FY 2013 / RAMPART-A Slides (Mirror) ::
http://cryptome.org/2014/06/nsa-intercept-14-0618.pdf
¤ Update ; Intercept Releases More RAMPART-A Slides ::
http://cryptome.org/2014/06/nsa-information-intercept-14-0619.pdf
_______________________________________
¤ Core Secrets: NSA Saboteurs in China and Germany
The National Security Agency has had agents in China, Germany,
and South Korea working on programs that use “physical subversion”
to infiltrate and compromise networks and devices, according to
documents obtained by The Intercept.
The documents, leaked by NSA whistleblower Edward Snowden, also
indicate that the agency has used “under cover” operatives to gain
access to sensitive data and systems in the global communications
industry, and that these secret agents may have even dealt with
American firms. The documents describe a range of clandestine field
activities that are among the agency’s “core secrets” when it comes
to computer network attacks, details of which are apparently shared
with only a small number of officials outside the NSA.
“It’s something that many people have been wondering about for a
long time,” said Chris Soghoian, principal technologist for the
American Civil Liberties Union, after reviewing the documents.
“I’ve had conversations with executives at tech companies about
this precise thing. How do you know the NSA is not sending people
into your data centers?”
Previous disclosures about the NSA’s corporate partnerships have
focused largely on US companies providing the agency with vast amounts
of customer data, including phone records and email traffic. But
documents published today by The Intercept suggest that even as the
agency uses secret operatives to penetrate them, companies have also
cooperated more broadly to undermine the physical infrastructure of
the internet than has been previously confirmed.
In addition to so-called “close access” operations, the NSA’s “core
secrets” include the fact that the agency works with US and foreign
companies to weaken their encryption systems; the fact that the NSA
spends “hundreds of millions of dollars” on technology to defeat
commercial encryption; and the fact that the agency works with US
and foreign companies to penetrate computer networks, possibly without
the knowledge of the host countries. Many of the NSA’s core secrets
concern its relationships to domestic and foreign corporations.
Some of the documents in this article appear in a new documentary,
CITIZENFOUR, which tells the story of the Snowden disclosures and is
directed by Intercept co-founder Laura Poitras. The documents describe
a panoply of programs classified with the rare designation of
“Exceptionally Compartmented Information,” or ECI, which are only
disclosed to a “very select” number of government officials.
https://firstlook.org/theintercept/2014/10/10/core-secrets/
¤ Top Secret Special Source Operations Classification Guides ::
http://cryptome.org/2014/10/nsa-whipgenie-the-intercept-14-1010.pdf
http://cryptome.org/2014/10/nsa-tarex-the-intercept-14-1010.pdf
¤ Operation Sentry Eagle (Parts 1 & 2) ::
http://cryptome.org/2014/10/nsa-sentry-eagle-the-intercept-14-1010.pdf
http://cryptome.org/2014/10/nsa-sentry-eagle-2-the-intercept-14-1010.pdf
¤ NSA Exceptionally Controlled Information ::
http://cryptome.org/2014/10/nsa-eci-the-intercept-14-1010.pdf
http://cryptome.org/2014/10/nsa-eci-pawleys-the-intercept-14-1010.pdf
http://cryptome.org/2014/10/nsa-eci-compartments-the-intercept-14-1010.pdf
¤ NSA National Initiative Task Security (Parts 1 & 2) ::
http://cryptome.org/2014/10/nsa-nit-the-intercept-14-1010.pdf
http://cryptome.org/2014/10/nsa-nit-2-the-intercept-14-1010.pdf
¤ NSA Computer Network Exploitation ::
http://cryptome.org/2014/10/nsa-cne-declass-the-intercept-14-1010.pdf
¤ Following 10 NSA Releases (8.5MB | ZIP) ::
http://cryptome.org/2014/10/nsa-releases-the-intercept-14-1010.zip
_______________________________________
¤ Retired NSA Technical Director Explains NSA Slides ::
http://proxy.rickmartensen.nl/www.alexaobrien.com/secondsight/wb/binney.html
¤ Retired NSA Technical Director Explains NSA Slides (ZIP) ::
Includes the report and the slides.
http://fileb.ag/i627vr7a6bkx
_______________________________________
¤ ACLU’s FOIA Documents Shed Light on One of the NSA’s Most
Powerful Tools (Other Agencies and Legal Loopholes) ::
https://www.aclu.org/blog/national-security/new-documents-shed-light-one-nsas-most-powerful-tools
¤ Overview of (Other) Signals Intelligence Authorities ::
https://www.aclu.org/files/assets/eo12333/NSA/Overview%20of%20Signals%20Intelligence%20Authorities.pdf
¤ DoD-DIA’s 16 Legal Loopholes to Spy On US Persons ::
https://www.aclu.org/files/assets/eo12333/DIA/DoD%20HUMINT%20Legal%20Workshop%20Fundamentals%20of%20HUMINT%20Targeting.pdf
¤ Intelligence Law Handbook Defense HUMINT Service ::
https://www.aclu.org/files/assets/eo12333/DIA/Intelligence%20Law%20Handbook%20Defense%20HUMINT%20Service.pdf
_______________________________________
¤ NSA Spies on UN in Vienna ::
http://fm4.orf.at/stories/1746596/
http://securityaffairs.co/wordpress/28666/intelligence/nsa-spying-un-vienna.html
http://www.techworm.net/2014/09/erich-mochel-leaks-photos-nsa-spying-united-nations.html
¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯
¤ How Covert Agents Infiltrate the Internet to Manipulate, Deceive,
and Destroy Reputations ::
https://firstlook.org/theintercept/2014/02/24/jtrig-manipulation/
http://www.infowars.com/cointelrpo-revisited-greenwald-exposes-nsa-agenda-to-destroy-journalists/
One of the many pressing stories that remains to be told from the
Snowden archive is how western intelligence agencies are attempting
to manipulate and control online discourse with extreme tactics of
deception and reputation-destruction. It’s time to tell a chunk of
that story, complete with the relevant documents.
Over the last several weeks, I worked with NBC News to publish a
series of articles about “dirty trick” tactics used by GCHQ’s previously
secret unit, JTRIG (Joint Threat Research Intelligence Group). These
were based on four classified GCHQ documents presented to the NSA
and the other three partners in the English-speaking “Five Eyes”
alliance. Today, we at the Intercept are publishing another new
JTRIG document, in full, entitled “The Art of Deception: Training
for Online Covert Operations.”
¤ GCHQ ; The Art of Deception: Training for Online Covert Operations ::
https://firstlook.org/theintercept/document/2014/02/24/art-deception-training-new-generation-online-covert-operations/
https://s3.amazonaws.com/s3.documentcloud.org/documents/1021430/the-art-of-deception-training-for-a-new.pdf
---------------------------------------
¤ Hacking Online Polls and Other Ways British Spies
Seek to Control the Internet ::
The secretive British spy agency GCHQ has developed
covert tools to seed the internet with false information,
including the ability to manipulate the results of online
polls, artificially inflate pageview counts on web sites,
“amplify” sanctioned messages on YouTube, and censor video
content judged to be “extremist.” The capabilities, detailed
in documents provided by NSA whistleblower Edward Snowden,
even include an old standby for pre-adolescent prank callers
everywhere: A way to connect two unsuspecting phone users
together in a call.
The tools were created by GCHQ’s Joint Threat Research
Intelligence Group (JTRIG), and constitute some of the most
startling methods of propaganda and internet deception
contained within the Snowden archive. Previously disclosed
documents have detailed JTRIG’s use of “fake victim blog
posts,” “false flag operations,” “honey traps” and
psychological manipulation to target online activists,
monitor visitors to WikiLeaks, and spy on YouTube and
Facebook users.
https://firstlook.org/theintercept/2014/07/14/manipulating-online-polls-ways-british-spies-seek-control-internet/
http://www.infowars.com/what-exactly-are-the-spy-agencies-actually-doing-with-their-bag-of-dirty-tricks/
¤ GCHQ’s JTRIG Tools and Techniques ::
http://cryptome.org/2014/07/nsa-jtrigall-intercept-14-0714.pdf
---------------------------------------
¤ More Details on GCHQ Propaganda/Deception Tactics ::
https://firstlook.org/theintercept/2014/04/04/cuban-twitter-scam-social-media-tool-disseminating-government-propaganda/
This week, the Associated Press exposed a secret
program run by the US Agency for International
Development to create “a Twitter-like Cuban
communications network” run through “secret shell
companies” in order to create the false appearance
of being a privately owned operation. Unbeknownst
to the service’s Cuban users was the fact that
“American contractors were gathering their private
data in the hope that it might be used for political
purposes”–specifically, to manipulate those users
in order to foment dissent in Cuba and subvert its
government. According to top-secret documents
published today by The Intercept, this sort of
operation is frequently discussed at western
intelligence agencies, which have plotted ways to
covertly use social media for “propaganda,” “deception,”
“mass messaging,” and “pushing stories.” ...
¤ GCHQ Full Spectrum Cyber Effects ::
“Destroy Deny Degrade Disrupt Deceive Protect”
http://cryptome.org/2014/04/gchq-full-spectrum-cyber.pdf
... The annual SIGDEV conference, according to one
NSA document published today by The Intercept, “enables
unprecedented visibility of SIGINT Development activities
from across the Extended Enterprise, Second Party and US
Intelligence communities.” The 2009 Conference, held at
Fort Meade, included “eighty-six representatives from
the wider US Intelligence Community, covering agencies
as diverse as CIA (a record 50 participants), the Air
Force Research Laboratory and the National Air and
Space Intelligence Center.”
Defenders of surveillance agencies have often insinuated
that such proposals are nothing more than pipe dreams
and wishful thinking on the part of intelligence agents.
But these documents are not merely proposals or hypothetical
scenarios. As described by the NSA document published
today, the purpose of SIGDEV presentations is “to
synchronize discovery efforts, share breakthroughs,
and swap knowledge on the art of analysis.”
For instance: One of the programs described by the newly
released GCHQ document is dubbed “Royal Concierge,” under
which the British agency intercepts email confirmations
of hotel reservations to enable it to subject hotel
guests to electronic monitoring. It also contemplates
how to “influence the hotel choice” of travelers and
to determine whether they stay at “SIGINT friendly”
hotels. The document asks: “Can we influence the hotel
choice? Can we cancel their visit?” ...
¤ NSA 5 Eyes 2009 SIGDEV Conference ::
http://cryptome.org/2014/04/nsa-5-eyes-2009-sigdev.pdf
---------------------------------------
¤ GCHQ Trolls, Spies and Deceives Online Users ::
http://cryptome.org/2014/02/gchq-online-deception.pdf
¤ GCHQ Disruption Operations ::
http://cryptome.org/2014/02/gchq-disruption.pdf
¤ GCHQ Spreads Propaganda to Discredit Critics ::
The documents from the GCHQ (the British equivalent
of the NSA), titled “The Art of Deception: Training
for Online Covert Operations,” were given to the
NSA and leaked by Snowden. They reveal that the
GCHQ is involved, through a unit known as JTRIG
(Joint Threat Research Intelligence Group), in
“the monitoring of YouTube and Blogger, the
targeting of Anonymous with the very same DDoS
attacks they accuse “hacktivists” of using, the
use of honey traps (luring people into compromising
situations using sex) and destructive viruses.”
The goals of the JTRIG program are “(1) to inject
all sorts of false material onto the internet in
order to destroy the reputation of its targets;
and (2) to use social sciences and other techniques
to manipulate online discourse and activism to
generate outcomes it considers desirable.”
https://firstlook.org/theintercept/2014/02/24/jtrig-manipulation/
http://www.examiner.com/article/government-infiltrating-websites-to-deny-disrupt-degrade-deceive
http://rt.com/news/five-eyes-online-manipulation-deception-564/
---------------------------------------
¤ GCHQ Attacked Anonymous in 2012 ::
http://cryptome.org/2014/02/gchq-anonymous.pdf
http://msnbcmedia.msn.com/i/msnbc/sections/news/snowden_anonymous_nbc_document.pdf
¤ GCHQ Cyber Attack Operations ::
http://cryptome.org/2014/02/gchq-cyber-attack.pdf
http://s3.documentcloud.org/documents/1015553/snowden-cyber-offensive1-nbc-document.pdf
¤ GCHQ Full-Spectrum Cyber Effects ::
http://cryptome.org/2014/02/gchq-cyber-effects.pdf
¤ GCHQ Spies Attacked Anonymous IRC Chats ::
http://www.nbcnews.com/news/investigations/war-anonymous-british-spies-attacked-hackers-snowden-docs-show-n21361
http://www.zdnet.com/uk-used-denial-of-service-against-anonymous-7000025993/
http://www.wired.co.uk/news/archive/2014-02/05/gchq-ddos-attack-anonymous
¤ British Spies Used Porn and Dirty Tricks to
Lure Targets to Honeypots ::
http://www.nbcnews.com/news/investigations/snowden-docs-british-spies-used-sex-dirty-tricks-n23091
---------------------------------------
¤ NSA & GCHQ Spies on Wikileaks, TPB Visitors ::
https://firstlook.org/theintercept/article/2014/02/18/snowden-docs-reveal-covert-surveillance-and-pressure-tactics-aimed-at-wikileaks-and-its-supporters/
http://wikileaks.org/NSA-and-GCHQ-spying-on-WikiLeaks.html
https://www.eff.org/deeplinks/2014/02/surveillance-and-pressure-wikileaks-readers
http://torrentcrazy.com/news/nsa-authorized-monitoring-of-pirate-bay-and-proxy-users
¤ NSA-GCHQ Discovery SIGINT Targeting ::
http://cryptome.org/2014/02/nsa-gchq-discovery.pdf
¤ Youtube Targets by SQUEAKYDOLPHIN Presentation ::
http://cryptome.org/2014/02/gchq-squeakydolphin-videos.htm
¤ GCHQ Psychology SIGDEV ::
http://cryptome.org/2014/02/gchq-psychology.pdf
---------------------------------------
▲ Reddit Censors All Stories Above ::
http://www.infowars.com/reddit-censors-big-story-about-government-manipulation-and-disruption-of-the-internet/
_______________________________________
¤ Unraveling NSA’s TURBULENCE Programs ::
https://robert.sesek.com/2014/9/unraveling_nsa_s_turbulence_programs.html
_______________________________________
¤ New Zealand’s Prime Minister Isn’t Telling the Truth About
Mass Surveillance ::
https://firstlook.org/theintercept/2014/09/15/snowden-new-zealand-surveillance/
¤ New Zealand Launched Mass Surveillance Project While Publicly
Denying It ::
https://firstlook.org/theintercept/2014/09/15/new-zealand-gcsb-speargun-mass-surveillance/
¤ Snowden and Greenwald Reveal Prime Minister John Key Lied About
Kiwi Mass Surveillance, Key Calls Greenwald “A Loser” ::
https://www.techdirt.com/articles/20140915/06175828518/snowden-greenwald-reveal-pm-john-key-lied-about-kiwi-mass-surveillance-key-hits-back-calling-greenwald-loser.shtml
¤ New Zealand Prime Minister Releases GCSB Spy Documents ::
http://cryptome.org/2014/09/gcsb-nz-pm-nz-herald-14-0916.zip
¤ NSA Visit by New Zealand Spy PM Ferguson ::
http://cryptome.org/2014/09/nsa-nz-ferguson-visit-the-intercept-14-0915.pdf
¤ The Questions for New Zealand on Mass Surveillance ::
https://firstlook.org/theintercept/2014/09/15/questions-new-zealand-mass-surveillance/
_______________________________________
▼ NSA Spooks Deny The Evidence (Provided Below) Exists ::
Did the NSA forget Ed Snowden contacted NBC and released
the evidence contacting authorities regarding his concerns?
https://news.vice.com/article/the-nsa-has-revealed-new-details-about-its-exhaustive-search-of-edward-snowdens-emails
▲ FLASHBACK! Snowden Strikes Back at NSA, Emails NBC News ::
Fugitive Edward Snowden on Friday challenged the
NSA’s insistence that it has no evidence he tried
to raise concerns about the agency’s surveillance
activity before he began leaking government documents
to reporters, calling the response a “clearly tailored
and incomplete leak ... for a political advantage.”
“The NSA’s new discovery of written contact between
me and its lawyers -- after more than a year of denying
any such contact existed - raises serious concerns,”
Snowden said in an email Friday to NBC News. “It
reveals as false the NSA’s claim to Barton Gellman
of the Washington Post in December of last year, that
‘after extensive investigation, including interviews
with his former NSA supervisors and co-workers, we
have not found any evidence to support Mr. Snowden’s
contention that he brought these matters to anyone’s
attention.’”
Snowden’s email followed Thursday’s release by the US
Office of the Director of Intelligence of an email
exchange between Snowden and the NSA’s Office of the
General Counsel. The Washington Post received and
published a similar response from Snowden on Thursday.
http://www.nbcnews.com/feature/edward-snowden-interview/snowden-strikes-back-nsa-emails-nbc-news-n118821
▲ NSA Oversight Training, OVSC1800 Minimization Training,
NSA OGC Snowden Emails on OVSC1800 Course ::
http://cryptome.org/2014/05/nsa-oversight.pdf
http://cryptome.org/2014/05/nsa-ovsc1800.pdf
http://cryptome.org/2014/05/nsa-ogc-snowden.pdf
---------------------------------------
¤ NBC Interviews Edward Snowden (Full) ::
https://www.youtube.com/watch?v=yNhMXyAdjp8
Mirror here » http://upstore.net/62ocku
_______________________________________
¤ NSA-GCHQ Breached Deutsche Telekom and Other German Firms ::
According to top-secret documents from the NSA and the British
agency GCHQ, the intelligence agencies are seeking to map the entire
Internet, including end-user devices. In pursuing that goal, they
have broken into networks belonging to Deutsche Telekom.
http://www.spiegel.de/international/world/snowden-documents-indicate-nsa-has-breached-deutsche-telekom-a-991503.html
https://firstlook.org/theintercept/2014/09/14/nsa-stellar/
¤ GCHQ Satellite Teleport Knowledge ::
http://cryptome.org/2014/09/gchq-stellar-der-spiegel-14-0914.pdf
¤ NSA Treasure Map New Release ::
http://cryptome.org/2014/09/nsa-treasure-map-new-der-spiegel-14-0914.pdf
¤ NSA Treasure Map Slides ::
http://cryptome.org/2014/09/nsa-treasure-map-der-spiegel-14-0914.pdf
http://s3.documentcloud.org/documents/1301057/tm-m-402.pdf
_______________________________________
¤ NSA Economic Espionage Benefits American Corporations ::
https://firstlook.org/theintercept/2014/09/05/us-governments-plans-use-economic-espionage-benefit-american-corporations/
¤ Masterspy Quadrennial Report 2009 (Spy For US Corporations) ::
http://cryptome.org/2014/09/dni-qicr-2009-the-intercept-14-0905.pdf
▲ UPDATE: Obama Rubber Stamps Economic Espionage, Mass Spying ::
http://www.nationaljournal.com/tech/despite-obama-s-pledge-to-curb-it-nsa-mass-surveillance-wins-rubber-stamp-20140913
_______________________________________
¤ Bush-era Justification For Warrantless Wiretapping ::
http://www.washingtonpost.com/world/national-security/legal-memos-released-on-bush-era-justification-for-warrantless-wiretapping/2014/09/05/91b86c52-356d-11e4-9e92-0899b306bbea_story.html
http://www.dailystar.com.lb/News/World/2014/Sep-06/269796-bush-era-memos-president-can-wiretap-americans-at-all-times.ashx
http://mic.com/articles/98116/just-released-bush-administration-memos-explain-deeply-disturbing-government-spying
¤ NSA STELLAR WIND Assessed by DoJ 2004 (REDACTED) ::
http://cryptome.org/2014/09/nsa-olc-stellar-wind-wapo-14-0906.pdf
¤ NSA STELLAR WIND Assessed by DoJ 2004 (UNREDACTED) ::
Above DOJ assessment released by WaPo compared to ACLU document.
http://cryptome.org/2014/09/nsa-olc-stellar-wind-annotated.pdf
¤ NSA’s STELLAR WIND PROGRAM (DECLASSIFIED 2013) ::
RAGTIME was the codename for Stellar Wind.
http://cryptome.org/2013/06/nsa-stellar-wind.pdf
¤ NSA STELLARWIND Classification Marking ::
http://electrospaces.blogspot.com/2014/09/about-stellarwind-and-another.html
_______________________________________
¤ DNI Releases 47 FISC Yahoo Documents ::
http://cryptome.org/2014/09/dni-fisc-yahoo-14-0911.zip
_______________________________________
KILLCEN ; Eyeballing Snowden’s Info
Includes all news reports, videos, images, slides and
documents from and related to Snowden’s leaks so far,
up to September 5th of 2014. I’m still collecting any
information that comes out and will provide an updated
archive twice per year.
Due to the enormous size of this current archive, the
archive has been split concurrent to the names of each
file and directory in alphabetical order to facilitate
the size limit while uploading to the file hosts below.
After decompression, the first folder is titled “Eyeballing_
Snowden_Info_Folder_01” and the second is titled “Eyeballing_
Snowden_Info_Folder_02” , both holding a total of 1,668 files
(1.37GB) after being decompressed and consolidated.
This was stored on an old OFFLINE system, without any
WiFi card or modem attached so the archive is safe from
being modified, exploited or stolen.
Eyeballing_Snowden_Info_Folder_01.zip
(589 files | ZIP | 686MB)
http://fileb.ag/ojvlj5rqihw2
http://bitshare.com/files/pigqc2bo/Eyeballing_Snowden_Info_Folder_01.zip.html
http://fpsbay.com/download/64709X14099602822363X347361/Eyeballing_Snowden_Info_Folder_01.zip
Eyeballing_Snowden_Info_Folder_02.zip
(1,079 files | ZIP | 476MB)
http://fileb.ag/xqtrujp8jcey
http://bitshare.com/files/ztfcjdwg/Eyeballing_Snowden_Info_Folder_02.zip.html
http://fpsbay.com/download/64711X14099654782364X347381/Eyeballing_Snowden_Info_Folder_02.zip
¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯
¤ NSA ; Ask Zelda (Redacted) ::
http://cryptome.org/2014/03/nsa-ask-zelda.pdf
https://firstlook.org/theintercept/article/2014/03/07/nsa-advice-columnist-seriously/
¤ NSA ; Ask Zelda (Full, DECLASSIFIED) ::
http://cryptome.org/2014/09/nsa-ask-zelda-14-0828.pdf
_______________________________________
¤ NSA’s Foreign Partnerships ::
http://electrospaces.blogspot.com/2014/09/nsas-foreign-partnerships.html
_______________________________________
¤ Two-Faced Friendship: Turkey Is Partner and Target for NSA ::
http://www.spiegel.de/international/documents-show-nsa-and-gchq-spied-on-partner-turkey-a-989011.html
https://firstlook.org/theintercept/2014/08/31/nsaturkeyspiegel/
¤ NSA-GCHQ Eyeball Turkey (Original Links) ::
http://www.spiegel.de/media/media-34650.pdf
http://www.spiegel.de/media/media-34651.pdf
http://www.spiegel.de/media/media-34652.pdf
http://www.spiegel.de/media/media-34653.pdf
http://www.spiegel.de/media/media-34654.pdf
http://www.spiegel.de/media/media-34655.pdf
http://www.spiegel.de/media/media-34656.pdf
http://www.spiegel.de/media/media-34657.pdf
http://www.spiegel.de/media/media-34658.pdf
http://www.spiegel.de/media/media-34659.pdf
http://www.spiegel.de/media/media-34660.pdf
http://www.spiegel.de/media/media-34661.pdf
http://www.spiegel.de/media/media-34662.pdf
¤ NSA-GCHQ Eyeball Turkey (Mirrored) ::
http://cryptome.org/2014/08/nsa-gchq-spy-turkey-der-spiegel-14-0831.pdf
_______________________________________
¤ How the NSA Built Its Own Secret Google ::
https://firstlook.org/theintercept/article/2014/08/25/icreach-nsa-cia-secret-google-crisscross-proton
¤ NSA ICREACH Slides ::
http://cryptome.org/2014/08/nsa-icreach.pdf
_______________________________________
¤ NSA-GCHQ-CSEC HACIENDA Program for Internet Colonization ::
http://www.heise.de/ct/artikel/NSA-GCHQ-The-HACIENDA-Program-for-Internet-Colonization-2292681.html
¤ NSA-GCHQ-CSEC HACIENDA Slides (ZIP) ::
http://www.xup.to/dl,62909734/HACIENDA_Slides.zip/
¤ NSA-GCHQ-CSEC HACIENDA Slides (PDF) ::
http://cryptome.org/2014/08/nsa-gchq-csec-hacienda-heise-14-0816.pdf
_______________________________________
¤ Now US Corporations Admit They Profit From Spying ::
Beat them at their own game - lie.
http://www.forbes.com/sites/quickerbettertech/2014/08/18/the-other-sharing-economy-thats-about-to-change-the-world/
¤ Money And Power - The Real Reason For The NSA Spying On Everyone ::
Put out false information. Flood them with false data.
https://www.techdirt.com/articles/20140819/17104028259/money-power-real-reason-nsa-spying-everyone.shtml
_______________________________________
¤ Newly Declassified Documents Regarding the “Now-Discontinued” (?)
NSA Bulk Electronic Communications Metadata Pursuant to Section 402
of the Foreign Intelligence Surveillance Act ::
http://icontherecord.tumblr.com/
_______________________________________
¤ GCHQ Covert Mobile Phone Security Tactics ::
http://cryptome.org/2014/08/gchq-covert-mobiles-the-intercept-14-0812.pdf
¤ Compare GCHQ Security Tactics to Jihadist Tactics ::
https://prod01-cdn03.cdn.firstlook.org/wp-uploads/sites/1/2014/08/GCHQ-Jihadist-handbook.gif
_______________________________________
¤ Barack Obama’s Secret “Terrorist-Tracking” System ::
Nearly half of the people on the US government’s widely shared
database of terrorist suspects are not connected to any known
terrorist group, according to classified government documents
obtained by The Intercept.
https://firstlook.org/theintercept/article/2014/08/05/watch-commander/
¤ NCTC Directorate of Terrorist Identities ::
http://cryptome.org/2014/08/nctc-dti-the-intercept.pdf
¤ Secret Government Rulebook For Labeling You a Terrorist ::
The Obama administration has quietly approved a substantial
expansion of the terrorist watchlist system, authorizing a
secret process that requires neither “concrete facts” nor
“irrefutable evidence” to designate an American or foreigner
as a terrorist, according to a key government document obtained
by The Intercept.
http://cryptome.org/2014/07/nctc-watchlist-intercept-14-0723.pdf
https://firstlook.org/theintercept/article/2014/07/23/blacklisted/
http://www.infowars.com/leaked-document-facts-and-evidence-not-considered-when-adding-americans-to-terror-lists/
https://www.techdirt.com/articles/20140723/14232027979/intercept-reveals-us-governments-guidebook-declaring-your-terrorist-putting-you-no-fly-list.shtml
https://www.techdirt.com/articles/20140723/14321427980/revealed-what-kind-extra-scrutiny-government-gives-to-folks-terrorist-watchlist.shtml
NOBODY notes
Sounds much like the (now defunct) COINTELPRO operation the
FBI once was launched to target, blacklist and harrass US
civil rights activists and whistleblowers back in the day -
only these “dirty tricks” are now fully digitalized.
¤ Executive Order 12333: They Do Spy on Americans ::
John Tye is but the latest surveillance whistleblower,
though he took pains to distinguish himself from Snowden
and his approach to dissent. “Before I left the State
Department, I filed a complaint with the department’s
inspector general, arguing that the current system of
collection and storage of communications by US persons
under Executive Order 12333 violates the Fourth Amendment,
which prohibits unreasonable searches and seizures,”
Tye explained. “I have also brought my complaint to the
House and Senate intelligence committees and to the
inspector general of the NSA.”
These steps — which many say Snowden should’ve taken —
produced no changes to the objectionable NSA spying and
wouldn’t be garnering attention at all if not for
Snowden’s leaks.
http://www.washingtonpost.com/opinions/meet-executive-order-12333-the-reagan-rule-that-lets-the-nsa-spy-on-americans/2014/07/18/93d2ac22-0b93-11e4-b8e5-d0de80767fc2_story.html
http://www.theatlantic.com/politics/archive/2014/07/a-new-surveillance-whistleblower-emerges/374722/
_______________________________________
¤ Cash, Weapons, Surveillance - The US is a Key Party to Every
Israeli Attack ::
The US government has long lavished overwhelming aid on Israel,
providing cash, weapons and surveillance technology that play a
crucial role in Israel’s attacks on its neighbors. But top secret
documents provided by NSA whistleblower Edward Snowden shed
substantial new light on how the US and its partners directly
enable Israel’s military assaults – such as the one on Gaza.
https://firstlook.org/theintercept/2014/08/04/cash-weapons-surveillance/
¤ ISNU-NSA Spying Pact (1999 & 2013) ::
http://cryptome.org/2014/08/israel-us-1999-the-intercept.pdf
http://cryptome.org/2014/08/nsa-israel-2013-the-intercept.pdf
¤ US Empire Pays Israel $500,000 in 2004 ::
http://cryptome.org/2014/08/nsa-israel-500k-2004.pdf
¤ (RELATED) Terrorism in the Israeli Attack on Gaza ::
https://firstlook.org/theintercept/2014/07/29/terrorism-israelgaza-context/
http://www.presstv.ir/detail/2014/08/04/374016/us-directly-enables-israeli-attacks-on-gaza/
http://rt.com/news/177716-us-israel-funding-aggression/
¤ (RELATED) Gaza Natural Gas - Why Israel Kills for It ::
http://cryptome.org/2014/08/gaza-natural-gas.zip
_______________________________________
¤ USA-Saudi Arabia Spy Partnership ::
http://cryptome.org/2014/07/nsa-saudi-arabia-intercept-14-0725.pdf
¤ NSA’s New Partner in Spying ; Saudi Arabia’s Brutal State Police ::
The National Security Agency last year significantly expanded
its cooperative relationship with the Saudi Ministry of Interior,
one of the world’s most repressive and abusive government agencies.
An April 2013 top secret memo provided by NSA whistleblower Edward
Snowden details the agency’s plans “to provide direct analytic and
technical support” to the Saudis on “internal security” matters.
The Saudi Ministry of Interior—referred to in the document as MOI
— has been condemned for years as one of the most brutal human rights
violators in the world. In 2013, the U.S. State Department reported
that “Ministry of Interior officials sometimes subjected prisoners
and detainees to torture and other physical abuse,” specifically
mentioning a 2011 episode in which MOI agents allegedly “poured an
antiseptic cleaning liquid down [the] throat” of one human rights
activist. The report also notes the MOI’s use of invasive surveillance
targeted at political and religious dissidents.
But as the State Department publicly catalogued those very abuses,
the NSA worked to provide increased surveillance assistance to the
ministry that perpetrated them. The move is part of the Obama
Administration’s increasingly close ties with the Saudi regime;
beyond the new cooperation with the MOI, the memo describes “a
period of rejuvenation” for the NSA’s relationship with the Saudi
Ministry of Defense.
In general, US support for the Saudi regime is long-standing. One
secret 2007 NSA memo lists Saudi Arabia as one of four countries
where the US “has [an] interest in regime continuity.”
https://firstlook.org/theintercept/2014/07/25/nsas-new-partner-spying-saudi-arabias-brutal-state-police/
_______________________________________
¤ Senate Bill Spy Funding FY 2015 ::
http://cryptome.org/2014/07/spy-funding-fy2015.pdf
_______________________________________
¤ NSA Spying Costs to US Businesses ::
http://cryptome.org/2014/07/nsa-naf-spy-costs.pdf
http://www.bloomberg.com/news/2014-07-29/tech-companies-reel-as-nsa-spying-mars-image-for-clients.html
_______________________________________
¤ Insider - Intelligence Agencies Are Running Governments ::
Alex Jones talks with NSA whistleblower William Binney about the
growing corruption and power of the NSA and how they abuse their
power behind the scenes to pull strings.
http://www.youtube.com/watch?v=DERMBOJBDCk
http://www.infowars.com/insider-says-intelligence-agencies-are-running-the-government/
_______________________________________
¤ NSA/FISA Spying Timeline ::
1978 FISA ; 1981 EO 12333, 1982 DoD Reg 5240.1-R,
1993 USSID SP0018 ; 2001 USA Patriot Act, 2002 FISC
“Raw Take” Share Motion ; 2003 SP002 ; 2004 PR/TT FISA ;
2004 NSA/CSS Policy 1-23 ; 2006 BR FISA ; 2006 RAS Memo ;
2007 PAA (expired) ; 2008 FAA ; 2008 SP002 (Revised) ;
2008 EO 12333 (Revised) ; 2008 RAS Memo (Revised) ;
2009 NSA/CSS Policy 1-23 (Revised).
http://cryptome.org/2014/03/nsa-spy-timeline.pdf
▲ FISA Surveillance Leaks ::
http://cryptome.org/2013/06/nsa-fisa-targeting.pdf
http://cryptome.org/2013/06/nsa-fisa-minimization.pdf
http://cryptome.org/2013/06/nsa-fisa-certification.pdf
▲ Executive Order 12333 (Default 1981) ::
http://www.archives.gov/federal-register/codification/executive-order/12333.html
▲ DoD Regulation 5240.1-R (1982) ::
Guidance to DoD components in implementing EO 12333
and general rules pursuant to FISA.
http://cryptome.org/dod5240-1-r.htm
▲ USSID SP0018 (2003) ::
http://www.dni.gov/files/documents/1118/CLEANEDFinal%20USSID%20SP0018.pdf
▲ FISA ; Pen Register and Trap and Trace (PR/TT) ::
Opinion of the FISC granting the government application
seeking the collection of bulk electronic communications
metadata pursuant to Section 402 of FISA, the Pen Register
and Trap and Trace (PR/TT) provision.
http://cryptome.org/2013/11/nsa-13-1118/CLEANEDPRTT%201.pdf
▲ Bulk Collection Programs Under PATRIOT ACT ::
http://cryptome.org/2013/07/obama-releases-13-0731.pdf
▲ NSA/CSS Policy 1-23 (Default 2004) ::
http://cryptome.org/nsa-css-1-23.pdf
▲ NSA/CSS Policy 1-23 (Revised 2009) ::
http://cryptome.org/2014/07/nsa-css-policy-1-23-nyt-14-0727.pdf
▲ Executive Order 12333 (Revised 2008) ::
http://cryptome.org/eo12333-amend.htm
NSA’s FOIA Release » http://cryptome.org/nsa-eo12333.pdf
▲ NSA ; FISA/PAA/FAA Classification Guide ::
http://cryptome.org/2014/03/nsa-fisa-faa-class.pdf
▲ NSA Attorney General Dissemination Procedures ::
http://cryptome.org/2014/03/nsa-ag-dissemination.pdf
_______________________________________
¤ NSA SIGINT Records Disposition Schedule ::
http://cryptome.org/2014/08/nsa-sigint-rds.pdf
http://www.nsa.gov/public_info/declass/records_management/index.shtml
_______________________________________
¤ The NSA Said Edward Snowden Had No Access to Surveillance
Intercepts, They Lied ::
The contents of the surveillance files — almost half of which
contained information from US citizens or residents — “tell
stories of love and heartbreak, illicit sexual liaisons,
mental-health crises, political and religious conversions,
financial anxieties and disappointed hopes.”
http://www.theatlantic.com/politics/archive/2014/07/a-devastating-leak-for-edward-snowdens-critics/373991/
http://www.motherjones.com/kevin-drum/2014/07/nsa-said-edward-snowden-had-no-access-surveillance-intercepts-they-lied
http://www.nationaljournal.com/tech/snowden-undermines-presidential-panel-s-defense-of-nsa-spying-20140708
¤ Meet the Muslim-American Leaders the FBI and NSA Have
Been Spying On ::
The National Security Agency and FBI have covertly
monitored the emails of prominent Muslim-Americans—including
a political candidate and several civil rights activists,
academics, and lawyers—under secretive procedures intended
to target terrorists and foreign spies.
According to documents provided by NSA whistleblower
Edward Snowden, the list of Americans monitored by their
own government includes:
• Faisal Gill, a longtime Republican Party operative and
one-time candidate for public office who held a top-secret
security clearance and served in the Department of Homeland
Security under President George W. Bush;
• Asim Ghafoor, a prominent attorney who has represented
clients in terrorism-related cases;
• Hooshang Amirahmadi, an Iranian-American professor of
international relations at Rutgers University;
• Agha Saeed, a former political science professor at
California State University who champions Muslim civil
liberties and Palestinian rights;
• Nihad Awad, the executive director of the Council on
American-Islamic Relations (CAIR), the largest Muslim civil
rights organization in the country.
https://firstlook.org/theintercept/article/2014/07/09/under-surveillance/
http://www.infowars.com/fbi-directly-spying-on-prominent-muslim-american-politicians-lawyers-and-civil-rights-activists/
http://electrospaces.blogspot.ca/2014/07/document-shows-that-it-was-not-nsa-but.html
¤ NSA FISA Accounts and Emails ::
http://cryptome.org/2014/07/nsa-fisa-accounts.pdf
http://cryptome.org/2014/07/nsa-emails.pdf
¤ Those Not Targeted Far Outnumber Foreigners Who Are ::
NSA targeted domestic communications as well as foreign.
http://www.washingtonpost.com/world/national-security/in-nsa-intercepted-data-those-not-targeted-far-outnumber-the-foreigners-who-are/2014/07/05/8139adf8-045a-11e4-8572-4b1b969b6322_story.html
▼ NSA OKs Domestic Spying for Suspected Criminals ::
¯¯¯¯¯¯¯¯¯
“The FBI is also permitted to disseminate US person
information that reasonably appears to be evidence of a
crime to law enforcement authorities.”
http://cryptome.org/2014/07/pclob-14-0702.pdf
▲ US Government Denies Spying US Persons ::
http://cryptome.org/2014/07/dni-doj-14-0709.pdf
NOBODY responds
Compare the new DoJ memo (dni-doj-14-0709.pdf)
with the one during 2007, before any of the NSA
documents were ever leaked (doj-nsa-memo.pdf)
http://cryptome.org/2013/06/doj-nsa-memo.pdf
Now compare the arrogance of the political class
back in 2004 up till today.
http://www.infowars.com/congress-insisted-they-be-kept-in-the-dark-on-nsa-spying/
Notice their lack of oversight during the Bush regime
now stuck in continuum under the Obama regime?
http://www.infowars.com/senate-committee-passes-cisa-cybersecurity-bill-that-could-broaden-nsa-powers/
Just like those in the “Department of Justice” they
never learn from their mistakes, they are stuck in a
state of blissful ignorance, they lie and when the truth
comes out (as it often does), then they deny it happened.
¤ Some New Thoughts on the Snowden Cache ::
http://members.efn.org/~paulmd/SomeNewThoughtsontheSnowdenCache.html
“So, apparently the Snowden cache contains quite a large number
of intercepted communications, not just technical documents,
PowerPoint slides, and memos. This opens up a whole can of worms,
and some new possibilities for the cache.
Worms first: several journalists have access to an incredibly
sensitive cache of personal information. According to some NSA
defenders: Snowden has committed a horrible privacy violation
of thousands of innocent Americans. This is a big problem, but
it requires some mental gymnastics not to recognize that if
Snowden had violated the privacy of innocents by giving this
information to journalists, so had the NSA by storing it in the
first place. Realistically, it’s not one or the other, it’s
both. Now that we know what it contains, the long term storage
of that portion cache by journalists becomes very problematic.
On one hand: it’s evidence, on the other, it’s private information
on many thousands of people.
While there are some problems, there are also new possibilities.
First, it could be a boon for defendants, and those facing legal
jeopardy, to confront the evidence against them, to receive a
genuinely fair trial. This is doubly important for drug cases,
particularly those with DEA involvement, because of the highly
questionably practice of Parallel Reconstruction, wherein
classified evidence is laundered, and is reconstructed using
traditional methods. In effect: perjury. Second, it is prima
facie evidence to use in lawsuits against the NSA, proof that
a plaintiff had been spied on. Third, one of the wilder stories:
Snowden to Reveal the Secrets of Arab Dictators, really can
happen now. The US government’s dealings with brutal regimes
are newsworthy, so are the dealings of those regimes against
their own people.
One of the things that makes Cablegate so powerful, and
simultaneously controversial, is the ability of ordinary
citizens to query it, and learn what the government had kept
hidden. In at least one case, it allowed a rendition victim
to seek justice. I am not suggesting leaking it out in full,
but ways of allowing ordinary citizens the ability to get
their own communications, and broadening access, should be
considered. Contrary to the opinions of those who described
the Post’s story as a dud, it’s the first page of the next
chapter of the Snowden Saga, with wide-reaching, and
unpredictable consequences.”
By Paul Dietrich, Jul 8, 2014
_______________________________________
¤ Networks vs. Hierarchies: Which Will Win? ::
http://libertyblitzkrieg.com/2014/06/22/networks-vs-hierarchies-which-will-win-niall-furguson-weighs-in/
¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯
¤ Ultimate Goal of the NSA ; Total Population Control ::
At least 80% of all audio calls, not just metadata, are
recorded and stored in the US, says whistleblower William
Binney – that’s a “totalitarian mentality.”
http://www.theguardian.com/commentisfree/2014/jul/11/the-ultimate-goal-of-the-nsa-is-total-population-control
_______________________________________
¤ NSA Hacks TOR in Germany, Calls Users Extremists ::
http://cryptome.org/2014/07/nsa-tor-de.htm
It is one of the most sensitive secrets of the NSA,
the engine of the global monitoring machine: the source
code of the XKeyscore program, the most comprehensive
Ausspähprogramm of US foreign intelligence.
NDR and WDR have excerpts of the source code. Parts of
the collection infrastructure ie, so-called software rules
that define the intelligence, what or who they want to
investigate.
There are only a few numbers and characters to string
together the programmer. But when the program executes
XKeyscore these rules, get people and their data in their
sights. The connections from computers to the Internet
are identified and stored in a database type. The users
are quasi marked. It is the dragnet of the 21st century.
http://download.media.tagesschau.de/video/2014/0703/TV-20140703-0546-2401.webl.webm
MP4 Video Format » http://fileb.ag/u12my0tpvr8y
¤ XKeyscore Targets Tor ::
http://daserste.ndr.de/panorama/xkeyscorerules100.txt
¤ NSA Targets the Privacy-conscious Using Tor ::
http://daserste.ndr.de/panorama/aktuell/nsa230_page-1.html
---------------------------------------
¤ NSA/FRA XKeyscore Targets Tor, etc. ::
http://cryptome.org/2013/12/nsa-xkeyscore-tor-slides.pdf
¤ NSA & GCHQ Counter-Tor Slides ::
“Use cookies to identify Tor users when they are not
using Tor.”
“Investigate Evercookie persistence.”
http://cryptome.org/2013/10/nsa-tor-stinks.pdf
¤ Cookies Threaten Tor User Anonymity ::
“Just because you’re using Tor doesn’t mean that your
browser isn’t storing cookies,” said Jeremiah Grossman,
a colleague of Hansen’s who also specializes in browser
vulnerabilities.
As Grossman described the procedure to CNET, the NSA is
aware of Tor’s entry and exit nodes because of its Internet
wide surveillance.
“The very feature that makes Tor a powerful anonymity
service, and the fact that all Tor users look alike on the
Internet, makes it easy to differentiate Tor users from
other Web users,” he wrote.
“The NSA then cookies that ad, so that every time you go
to a site, the cookie identifies you. Even though your IP
address changed [because of Tor], the cookies gave you away,”
he said.
http://news.cnet.com/8301-1009_3-57606178-83/nsa-tracks-google-ads-to-find-tor-users/
¤ GCHQ ; MULLENIZE Operation to Tag and Identify Packet
Traffic From Machines ::
“Working together, CT and CNE have devised a method to carry
out large-scale ‘staining’ as a means to identify individual
machines linked to that IP address. ... ...
User Agent Staining is a technique that involves writing a
unique marker (or stain) onto a target machine. Each stain
is visible in passively collected SIGINT and is stamped into
every packet, which enables all the events from that stained
machine to be brought back together to recreate a browsing
session.”
http://cryptome.org/2013/10/gchq-mullenize.pdf
http://s3.documentcloud.org/documents/801762/mullenize-28redacted-29.pdf
¤ Packet Staining ::
http://prezi.com/p5et9yawg2c6/ip-packet-staining/
http://tools.ietf.org/html/draft-macaulay-6man-packet-stain-00
http://tools.ietf.org/html/draft-macaulay-6man-packet-stain-01
http://cryptome.org/2013/10/packet-stain/packet-staining.htm
¤ NSA Peeling Back the Layers of Tor ::
http://cryptome.org/2013/10/nsa-egotisticalgiraffe.pdf
http://www.theguardian.com/world/interactive/2013/oct/04/egotistical-giraffe-nsa-tor-document
http://www.theguardian.com/world/2013/oct/04/tor-attacks-nsa-users-online-anonymity
http://www.theguardian.com/world/2013/oct/04/nsa-gchq-attack-tor-network-encryption
¤ NSA ; Tor Source Code Vulnerabilities ::
“We have seen several targets using Tor. Our goal was to
analyze Tor source code and determine any vulnerabilities
in the system. We set up an internal Tor network to analyze
Tor traffic, in the hopes of discovering ways to passively
identify it. We also worked to create a custom Tor client
which allows the user finer control.” ... ...
“This accomplishes several things. Most basically, the Tor
servers, many of which are listed on publicly advertised
directory servers, are chosen to act as a series of proxies.
This may seem to be excessively complex, as a single proxy
server can be used to hide one’s location, but a single-hop
proxy is vulnerable in two ways. First, by analyzing the
pattern of the traffic going to and from the proxy server,
it is possible to deduce which clients are making which requests.
Second, if an attacker owns the proxy server, then it certainly
knows who is asking for what, and anonymization is ruined. By
using multiple hops, Tor is much more resistant to both of
these attacks. Traffic analysis becomes extraordinarily
difficult, as it must be coordinated across several machines,
and an attacker must own all the hops along the circuit in
order to trace requests back to the originating client.”
... ...
“In our time in the lab, we found that running an nmap on a
node that is offering a hidden service will turn up the port
that the hidden service is using to deal with incoming
connections. It can then be directly connected to, outside
of Tor.”
... ...
“We would have to try to connect to each of the ports we see
open on a machine to determine if there is a hidden service
being run. We would not even know which protocol the hidden
service is running. It may be an HTTP server, an FTP server,
an SMTP server, etc. The only thing we know is that the protocol
must run over TCP. It is not enough to attempt to connect once
to each port, using an HTTP GET request. Several protocols must
be tried.”
... ...
“It may also be useful to study Tor directory servers in more
detail. Our work focused solely on the client, but many attacks
would be much easier with access to more Tor servers. The
directory servers ultimately control which Tor servers are
used by clients. We have found that a server can put itself on
a directory server multiple times; all it takes is the server
running several Tor processes, each having a different nickname,
open port, fingerprint, and LOG FILE. This only requires different
configuration files for the different processes, which are easy
to set up. That machine will handle a disproportionate amount of
traffic, since it is listed several times. This increases the
density of friendly servers in the cloud without increasing the
number of servers we have set up. Unfortunately, each listing
has the same IP address, which would be very noticeable to anyone
who inspecting the directories.”
http://cryptome.org/2013/10/nsa-tor.pdf
http://s3.documentcloud.org/documents/802061/ces-summer-2006-tor-paper-28redacted-29-1.pdf
http://www.washingtonpost.com/world/national-security/secret-nsa-documents-show-campaign-against-tor-encrypted-network/2013/10/04/610f08b6-2d05-11e3-8ade-a1f23cda135e_story.html
¤ NSA ; Types of IAT ::
http://cryptome.org/2013/10/nsa-iat-tor.pdf
¤ NSA Link Removed by Guardian ::
http://cryptome.org/2013/10/nsa-link-removed.htm
¤ Tor Media Reports Disinformative (?) ::
“This document doesn’t give much insight into capabilities
the IC has developed against Tor. It’s apparently quite common
to run multiple research teams (either known or unknown to
each other) against a single target, and a few summer
students with a dozen lab machines is a pretty small
investment. I’d expect there are other programs with more
sophisticated attacks, especially now 7 years later.”
http://cryptome.org/2013/10/nsa-tor-disinfo.htm
_______________________________________
¤ UPDATE ; German CIA Agent Arrested ::
http://cryptocomb.org/?p=869
¤ UPDATE ; Der Spiegel Exposed Spy Scandle Between US-Germany, ;
Angela Merkel Plans to Scrap No-spy Agreement with US-Britain ::
A new surveillance scandal is threatening to unsettle US-German
relations after it emerged that an employee of Germany’s
intelligence agency has been arrested under suspicion of acting
as a double agent for the US.
According to several reports in the German media, a 31-year-old
member of the Bundesnachrichtendienst (BND) administration
department in Pullach was on Wednesday arrested by the country’s
federal prosecutor, originally under suspicion of passing on
information to Russian intelligence services. ... ...
The plan is in response to the scandal resulting from last
week’s arrest of a 31-year-old BND “double agent” who spent
at least two years selling top-secret German intelligence
documents to his US spymasters in return for cash payments
of €10,000 (£7,940) per document. ...
The double agent is reported to have simply emailed Berlin’s
American embassy and asked whether officials were interested
in “co-operation”. He subsequently downloaded at least 300
secret documents on to USB sticks that he handed to his
American spymasters at secret location in Austria.
He was caught by German counter-espionage agents only after
he was found offering similar BND documents to Berlin’s Russian
embassy. The Germans had considered it “impossible” that one
of their own intelligence men could be working as a “double agent”
for the Americans.
http://www.independent.co.uk/news/world/europe/germany-to-spy-on-us-for-first-time-since-1945-after-double-agentscandal-9590645.html
http://www.theguardian.com/commentisfree/2014/jul/07/nsa-chancellor-double-agent-german-us-relations
http://www.theguardian.com/world/2014/jul/04/germany-arrest-bnd-spying-allegations-double-agent-us
http://www.nytimes.com/2014/07/11/world/europe/germany-expels-top-us-intelligence-officer.html?_r=0
¤ Der Spiegel Releases NSA-BND Spy Documents ::
http://cryptome.org/2014/06/nsa-spiegel-snowden-14-0618.pdf
http://www.spiegel.de/international/the-germany-file-of-edward-snowden-documents-available-for-download-a-975917.html
¤ NSA-BND_Spy_Documents_2014.zip (Mirror) ::
http://filedump.org/files/epVgbFV91403117533.html
¤ Der Spiegel Release on German SIGADs ::
http://cryptome.org/2014/06/nsa-spiegel-german-sigads.pdf
¤ Inside the New NSA-BND Revelations ::
http://www.spiegel.de/international/germany/new-snowden-revelations-on-nsa-spying-in-germany-a-975441.html
http://www.dw.de/new-leaks-show-germanys-collusion-with-nsa/a-17726141
¤ NSA and BND Spying Telecommunications ::
http://cryptome.org/2014/06/nsa-german-spying.pdf
http://cryptome.org/2014/06/nsa-der-spiegel-14-0616.pdf
¤ Germany Cooperates Closely with NSA ::
http://www.spiegel.de/international/world/spiegel-reveals-cooperation-between-nsa-and-german-bnd-a-909954.html
¤ Key Partners ; Secret Links Between BND and NSA ::
http://www.spiegel.de/international/world/german-intelligence-worked-closely-with-nsa-on-data-surveillance-a-912355.html
▲ FLASHBACK ; Angela Merkel Compares NSA to Stasi ::
In an angry exchange with Barack Obama, Angela Merkel
has compared the snooping practices of the US with those
of the Stasi, the ubiquitous and all-powerful secret
police of the communist dictatorship in East Germany,
where she grew up.
http://www.theguardian.com/world/2013/dec/17/merkel-compares-nsa-stasi-obama
_______________________________________
¤ NSA FORNSAT Intercept in 2002 and Economic Motives ::
http://electrospaces.blogspot.fr/2014/07/the-national-security-agency-in-2002.html
_______________________________________
¤ Look Out for Falling Redactions ::
http://cryptome.org/2014/06/nsa-falling-redactions.pdf
_______________________________________
¤ Dump of BOUNDLESSINFORMANT IP Data ::
https://gist.github.com/9b/de3f0510cccbd5dbfdf0
_______________________________________
¤ NSA Playset ; Tailored Access for Hackers ::
http://www.nsaplayset.org/
_______________________________________
¤ How Secret Partners Expand NSA’s Surveillance Dragnet ::
https://firstlook.org/theintercept/article/2014/06/18/nsa-surveillance-secret-cable-partners-revealed-rampart-a/
https://www.techdirt.com/articles/20140619/08062627624/nsa-working-with-denmark-germany-to-access-three-terabits-data-per-second-overseas-cables.shtml
http://www.infowars.com/nsa-uses-33-countries-to-intercept-web-traffic-snowden-files/
http://gigaom.com/2014/06/20/governments-let-nsa-tap-cables-on-their-territory-latest-snowden-revelations-show/
¤ Foreign Partner Access to Black Budget FY 2013 ::
https://s3.amazonaws.com/s3.documentcloud.org/documents/1200866/foreignpartneraccessbudgetfy2013-redacted.pdf
¤ Overview Presenting the RAMPART-A Spy Program ::
https://s3.amazonaws.com/s3.documentcloud.org/documents/1200860/odd-s3-overviewnov2011-v1-0-redacted-information.pdf
¤ Three RAMPART-A Slides ::
https://s3.amazonaws.com/s3.documentcloud.org/documents/1200865/uodds2overview-v1-1-redacted-information-dk.pdf
¤ Black Budget FY 2013 / RAMPART-A Slides (Mirror) ::
http://cryptome.org/2014/06/nsa-intercept-14-0618.pdf
¤ Update ; Intercept Releases More RAMPART-A Slides ::
http://cryptome.org/2014/06/nsa-information-intercept-14-0619.pdf
_______________________________________
Keith Alexander’s talking points for strategic meeting
between the NSA and the Danish Defense Intelligence
Service (DDIS).
https://s3.amazonaws.com/s3.documentcloud.org/documents/1200859/diropeningremarksguidancefordp1-v1-1-v1-0.pdf
_______________________________________
¤ FISA Court Rules to Retain Spy Data Past 5 Years ::
http://cryptome.org/2014/04/fisc-br14-01-14-0410.pdf
¤ NSA Admits They Keep All Spy Data Past 5 Years ::
http://dailycaller.com/2014/06/10/nsa-our-systems-are-too-complex-to-stop-deleting-evidence/
_______________________________________
¤ Head of GCHQ Very Pissed Off Over Media Coverage ::
http://www.telegraph.co.uk/technology/internet-security/10910212/Head-of-GCHQ-launches-thinly-veiled-attack-on-The-Guardian.html
_______________________________________
¤ GCHQ Forced to Reveal Secret Policy for Mass Spying
of Residents’ Facebook and Google Use ::
https://www.privacyinternational.org/press-releases/uk-intelligence-forced-to-reveal-secret-policy-for-mass-surveillance-of-residents
http://www.nytimes.com/2014/06/17/business/international/british-spy-agencies-said-to-assert-broad-power-to-intercept-web-traffic.html?_r=0
http://hosted.ap.org/dynamic/stories/E/EU_BRITAIN_ONLINE_SURVEILLANCE
Britain’s top counter-terrorism official has been forced
to reveal a secret Government policy justifying the mass
surveillance of every Facebook, Twitter, Youtube and Google
user in the UK.
https://www.privacyinternational.org/sites/privacyinternational.org/files/downloads/press-releases/witness_st_of_charles_blandford_farr.pdf
http://cryptome.org/2014/06/gchq-farr-pi.pdf (mirror)
_______________________________________
¤ THIS IS HOW THE US GOVERNMENT TREATS WHISTLEBLOWERS ;
CIA Rendition Jet Was Waiting in Europe to Blackbag Snowden ::
http://www.theregister.co.uk/2014/06/13/cia_rendition_jet_was_waiting_in_europe_to_snatch_snowden/
---------------------------------------
¤ Leak Spy Documents @ The Intercept Dropbox ::
http://y6xjgkgwj47us5ca.onion/
_______________________________________
¤ PRISM FOIA Request Highly Censored ::
http://cryptome.org/2014/06/nsa-prism-foia-email.pdf
_______________________________________
¤ DEA-NSA SANDKEY Voice Intercepts ::
http://cryptomeorg.siteprotect.net/dea-nsa-sandkey.pdf
Mirrored » http://fileb.ag/pmu6ugcxsxq1
_______________________________________
¤ How Governments Around The World Responded To
Snowden’s Revelations ::
https://www.techdirt.com/articles/20140612/03532827554/how-have-governments-around-world-responded-to-snowdens-revelations.shtml
_______________________________________
¤ GCHQ’s Beyond Top Secret Middle Eastern Spy Base ::
http://www.theregister.co.uk/2014/06/03/revealed_beyond_top_secret_british_intelligence_middleeast_internet_spy_base/
¤ GCHQ’s Middle Eastern Spy Base Eyeball ::
http://cryptome.org/2014-info/gchq-seeb/gchq-seeb.htm
_______________________________________
¤ UK Teleco Admits Governments Used Secret Cables
to Tap Phones ::
http://www.telegraph.co.uk/technology/internet-security/10880208/Vodafone-governments-use-secret-cables-to-tap-phones.html
_______________________________________
¤ Some Numbers About NSA’s Data Collection ::
http://electrospaces.blogspot.com.br/2014/06/some-numbers-about-nsas-data-collection.html
_______________________________________
¤ NSA Whistleblower Russel Tice Reveals NSA Has
Documents “Above Top Secret” and Many Are Burned
After Covert Operations, Routinely ::
“Think of it this way. Remember I told you about the
NSA doing everything they could to make sure that the
information from 40 years ago – from spying on Frank
Church and Lord knows how many other Congressman that
they were spying on – was hidden?
Now do you think they’re going to put that information
into Powerpoint slides that are easy to explain to
everybody what they’re doing?
They would not even put their own NSA designators on
the reports [so that no one would know that] it came
from the NSA. They made the reports look like they were
Humint (human intelligence) reports. They did it to
hide the fact that they were NSA and they were doing
the collection. That’s 40 years ago. [The NSA and other
agencies are still doing "parallel construction",
"laundering" information to hide the fact that the
information is actually from mass NSA surveillance.]
Now, what NSA is doing right now is that they’re taking
the information and they’re putting it in a much higher
security level. It’s called “ECI” – Exceptionally Controlled
Information – and it’s called the black program … which I
was a specialist in, by the way.
I specialized in black world – DOD and IC (Intelligence
Community) – programs, operations and missions … in “VRKs”,
“ECIs”, and “SAPs”, “STOs”. SAP equals Special Access
Program. It’s highly unlikely Mr. Snowden had any access
to these. STO equals Special Technical Operations It’s
highly unlikely Mr. Snowden had any access to these.
Now in that world – the ECI/VRK world – everything in that
system is classified at a higher level and it has its own
computer systems that house it. It’s totally separate than
the system which Mr. Snowden was privy to, which was called
the “JWICS”: Joint Worldwide Intelligence Communications
System. The JWICS system is what everybody at NSA has access
to. Mr Snowden had Sys Admin [systems administrator] authority
for the JWICS.
And you still have to have TS/SCI clearance [i.e. Top Secret/
Sensitive Compartmented Information - also known as “code word”
- clearance] to get on the JWICS. But the ECI/VRK systems are
much higher[levels of special compartmentalized clearance]
than the JWICS. And you have to be in the black world to get
that [clearance].
ECI = Exceptionally Controlled Information. I do not believe
Mr. Snowden had any access to these ECI controlled networks).
VRK = Very Restricted Knowledge. I do not believe Mr. Snowden
had any access to these VRK controlled networks.
These programs typically have, at the least, a requirement of
100 year or until death, ’till the person first being “read in”
[i.e. sworn to secrecy as part of access to the higher
classification program] can talk about them. [As an interesting
sidenote, the Washington Times reported in 2006 that – when Tice
offered to testify to Congress about this illegal spying – he
was informed by the NSA that the Senate and House intelligence
committees were not cleared to hear such information.]
It’s very compartmentalized and – even with stuff that they had
– you might have something at NSA, that there’s literally 40
people at NSA that know that it’s going on in the entire agency.
When the stuff came out in the New York Times [the first big
spying story, which broke in 2005] – and I was a source of
information for the New York Times – that’s when President Bush
made up that nonsense about the “terrorist surveillance program.”
By the way, that never existed. That was made up.
There was no such thing beforehand. It was made up … to try
to placate the American people.
The NSA IG (Inspector General) – who was not cleared for this –
all of a sudden is told he has to do an investigation on this;
something he has no information or knowledge of.
So what they did, is they took a few documents and they
downgraded [he classification level of the documents] – just
a few – and gave them to them to placate this basic whitewash
investigation.”
http://cryptome.org/2014/06/tice-shoot-snowden.pdf
http://www.washingtonsblog.com/2014/06/original-nsa-whistleblower-snowden-
http://www.infowars.com/nsa-whistleblower-snowden-never-had-access-to-the-juiciest-documents/
http://www.youtube.com/watch?v=az-YWMNWQuU
http://www.youtube.com/watch?v=GJS7F-mShpI
_______________________________________
¤ NSA MYSTIC SIGAD Reporting Tabulation ::
http://cryptome.org/2014/06/nsa-sigad-reporting.pdf
¤ NSA SOMALGET Spy Programme ::
https://s3.amazonaws.com/s3.documentcloud.org/documents/1164088/somalget.pdf
¤ SOMALGET SSO Dictionary Excerpt ::
https://s3.amazonaws.com/s3.documentcloud.org/documents/1164086/sso-dictionary-excerpt.pdf
¤ MYSTIC/SOMALGET Spy Documents ::
http://cryptome.org/2014/05/nsa-intercept-14-0519.pdf
¤ Toward the Identity of “Country X” in MYSTIC ::
http://cryptome.org/2014/05/nsa-mystic-identity.pdf
¤ Wikileaks Releases Identity of “Country X” ::
http://wikileaks.org/WikiLeaks-statement-on-the-mass.html
http://www.infowars.com/country-x-wikileaks-reveals-nsa-recording-nearly-all-phone-calls-in-afghanistan/
¤ Google Idea’s Director Jared Cohen Was Tasked With
Getting Afghan Telcos to Move Towers to US Bases ::
https://wikileaks.org/plusd/cables/09KABUL2020_a.html
¤ Data Pirates of the Caribbean ; The NSA Is
Recording Every Cell Phone Call in the Bahamas ::
https://firstlook.org/theintercept/article/2014/05/19/data-pirates-caribbean-nsa-recording-every-cell-phone-call-bahamas/
¤ UPDATE ; The Bahamas Wants to Know Why the NSA is
Recording Its Phone Calls ::
https://firstlook.org/theintercept/2014/05/20/bahamas-wants-know-nsa-recording-phone-calls/
_______________________________________
¤ NSA Collecting Millions of Faces From Web Images ::
The FBI, DHS, state and local law enforcement
agencies are now also using the same facial
recognition systems as the NSA. Other biometric
identification systems are being developed as well.
A panopticon for endless spying in the police state.
http://www.nytimes.com/2014/06/01/us/nsa-collecting-millions-of-faces-from-web-images.html
http://rt.com/usa/162868-nsa-snowden-social-facial/
¤ NSA Identity Spying ::
http://cryptome.org/2014/06/nsa-identity-spy.pdf
_______________________________________
¤ 10 Things (Most People) Didn’t Know Before Snowden ::
1. Everything you do online can be monitored.
2. What you do offline can be monitored!
3. They are collecting your phone records, too.
4. In some countries, it is not just metadata.
5. Or ordinary citizens for that matter.
6. The NSA engages in industrial espionage.
7. The NSA is also hacking the global financial system.
8. The NSA is also hacking into online video games.
9. The NSA uses pornography to honeytrap targets.
10. The NSA dragnet is collecting facial images.
http://rt.com/usa/163700-year-whistleblower-before-snowden/
And a few more to think about,
11. The NSA has access to crypto-breaking supercomputers.
12. The NSA spied on human rights activists, organizations.
13. Google does in fact have personal relations in the NSA.
14. All electronic products are manufactured with backdoors.
15. NSA tampers with electronics being shipped by mail.
_______________________________________
▼ Snowden Strikes Back at NSA, Emails NBC News ::
Fugitive Edward Snowden on Friday challenged the
NSA’s insistence that it has no evidence he tried
to raise concerns about the agency’s surveillance
activity before he began leaking government documents
to reporters, calling the response a “clearly tailored
and incomplete leak ... for a political advantage.”
“The NSA’s new discovery of written contact between
me and its lawyers -- after more than a year of denying
any such contact existed - raises serious concerns,”
Snowden said in an email Friday to NBC News. “It
reveals as false the NSA’s claim to Barton Gellman
of the Washington Post in December of last year, that
‘after extensive investigation, including interviews
with his former NSA supervisors and co-workers, we
have not found any evidence to support Mr. Snowden’s
contention that he brought these matters to anyone’s
attention.’”
Snowden’s email followed Thursday’s release by the US
Office of the Director of Intelligence of an email
exchange between Snowden and the NSA’s Office of the
General Counsel. The Washington Post received and
published a similar response from Snowden on Thursday.
http://www.nbcnews.com/feature/edward-snowden-interview/snowden-strikes-back-nsa-emails-nbc-news-n118821
▲ NSA Oversight Training, OVSC1800 Minimization Training,
NSA OGC Snowden Emails on OVSC1800 Course ::
http://cryptome.org/2014/05/nsa-oversight.pdf
http://cryptome.org/2014/05/nsa-ovsc1800.pdf
http://cryptome.org/2014/05/nsa-ogc-snowden.pdf
---------------------------------------
¤ NBC Interviews Edward Snowden (Full) ::
https://www.youtube.com/watch?v=yNhMXyAdjp8
Mirror here » http://upstore.net/62ocku
_______________________________________
¤ What Does GCHQ Know About Our Devices We Don’t? ::
https://www.privacyinternational.org/blog/what-does-gchq-know-about-our-devices-that-we-dont
¤ A Hint? ; “Flashdrive Cache Paths” (Repost) ::
http://paste.security-portal.cz/view/b30bffb6
_______________________________________
¤ Onionshare App Lets the Next Snowden Send Big Files
Securely and Anonymously ::
OnionShare lets you securely and anonymously
share a file of any size with someone. It works
by starting a web server, making it accessible
as a Tor hidden service, and generating an
unguessable URL to access and download the file.
It doesn’t require setting up a server on the
internet somewhere or using a third party
filesharing service. You host the file on your
own computer and use a Tor hidden service to
make it temporarily accessible over the internet.
The other user just needs to use Tor Browser to
download the file from you.
https://github.com/micahflee/onionshare
http://www.wired.com/2014/05/onionshare/
¤ Mirrored Onionshare App w/ Report (ZIP) ::
https://anonfiles.com/file/9805fddaf90e3ecf37b957e5bed3f474
¤ Mirrored Onionshare App w/ Report (RAR) ::
https://anonfiles.com/file/ea22d9e866875e02a5a0c95e2f69b5d4
_______________________________________
¤ Former NSA-CIA Director Michael Hayden Admits
Metadata SIGINT Collection Used to Kill People ::
http://www.youtube.com/watch?v=yaTGkSoI8Ic
¤ The Price of Privacy Debate - Re-Evaluating the NSA ::
http://www.youtube.com/watch?v=kV2HDM86XgI
_______________________________________
¤ Glenn Greenwald - “No Place To Hide” (EPUB) ::
magnet:?xt=urn:btih:2d1ace5d3b854a9afffc4c2b576cdadc4a0e2718
http://torrage.com/torrent/2D1ACE5D3B854A9AFFFC4C2B576CDADC4A0E2718.torrent
¤ Glenn Greenwald - “No Place To Hide” (PDF) ::
http://cryptome.org/2014/05/npth.7z
▼ NSA Documents From “No Place To Hide” ::
http://hbpub.vo.llnwd.net/o16/video/olmk/holt/greenwald/NoPlaceToHide-Documents-Uncompressed.pdf
Mirror here » http://fileb.ag/94dwpno2eokp
▲ An Avalanche of Snowden Documents To Be Released
Online Next Week ::
http://www.engadget.com/2014/05/08/an-avalanche-of-new-snowden-documents-will-go-online-next-week/
---------------------------------------
¤ NSA’s Largest Cable Tapping Program ::
http://electrospaces.blogspot.de/2014/05/nsas-largest-cable-tapping-program.html
¤ Glenn Greenwald On Democracy Now ::
http://publish.dvlabs.com/democracynow/ipod/dn2014-0513.mp4
http://publish.dvlabs.com/democracynow/ipod/dn2014-0514.mp4
¤ New Snowden Document Implies NSA May Be Putting
Israel’s Security Ahead of America’s ::
http://www.infowars.com/new-snowden-document-implies-nsa-may-be-putting-israels-security-ahead-of-americas/
¤ New Snowden Documents Reveal Depth Of Facebook
Infiltration by NSA ::
http://revolution-news.com/new-snowden-documents-reveal-depth-of-facebook-infiltration-by-nsa/
http://www.infowars.com/how-the-nsa-fbi-made-facebook-the-perfect-mass-surveillance-tool/
¤ Leaked Photos of the NSA’s TAO Factory ::
A document included in the trove of National Security
Agency files released with Glenn Greenwald’s book
“No Place To Hide” details how the agency’s Tailored
Access Operations (TAO) unit and other NSA employees
intercept servers, routers, and other network gear
being shipped to organizations targeted for surveillance
and install covert implant firmware onto them before
they’re delivered.
http://govtslaves.info/leaked-photos-nsas-router-upgrade-factory/
http://cryptome.org/2014/05/nsa-customs.htm
¤ Cisco Letter to Obama Objecting to NSA Implants ::
http://cryptome.org/2014/05/cisco-implant.pdf
¤ No Place to Hide Documents Compared to Previous ::
http://cryptome.org/2014/05/npth-docs-compare.pdf
______________________________________
¤ House Leaders and Obama Regime Water Down
Surveillance Reform Bill ::
http://newamerica.net/node/110983
_______________________________________
¤ US Justice Department Told Supreme Court to Dismiss
NSA Spying Cases? ::
http://www.theguardian.com/commentisfree/2014/may/17/government-lies-nsa-justice-department-supreme-court
_______________________________________
¤ The New Yorker Interviews Keith Alexander ::
http://www.newyorker.com/online/blogs/newsdesk/2014/05/were-at-greater-risk-q-a-with-general-keith-alexander.html
_______________________________________
▼ Leak Spy Documents @ The Intercept Dropbox ::
http://y6xjgkgwj47us5ca.onion/
http://cryptome.org/2014/05/intercept-drop.pdf
▲ Obama’s Directive Makes Mere Citing of Snowden’s
Leaks a Punishable Offense ::
In a new policy directive from the Obama administrative,
national security and other government officials will no
longer be allowed to publicly discuss or even reference
news reporting that is based on “unauthorized leaks.”
https://www.commondreams.org/headline/2014/05/09
_______________________________________
¤ Munk Debate on State Surveillance ::
Greenwald, Ohanian vs Hayden, Dershowitz
http://www.youtube.com/watch?v=_d1tw3mEOoE
______________________________________
¤ NSA ; Manageable Network Plan ::
http://cryptome.org/2014/05/nsa-network-plan.pdf
______________________________________
¤ United States of Secrets ; How the Government
Came to Spy on Millions of Americans ::
Part One: Tuesday, May 13, 2014, at 9 p.m. on PBS
Part Two: Tuesday, May 20, 2014, at 10 p.m. on PBS
http://www.pbs.org/wgbh/pages/frontline/united-states-of-secrets/
http://www.pbs.org/wgbh/pages/frontline/pressroom/press-release-united-states-of-secrets-how-the-government-came-to-spy-on-millions-of-americans/
______________________________________
¤ NSA, Google Inc. Relationship Emails ::
http://cryptome.org/2014/05/nsa-google.pdf
¤ NSA Scares CEOs Into Cyber Spying (Related) ::
http://cryptome.org/2014/05/nsa-scares-ceos.pdf
¤ Emails Reveal Close Google Relationship With NSA ::
“Keep in mind that social media survives by
selling user data. Spying is their business model.
In padding their bottom lines executives have
worked diligently to dilute privacy legislation
in addition to garnering a myriad of fines. All
of this data harvesting services a data broker
industry which generates something in the
neighborhood of $200 billion in revenue annually.”
- Bill Blunden, counterpunch.org
http://america.aljazeera.com/articles/2014/5/6/nsa-chief-google.html
http://www.theregister.co.uk/2014/05/07/googles_nsa_data_dealings_not_as_bad_as_first_thought_theyre_much_worse/
http://www.counterpunch.org/2014/05/09/the-nsas-corporate-collaborators/
_______________________________________
¤ GCHQ Director Visits NSA for PRISM Data Access ::
Hosted Dinner: 30 April 2013//1830Hrs - Quarters
Hosted Discussions: 1 May 2013//0800-0830
“PURPOSE OF THE VISIT: (U//FOUO) As the Director
of GCHQ, Sir Iain wants to reconnect with NSA
Leadership on matters of mutual concern, and to
ensure each partner is aware of the other’s
activities and future plans.” … …
“Unsupervised access to FAA 702 data, in a manner
similar to Olympics Option, remains on GCHQ’s wish
list and is something its leadership still desires.”
http://cryptome.org/2014/04/nsa-gchq-lobban-visit.pdf
¤ GCHQ Unsupervised PRISM Access in 2012 ::
http://cryptome.org/2014/04/nsa-prism-olympics.pdf
¤ NSA Spied “Suspected Terrorists” At 2012 Olympics ::
http://cryptome.org/2014/04/nsa-ghostmachine-echobase.pdf
¤ NSA & GCHQ Eyeballed “Suspected Terrorists” Before,
During and After 2012 Olympics ::
The Snowden files do not indicate whether NSA granted
GCHQ’s request, but they do show that the NSA was
“supportive” of the idea, and that GCHQ was permitted
extensive access to PRISM during the London Olympics
in 2012. The request for the broad access was
communicated at “leadership” level, according to
the documents. Neither agency would comment on the
proposed arrangement or whether it was approved. … …
The data sharing between the agencies during the
Olympics, though, was not isolated to PRISM. … …
The NSA was funneling troves of intercepted data
to GCHQ from a system called GHOSTMACHINE, a massive
cloud database used by the NSA to analyze metadata
and store, according to one document in the Snowden
archive, “100s of billions of entries.”
https://firstlook.org/theintercept/article/2014/04/30/gchq-prism-nsa-fisa-unsupervised-access-snowden/
_______________________________________
¤ NSA MYSTIC Telephone Interception Program ::
http://s3.documentcloud.org/documents/1086618/mysticssoweeklybrief.pdf
http://s3.documentcloud.org/documents/1086616/fromsso-key-brief-overview.pdf
http://s3.documentcloud.org/documents/1088934/mystic-tearsheet-cropped-v2.pdf
The National Security Agency has built a surveillance
system capable of recording “100 percent” of a foreign
country’s telephone calls, enabling the agency to rewind
and review conversations as long as a month after they
take place, according to people with direct knowledge of
the effort and documents supplied by former contractor
Edward Snowden.
A senior manager for the program compares it to a time
machine — one that can replay the voices from any call
without requiring that a person be identified in advance
for surveillance.
The voice interception program, called MYSTIC, began in
2009. Its RETRO tool, short for “retrospective retrieval,”
and related projects reached full capacity against the
first target nation in 2011. Planning documents two years
later anticipated similar operations elsewhere.
In the initial deployment, collection systems are recording
“every single” conversation nationwide, storing billions of
them in a 30-day rolling buffer that clears the oldest
calls as new ones arrive, according to a classified summary.
The call buffer opens a door “into the past,” the summary
says, enabling users to “retrieve audio of interest that
was not tasked at the time of the original call.” Analysts
listen to only a fraction of 1 percent of the calls, but
the absolute numbers are high. Each month, they send
millions of voice clippings, or “cuts,” for processing
and long-term storage.
http://www.washingtonpost.com/world/national-security/nsa-surveillance-program-reaches-into-the-past-to-retrieve-replay-phone-calls/2014/03/18/226d2646-ade9-11e3-a49e-76adc9210f19_story.html
¤ Washington Post Censors MYSTIC Slides ::
The Washington Post is reporting, based on the
files of whistleblower Edward Snowden, that the NSA
is able to store every phone call made in an entire
nation and replay them for up to 30 days. Not only
can the agency do this, but there is a country where
it’s actually doing this now–the Post knows where,
but they won’t say.
http://www.fair.org/blog/2014/03/19/the-nsa-built-a-time-machine-but-washington-post-wont-say-where/
¤ NSA Records All Phone Calls Using Project MYSTIC ::
http://www.youtube.com/watch?v=NYq44T5e3lU
Mirror here » http://fileb.ag/3cva7msxqefx
_______________________________________
¤ NSA/NIS Dagbladet Documents Decensored ::
There are a couple images in the latest Dagbladet
story from the Snowden trove that were originally
blurred instead of blacked out. This allowed the
text to be recovered. There was no particular point
in making a project out of the first, since it had
already been published previously. The second was
completely decoded in a matter of a few hours.
http://cryptome.org/2014/04/DagbladetDecensor.pdf
¤ NSA/NIS Aquired Supercomputer to Break Crypto ::
The Norwegian Inteligence Service (NIS) is also
nauseous from the unmanageable amounts of data it
is served daily. This is partly the reason why NSA
now purchases a supercomputer codenamed Steelwinter.
This information comes from a document Edward Snowden
took from NSA and has later shared with Dagbladet.
The document, marked “top secret” is a summary of
how the NSA sees the collaboration with Norway after
a meeting between the two services in March 2013.
The supercomputer NIS buys is a derivation of the
so-called Windsor Blue supercomputer.
“NIS is in the process of acquiring STEEL WINTER
(a WINDSORBLUE derivative supercomputer) and has
entered into a partnership with NSA - cryptanalysis
( ...) service to develop applications of mutual
benefit” the document says.
“Windsor Blue” is the name of a program for
supercomputers at the American IT-giant IBM. The
company is working towards creating a so-called
exascale supercomputer which means it can make a
quintillion - 1,000,000,000,000,000,000 - calculations
per second.
http://www.dagbladet.no/2014/04/26/nyheter/snowden_i_norge/edward_snowden/nsa/etterretningstjenesten/32991102/
_______________________________________
¤ Germany Blocks Edward Snowden From Testifying ::
http://www.theguardian.com/world/2014/may/01/germany-edward-snowden-nsa-inquiry
_______________________________________
¤ NSA Spies More on Americans Than Russians ::
http://www.nationaljournal.com/tech/edward-snowden-nsa-spies-more-on-americans-than-russians-20140430
_______________________________________
¤ Snowden Asks Putin About Russian Spying ::
http://www.youtube.com/watch?v=w1yH554emkY
http://rt.com/news/snowden-putin-spy-online-140/
http://www.zerohedge.com/news/2014-04-17/snowden-calls-putin-telethon-discuss-legality-mass-surveillance
_______________________________________
¤ NSA Spied on Human Rights Workers ::
The US has spied on the staff of prominent
human rights organisations, Edward Snowden has
told the Council of Europe in Strasbourg, Europe’s
top human rights body.
Giving evidence via a videolink from Moscow,
Snowden said the National Security Agency – for
which he worked as a contractor – had deliberately
snooped on bodies like Amnesty International and
Human Rights Watch.
http://www.theguardian.com/world/2014/apr/08/edwards-snowden-us-government-spied-human-rights-workers
¤ Edward Snowden Testimony @ Parliamentary Assembly
of the Council of Europe (Full) ::
http://www.youtube.com/watch?v=3f8Lunf1a2w
_______________________________________
¤ EU High Court Allows Banning Metadata Collection ::
Due to the particularities of EU lawmaking, the
effects of the directive (spying) will still be in
place in most EU member states for the time being.
According to EU legal procedure, a directive is
a type of law that requires each of the 28 member
countries to “transpose” it into their own national
laws. In this case, countries could even choose
whether to expand the six-month requirement to as
high as two years. ... ...
Current EU data retention law will remain in
effect until repealed legislatively or invalidated
by domestic courts.
http://arstechnica.com/tech-policy/2014/04/eu-high-court-strikes-down-metadata-collection-law/
_______________________________________
¤ Masterspy Orders Snub on Media Contacts ::
http://www.infowars.com/intelligence-head-who-lied-to-congress-bans-employees-from-talking-to-media/
_______________________________________
¤ US Whines - ‘Anti-Snooping Plans are Unfair’ ::
“Recent proposals from countries within the
European Union to create a Europe-only electronic
network (dubbed a ‘Schengen cloud’ by advocates) or
to create national-only electronic networks could
potentially lead to effective exclusion or discrimination
against foreign service suppliers that are directly
offering network services, or dependent on them,”
the USTR said in its annual report.
http://www.ustr.gov/sites/default/files/2014%20NTE%20Report%20on%20FTB.pdf
http://inserbia.info/today/2014/04/us-blasts-eus-plan-for-schengen-cloud/
http://rt.com/news/us-europe-nsa-snowden-549/
¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯
¤ ACLU Offers NSA Document Search ::
https://www.aclu.org/nsa-documents-search
¤ ACLU Offers Mirrored NSA Documents ::
https://www.aclu.org/nsa-documents-released-public-june-2013
_______________________________________
¤ KILLCEN ; Eyeballing_Snowden_Info.zip ::
Includes all news reports, videos, images, slides
and documents from and related to Snowden’s leaks
so far, up to April 2nd of 2014. I’m still collecting
any information that comes out and will provide an
updated archive from time to time.
After decompression - the main folder is titled
“Eyeballing_Snowden_Info” and it holds a total of
927MB decompressed.
This was stored on an old OFFLINE system, without
any WiFi card or modem attached so the archive is
safe from being modified, exploited or stolen.
Eyeballing_Snowden_Info.zip
(1,325 files | ZIP | 743MB)
http://fileb.ag/1ixi6dqmbj80
http://fpsbay.com/download/64465X13965734822241X344921/Eyeballing_Snowden_Info.zip
http://davvas.com/l21m47ls819e
http://jumbofiles.org/newfile?n=528498&Eyeballing_Snowden_Info.zip
_______________________________________
¤ It’s Finally Admitted! ::
https://www.documentcloud.org/documents/1100298-unclassified-702-response.html
http://www.emptywheel.net/2014/04/01/james-clapper-confirms-vadm-mike-rogers-needlessly-obfuscated-in-confirmation-hearing/
http://www.theguardian.com/world/2014/apr/01/nsa-surveillance-loophole-americans-data
http://www.zdnet.com/nsa-searched-u-s-calls-emails-without-warrant-u-s-intelligence-chief-admits-7000027938/
http://rt.com/usa/clapper-wyden-nsa-fisa-665/
_______________________________________
¤ NSA Spy Chiefs of State ::
http://cryptome.org/2014/03/nsa-spy-cos.pdf
¤ NSA Spy Chiefs of State (Full List) ::
http://cryptome.org/2014/03/nsa-nymrod-spy-cos.pdf
¤ GCHQ and NSA Targeted Private German Companies ::
http://www.spiegel.de/international/germany/gchq-and-nsa-targeted-private-german-companies-a-961444.html
https://firstlook.org/theintercept/article/2014/03/29/der-spiegel-nsa-ghcq-hacked-german-companies-put-merkel-list-122-targeted-leaders/
https://www.wsws.org/en/articles/2014/03/31/nsas-m31.html
http://leaksource.info/2014/03/31/122-country-leaders-in-nsas-target-knowledge-database-2009-document/
▲ UPDATE ; European Parliament Suspends US
Trade Talks Due to Political Spying ::
http://falkvinge.net/2014/03/12/europarl-suspends-u-s-trade-talks-data-sharing-over-mass-surveillance/
_______________________________________
¤ Video Demonstration of Two Intelligence Analysis Tools ::
http://electrospaces.blogspot.se/2014/03/video-demonstration-of-two-intelligence.html
¤ Telephone Call Data Record Link Analysis Software ::
http://www.youtube.com/watch?v=J38tKqq9kpY
¤ IBM i2 Analysts Notebook - Esri Edition ::
http://www.youtube.com/watch?v=MJ5CovDQDYU
¤ Report and Both Videos ZIPPED & Mirrored ::
http://fpsbay.com/download/64445X13961058822231X344721/Two%20Intelligence%20Analysis%20Tools.zip
_______________________________________
¤ NSA’s New Civil Liberties and Privacy Officer ::
Becky Richards promises more transparency. She
also promises the NSA will “build privacy into
new technologies” to “protect privacy and civil
liberties” and “to be as transparent with the
public as possible” as well helping the public
“understand how we’re protecting their privacy,
how we’re protecting national security.”
http://cryptome.org/2014/03/nsa-richards-14-0320.htm
¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯
¤ NSA Huawei SHOTGIANT Hardware Exploit ::
http://cryptome.org/2014/03/nsa-huawei.pdf
http://cryptome.org/2014/03/nsa-huawei-02.pdf
¤ Huawei Global Cyber Security Assurance ::
http://cryptome.org/2014/03/huawei-cyber-security.pdf
¤ Huawei Network Migration Tool (48.7MB) ::
http://cryptome.org/2014/03/huawei-network-migration.zip
¤ NSA Breached Chinese Telecom Giant Huawei ::
The American government conducted a major intelligence
offensive against China, with targets including the
Chinese government and networking company Huawei,
according to documents from former NSA worker Edward
Snowden that have been viewed by SPIEGEL and the
New York Times. Among the American intelligence
service’s targets were former Chinese President
Hu Jintao, the Chinese Trade Ministry, banks, as
well as telecommunications companies.
But the NSA made a special effort to target Huawei.
With 150,000 employees and €28 billion ($38.6 billion)
in annual revenues, the company is the world’s second
largest network equipment supplier. At the beginning
of 2009, the NSA began an extensive operation, referred
to internally as “Shotgiant,” against the company, which
is considered a major competitor to US-based Cisco. The
company produces smartphones and tablets, but also mobile
phone infrastructure, WLAN routers and fiber optic cable
-- the kind of technology that is decisive in the NSA’s
battle for data supremacy.
A special unit with the US intelligence agency succeeded
in infiltrating Huwaei’s network and copied a list of
1,400 customers as well as internal documents providing
training to engineers on the use of Huwaei products,
among other things.
http://www.nytimes.com/2014/03/23/world/asia/nsa-breached-chinese-servers-seen-as-spy-peril.html
http://www.spiegel.de/international/world/nsa-spied-on-chinese-government-and-networking-firm-huawei-a-960199.html
http://news.yahoo.com/nsa-infiltrates-servers-china-telecom-giant-huawei-report-022030765--finance.html
http://www.forbes.com/sites/rosatrieu/2014/03/24/chinas-huawei-condemns-nsa-spying-calls-for-unity-against-cyber-mischief/
¤ Hong Lei Responds to Huawei NSA Backdoors ::
“We are seriously concerned with relevant reports. The
media has disclosed a lot about the eavesdropping,
surveillance and spying activities that the US has
carried out on other countries, including China. China
has lodged representations with the American side on
many occasions. We require the American side to give a
clear explanation and stop such behaviours.”
http://www.fmprc.gov.cn/eng/xwfw/s2510/t1140281.shtml
_______________________________________
¤ NSA Mapping and Spying System Administrators ::
The document consists of several posts – one of
them is titled “I hunt sys admins” – that were
published in 2012 on an internal discussion board
hosted on the agency’s classified servers. They
were written by an NSA official involved in the
agency’s effort to break into foreign network
routers, the devices that connect computer
networks and transport data across the Internet.
By infiltrating the computers of system administrators
who work for foreign phone and Internet companies,
the NSA can gain access to the calls and emails
that flow over their networks.
The classified posts reveal how the NSA official
aspired to create a database that would function
as an international hit list of sys admins to
potentially target. Yet the document makes clear
that the admins are not suspected of any criminal
activity – they are targeted only because they
control access to networks the agency wants to
infiltrate. “Who better to target than the person
that already has the ‘keys to the kingdom’?” one
of the posts says.
The NSA wants more than just passwords. The document
includes a list of other data that can be harvested
from computers belonging to sys admins, including
network maps, customer lists, business correspondence
and, the author jokes, “pictures of cats in funny
poses with amusing captions.”
http://cryptome.org/2014/03/nsa-hunt-sysadmins.pdf
https://firstlook.org/theintercept/document/2014/03/20/hunt-sys-admins/
https://firstlook.org/theintercept/article/2014/03/20/inside-nsa-secret-efforts-hunt-hack-system-administrators/
_______________________________________
¤ NSA Culture, 1980s to the 21st Century ::
http://cryptome.org/2014/03/nsa-sid-culture.pdf
_______________________________________
¤ CSEC SNOWGLOBE Slides ::
http://cryptome.org/2014/03/cse-snowglobe.pdf
http://s3.documentcloud.org/documents/1094526/babarfull.pdf
¤ Default Le Monde Report ::
http://www.lemonde.fr/international/article/2014/03/21/quand-les-canadiens-partent-en-chasse-de-babar_4387233_3210.html
¤ Le Monde Report Translated to English ::
http://slexy.org/view/s20ThA9Vog
_______________________________________
¤ DNI National Security / Secrecy Panic ::
http://cryptome.org/2014/03/litt-14-0318.pdf
_______________________________________
¤ TED ; Ask Snowden ::
http://www.youtube.com/watch?v=yVwAodrjZMY
http://iroots.org/2014/03/18/transcript-edward-snowden-today-at-ted-talk/
_______________________________________
¤ SXSW ; Ask Snowden ::
http://www.youtube.com/watch?v=nRQTDNbYjqY
http://cryptome.org/2014/03/snowden-sxsw.htm
http://blog.inside.com/blog/2014/3/10/edward-snowden-sxsw-full-transcription-and-video
_______________________________________
¤ NSA ; Ask Zelda ::
http://cryptome.org/2014/03/nsa-ask-zelda.pdf
https://firstlook.org/theintercept/article/2014/03/07/nsa-advice-columnist-seriously/
_______________________________________
¤ NSA Third Party (Five Eye) Relationships ::
http://cryptome.org/2014/03/nsa-third-parties.pdf
_______________________________________
¤ Comsec as Essential Public Utility ::
http://cryptome.org/2014/03/comsec-public-utility.htm
¤ Update ; Comsec as Essential Failure ::
http://cryptome.org/2014/03/comsec-ewafmss.htm
_______________________________________
¤ NSA/CSS Classification/Damage Control ::
http://cryptome.org/2014/03/nsa-policy-1-52.pdf
_______________________________________
¤ NSA/FBI Cryptanalysts Database Sharing ::
http://cryptome.org/2014/03/nsa-crypt-fisa-share.pdf
▲ FBI’s Data Intercept Technology Unit (DITU) ::
http://www.foreignpolicy.com/articles/2013/11/21/the_obscure_fbi_team_that_does_the_nsa_dirty_work
▲ FISA Court Releases FBI Spy Documents ::
http://cryptome.org/2013/09/fisc-13-0917-4.pdf
_______________________________________
¤ STELLARWIND Classification Guide ::
http://cryptome.org/2014/03/nsa-stellarwind-class.pdf
▲ NSA ; STELLARWIND Program ::
http://cryptome.org/2013/06/nsa-stellar-wind.pdf
_______________________________________
¤ FISC Orders to Preserve NSA Metadata Spying ::
http://cryptome.org/2014/03/fisc-br14-01-order-14-0312.pdf
http://cryptome.org/2014/03/fisc-br14-01-tro-14-0311.pdf
_______________________________________
¤ How the NSA Plans to Infect Millions of Computers
With Malware ::
Top-secret documents reveal that the National
Security Agency is dramatically expanding its
ability to covertly hack into computers on a mass
scale by using automated systems that reduce the
level of human oversight in the process.
The classified files – provided previously by NSA
whistleblower Edward Snowden – contain new details
about groundbreaking surveillance technology the
agency has developed to infect potentially millions
of computers worldwide with malware “implants.” The
clandestine initiative enables the NSA to break into
targeted computers and to siphon out data from foreign
Internet and phone networks.
https://prod01-cdn02.cdn.firstlook.org/wp-uploads/2014/03/nsa_malware_feature.jpg
https://prod01-cdn01.cdn.firstlook.org/wp-uploads/2014/03/turbine-large.jpg
https://prod01-cdn01.cdn.firstlook.org/wp-uploads/2014/03/tao-2-1024x768.png
https://s3.amazonaws.com/s3.documentcloud.org/documents/1076889/nsa-technology-directorate-analysis-of-converged.pdf
https://s3.amazonaws.com/s3.documentcloud.org/documents/1077724/industry-scale-exploitation.pdf
https://s3.amazonaws.com/s3.documentcloud.org/documents/1077721/thousands-of-implants.pdf
https://s3.amazonaws.com/s3.documentcloud.org/documents/1076859/nsa-phishing-tactics-and-man-in-the-middle-attacks.pdf
https://s3.amazonaws.com/s3.documentcloud.org/documents/1076891/there-is-more-than-one-way-to-quantum.pdf
https://s3.amazonaws.com/s3.documentcloud.org/documents/1076862/quantum-insert-diagrams.pdf
The covert infrastructure that supports the hacking
efforts operates from the agency’s headquarters in
Fort Meade, Maryland, and from eavesdropping bases
in the United Kingdom and Japan. GCHQ, the British
intelligence agency, appears to have played an integral
role in helping to develop the implants tactic.
The implants being deployed were once reserved for
a few hundred hard-to-reach targets, whose communications
could not be monitored through traditional wiretaps. But
the documents analyzed by The Intercept show how the NSA
has aggressively accelerated its hacking initiatives in
the past decade by computerizing some processes previously
handled by humans. The automated system – codenamed TURBINE
– is designed to “allow the current implant network to
scale to large size (millions of implants) by creating
a system that does automated control implants by groups
instead of individually.”
https://firstlook.org/theintercept/article/2014/03/12/nsa-plans-infect-millions-computers-malware/
¤ “Thousands of Implants” ::
“Building the operations floor and increasing the number
of break-out rooms will enable us to grow from the current
average of these operations per clay to over per day and will
facilitate the integration of 55 computer network operations
and real--time customer support. Sustained collection involving
automated implants pushing collected data from targets to the
RDC as well as voice and geolocation collection are managed from
the Operations Teaming Areas. The increased capacity in this
area will support a growth from managing an average of I 543
active implants today to simultaneously managing thousands of
implanted targets. The increased personnel capacity will support
this net growth in operations tempo and will allow the integration
of TAD's Requirements Targeting Division alongside the operators
in order to better target development and efficiently plan and
execute endpoint operations.”
http://cryptome.org/2014/03/nsa-thousands-implants.pdf
According to one top-secret document from 2012, the agency
can deploy malware by sending out spam emails that trick targets
into clicking a malicious link. Once activated, a “back-door
implant” infects their computers within eight seconds.
There’s only one problem with this tactic, codenamed WILLOWVIXEN:
According to the documents, the spam method has become less
successful in recent years, as Internet users have become wary
of unsolicited emails and less likely to click on anything that
looks suspicious.
Consequently, the NSA has turned to new and more advanced
hacking techniques. These include performing so-called
“man-in-the-middle” and “man-on-the-side” attacks, which
covertly force a user’s internet browser to route to NSA
computer servers that try to infect them with an implant.
To perform a man-on-the-side attack, the NSA observes a
target’s Internet traffic using its global network of covert
“accesses” to data as it flows over fiber optic cables or
satellites. When the target visits a website that the NSA
is able to exploit, the agency’s surveillance sensors alert
the TURBINE system, which then “shoots” data packets at the
targeted computer’s IP address within a fraction of a second.
In one man-on-the-side technique, codenamed QUANTUMHAND,
the agency disguises itself as a fake Facebook server. When
a target attempts to log in to the social media site, the
NSA transmits malicious data packets that trick the target’s
computer into thinking they are being sent from the real
Facebook. By concealing its malware within what looks like
an ordinary Facebook page, the NSA is able to hack into the
targeted computer and covertly siphon out data from its
hard drive. A top-secret animation demonstrates the tactic
in action.
¤ How the NSA Secretly Masqueraded as Facebook to Hack
Computers for Surveillance ::
https://player.vimeo.com/video/88822483
and @ https://www.youtube.com/watch?v=Td8nZscYvT4
Mirrored » http://megaswf.com/f/2647410
According to Matt Blaze, a surveillance and cryptography
expert at the University of Pennsylvania, it appears that
the QUANTUMHAND technique is aimed at targeting specific
individuals. But he expresses concerns about how it has
been covertly integrated within Internet networks as part
of the NSA’s automated TURBINE system.
¤ NSA TURBINE Automated Hacking Documents (Mirrored) ::
http://cryptome.org/2014/03/nsa-turbine-turmoil.pdf
http://cryptome.org/2014/03/nsa-industry-exploit.pdf
http://cryptome.org/2014/03/nsa-converged.pdf
http://cryptome.org/2014/03/nsa-quantum-insert.pdf
http://cryptome.org/2014/03/nsa-thousands-implants.pdf
http://cryptome.org/2014/03/nsa-gchq-quantumtheory.pdf
http://cryptome.org/2014/03/nsa-more-than-one-way.pdf
http://cryptome.org/2014/03/nsa-hammerchant.pdf
http://cryptome.org/2014/03/nsa-phishing-mtm.pdf
http://cryptome.org/2014/03/tao-quantuminsert-bonanza.htm
¤ Compare TURBINE Slides (Spiegel vs Intercept) ::
http://cryptome.org/2014/03/nsa-spot-differences.pdf
¤ NSA Denies Thousands of Implants ::
http://cryptome.org/2014/03/nsa-14-0313.pdf
_______________________________________
¤ NSA Hacking Routers & Social Media (Misc) ::
http://cryptome.org/2014/03/nsa-5-eyes-hacking.pdf
http://cryptome.org/2014/03/nsa-menwith-xkeyscore.pdf
http://cryptome.org/2014/03/nsa-selector.pdf
_______________________________________
¤ Cryptome Eyeballs Deputy Director Richard Ledgett ::
http://cryptome.org/2014-info/richard-ledgett/richard-ledgett.htm
_______________________________________
¤ NSA Assistance to Dutch Somali Piracy Control ::
Alliances between security services are usually
kept secret. But thousands of NSA documents are
now in the hands of a select group of journalists,
thanks to former NSA worker Edward Snowden. They
show that the NSA is the central organisation in
an international exchange of tapped telephone and
internet traffic.
The Netherlands is also a part of this. In September,
the German weekly Der Spiegel published an NSA document
about the Netherlands. The graph, entitled ‘Netherlands
– 30 days’, appeared to show that the NSA had listened
in to 1.8 million Dutch telephone calls.
But last month, the cabinet showed that the reality
was different. The 1.8 million telephone calls, wrote
home affairs minister Ronald Plasterk and defence
minister Jeanine Hennis, were not intercepted by
the Americans, but by the Dutch and then shared with
the NSA. It was not American, but Dutch espionage.
Two new documents give further details. The Netherlands,
it transpires, intercepts vast amounts of Somali
telephone traffic and shares it with the NSA. The
Dutch use the information to combat piracy. But the
Americans may possibly use the information for
something else as well: taking out terrorism suspects
by attacking them with armed drones.
http://cryptome.org/2014/03/nsa-dutch-assist.pdf
http://www.nrc.nl/nieuws/2014/03/05/the-secret-role-of-the-dutch-in-the-american-war-on-terror/
_______________________________________
¤ NSA Blames Tech Firms, Vice Versa ::
http://cryptome.org/2014/03/tech-stop-spying.htm
http://cryptome.org/2014/03/big-data-spying.htm
---------------------------------------
¤ Tech Firms Spy ::
http://cryptome.org/isp-spy/online-spying.htm
¤ NSA Spies Too ::
https://www.aclu.org/nsa-documents-released-public-june-2013
_______________________________________
¤ GCHQ “OPTIC NERVE” Spy Programme ::
http://cryptome.org/2014/02/gchq-optic-nerve.pdf
¤ GCHQ Collects Webcam Photos of Yahoo Users ::
The documents show that images were collected
from webcams at regular intervals, one image
every five minutes, and were used by the spy
agency to trial automated facial recognition
programs.
http://www.theguardian.com/world/2014/feb/27/gchq-nsa-webcam-images-internet-yahoo
http://www.infowars.com/you-read-it-here-first-government-spies-on-innocent-people-via-webcams-laptops-xbox/
http://news.softpedia.com/news/GCHQ-Collected-Webcam-Images-of-Millions-of-Yahoo-Fans-429705.shtml
https://www.wsws.org/en/articles/2014/02/28/gchq-f28.html
¤ FLASHBACK ; Infowars Warned Users in 2006 ::
http://www.infowars.com/articles/bb/gov_industry_use_computer_mics_spy_on_americans.htm
_______________________________________
¤ NSA Director Alexander’s Phones ::
http://electrospaces.blogspot.com/2014/02/nsa-director-alexanders-phones.html
_______________________________________
¤ NSA Seeks to Expand Database, 26 Feb 2014 ::
http://www.breitbart.com/InstaBlog/2014/02/27/NSA-Seeks-to-Expand-Database
http://www.uscourts.gov/uscourts/courts/fisc/br14-01-motion-140226.pdf
_______________________________________
¤ NSA Bugged Top German Officials After Orders
Not to Spy On Chancellor Claims New Whistleblower ::
http://www.mintpressnews.com/snowden-2-0-new-active-duty-nsa-whistleblower/180502/
http://techcrunch.com/2014/02/24/report-nsa-bugged-top-german-officials-after-obama-ordered-cease-of-spying-on-chancellor/
_______________________________________
¤ NSA Observer ::
https://nsa-observer.laquadrature.net/
_______________________________________
¤ Spy Documents Released Since June 2013 ::
https://www.aclu.org/nsa-documents-released-public-june-2013
http://cryptome.org/2014/02/snowden-tabulations.htm
_______________________________________
¤ NSA Spying Zero Hedge Connections ::
http://www.zerohedge.com/sites/default/files/images/user5/imageroot/2014/02/ZH%20browsing%20govt_1.jpg
http://www.zerohedge.com/news/2014-02-19/while-browsing-zero-hedge-certain-government-agency
_______________________________________
¤ NYT Samantha Storey Inept Redactions ::
Inlcudes two GCHQ documents.
01 “MOBILE THEME BRIEFING MAY 28 2010”
02 “Converged Analysis of Smartphone Devices”
http://cryptome.org/2014/02/nyt-leak.zip
_______________________________________
¤ NSA’s Secret Role in the US Assassination Program ::
An anonymous former drone operator for Joint
Special Operations Command (JSOC) told The
Intercept — a new publication helmed by
Glenn Greenwald, who broke the first of many
NSA revelations last year — that the US military
and CIA use the NSA’s metadata analysis and
phone-tracking abilities to identify airstrike
targets without confirming their veracity on
the ground.
https://firstlook.org/theintercept/article/2014/02/10/the-nsas-secret-role/
https://www.activistpost.com/2013/10/add-death-by-drone-to-nsas-list-of.html
http://www.infowars.com/new-whistleblower-reveals-nsa-picking-drone-targets-based-on-bad-data-death-by-unreliable-metadata/
_______________________________________
¤ ASD Helps NSA Spy on Law Firms, Laywers ::
A top-secret document, obtained by the
former NSA contractor Edward J. Snowden,
shows that an American law firm was
monitored while representing a foreign
government in trade disputes with the
United States. The disclosure offers a
rare glimpse of a specific instance in
which Americans were ensnared by the
eavesdroppers, and is of particular
interest because lawyers in the United
States with clients overseas have
expressed growing concern that their
confidential communications could be
compromised by such surveillance.
http://www.nytimes.com/2014/02/16/us/eavesdropping-ensnared-american-law-firm.html
http://www.activistpost.com/2014/02/new-snowden-docs-implicate-nsa-in.html
http://thehill.com/blogs/global-affairs/asia-pacific/198506-report-spies-watched-us-lawyers-in-trade-deal
NOBODY comments
NY Times has not provided any documentation.
There should be an FOIA request to the IC
and perhaps to the DNI for this document to
be declassified for research in public domain.
_______________________________________
¤ NSA FISA Business Spying ::
http://cryptome.org/2014/02/nsa-fisa-business.pdf
¤ NSA Course on FISA Spying Operations ::
http://cryptome.org/2014/02/nsa-fisa-course.pdf
_______________________________________
¤ Snowden Allegedly Used Web Scraper Tool ::
http://www.nytimes.com/2014/02/09/us/snowden-used-low-cost-tool-to-best-nsa.html?hp&_r=1
_______________________________________
¤ Ex-chancellor Gerhard Schröder Allegedly
Spied by NSA (No Documentation Presented) ::
Munich daily Sueddeutsche Zeitung and
public broadcaster NDR reported Tuesday
that Merkel’s predecessor Gerhard Schroeder
was added to the NSA’s National Sigint
Requirement List as number 388 in 2002.
http://www.dw.de/reports-nsa-first-targeted-german-chancellor-schr%C3%B6der-then-merkel/a-17408683
http://www.theguardian.com/world/2014/feb/04/us-nsa-gerhard-schroeder-surveillance?view=mobile
http://www.faz.net/aktuell/politik/ausland/ausspaeh-affaere-die-spionage-botschaft-12635377.html
¤ New Interpretations of NSA Monitoring
the German Chancellor ::
http://electrospaces.blogspot.de/2014/02/new-interpretations-of-nsa-monitoring.html
_______________________________________
¤ Dutch Intelligence Claims Responsibility for
Phone Call Spying ::
http://www.dutchnews.nl/news/archives/2014/02/the_netherlands_not_usa_gather.php
http://static3.volkskrant.nl/static/asset/2014/kamerbrief_met_reactie_op_berichtgeving_metadata_telefoonverkeer_3761.pdf
_______________________________________
¤ First Congressman To Battle the NSA is Dead ::
http://pando.com/2014/02/04/the-first-congressman-to-battle-the-nsa-is-dead-no-one-noticed-no-one-cares/
_______________________________________
¤ Mike Rogers Wants Journalists With Leaks Jailed ::
http://nypost.com/2014/02/05/pol-journalist-fencing-snowden-secrets-should-be-jailed/
_______________________________________
On Saturday 20 July 2013, in the basement of the
Guardian’s office in Kings Cross, London, watched by
two GCHQ technicians, Guardian editors destroyed
hard drives and memory cards on which encrypted files
leaked by Edward Snowden had been stored. This is
the first time footage of the event has been released.
http://www.youtube.com/watch?v=bUokM5d1qic
¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯
¤ CSEC IP Profiling & Mission Impacts ::
http://www.cbc.ca/news2/pdf/airports_redacted.pdf
http://cryptome.org/2014/01/csec-ip-profile.pdf
¤ CSEC Objects to Disclosure of IP Profiling ::
http://cryptome.org/2014/01/csec-14-0131.pdf
¤ CSEC Used Airport Wi-Fi to Track Travellers ::
A top secret document retrieved by US whistleblower
Edward Snowden and obtained by CBC News shows
that Canada’s electronic spy agency used information
from the free internet service at a major Canadian
airport to track the wireless devices of thousands
of ordinary airline passengers for days after they
left the terminal.
After reviewing the document, one of Canada’s
foremost authorities on cyber-security says the
clandestine operation by the Communications
Security Establishment Canada (CSEC) was almost
certainly illegal. ... ...
The document indicates the passenger tracking
operation was a trial run of a powerful new
software program CSEC was developing with help
from its US counterpart, the NSA.
In the document, CSEC called the new technologies
“game-changing,” and said they could be used for
tracking “any target that makes occasional forays
into other cities/regions.”
http://www.cbc.ca/news/politics/csec-used-airport-wi-fi-to-track-canadian-travellers-edward-snowden-documents-1.2517881
CSEC concluded: “Can then take seeds from these
airports and repeat to cover whole world.”
http://arstechnica.com/tech-policy/2014/01/new-snowden-docs-show-canadian-spies-tracked-thousands-of-travelers/
¤ More Details Into CSEC IP Profiling ::
http://electrospaces.blogspot.fr/2014/02/did-csec-really-tracked-canadian.html
¤ How Canada’s CSEC Maps Phone and Internet Connections ::
http://electrospaces.blogspot.com/2014/03/olympia-how-canadas-csec-maps-phone-and.html
_______________________________________
¤ NSA, GCHQ Allegedly Hack Cryptographer ::
http://cryptome.org/2014/02/nsa-gchq-quisquater.pdf
¤ ... And Now It’s Personal ::
http://cryptome.org/2014/02/stopping-nsa.htm
_______________________________________
¤ GCHQ Snooped on YouTube and Facebook ::
Documents taken from the National Security
Agency by Edward Snowden and obtained by NBC
News detail how British cyber spies demonstrated
a pilot program to their US partners in 2012
in which they were able to monitor YouTube in
real time and collect addresses from the billions
of videos watched daily, as well as some user
information, for analysis. At the time the
documents were printed, they were also able to
spy on Facebook and Twitter.
Called “Psychology A New Kind of SIGDEV”
(Signals Development), the presentation includes
a section that spells out “Broad real-time
monitoring of online activity” of YouTube videos,
URLs “liked” on Facebook, and Blogspot/Blogger
visits. The monitoring program is called
“Squeaky Dolphin.”
Experts told NBC News the documents show the
British had to have been either physically able
to tap the cables carrying the world’s web
traffic or able to use a third party to gain
physical access to the massive stream of data,
and would be able to extract some key data
about specific users as well.
http://cryptome.org/2014/01/gchq-squeaky-dolphin.pdf
http://cryptome.org/2014/01/gchq-newtons-cat.pdf
http://msnbcmedia.msn.com/i/msnbc/Sections/NEWS/snowden_youtube_nbc_document.pdf
http://investigations.nbcnews.com/_news/2014/01/27/22469304-snowden-docs-reveal-british-spies-snooped-on-youtube-and-facebook?lite
_______________________________________
¤ NSA/GCHQ Smartphone App Location Spying ::
http://www.theguardian.com/world/2014/jan/27/nsa-gchq-smartphone-app-angry-birds-personal-data
https://www.propublica.org/article/spy-agencies-probe-angry-birds-and-other-apps-for-personal-data
http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html?_r=0
¤ GCHQ Mobile Theme Briefing ::
“Over 200 3rd party Location Aware Applications
on the iPhone alone.”
http://cryptome.org/2014/01/gchq-mobile-theme.pdf
¤ NSA Converged Analysis of Smartphone Devices ::
“Android Phones pass GPS data in the clear.”
http://cryptome.org/2014/01/nsa-smartphones-analysis.pdf
_______________________________________
¤ Obama Grants NSA Exemption From Law ::
The National Security Agency program that
collects data on nearly every US phone call
isn’t legal, a privacy review board said
Thursday in a newly released report.
http://cryptome.org/2014/01/pclob-14-0123.pdf
“We have not identified a single instance
involving a threat to the United States in
which the program made a concrete difference
in the outcome of a counterterrorism
investigation,” the board wrote in the
report released Thursday.
Despite Obama’s promise to reform the NSA,
domestic spying will continue.
http://edition.cnn.com/2014/01/23/politics/nsa-telephone-records-privacy/index.html?hpt=hp_t3
_______________________________________
¤ Snowden Speaks ::
http://cryptome.org/2014/01/snowden-video-13-0126.zip
_______________________________________
▼ Snowden Calls Russian-Spy Story “Absurd” ::
http://www.newyorker.com/online/blogs/newsdesk/2014/01/snowden-calls-russian-spy-story-absurd.html
▲ NSA is NOT the Source of All Spying ::
¯¯¯
http://20committee.com/2014/01/18/the-end-of-the-snowden-operation/
NOBODY’s comment blocked @ 20committee.com
Reform? Reform was never intended to come
from politicians or the white house. Reform
will come from peoples’ change of online use ;
growing public use of open-source encryption,
growing use of services such as Tor, a growing
amount of computers air-gapped, growing use of
hardcopy backups rather than “the cloud” - and
add to that, more people bleaching their cookies
among other web browser cache, surging VPN use,
growing use of proxies. Sudden disconnections
of users’ modems when not actually being used. The
use of alternative search engines (such as ixquick,
duckduckgo, startpage, privatelee, et al) and
also consider the growing use of XPIs such as
Noscript, Ghostery, HTTPS Everywhere and others.
Reform?
How about the death of RSA and a new generation
of young privacy-crypto-enthusiasts who start to
say “fuck the corporate platforms” and change it
whether legal or not?
The reform will come from people taking action.
Here’s what I’d like to know - will “big government”
follow up reform with their “internet kill switch?”
_______________________________________
¤ NSA Redactions Fail, Fail and Fail Again ::
http://cryptome.org/2014/01/nsa-redaction-fails.pdf
_______________________________________
¤ NSA’s Upstream Collection Detailed ::
The corporate partnerships are one of
three ways NSA is intercepting the world’s
main internet cables:
- Cooperation with telecommunication companies
- Cooperation with foreign intelligence agencies
- Unilateral cable tapping operations
http://electrospaces.blogspot.de/2014/01/slides-about-nsas-upstream-collection.html
---------------------------------------
http://postimg.org/image/9viuxblpd/
http://www.youtube.com/watch?v=kOAv7zbJkCk
http://www.dailydot.com/news/nsa-fairview-slides-brazil-spying/
http://cryptome.org/2013/08/nsa-codenames.htm
_______________________________________
¤ 24 FISA Court Documents DECLASSIFIED ::
http://cryptome.org/2014/01/fisc-13-0117.zip
¤ FISA Court Orders Comparison ::
http://cryptome.org/vz-slip.jpg
http://cryptome.org/2014/01/fisc/fisc-orders-compare.htm
http://cryptome.org/2014/01/fisc2/fisc-before-after-obama.htm
http://cryptome.org/2014/01/fisc3/fisc-br-11-07-v-11-57.htm
---------------------------------------
http://icontherecord.tumblr.com/
_______________________________________
¤ SMS Text Messages - A Goldmine to Exploit ::
http://cryptome.org/2014/01/nsa-sms-exploit.pdf
http://s3.documentcloud.org/documents/1006111/sms.pdf
¤ NSA Vacuuming SMS Texts Around the World ::
The documents also reveal the UK spy agency
GCHQ has made use of the NSA database to search
the metadata of “untargeted and unwarranted”
communications belonging to people in the UK.
The NSA program, codenamed Dishfire, collects
“pretty much everything it can”, according to
GCHQ documents, rather than merely storing the
communications of existing surveillance targets.
The NSA has made extensive use of its vast
text message database to extract information
on people’s travel plans, contact books, financial
transactions and more – including of individuals
under no suspicion of illegal activity.
http://www.theguardian.com/world/2014/jan/16/nsa-collects-millions-text-messages-daily-untargeted-global-sweep
_______________________________________
¤ NSA Covert Radio Signals Break Air-gaps ::
http://cryptome.org/2014/01/nsa-quantum-radio.htm
http://www.nytimes.com/2014/01/15/us/nsa-effort-pries-open-computers-not-connected-to-internet.html
The technology, which the agency has used
since at least 2008, relies on a covert
channel of radio waves that can be transmitted
from tiny circuit boards and USB cards inserted
surreptitiously into the computers. In some
cases, they are sent to a briefcase-size
relay station that intelligence agencies can
set up miles away from the target.
The radio frequency technology has helped
solve one of the biggest problems facing
American intelligence agencies for years:
getting into computers that adversaries,
and some American partners, have tried to
make impervious to spying or cyberattack.
In most cases, the radio frequency hardware
must be physically inserted by a spy, a
manufacturer or an unwitting user.
---------------------------------------
Refer to NSA’s Tailored Access Operations
http://paste.cdtag.de/view.php?id=23643
_______________________________________
¤ NSA Windows Event Monitoring ::
http://cryptome.org/2014/01/nsa-windows-event.pdf
---------------------------------------
¤ Locate And Destroy WinRM Registry ::
http://pastebin.jity.de/view/e8a662d4
_______________________________________
¤ NSA Reducing the Effectiveness of Hash ::
http://cryptome.org/2014/01/nsa-pass-hash.pdf
_______________________________________
¤ NSA’s Organizational Designations ::
http://electrospaces.blogspot.com/2014/01/nsas-organizational-designations.html
_______________________________________
¤ Analysis of NSA’s 215 Metadata Spy Programs ::
http://politicalscience.osu.edu/faculty/jmueller/NSAshane3.pdf
_______________________________________
¤ John Inglis Explains Why US-Based Collection
of Internet Metadata Doesn’t Work ::
http://www.npr.org/2014/01/10/261282601/transcript-nsa-deputy-director-john-inglis?live=1
http://www.emptywheel.net/2014/01/10/john-inglis-explains-why-us-based-collection-of-internet-metadata-doesnt-work/
_______________________________________
¤ Rand Paul to Lead Class-Action Lawsuit
Against Obama Over NSA Spying ::
http://www.breitbart.com/Big-Government/2014/01/03/Rand-Paul-to-Sue-Obama-over-NSA-Spying
_______________________________________
¤ NSA Quantum Computing Research for Cracking
All Encryption ::
In room-size metal boxes secure against
electromagnetic leaks, the National Security
Agency is racing to build a computer that
could break nearly every kind of encryption
used to protect banking, medical, business
and government records around the world.
According to documents provided by former
NSA contractor Edward Snowden, the effort
to build “a cryptologically useful quantum
computer” — a machine exponentially faster
than classical computers — is part of a
$79.7 million research program titled
“Penetrating Hard Targets.” Much of the
work is hosted under classified contracts
at a laboratory in College Park, Md.
http://cryptome.org/2014/01/nsa-quantum-computer.pdf
http://cryptome.org/2014/01/nsa-quantum-computer-2.pdf
http://www.washingtonpost.com/world/national-security/nsa-seeks-to-build-quantum-computer-that-could-crack-most-types-of-encryption/2014/01/02/8fff297e-7195-11e3-8def-a33011492df2_print.html
_______________________________________
¤ NSA and Random Number Generators ::
http://blog.cryptographyengineering.com/2013/12/a-few-more-notes-on-nsa-random-number.html
_______________________________________
¤ Updated List of NSA Codenames ::
http://cryptome.org/2014/01/nsa-codenames.htm
_______________________________________
¤ Jacob Appelbaum Explains New NSA Leaks ::
https://www.youtube.com/watch?v=b0w36GAyZIA
Mirror » http://fileb.ag/xwcp0jrewk2o
¤ Jacob’s NSA Slides @ioerror (ZIP) ::
http://cryptome.org/2013/12/nsa-catalog.zip
¤ NSA Catalog Image Formats (16.7MB) Mirrored ::
http://upsto.re/CtXqio
http://f.lui.li/get_1228_a2b4.html
http://blakker.pl/files/get/fenW1XyGrl/nsa-catalog-images.zip
¤ Documents Reveal Top NSA Hacking Unit ::
The NSA’s TAO hacking unit is considered
to be the intelligence agency’s top secret
weapon. It maintains its own covert network,
infiltrates computers around the world and
even intercepts shipping deliveries to plant
back doors in electronics ordered by those
it is targeting. ... ...
http://www.spiegel.de/international/world/the-nsa-uses-powerful-toolbox-in-effort-to-spy-on-global-networks-a-940969.html
The insert method and other variants of
QUANTUM are closely linked to a shadow
network operated by the NSA alongside the
Internet, with its own, well-hidden
infrastructure comprised of “covert”
routers and servers. It appears the NSA
also incorporates routers and servers
from non-NSA networks into its covert
network by infecting these networks with
“implants” that then allow the government
hackers to control the computers remotely.
In this way, the intelligence service seeks
to identify and track its targets based on
their digital footprints. These identifiers
could include certain email addresses or
website cookies set on a person’s computer.
Of course, a cookie doesn’t automatically
identify a person, but it can if it includes
additional information like an email address.
In that case, a cookie becomes something
like the web equivalent of a fingerprint.
---------------------------------------
¤ NSA QUANTUM Theory (FOXACID) ::
http://cryptome.org/2013/12/nsa-quantumtheory.pdf
¤ NSA/GCHQ QUANTUM Tasking Techniques ::
“YahooBcookie’s are unique to a specific
computer and can hold other addresses
that are being logged into on that computer
as long as the user does not clear browser
cookies.”
http://cryptome.org/2013/12/nsa-quantum-tasking.pdf
¤ NSA QFIRE Packet Injection Attacks ::
http://cryptome.org/2013/12/nsa-qfire.pdf
---------------------------------------
¤ NSA Catalog for Hardware Backdoors ::
The specialists at ANT, which presumably
stands for Advanced or Access Network Technology,
could be described as master carpenters for
the NSA’s department for Tailored Access
Operations (TAO). In cases where TAO’s usual
hacking and data-skimming methods don’t suffice,
ANT workers step in with their special tools,
penetrating networking equipment, monitoring
mobile phones and computers and diverting or
even modifying data. Such implants, as they are
referred to in NSA parlance, have played a
considerable role in the intelligence agency’s
ability to establish a global covert network
that operates alongside the Internet.
Some of the equipment available is quite
inexpensive. A rigged monitor cable that
allows “TAO personnel to see what is displayed
on the targeted monitor,” for example, is
available for just $30. But an “active GSM
base station” -- a tool that makes it possible
to mimic a mobile phone tower and thus monitor
cell phones -- costs a full $40,000. Computer
bugging devices disguised as normal USB plugs,
capable of sending and receiving data via radio
undetected, are available in packs of 50 for
over $1 million.
The ANT division doesn’t just manufacture
surveillance hardware. It also develops software
for special tasks. The ANT developers have a
clear preference for planting their malicious
code in so-called BIOS, software located on a
computer’s motherboard that is the first thing
to load when a computer is turned on.
This has a number of valuable advantages: an
infected PC or server appears to be functioning
normally, so the infection remains invisible
to virus protection and other security programs.
And even if the hard drive of an infected
computer has been completely erased and a new
operating system is installed, the ANT malware
can continue to function and ensures that new
spyware can once again be loaded onto what is
presumed to be a clean computer. The ANT
developers call this “Persistence” and believe
this approach has provided them with the
possibility of permanent access.
Another program attacks the firmware in
hard drives manufactured by Western Digital,
Seagate, Maxtor and Samsung, all of which,
with the exception of latter, are American
companies. Here, too, it appears the US
intelligence agency is compromising the
technology and products of American companies.
http://cryptome.org/2013/12/nsa-tao-ant-pdf.pdf
http://www.spiegel.de/international/world/catalog-reveals-nsa-has-back-doors-for-numerous-devices-a-940994.html
http://gizmodo.com/the-nsa-actually-intercepted-packages-to-put-backdoors-1491169592
http://www.theguardian.com/world/2013/dec/29/der-spiegel-nsa-hacking-unit-tao
https://www.wsws.org/en/articles/2013/12/31/snow-d31.html
¤ NSA Cisco / Juniper Router Backdoors ::
http://cryptome.org/2013/12/nsa-ant-firewalls.pdf
http://cryptome.org/2013/12/nsa-ant-router.pdf
¤ NSA Computer Monitor Backdoor ::
http://cryptome.org/2013/12/nsa-ant-bildschirm.pdf
¤ NSA PCI Bus Backdoor ::
http://cryptome.org/2013/12/nsa-ant-rechner.pdf
¤ NSA Motherboard Backdoor (#BadBIOS) ::
http://cryptome.org/2013/12/nsa-ant-server.pdf
¤ NSA Keyboard Backdoor ::
http://cryptome.org/2013/12/nsa-ant-tastatu.pdf
¤ NSA Apple iPhone Backdoor ::
http://cryptome.org/2013/12/nsa-ant-handys.pdf
¤ NSA WiFi Card / Apple Airport Backdoors ::
http://cryptome.org/2013/12/nsa-ant-mobilfunk.pdf
¤ NSA Active 802.11 Netcard Backdoor ::
http://cryptome.org/2013/12/nsa-ant-w-lan.pdf
¤ NSA USB Backdoor to Bridge Air-gaps ::
http://cryptome.org/2013/12/nsa-ant-usb.pdf
¤ NSA Alternative SIGINT Hunter ::
http://cryptome.org/2013/12/nsa-ant-raumuber.pdf
¤ NSA Keystroke, Screenshot & SIGINT Hunting ::
http://cryptome.org/2013/12/greenwald-13-1231.pdf
http://truth-out.org/news/item/20948-glenn-greenwald-the-nsa-can-literally-watch-every-keystroke-you-make
¤ Jacob Appelbaum Comment on Der Spiegel Reports ::
http://cryptome.org/2014/01/appelbaum-der-spiegel.htm
---------------------------------------
BLOWBACK SETS IN ...
¤ IT Firms Lose Billions After NSA Scandal ::
http://www.independent.co.uk/life-style/gadgets-and-tech/news/it-firms-lose-billions-after-nsa-scandal-exposed-by-whistleblower-edward-snowden-9028599.html
¤ Foreign Firms Won’t Buy American Tech ::
https://www.informationweek.com/security/risk-management/nsa-fallout-why-foreign-firms-wont-buy-american-tech/d/d-id/1113384
---------------------------------------
¤ Apple Claims They Know Nothing About Backdoors ::
http://www.infowars.com/apple-says-it-knows-nothing-about-your-iphone-spying-on-you/
¤ Apple Inc. Lying Exposed ::
Logs from a properly air-gapped Mac OSX show
the system attempting to access the Airport -
yet the Airport card was physically disconnected.
http://pastebin.jity.de/view/77d624be
¤ Cyber–Security Experts Ask If Apple “Flaw”
Was Really NSA Backdoor ::
Following an admission by Apple that a “bug”
in its operating system had left devices open
to potential hacking, experts are questioning
whether the security hole was intentional, in
order to allow the NSA backdoor access as part
of its mass spying program.
http://www.infowars.com/cyber-security-experts-ask-apple-flaw-was-really-nsa-backdoor/
---------------------------------------
¤ Intel CEO Refuses To Answer Questions On
Whether NSA Can Access Processors ::
http://www.infowars.com/intel-ceo-refuses-to-answer-questions-on-whether-nsa-can-access-processors/
¤ Dell Inc. Apologizes for the ‘Inconvenience’
of Helping NSA Install Backdoors ::
http://www.techdirt.com/articles/20131230/17174425718/dells-twitter-account-apologizes-inconvenience-helping-nsa-place-hidden-bios-bug.shtml
http://www.infowars.com/dells-twitter-account-apologizes-for-the-inconvenience-of-helping-nsa-install-spyware/
¤ Locate And Destroy 802.11 Registry ::
How to disable SOMBERKNAVE implant to
properly air-gap the Windows XP system.
http://pastebin.jity.de/view/bdd440b3
_______________________________________
¤ NSA Whistleblower ; Planned Police State ::
http://www.youtube.com/watch?v=x9Kcgme2I0c
¤ NSA Whistleblower ; National Security Scam ::
http://www.youtube.com/watch?v=xPemLhvwfos
_______________________________________
¤ Edward Snowden Interview by Barton Gellman ::
http://www.washingtonpost.com/world/national-security/edward-snowden-after-months-of-nsa-revelations-says-his-missions-accomplished/2013/12/23/49fc36de-6c1c-11e3-a523-fe73f0ff6b8d_story.html
Beginning in October 2012, he said, he
brought his misgivings to two superiors
in the NSA’s Technology Directorate and
two more in the NSA Threat Operations
Center’s regional base in Hawaii. For
each of them, and 15 other co-workers,
Snowden said he opened a data query tool
called BOUNDLESSINFORMANT, which used
color-coded “heat maps” to depict the
volume of data ingested by NSA taps.
His colleagues were often “astonished to
learn we are collecting more in the United
States on Americans than we are on Russians
in Russia,” he said. Many of them were
troubled, he said, and several said they
did not want to know any more.
---------------------------------------
BOUNDLESS INFORMANT REPORTS/DOCS REFER HERE ;
http://paste.cdtag.de/view.php?id=19580
_______________________________________
¤ New York Judge, William Pauley III, Declares
Metadata Hoarding Legal ::
http://cryptome.org/2013/12/pauley-13-1227.pdf
http://www.scribd.com/doc/194082600/NSA-Opinion
http://www.politico.com/story/2013/12/nsa-phone-surveillance-ruling-101569.html
http://www.infowars.com/judge-falls-for-the-big-lie-about-nsa-spying/
/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/
\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\
¤ Judge Declares Metadata Hoarding Violates
Fourth Amendment Rights ::
http://cryptome.org/2013/12/klayman-048-049.pdf
A federal judge ruled Monday that the
National Security Agency program which
collects information on nearly all telephone
calls made to, from or within the United
States is likely unconstitutional.
US District Court Judge Richard Leon found
that the program appears to violate the
Fourth Amendment ban on unreasonable
searches and seizures. He also said the
Justice Department had failed to demonstrate
that collecting the information had helped
to head off terrorist attacks.
Acting on a lawsuit brought by conservative
legal activist Larry Klayman, Leon issued
a preliminary injunction barring the NSA
from collecting so-called metadata pertaining
to the Verizon accounts of Klayman and one
of his clients. However, the judge stayed
the order to allow for an appeal.
http://www.politico.com/story/2013/12/national-security-agency-phones-judge-101203.html
http://www.wsws.org/en/articles/2013/12/17/cour-d17.html
Leon’s 68-page opinion is the first
significant legal setback for the NSA’s
surveillance program since it was disclosed
in June in news stories based on leaks
from former NSA contractor Edward Snowden.
For seven years, the metadata program has
been approved repeatedly by numerous judges
on the Foreign Intelligence Surveillance
Court and found constitutional by at least
one judge sitting in a criminal case.
https://ecf.dcd.uscourts.gov/cgi-bin/show_public_doc?2013cv0851-48
¤ Klayman v. NSA 7 Court Documents ::
http://cryptome.org/2013/12/klayman-051-058.zip
▼ Delay Motion for Class Action Lawsuit ::
http://cryptome.org/2013/12/klayman-060.pdf
▲ White House Tries to Prevent Judge From
Ruling on Surveillance Efforts ::
http://www.nytimes.com/2013/12/22/us/white-house-tries-to-prevent-judge-from-ruling-on-surveillance-efforts.html?_r=0
¤ Bulk Metadata Collection Ruled Illegal ::
http://cryptome.org/2013/12/leon-13-1216.pdf
---------------------------------------
¤ White House Spying Review Group Report ::
http://cryptome.org/2013/12/obama-nsa-report.pdf
¤ White House Spy Report Commentary ::
http://cryptome.org/2013/12/prgi-comments-001.htm
http://cryptome.org/2013/12/prgi-comments-002.htm
¤ Obama Advisory Committee Whitewashes US
Spying Programs ::
http://www.wsws.org/en/articles/2013/12/19/spyi-d19.html
---------------------------------------
▼ FLASHBACK ; Michael Hayden Admits They
Will NOT Stifle Surveillance ::
http://www.youtube.com/watch?v=XS6nfkbNvlo
http://www.infowars.com/former-nsa-boss-government-will-continue-surveillance-so-get-used-to-it/
▲ Counter-spy_Manual.zip
(22 files | ZIP | 2.93MB)
http://paste.darkbyte.ru/view/5459487
http://ae7.st/p/26c (mirror)
_______________________________________
¤ NSA/CSS Mission Slides ::
These slides, from an internal presentation
in the first week of October 2001, show how
critical the NSA sees electronic eavesdropping.
http://cryptome.org/2013/12/nsa-css-mission.pdf
“ 1B. Ability to exploit:
- Military Information
- Economic Information
- Information Operations Information
- Political Information ”
_______________________________________
¤ Eben Moglen & Bruce Schneier Talk About
NSA Leaks, Software and Cryptography ::
https://www.youtube.com/watch?v=N8Sc6pUR1mA
¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯
¤ NSA Rigging RSA Crypto Market ::
http://www.reuters.com/article/2013/12/20/us-usa-security-rsa-idUSBRE9BJ1C220131220
¤ RSA Cryptographers Duped and Bribed by NSA ::
http://cryptome.org/2013/12/nsa-kills-rsa.htm
¤ NSA Kills RSA Trust and Therefore RSA Jobs ::
http://cryptome.org/2013/12/nsa-kills-rsa-workers.htm
¤ List of Canceled RSA Talks Continues to Grow ::
http://threatpost.com/list-of-canceled-rsa-talks-continues-to-grow/103508
¤ FLASHBACK ; NSA Rigging the Crypto Market ::
http://cryptome.org/jya/nsa-sun.htm
_______________________________________
¤ Did British Telecom Provides Backdoors
for NSA and GCHQ (?) ::
In a paper titled ‘The Internet Dark Age’
the researchers say that BT is shipping
hardware with backdoors that allow secret
government access in order to make network
compromise easier. “BT are directly responsible
for covertly embedding secret spy equipment
in millions of homes and businesses within
the UK,” the paper states.
Recently on Cryptome (the better leaks
than wikileaks site), a paper appeared
pointing out that BT (British Telecom)
assigns all their modems an extra address
in the 30.x.x.x address space, and then
attaches SSH and SNMP to that address.
This looks like what many ISPs do, assigning
a second IP address for management, except
for one thing: the 30.0.0.0/8 block is
assigned to the United States Department
of Defense. This has caused a fevered round
of speculation that this is actually a
secret backdoor for the NSA/GCHQ, so that
they can secretly monitor and control
peoples’ home networks.
Maybe, but it’s probably not the case.
The better explanation is that BT simply
chose this address space because it’s
non-routable. While it’s assigned public
address, it’s only used inside the private
DoD military network. Try tracerouting to
that address space, you’ll see that your
packets go nowhere.
http://cryptome.org/2013/12/Full-Disclosure.pdf
http://www.csoonline.com/article/744697/report-accuses-bt-of-supplying-backdoors-for-gchq-and-nsa
http://blog.erratasec.com/2013/12/dod-address-space-its-not-conspiracy.html
¤ Bruce Schneier Leaves British Telecom ::
“Yes, it’s true. And contrary to rumors,
this has nothing to do with the NSA or GCHQ.
No, BT wasn’t always happy with my writings
on the topic, but it knew that I am an
independent thinker and didn’t try to
muzzle me in any way. I’m just ready to
leave. I spent seven years at BT, and
seven years at Counterpane Internet
Security, Inc., before BT bought us.
It’s past time for something new.”
http://www.schneier.com/blog/archives/2013/12/yes_im_leaving.html
http://arstechnica.com/information-technology/2013/12/nsa-surveillance-critic-bruce-schneier-to-leave-post-at-bt/
http://www.computing.co.uk/ctg/news/2319296/bruce-schneier-leaves-bt-after-eight-years-as-security-futurologist
---------------------------------------
¤ NSA Infected Around 50,000 Networks Worldwide ::
The American intelligence service - NSA -
infected more than 50,000 computer networks
worldwide with malicious software designed
to steal sensitive information. Documents
provided by former NSA-employee Edward Snowden
and seen by this newspaper, prove this.
A management presentation dating from 2012
explains how the NSA collects information
worldwide. In addition, the presentation
shows that the intelligence service uses
‘Computer Network Exploitation’ (CNE) in
more than 50,000 locations. CNE is the
secret infiltration of computer systems
achieved by installing malware, malicious
software.
One example of this type of hacking was
discovered in September 2013 at the Belgium
telecom provider Belgacom. For a number of
years the British intelligence service - GCHQ –
has been installing this malicious software
in the Belgacom network in order to tap
their customers’ telephone and data traffic.
The Belgacom network was infiltrated by GCHQ
through a process of luring employees to a
false Linkedin page.
http://www.nrc.nl/wp-content/uploads/2013/11/nsa568.jpg
http://cryptome.org/2013/11/nsa-sigint-cryptologic-platform.pdf
http://www.nrc.nl/nieuws/2013/11/23/nsa-infected-50000-computer-networks-with-malicious-software/
http://hothardware.com/News/Dutch-News-Agency-Reports-NSA-Infected-50000-Networks-With-Malware/
¤ NSA Power to Generate Profits and Pay ::
The NSA SIGINT Strategy 2012-2016 pretty
well covers all the comsec and crypto
initiatives to covertly exploit people,
cryptographers, anonymizers, informants,
planted spies, security firms, networks,
governments, nations, friends, lovers
and citizens.
Not sure leaks, lawsuits and protests
will deter this bounty of profits for
the comsec industry, unless the public
is aroused to demand the 3 branches grasp
the nettle, and all those making money
from this deception operation decide to
give up their profits, perks and prestige.
I mean those on the comsec and crypto
lists, those participating in standards
committees, those enjoying contracts and
grants in think tanks and universities,
those in law firms and public interest
orgs, those in the media and academia,
those in non-spy gov agencies, pretending
to be in opposition as they scramble to
rejigger their products and sales pitches,
to exploit what is being fabricated to
diminish Snowden’s revelations with new
forms of secrecy, technology, law,
regulations, bribery, lobbying, grants,
contracts, list lurking, online and
offline spying, break-ins, the usual
kaboodle, to assure the NSA goals are
fulfilled.
http://cryptome.org/2013/11/nsa-power-profit-pay.htm
http://cryptome.org/2013/11/nsa-sigint-cryptologic-platform.pdf
¤ NSA’s Global Interception Network ::
http://electrospaces.blogspot.fr/2013/12/nsas-global-interception-network.html
¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯
¤ GCHQ Accused of Spying European, German
and Israeli Politicians (No Documentation) ::
http://www.spiegel.de/international/world/snowden-documents-show-gchq-targeted-european-and-german-politicians-a-940135.html
http://www.theguardian.com/uk-news/2013/dec/20/gchq-targeted-aid-agencies-german-government-eu-commissioner
http://www.nytimes.com/2013/12/21/world/nsa-dragnet-included-allies-aid-groups-and-business-elite.html?_r=0
_______________________________________
¤ CBS 60min ; Inside the NSA (Part One) ::
http://www.youtube.com/watch?v=WgPNyAYOr04
¤ CBS 60min ; The Snowden Affair (Part Two) ::
http://www.youtube.com/watch?v=5AaREKHQI8E
¤ NSA Interviewed by CBS - Transcript ::
http://cryptome.org/2013/12/nsa-60mins/nsa-60mins.htm
_______________________________________
¤ Proposal for Distribution of Snowden Cache ::
http://cryptome.org/2013/12/snowden-cache-dist.htm
_______________________________________
¤ EU Data Retention Directive “Unlawful”
and “Incompatible” with Charter of Rights ::
http://www.scribd.com/doc/191078925/Data-Retention-Challenge-Press-Release
http://www.computing.co.uk/ctg/news/2318838/eu-data-retention-directive-unlawful-and-incompatible-with-charter-of-rights
_______________________________________
¤ GOOGLE CENSORING NSA SEARCH RESULTS (?) ::
http://www.washingtonpost.com/blogs/the-switch/wp/2013/12/17/edward-snowden-doesnt-show-up-once-in-googles-list-of-top-2013-searches/
_______________________________________
¤ Clapper, Feinstein, Obama Total Disregard
of Public Concerns ::
http://cryptome.org/2013/12/spies-reign-obama.htm
¤ Merkel Throws a Pissy Fit ::
http://www.theguardian.com/world/2013/dec/17/merkel-compares-nsa-stasi-obama
_______________________________________
¤ GCHQ’s Use of FLYING PIG to Spy ::
“FLYING PIG is a program that allows
analysts to query GCHQ’s vast repository
of metadata about the world’s secure
communications over TLS/SSL. It’s
certainly not a program through which
the GCHQ, or NSA for that matter, performs
man-in-the-middle attacks against internet
services like Google, as reported by others,
including Bruce Schneier. The reports that
claim the NSA performed MITM attacks against
Google are based on a small piece of a
document that describes a FLYING PIG
(which is a not an NSA program, as you may
have noticed) use case (presumably, an
investigation into the DigiNotar CA breach).
That’s not to say the GCHQ doesn’t perform
MITM attacks, but there’s no evidence to
be found in this document. Though, FLYING PIG
may be used to prepare MITM attacks, e.g.
by providing information about a target.”
http://koen.io/2013/12/flying-pig-gchq-tls-ssl-knowledge-base/
¤ NSA Use of FLYING PIG to Spy ::
https://www.documentcloud.org/documents/785152-166819124-mitm-google.html
http://www.techdirt.com/articles/20130910/10470024468/flying-pig-nsa-is-running-man-middle-attacks-imitating-googles-servers.shtml
http://news.cnet.com/8301-13578_3-57602701-38/nsa-disguised-itself-as-google-to-spy-say-reports/
¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯
¤ John Young Breaks Down the NSA Leaks ::
http://www.corbettreport.com/mp3/2013-12-17%20John%20Young.mp3
http://www.corbettreport.com/interview-793-john-young-breaks-down-the-snowdennsa-saga/
_______________________________________
¤ FASCIA Database of Device-Location Records ::
http://cryptome.org/2013/12/nsa-fascia.pdf
---------------------------------------
¤ hdfs:// Cloud Holds FASCIA Database ::
http://cryptome.org/2013/12/nsa-ghost-machine.pdf
HDFS stands for “Hadoop Distributed File
System” which was inspired by Google Inc,
and later managed by big data corporations
such as IBM, Yahoo, Facebook, et al.
HDFS is designed to reliably store very
large files across machines in a large
cluster.
¤ Hadoop Emerging Technology ::
“Hadoop is a data processing system that
follows the MapReduce paradigm for scalable
data analysis.” ... “Largest install is at
Yahoo, a major contributor.”
HDFS is a scalable file system with two
major components, a central metadata server
and file servers from data.
http://www.upload-box.com/index.php/files/get/uTqMG-LMlY/hadoop-emerging-technology.pdf
¤ Yahoo - Managing a Hadoop Cluster ::
This was taken from the Yahoo website,
posted on public domain.
http://msfire.tk/files/get/SIut69QW7Q/yahoo-hadoop.zip
¤ Apache Hadoop FileSystem and its Usage
in Facebook (This File Is Mirrored) ::
http://4lodzik.de/xu2/files/get/U-eeftxCDJ/facebook-hadhoop.zip
http://www.uploadmini.com/index.php/files/get/rnvpDpXfZu/facebook-hadhoop.zip
http://cloudseminar.berkeley.edu/data/hdfs.pdf
¤ hadoop_install.zip (Mirrored) ::
http://fileb.ag/nukq1uicayye
http://f.ishoo.ru/files/get/vfym4eZHvY/hadoop-install.zip
http://cloud.elearning.uq.edu.au/download/hadoop_install.zip
---------------------------------------
¤ CO-TRAVELER Cellphone Tracking ; FASCIA
Database Available With Ghostmachine ::
“Proxies can make IP resolution challenging.”
http://cryptome.org/2013/12/nsa-cotraveler.pdf
¤ CHALKFUN Location Tool Highly Censored ::
http://cryptome.org/2013/12/nsa-chalkfun.pdf
¤ NSA Targets Device Location Verification ::
http://cryptome.org/2013/12/nsa-target-location.pdf
¤ NSA’s Global Interception Network ::
http://electrospaces.blogspot.com/2013/12/nsas-global-interception-network.html
¤ NSA Tracking Cellphone Locations ::
In unveiling new Edward Snowden revelations
about NSA spying, the Washington Post has
once again whitewashed the fact that the
content of all our communications have
been stored and analyzed under the Echelon
program since the 1990s.
The new details concern how, “The National
Security Agency is gathering nearly 5
billion records a day on the whereabouts
of cellphones around the world.”
However, the report reveals itself to
be little more than an exercise in soft-
peddling when it claims that, “The NSA
does not target Americans’ location data
by design, but the agency acquires a
substantial amount of information on
the whereabouts of domestic cellphones
“incidentally.”
This notion that the NSA just accidentally
happens to record the locations of Americans
using data from their cellphones, and is
not deliberately engaging in domestic
surveillance, is yet another example of
damage control by the establishment.
http://www.infowars.com/new-nsa-revelations-another-limited-hangout-whitewash/
http://www.washingtonpost.com/wp-srv/special/_ie-fallbacks/NSA_Co-traveler_g.jpg
http://apps.washingtonpost.com/g/page/world/fascia-the-nsas-huge-trove-of-location-records/637/
http://apps.washingtonpost.com/g/page/world/how-to-tell-if-a-target-is-foreign/635/
http://www.washingtonpost.com/world/national-security/nsa-tracking-cellphone-locations-worldwide-snowden-documents-show/2013/12/04/5492873a-5cf2-11e3-bc56-c6ca94801fac_print.html
http://www.theguardian.com/world/2013/dec/04/nsa-storing-cell-phone-records-daily-snowden
---------------------------------------
¤ NSA Uses Google Cookies and GSM Geohashes
to Pinpoint Targets ::
The National Security Agency is ‘secretly’
piggybacking on the tools that enable
Internet advertisers to track consumers,
using cookies and location data to pinpoint
targets for government hacking and to
bolster surveillance.
http://cryptome.org/2013/12/nsa-sigint-successes.pdf
http://cryptome.org/2013/12/nsa-gsm-tracking.pdf
http://apps.washingtonpost.com/g/page/national/nsa-signal-surveillance-success-stories/647/
http://www.washingtonpost.com/blogs/the-switch/wp/2013/12/10/nsa-uses-google-cookies-to-pinpoint-targets-for-hacking/
http://boingboing.net/2013/12/10/nsa-uses-googles-tracking-co.html
http://www.theverge.com/2013/12/10/5198592/nsa-reportedly-piggybacking-on-google-advertising-cookies
https://www.wsws.org/en/articles/2013/12/14/snow-d14.html
---------------------------------------
¤ FLASHBACK ; Anonymizing Google’s Cookie ::
http://www.imilly.com/google-cookie.htm
---------------------------------------
¤ How Marketers Will Find and Track You
In a World Without Cookies ::
http://blog.thefetch.com/2013/11/18/cookie-monsters-how-marketers-will-find-and-track-you-in-a-world-without-cookies/
_______________________________________
¤ How the NSA Targets Italy ::
http://espresso.repubblica.it/foto/2013/12/05/galleria/nsa-intercettazioni-1.144400
http://espresso.repubblica.it/inchieste/2013/12/05/news/revealed-how-the-nsa-targets-italy-1.144428
http://www.pcworld.com/article/2070480/nsa-spies-on-italians-from-roof-of-us-embassy-in-rome-magazine-reports.html
¤ SCS_Italy_Spying.zip | 371KB ::
http://ge.tt/api/1/files/2Bbc4C81/0/blob?download
http://megaswf.com/f/2625421
http://msfire.tk/files/get/srIJUWgvYg/scs-italy-spying.zip
_______________________________________
¤ Swedish Intelligence Agency (FRA) Spied
on Russian Leaders for NSA ::
http://cryptome.org/2013/12/nsa-se-spied-ru.htm
http://cryptome.org/2013/12/nsa-se-fra-ru-baltic.pdf
http://www.youtube.com/watch?v=0yP7n8qZrz0
http://rt.com/news/sweden-spied-russia-nsa-759/
http://www.infowars.com/nsa-leaks-sweden-spied-on-russian-leaders-for-us/
http://www.thelocal.se/20131211/sweden-aided-in-nsa-hacking-operations-report
¤ NSA & FRA Quantum Hacking Programme ::
http://www.svt.se/ug/fra-part-of-top-secret-hacker-project
¤ NSA & FRA Relationship Was “Top Secret” ::
http://cryptome.org/2013/12/nsa-se-spies.pdf
http://s3.documentcloud.org/documents/889126/nsa-intelligence-relationship-with-sweden.pdf
¤ NSA & FRA Relationship “Actively Engaged” ::
http://cryptome.org/2013/12/nsa-se-fra-relationship.pdf
http://s3.documentcloud.org/documents/894384/nsa-internal-pm-on-fra-and-sweden-relations.pdf
¤ NSA & FRA Joint Quantum Spy Agenda ::
http://cryptome.org/2013/12/nsa-se-fra-spying-agenda.pdf
¤ NSA/GCHQ/FRA Quantum Spying Accomplishments ::
http://cryptome.org/2013/12/nsa-gchq-fra-quantum.pdf
http://cryptome.org/2013/12/nsa-se-fra-quantum-2.pdf
http://cryptome.org/2013/12/gchq-se-fra-quantum-3.pdf
¤ NSA/GCHQ/FRA Communication Intelligence ::
http://cryptome.org/2013/12/nsa-gchq-se-fra-comint.pdf
---------------------------------------
PAST XKEYSCORE REPORTS/DOCUMENTS REFER HERE ;
http://paste.cdtag.de/view.php?id=16647
---------------------------------------
¤ NSA/FRA XKeyscore Targets Website Viewers ::
http://cryptome.org/2013/12/nsa-se-fra-xkeyscore-slide.pdf
¤ NSA/FRA XKeyscore Targets Tor, etc. ::
http://cryptome.org/2013/12/nsa-xkeyscore-tor-slides.pdf
¤ NSA/FRA XKeyscore Exploit Sources ::
http://cryptome.org/2013/12/nsa-xkeyscore-sources.pdf
¤ NSA/FRA XKeyscore Data Hoarding Plans ::
http://cryptome.org/2013/12/nsa-se-fra-xkeyscore.pdf
_______________________________________
“Earlier, a map showing SCS locations
worldwide was published by the German
magazine Der Spiegel. Initially an unredacted
map was put online by accident, but before
it was replaced, it was already copied onto
several websites. This map showed 74 staffed
SCS locations, 14 unmanned remote controlled
locations and 8 other locations as of August
2010. Except for the SCS locations in Europe,
the names of all other cities were blurred
by Der Spiegel.”
- electrospaces.blogspot.fr
REDACTED MAP (CENSORED)
https://lh3.ggpht.com/-ymi_oEW0XcI/UpzfqqqPRsI/AAAAAAAABCs/WU4lKnfs52w/s320/scs-global-map-redacted.jpg
UNREDACTED MAP (DEFAULT)
http://postimg.org/image/6kzpypy1l/
BOTH REDACTED AND UNREDACTED (ZIP | 223KB)
http://f.lui.li/get_1065_f4ab.html
---------------------------------------
¤ Decensoring SCS Locations ::
http://cryptome.org/2013/12/decensoring-scs-slides.htm
The NSA spies under diplomatic cover.
_______________________________________
¤ Five Eyes ::
http://cryptome.org/2013/12/nsa-5-eyes-partners.pdf
_______________________________________
¤ A Conspiracy So Vast ::
http://www.lewrockwell.com/2013/12/andrew-p-napolitano/a-conspiracy-so-vast%E2%80%A8/
_______________________________________
¤ PayPal Corporation Said To Be Implicated
in Withheld NSA Documents ::
http://www.youtube.com/watch?v=tTivPZZorWY
http://www.boilingfrogspost.com/2013/12/11/bfp-breaking-news-omidyars-paypal-corporation-said-to-be-implicated-in-withheld-nsa-documents/
_______________________________________
¤ NSA GCHQ Spies on Video Game Geeks ::
Say hello to undercover NSA orcs.
http://cryptome.org/2013/12/nsa-gchq-spy-games.pdf
http://cryptome.org/2013/12/nsa-spy-games.pdf
http://arstechnica.com/tech-policy/2013/12/world-of-spycraft-nsa-gchq-hacked-wow-and-xbox-live-other-games/
http://www.theguardian.com/world/2013/dec/09/nsa-spies-online-games-world-warcraft-second-life
http://www.breitbart.com/Big-Government/2013/12/09/Report--NSA-spying-on-virtual-worlds--online-games
http://www.businessinsider.com/spy-agencies-infiltrated-video-games-nsa-gchq-world-of-warcraft-2013-12
_______________________________________
¤ Rollingstone Describes NSA’s Influx of Money ::
September 11th, which also happened to
be Drake’s first day at Fort Meade, changed
the equation. Drake explains the shift in
two ways: The first was a massive expansion
of US spying capabilities as the agency
“unchained itself from the Constitution,”
and began to spy on Americans and foreign
citizens, at home and abroad. The other
change, felt across the entire intelligence
community, was a rapid expansion of the NSA
itself.
“Massive amounts of money were pumped
into the NSA after 9/11, and Congress was
saying, ‘How big do you want the check?’”
says Drake. With virtually every agency
involved in tracking terrorists clamoring
for its SIGINT, or signals intelligence,
the NSA expanded its outposts in Texas,
Georgia, Hawaii, Colorado and Utah, as
well as listening posts abroad, and also
went on a building spree at Fort Meade,
where the NSA’s sprawling 5,000-acre
campus is now almost 10 times the size
of the Pentagon. By 2013, according to
The Washington Post, the NSA had expanded
its workforce by one-third, to about
33,000. The number of private companies
it depended upon more than tripled during
that time.
Soon, thanks to this influx of money
and the increasing reliance on the private
sector to handle even sensitive jobs,
the very heart of America’s intelligence
infrastructure was being outsourced to
contractors. “Essentially, 9/11 was a
massive jobs program, in which the ticket
you needed for the party was your clearance,”
says Drake. “And tons of people were
getting those clearances. So you had
this huge apparatus being built, and
the government was just managing it.
And in some cases, they weren’t even
doing that.” ... ...
By the time Snowden joined the agency’s
workforce, the surveillance he would
later expose was becoming not just
institutionalized but very big business.
“It was around 2009, 2010 that you saw
the full flower of that massive, massive
bubble of money,” says Drake. “And people
were taking it for a ride as far as it
could go.” ... ...
Prior to 2009, Snowden had considered
leaking government secrets when he was
at the CIA, but held off, he later said,
not wanting to harm agents in the field,
and hoping that Obama would reform the
system. His optimism didn’t last long.
“I watched as Obama advanced the very
policies that I thought would be reined
in,” he later said. As a result, he added,
“I got hardened.” The more Snowden saw of
the NSA’s actual business – and, particularly,
the more he read “true information,”
including a 2009 Inspector General’s report
detailing the Bush era’s warrantless-
surveillance program – the more he realized
that there were actually two governments:
the one that was elected, and the other,
secret regime, governing in the dark.
“If the highest officials in government
can break the law without fearing punishment
or even any repercussions at all, secret
powers become tremendously dangerous.”
http://www.rollingstone.com/politics/news/snowden-and-greenwald-the-men-who-leaked-the-secrets-20131204
_______________________________________
¤ Rajiv Pant Describes Snowden Files Transfer ::
http://cryptome.org/2013/12/nyt-snowden-transfer.htm
_______________________________________
¤ Is British Intelligence in Damage Control? ::
http://www.globalresearch.ca/british-intelligence-operation-to-kidnap-snowden-number-one-mi-6-officer-working-undercover-in-moscow-embassy/5358555
_______________________________________
¤ Snowden Leaks “Greatest Intelligence
Failure Since World War 2” Exaggerated ::
The Director of NSA claims Snowden stole
200,000 documents. Allegations in Australian
press claim he stole “up to 20,000.” British
authorities accuse Snowden of stealing 58,000.
Claims are bruited in the 5 Eyes that this
is the “greatest intelligence failure since
World War 2.” High officials and ex-spies
accuse Snowden and related media of engaging
in terrorism.
This suggests a counter-espionage campaign
to exaggerate Snowden’s damage, of betrayal
to his country, of aiding the enemy, of
threatening national security. It is
successfully restricting release of the
Snowden material and will likely become
more forceful as releases continue to the
extent of legislation (open or secret)
to criminalize release as a national
security threat.
http://cryptome.org/2013/12/snowden-civil-war.htm
_______________________________________
¤ KILLCEN ; Eyeballing_Snowden_Info.7z ::
Includes most reports, slides and
documents all related to the recent
Snowden leaks so far up to December
4th of 2013. I’m still collecting
any information that comes out and
will provide updated archives from
time to time. Grab this while you can.
After decompression - the folder is
titled “Eyeballing_Snowden_Info” and
holds a total of 371MB decompressed.
Eyeballing_Snowden_Info.7z
(783 files | 7zip | 286MB)
http://fileb.ag/iv8x797lqzdw
http://uploadhero.co/dl/aBBhCePf
http://bitshare.com/files/fuxhd3ry/Eyeballing_Snowden_Info.7z.html
http://www.upload-box.com/index.php/files/get/0VPCtiKFxf/eyeballing-snowden-info.7z
http://f.ishoo.ru/files/get/3GfGXXqGSH/eyeballing-snowden-info.7z
http://davvas.com/frrbbi2975xe
http://BillionUploads.com/hpww20r554x4
http://bayfiles.net/file/119rR/Y6ax0Z/Eyeballing_Snowden_Info.7z
_______________________________________
¤ indonesia-spying-slides.zip (mirrored) ::
http://up.sef.ps/xu/files/get/Aen2UBNeep/indonesia-spying-slides.zip
http://document-space.com/index.php/files/get/yWGp5DplsK/indonesia-spying-slides.zip
http://www.quickupdown.com/files/get/BEqtDnYz8M/indonesia-spying-slides.zip
¤ Australian Intelligence Agency (ASD)
Swaps Bulk Metadata With the NSA ::
Australia’s intelligence apparatus mines
the telecommunications data of ordinary
Australians, and hands over the material
to the US and its closest allies, according
to the latest leaked document from Edward
Snowden, partly published by the Guardian
Australia web site.
The document obtained by the former US
National Security Agency (NSA) contractor
confirms that the electronic surveillance
agency, the Australian Signals Directorate
(ASD), monitors the domestic population,
as well as the people and governments of
many Asian countries.
Despite Australian legislation supposedly
restricting the ASD’s internal spying,
the agency hands over to the NSA and its
global partners so-called metadata of
the phone calls, texts, emails, on-line
address books and social media posts of
millions of people.
This exposure of mass surveillance follows
the recent revelations, also from documents
leaked by Snowden, that the ASD, then known
as the Defence Signals Directorate (DSD),
tapped the phone calls of Indonesian
prez Susilo Bambang Yudhoyono, and that
Australian embassies throughout Asia
operate as electronic listening posts
for the US-led spying network.
http://www.abc.net.au/news/2013-11-18/australia-spied-on-indonesian-president-leaked-docu
http://www.abc.net.au/news/2013-11-18/canberra-jakarta-and-the-digital-great-game/5100502
http://www.theguardian.com/world/2013/nov/18/australia-tried-to-monitor-indonesian-presidents-phone
http://www.wsws.org/en/articles/2013/12/03/data-d03.html
http://www.scmp.com/news/asia/article/1359356/indonesian-ambassador-australia-recalled-over-spying-claims
http://www.voanews.com/content/indonesia-to-review-cooperation-with-australia-due-to-spying-claims/1792523.html
¤ Australian Media Denounces Exposure of
Indonesia Spying Operations ::
The Australian Broadcasting Corporation’s
(ABC) recent joint reporting of Australian
espionage operations targeting Indonesian
political figures has been furiously
denounced by other media outlets for
breaching “national security” and the
“national interest.” The reaction
underscores the extent to which the
media establishment has been integrated
into the state-intelligence apparatus.
On November 18, after being approached
by the Guardian with documents leaked
by former National Security Agency (NSA)
contractor Edward Snowden, the ABC
co-released the story, revealing Australian
phone tapping of Indonesian Prez Susilo
Bambang Yudhoyono, his wife and eight
senior political figures. The report
triggered a still-unresolved diplomatic
crisis for the Australian government, with
the Indonesian president suspending military
and intelligence cooperation.
http://www.wsws.org/en/articles/2013/12/03/medi-d03.html
_______________________________________
¤ NSA G8 - G20 Summit SIGINT Directive ::
Top secret documents retrieved by US
whistleblower Edward Snowden show that
Prime Minister Stephen Harper’s dictatorship
allowed the largest American spy agency
to conduct widespread surveillance in
Canada during the 2010 G8 and G20 summits.
The documents are being reported exclusively
by CBC News.
The briefing notes, stamped “Top Secret,”
show the US turned its Ottawa embassy into
a security command post during a six-day
spying operation by the National Security
Agency while US Prez Barack Obama and 25
other foreign heads of government were on
Canadian soil in June of 2010.
The covert US operation was no secret to
Canadian authorities. ... ...
The world was still struggling to climb
out of the great recession of 2008. Leaders
were debating a wide array of possible
measures including a global tax on banks,
an idea strongly opposed by both the US
and Canadian governments. That notion was
eventually scotched.
http://cryptome.org/2013/12/nsa-g8-g20-spying.pdf
http://www.cbc.ca/news/politics/read-snowden-nsa-document-on-g8-g20-summit-surveillance-1.2447387
http://www.cbc.ca/news/politics/new-snowden-docs-show-u-s-spied-during-g20-in-toronto-1.2442448
http://www.wsws.org/en/articles/2013/12/03/cana-d03.html
https://www.wsws.org/en/articles/2013/12/14/cses-d14.html
¤ Canada’s CSEC Slides Expose Espionage
Against Brazilian Ministry ::
http://cryptome.org/2013/10/cse-br/cse-br.htm
UPDATE ; 18 CSEC slides posted on PDF @
cryptome.org, November 30, 2013.
http://cryptome.org/2013/11/csec-br-spy.pdf
¤ Interpreting the CSEC Presentation ::
http://theoreti.ca/?p=5057
¤ Ministério de Minas e Energia está na
mira de espiões americanos e canadenses ::
http://m.g1.globo.com/fantastico/noticia/2013/10/ministerio-das-minas-e-energia-esta-na-mira-de-espioes-americanos-e-canadenses.html
TRANSLATED @ slexy.org
http://slexy.org/view/s2tDGSktog
¤ American and Canadian Spies Target Brazilian
Energy and Mining Ministry (English) ::
http://g1.globo.com/fantastico/noticia/2013/10/american-and-canadian-spies-target-brazilian-energy-and-mining-ministry.html
¤ Canada’s CSEC Provides Data to NSA ::
The politicians and corporate media would have Canadians
believe that they have only “moved on” from discussing
CSEC’s activities because there is nothing for Canadians
to worry about.
In reality, the CSEC is a vital tool of the Canadian ruling
class that plays an important role in the pursuit of its
imperialist foreign policy and in the surveillance and
suppression of opposition at home. The size of CSEC’s
staff—it employs almost 2,000 people and a further thousand
military personnel assist its work—give an inkling of the
scale of its activities.
These include everything from supporting the overseas
operations of the Canadian military, to spying on governments
that are reputed allies of Canada and assisting CSIS and the
RCMP in conducting a vast program of domestic surveillance.
Of especial importance is the CSEC’s partnership with the NSA.
According to former NSA technical director William Binney,
the two organizations “have integrated personnel” i.e. swap
personnel to improve seamless collaboration. They also share
Internet surveillance programs.
As a further element of its collaboration with the Five Eyes
alliance, CSEC was relied on in the project of spying on
diplomats and officials during the 2009 London G20 meeting
according to a report in the British newspaper The Guardian,
which was based on documents supplied by Snowden. The highly
sensitive operation involved the penetration of delegates’
smartphones to monitor their email messages and calls.
http://www.wsws.org/en/articles/2013/09/28/csec-s28.html
http://www.scribd.com/doc/188094600/CSEC-Presentation
¤ NSA CSEC Partnership ::
http://cryptome.org/2013/12/nsa-csec-partners.pdf
_______________________________________
¤ EU Nations Address Mass Spying ::
http://cryptome.org/2013/11/eu-mass-spying.pdf
¤ EU Hearings On NSA ::
http://www.europarl.europa.eu/committees/en/libe/events.html?id=hearings
http://euobserver.com/justice/121979
http://blog.cyberwar.nl/2013/11/viviane-reding-nsa-needs-counterweight.html
¤ EU/US Data Protection Hoot ::
http://cryptome.org/2013/11/eu-us-data-protect-13-1127.pdf
¤ EU to Run Yet Another Ineffectual Probe ::
http://www.theguardian.com/world/2013/dec/02/edward-snowden-un-investigation-surveillance
_______________________________________
Draft state-level legislation called the
Fourth Amendment Protection Act would –
in theory – forbid local governments from
providing services to federal agencies
that collect electronic data from Americans
without a personalized warrant.
No Utah lawmaker has came forward to
introduce the suggested legislation yet,
but at least one legislator has committed
to doing so, according to Mike Maharrey
of the Tenth Amendment Center. He declined
to identify the lawmaker before the bill
is introduced.
“We are still very early in the campaign,
and this is in fact a multi-step, multi-year
long-term strategy,” says Maharrey, whose
group is part of the OffNow coalition along
with the Bill of Rights Defense Committee
and a handful of other groups.
The campaign is looking beyond Utah,
Maharrey adds.
http://www.usnews.com/news/articles/2013/12/03/some-nsa-opponents-want-to-nullify-surveillance-with-state-law
_______________________________________
¤ Guardian’s Reporters Face Threats and
Intimidation From British Dictatorship ::
In the months since, the Guardian has
continued to make officials here exceedingly
nervous by exposing the joint operations of
US and British intelligence — particularly
their cooperation in data collection and
snooping programs involving British citizens
and close allies on the European continent.
In response, the Guardian is being called
to account by British authorities for
jeopardizing national security. The
Guardian’s top editor, Alan Rusbridger,
is being forced to appear before a
parliamentary committee Tuesday to explain
the news outlet’s actions.
http://www.washingtonpost.com/world/europe/britain-targets-guardian-newspaper-over-intelligence-leaks-related-to-edward-snowden/2013/11/29/1ec3d9c0-581e-11e3-bdbf-097ab2a3dc2b_story.html
http://www.infowars.com/uk-police-threaten-guardian-editor-with-terrorism-charges-over-snowden-leaks/
http://www.wsws.org/en/articles/2013/10/18/guar-o18.html
¤ Alan Rusbridger Interviewed ::
http://www.washingtonpost.com/world/q-and-a-with-alan-rusbridger-editor-of-the-guardian/2013/11/29/11b36798-5821-11e3-bdbf-097ab2a3dc2b_story.html
¤ US Dictatorship Fuels the Same Threats
as the British Dictatorship ::
Glenn Greenwald, the Guardian reporter who
published Edward Snowden’s leaks, was
recently suggested to be a criminal for
shining light on the NSA’s abuse of power.
This is a key identifiable step when societies
close down; it is a point of no return. It
seems the United States is reaching the event
horizon to a police state.
http://falkvinge.net/2013/06/30/with-journalism-persecuted-the-united-states-is-now-at-event-horizon-to-a-police-state/
Cryptome noted
“There have been no reports of leakage
from the insurance stashes, the publication
outlets or the various reported transmissions
among them (except for the Miranda snatch by
UKG), although there could be some which have
not been disclosed, not known, were sold or
bartered, or were stolen for future use.
It is likely that intelligence and law
enforcement agencies have made stringent
efforts to access the documents by customarily
secret burglary, bribery, barter, purchase,
deception, co-optation.
Those multiple persons and outlets who have
had access, or suspected of access, are
certain to have been targeted, some perhaps
successfully persuaded to cooperate with
promises of confidentiality, backed by
threats if cooperation is refused -- a
standard coercive means of authorities.
While Edward Snowden is knowledgeable
about counter-espionage and likely advised
his initial correspondents, who in turn
advised successive cooperators, usually
these counter-operations are not revealed,
but hints of them are leaked to discourage
participation.
Beyond that, it is customary to foment
disputes and disagreements among competing
publications, reporters, opinionators,
experts, the spying industry and consumers,
along with threats against families, friends
and employers, as now occurring, to rattle
and pressure targets to consider cooperating
with authorities, including use of rewards
-- monetary and career -- for informants.”
http://cryptome.org/2013/11/snowden-related-targets.htm
_______________________________________
¤ NSA Describes Dutch SIGINT Spying ::
http://cryptome.org/2013/11/nsa-dutch-sigint.pdf
_______________________________________
¤ Mass Surveillance Is Big Business ;
Corporations Are as Good at Spying as
Governments ::
http://motherboard.vice.com/blog/mass-surveillance-is-big-business-corporations-are-as-good-at-spying-as-governments
_______________________________________
¤ NSA Spies on Pornography Viewing to
Discredit Targeted Enemies ::
http://cryptome.org/2013/11/nsa-muslim-porn.pdf
http://www.techdirt.com/articles/20131127/00243625384/nsa-spied-porn-habits-radicalizers-planned-to-use-details-to-embarrass-them.shtml
http://www.huffingtonpost.com/2013/11/26/nsa-porn-muslims_n_4346128.html
http://www.dailykos.com/story/2013/11/26/1258660/-NSA-spied-on-radicalizers-to-discredit-them
_______________________________________
¤ NSA WINDSTOP, MUSCULAR, INCENSER Slides ::
http://cryptome.org/2013/10/nsa-windstop-muscular-incenser.pdf
¤ What Else Do We Know About MUSCULAR? ::
http://cryptome.org/2013/10/nsa-muscular.htm
¤ NSA WINDSTOP Month of Mass Spying ::
http://cryptome.org/2013/11/nsa-windstop.pdf
¤ NSA Collection Optimization Overview ::
http://cryptome.org/2013/10/nsa-sso-overview.pdf
¤ NSA Content Acquisition Optimization ::
http://cryptome.org/2013/10/nsa-sso-content.pdf
¤ NSA Collection Optimization Slides ::
http://cryptome.org/2013/10/nsa-sso-slides.pdf
¤ NSA SSO Cryptologic Provider ::
http://cryptome.org/2013/11/nsa-sso-crypto.pdf
¤ NSA SSO Yahoo, Google Exploitation ::
http://cryptome.org/2013/11/nsa-sso-yahoo-google.pdf
¤ NSA and GCHQ Breaks 3rd Party SSL to
Steal Email Metadata ::
Even though they cooperate with the US
spy agency on court-ordered surveillance,
firms like Google and Yahoo are subject to
additional surveillance they never agreed to.
Web companies host copies of your data on
servers around the world, reducing the
chance of losing your information should
one fail. When you log in to an account
with these firms, the data sent between
you and their servers is encrypted, making
it difficult to snoop – but the internal
transfers between data centres are unencrypted.
And because many of the transfers take place
outside the US, approval from a FISA court
isn’t required to tap the information.
The National Security Agency has secretly
broken into the main communications links
that connect Yahoo and Google data centers
around the world, according to documents
obtained from former NSA contractor Edward
Snowden and interviews with knowledgeable
officials.
By tapping those links, the agency has
positioned itself to collect at will from
hundreds of millions of user accounts,
many of them belonging to Americans. The
NSA does not keep everything it collects,
but it keeps a lot.
The NSA’s principal tool to exploit the
data links is a project called MUSCULAR,
operated jointly with the agency’s British
counterpart, the Government Communications
Headquarters. From undisclosed interception
points, the NSA and the GCHQ are copying
entire data flows across fiber-optic cables
that carry information among the data
centers of the Silicon Valley giants.
http://www.washingtonpost.com/world/national-security/nsa-infiltrates-links-to-yahoo-google-data-centers-worldwide-snowden-documents-say/2013/10/30/e51d661e-4166-11e3-8b74-d89d714ca4dd_story.html
http://articles.economictimes.indiatimes.com/2013-10-31/news/43528723_1_data-centers-google-claire-cain-miller
http://www.newscientist.com/article/dn24519-nsa-snoops-tech-companies-fibreoptic-networks.html
http://www.theguardian.com/technology/2013/nov/04/eric-schmidt-nsa-spying-data-centres-outrageous
http://article.wn.com/view/2013/10/30/NSA_Broke_Into_Yahoo_Google_Data_Centers_Report/
¤ NSA Collects Bulk Email Address Books ::
In June, President Obama said the NSA’s
email collecting program “does not apply
to US citizens.”
The National Security Agency is harvesting
hundreds of millions of contact lists from
personal e-mail and instant messaging
accounts around the world, many of them
belonging to Americans, according to
senior intelligence officials and top-secret
documents provided by former NSA contractor
Edward Snowden.
The collection program, which has not
been disclosed before, intercepts e-mail
address books and “buddy lists” from
instant messaging services as they move
across global data links. Online services
often transmit those contacts when a user
logs on, composes a message, or synchronizes
a computer or mobile device with information
stored on remote servers.
http://www.washingtonpost.com/world/national-security/nsa-collects-millions-of-e-mail-address-books-globally/2013/10/14/8e58b5be-34f9-11e3-80c6-7e6dd8d22d8f_story.html
http://www.theblaze.com/stories/2013/10/14/report-nsa-collects-millions-of-contact-lists-from-personal-email-and-instant-messaging-accounts-globally/
http://www.theatlanticwire.com/technology/2013/10/nsa-collects-email-address-books-contact-lists/70535/
¤ Special Collection Services Wikis ::
http://cryptome.org/2013/11/scs-fr-us.pdf
¤ NSA Exploits Microsoft Vulnerabilities ::
http://cryptome.org/2013/11/nsa-microsoft.pdf
http://s3.documentcloud.org/documents/841655/microsoft-realms-redacted.pdf
http://cryptome.org/2013/11/nsa-microsoft-cloud-exploit.pdf
http://s3.documentcloud.org/documents/841654/microsoft-in-cloud-exploitation-redacted.pdf
http://www.theguardian.com/world/2013/jul/11/microsoft-nsa-collaboration-user-data
¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯
¤ NSA’s Boundless Informant ::
http://cryptome.org/2013/10/nsa-boundless-informant.pdf
¤ NSA’s Boundless Informant Collected
124+ Billion Phone Calls in One Month ::
http://cryptome.org/2013/10/nsa-125b-calls.htm
¤ NSA’s Boundless Informant Metadata ::
http://electrospaces.blogspot.com/2013/10/boundlessinformant-only-shows-metadata.html
¤ Guardian’s Boundless Informant Report ::
http://www.theguardian.com/world/2013/jun/08/nsa-boundless-informant-global-datamining
¤ Le Monde’s Boundless Informant Report ::
http://www.lemonde.fr/technologies/article/2013/10/21/france-in-the-nsa-s-crosshair-phone-networks-under-surveillance_3499741_651865.html
¤ Three Boundless Informant “Heatmaps” ::
http://cryptome.org/2013/10/nsa-boundless-informant-images.htm
¤ NSA Boundless Informant Spied Norway ::
http://cryptome.org/2013/11/nsa-boundlessinformant-no-33m.pdf
¤ US Says France, Spain Aided NSA Spying ::
http://cryptome.org/2013/10/nsa-us-france-spain.htm
---------------------------------------
NOBODY comments ▼
Le Monde’s Boundless Informant document
differs from the Guardians.
Le Monde’s Boundless Informant Graph ...
http://s3.documentcloud.org/documents/807033/boundless-monde.pdf
Guardians’ Boundless Informant Graph ...
http://static.guim.co.uk/sys-images/Guardian/Pix/pictures/2013/6/8/1370716131074/boundless-heatmap-008.jpg
Le Monde shows 3,095,533,478 intercepts
in the US compared to the Guardian showing
2,392,343,446 US intercepts.
Le Monde’s Boundless Informant graph
shows the “aggregate” estimate, both
digital networks (DNI) and telephony (DNR)
interception ; while the Guardian’s graph
only shows the digital “DNI” estimate.
---------------------------------------
¤ DRTBOX and the DRT Surveillance Systems ::
http://electrospaces.blogspot.com/2013/11/drtbox-and-drt-surveillance-systems.html
¤ BOUNDLESS INFORMANT Explicated ::
This was written from a person who purports
to actually use the Boundless Informant tool.
http://cryptome.org/2013/11/nsa-boundless-informant-explicated.htm
¤ RE-BOUNDLESS INFORMANT Explicated ::
http://cryptome.org/2013/11/nsa-boundless-informant-gm-place.htm
¤ BOUNDLESS INFORMANT Screenshots Can Be
Misleading ::
http://electrospaces.blogspot.com/2013/11/screenshots-from-boundlessinformant-can.html
¤ DNI Masterspy Says Le Monde Misleads
on NSA Spying ::
http://cryptome.org/2013/10/dni-13-1022.pdf
“Recent articles published in the
French newspaper Le Monde contain
inaccurate and misleading information
regarding US foreign intelligence
activities. The allegation that the
National Security Agency collected more
than 70 million “recordings of French
citizens’ telephone data” is false.
While we are not going to discuss the
details of our activities, we have
repeatedly made it clear that the
United States gathers intelligence of
the type gathered by all nations. The
US collects intelligence to protect the
nation, its interests, and its allies
from, among other things, threats such
as terrorism and the proliferation of
weapons of mass destruction.
The United States values our longstanding
friendship and alliance with France and
we will continue to cooperate on security
and intelligence matters going forward.”
James R. Clapper
Director of National Intelligence
---------------------------------------
¤ Snowden Responds to Feinstein’s Stupidity ::
http://thehill.com/blogs/hillicon-valley/technology/330497-snowden-fires-back-at-feinstein-over-surveillance-claim
“Today, no telephone in America makes
a call without leaving a record with the
NSA. Today, no Internet transaction enters
or leaves America without passing through
the NSA’s hands,” Snowden said in a
statement Thursday.
“Our representatives in Congress tell us
this is not surveillance. They’re wrong.”
_______________________________________
¤ US and UK Governments Still Worry Over
Cache of Encrypted Documents by Snowden ::
US and British intelligence officials
say they are concerned about a “doomsday”
collection of highly classified, heavily
encrypted materials they believe former
National Security Agency contractor
Edward Snowden may have stored away.
One source saw the cache of documents
as an “insurance policy” for Snowden
should he feel threatened by arrest or
other harm. ... ...
Adding merit to the suspicion that the
well-secured cache may be an insurance
policy of sorts, Greenwald said in June
that “if anything happens at all to
Edward Snowden, he has arranged for them
to get access to the full archives.”
http://www.infowars.com/us-uk-officials-worry-snowden-still-has-doomsday-collection-of-classified-material/
_______________________________________
¤ (Go Figure) Obama’s “Overhaul” of Spy
Programs Cloaked in More Secrecy ::
Obama has been gradually tweaking vast
government surveillance policies. But he
is not disclosing those changes to the
public. Has he stopped spying on friendly
world leaders? He won’t say. Has he stopped
eavesdropping on the United Nations, the
World Bank and the International Monetary
Fund? He won’t say.
Even the report by the group Obama created
to review and recommend changes to his
surveillance programs has been kept secret.
http://www.mcclatchydc.com/2013/11/25/209465/obamas-overhaul-of-spy-programs.html
_______________________________________
¤ NSA Report Outlined Goals for More Power ::
Officials at the National Security Agency,
intent on maintaining its dominance in
intelligence collection, pledged last year
to push to expand its surveillance powers,
according to a top-secret strategy document.
Written as an agency mission statement with
broad goals, the five-page document said
that existing American laws were not adequate
to meet the needs of the NSA to conduct broad
surveillance in what it cited as “the golden
age of Sigint,” or signals intelligence.
“The interpretation and guidelines for
applying our authorities, and in some cases
the authorities themselves, have not kept
pace with the complexity of the technology
and target environments, or the operational
expectations levied on NSA’s mission,” the
document concluded.
http://cryptome.org/2013/11/nsa-sigint-strategy-2012-2016.pdf
http://cryptome.org/2013/11/nsa-power-goals.htm
http://www.nytimes.com/2013/11/23/us/politics/nsa-report-outlined-goals-for-more-power.html
http://rt.com/usa/snowden-leak-expand-surveillance-goal-185/
http://www.dailydot.com/politics/snowden-leak-nsa-power/
¤ NSA TreasureMap Description ::
The NY Times today cites an NSA tool
called Treasure Map and describes its
capabilities but does not publish visual
examples. Also cited is Packaged Goods,
an associated tool. If publicly available,
Cryptome asked for pointers to the two.
http://cryptome.org/2013/11/nsa-treasuremap.htm
_______________________________________
¤ Documents Show Tony Blair Let US Spy Britons ::
http://www.channel4.com/news/nsa-edward-snowden-america-britain-tony-blair
_______________________________________
¤ GCHQ ROYAL CONCIERGE Diplomatic Hotel Spy ::
http://cryptome.org/2013/11/gchq-royal-concierge-de.pdf
http://cryptome.org/2013/11/gchq-royal-concierge.jpg
¤ GCHQ Monitors Diplomats Hotel Bookings ::
Britain’s GCHQ intelligence service monitors
diplomats’ travels using a sophisticated
automated system that tracks hotel bookings.
Once a room has been identified, it opens
the door to a variety of spying options.
http://www.spiegel.de/international/europe/gchq-monitors-hotel-reservations-to-track-diplomats-a-933914.html
_______________________________________
¤ Supreme Court Blocks Challenge to Spying ::
“We ask the NSA to immediately suspend
collection of solely domestic communications
pending the competition of a public rulemaking
as required by law. We intend to renew our
request each week until we receive your
response,” EPIC said.
Five months later, though, the Supreme Court
said this week that it would not be hearing
EPIC’s plea. A document began circulating
early Monday in which the high court listed
the petition filed by the privacy advocates
as denied.
http://rt.com/usa/supreme-court-nsa-spying-906/
http://www.infowars.com/supreme-court-blocks-challenge-to-nsa-phone-tracking/
_______________________________________
¤ NSA Deputy Director John Inglis Speaks ::
http://www.youtube.com/watch?v=6ydkw4xgZ-Y
¤ Intelligence Community Lawyers Argue
Over Metadata Hoarding ::
http://www.techdirt.com/articles/20131105/08030825135/dni-lawyer-argues-that-curbing-metadata-collections-will-damage-americans-privacy.shtml
http://www.dailybinarynews.com/intelligence-community-lawyers-argue-that-curbing-metadata-collections-will/
¤ Bill Clinton Warns We Have No Security,
No Privacy ::
http://www.infowars.com/bill-clinton-on-nsa-spying-we-are-on-the-verge-of-having-the-worst-of-all-worlds-well-have-no-security-and-no-privacy/
¤ Obama Regime Pledges to Continue Illegal
Spying Programs ::
http://www.wsws.org/en/articles/2013/11/06/spyi-n06.html
¤ John McCain Interview by Der Spiegel ::
http://cryptome.org/2013/11/mccain-nsa-affair.pdf
http://www.spiegel.de/international/world/interview-with-john-mccain-on-nsa-spying-on-angela-merkel-a-932721.html
_______________________________________
¤ NSA & GCHQ “Bullrun” Decryption Brief ::
http://cryptome.org/2013/09/nsa-bullrun-brief-propublica-13-0905.pdf
http://s3.documentcloud.org/documents/784284/bullrun-briefing-sheet-from-gchq.pdf
¤ NSA & GCHQ “Bullrun” Decryption Guide ::
http://cryptome.org/2013/09/nsa-bullrun-2-16-guardian-13-0905.pdf
http://s3.documentcloud.org/documents/784047/bullrun-guide-final.pdf
¤ NSA ; Cryptanalysis & Exploitation ::
“TOP SECRET//COMINT at a minimum”
“(TS//SI) The fact that NSA/CSS makes
cryptographic modifications to commercial
or indigenous cryptographic information
security devices or systems in order to
make them exploitable.”
“TOP SECRET//COMINT at a minimum”
“(U//FOUO) The fact that NSA/CSS
successfully exploits cryptographic
components of commercial information
security devices or systems when the
device or system specified.”
http://cryptome.org/2013/09/nsa-cryptanalysis-2-12-guardian-13-0905.pdf
http://s3.documentcloud.org/documents/784048/crypt-guide2.pdf
¤ NSA & GCHQ Breaks Other SIGINT Crypto ::
http://cryptome.org/2013/09/nsa-sigint-enabling-guardian-13-0905.pdf
http://cryptome.org/2013/09/nsa-sigint-enabling-propublica-13-0905.pdf
http://cryptome.org/2013/09/nsa-sigint-enabling-redacts.jpg
¤ NSA and GCHQ Defeats Encryption ::
US and British intelligence agencies
have successfully cracked much of the
online encryption relied upon by hundreds
of millions of people to protect the
privacy of their personal data, online
transactions and emails, according to
top-secret documents revealed by former
contractor Edward Snowden. ...
Those methods include covert measures
to ensure NSA control over setting of
international encryption standards, the
use of supercomputers to break encryption
with “brute force”, and – the most closely
guarded secret of all – collaboration with
technology companies and internet service
providers themselves.
Through these covert partnerships, the
agencies have inserted secret vulnerabilities
– known as backdoors or trapdoors – into
commercial encryption software. ... ...
Independent security experts have long
suspected that the NSA has been introducing
weaknesses into security standards, a fact
confirmed for the first time by another
secret document. It shows the agency
worked covertly to get its own version
of a draft security standard issued by
the US National Institute of Standards
and Technology approved for worldwide
use in 2006.
http://www.theguardian.com/world/2013/sep/05/nsa-gchq-encryption-codes-security
¤ Full Guardian Report Mirrored ::
http://cryptome.org/2013/09/nsa-decrypt-guardian-13-0905.pdf
¤ Full New York Times Report Mirrored ::
http://cryptome.org/2013/09/nsa-decrypt-nyt-13-0905.pdf
¤ Full ProPublica Report Mirrored ::
http://cryptome.org/2013/09/nsa-decrypt-propublica-13-0905.pdf
¤ Bruce Schneier - NSA Cracks Crypto ::
http://cryptome.org/2013/09/nsa-decrypt-schneier-13-0905-01.pdf
http://cryptome.org/2013/09/nsa-decrypt-schneier-13-0905-02.pdf
http://cryptome.org/2013/09/nsa-decrypt-schneier-13-0905-03.pdf
¤ Matthew Green - NSA Cracks Crypto ::
http://cryptome.org/2013/09/nsa-decrypt-matthew-green-13-0905.pdf
http://cryptome.org/2013/09/nsa-decrypt-matthew-green-13-0910.pdf
¤ DNI Response to NSA Cracks Crypto ::
http://cryptome.org/2013/09/nsa-decrypt-masterspy-13-0906.htm
¤ Cryptography List Members Face Ulcers ::
http://cryptome.org/2013/09/nsa-decrypt-cryptography-13-0905.htm
¤ Documents Confirm “Back Doors” Inserted
Into Web and Software to Exploit Crypto ::
http://rt.com/usa/nsa-gchq-encryption-snowden-478/
http://www.infowars.com/documents-confirm-nsa-inserts-back-doors-into-web-software/
A range of US hardware and software
companies are in danger of being dragged
into the widening scandal over internet
surveillance, following the latest leaks
from Edward Snowden, the former National
Security Agency contractor.
The leaked documents include NSA claims
that it has collaborated with technology
companies to plant “back doors” into
their systems – or ways for the agency
secretly to penetrate systems without
the users’ knowledge.
http://www.ft.com/cms/s/0/0054adb2-1709-11e3-9ec2-00144feabdc0.html
¤ You Are the Enemy of the Police State ::
http://anewdomain.net/2013/09/06/john-c-dvorak-nsa-spying-americans-now-enemy/
_______________________________________
¤ SSL Inspector ::
http://www.wikileaks.org/spyfiles/docs/NETRONOME-2011-SSLInsp-en.pdf
¤ Examining SSL-Encrypted Communications ::
http://www.wikileaks.org/spyfiles/docs/METRONOME-2011-ExamSSL-Comm-en.pdf
_______________________________________
¤ Bobby R. Inman Suggests NSA Declassify
All Suspected Leaks From Snowden ASAP ::
http://www.nytimes.com/2013/11/03/world/no-morsel-too-minuscule-for-all-consuming-nsa.html?_r=0
¤ Around 42 Years to Publish All Leaks ::
http://cryptome.org/2013/11/snowden-tally.htm
¤ US SIGINT Strategic Mission 2007 ::
http://cryptome.org/2013/11/nsa-sigint-strategic-mission-2007.pdf
¤ US SIGINT Strategic Mission 2013 ::
http://cryptome.org/2013/11/nsa-sigint-strategic-mission-2013.pdf
¤ A Weeks Worth of Eavesdropping ::
http://cryptome.org/2013/11/nsa-week-spy-2009.pdf
¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯
¤ Greenwald’s Partner, David Miranda
Accused of Terrorism in the UK ::
http://www.reuters.com/article/2013/11/01/us-uk-nsa-idUSBRE9A013O20131101
¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯
¤ Meet the Spies Doing the NSA’s Dirty Work ::
The heart of the FBI’s signals intelligence
activities is an obscure organization called
the Data Intercept Technology Unit, or DITU
(pronounced DEE-too). The handful of news
articles that mentioned it prior to revelations
of NSA surveillance this summer did so mostly
in passing. It has barely been discussed in
congressional testimony. An NSA PowerPoint
presentation given to journalists by former
NSA contractor Edward Snowden hints at DITU’s
pivotal role in the NSA’s Prism system --
it appears as a nondescript box on a flowchart
showing how the NSA task[s] information to
be collected, which is then gathered and
delivered by the DITU.
The DITU is located in a sprawling compound
at Marine Corps Base Quantico in Virginia,
home of the FBI’s training academy and the
bureau’s Operational Technology Division,
which runs all the FBI’s technical intelligence
collection, processing, and reporting.
http://www.foreignpolicy.com/articles/2013/11/21/the_obscure_fbi_team_that_does_the_nsa_dirty_work
¤ More PRISM Slides Published ::
http://cryptome.org/2013/10/nsa-prism-13-1021.pdf
https://s3.amazonaws.com/s3.documentcloud.org/documents/807036/prism-entier.pdf
http://www.lemonde.fr/technologies/article/2013/10/21/espionnage-de-la-nsa-tous-les-documents-publies-par-le-monde_3499986_651865.html
¤ PRISM ; FAA Passive Spying ::
http://cryptome.org/2013/10/nsa-wanadoo-alcatel.pdf
http://s3.documentcloud.org/documents/807031/wanadoo-alcatel.pdf
http://www.lemonde.fr/technologies/article/2013/10/21/espionnage-de-la-nsa-tous-les-documents-publies-par-le-monde_3499986_651865.html
¤ Compare PRISM Slide Publication ::
http://cryptome.org/2013-info/10/le-monde-prism/le-monde-prism.htm
¤ NSA PRISM Slides From Guardian ::
http://cryptome.org/2013/11/nsa-prism-guardian-13-1101.pdf
¤ Le Monde’s PRISM Report (TRANSLATED) ::
http://www.lemonde.fr/technologies/article/2013/10/21/l-ampleur-de-l-espionnage-mondial-par-la-nsa_3499756_651865.html
The magnitude of the global espionage
by the NSA.
During the summer, the documents provided to the Guardian
and the Washington Post by former NSA employee Edward
Snowden helped unveil the extent of surveillance and
espionage carried out by the NSA and its allies. Le Monde
also now has access to some of these documents.
Before the summer, the NSA was the most secretive intelligence
agencies of the United States. Then came Edward Snowden,
who was granted an asylum for a year in Russia. Wanting to
denounce "the largest program of arbitrary monitoring of human
history," the American working for a subcontractor of the NSA
has obtained several thousands of highly confidential documents.
In early June, the first secrets of the National Security
Agency in these parts start to filter. The Guardian reveals
that the telephone operator Verizon provides NSA phone data
of several million Americans, according to a court order secret.
Then it was the turn of the Prism program to be unveiled. It
allows the US Secret Service, and first and foremost to the
NSA, to access a privileged manner, since December 2007,
data from nine major Internet companies, including Google,
Facebook and Microsoft.
MONITORING OF SUBMARINE CABLE
A document providing internal training on Prism, which Le
Monde has also had access, how the NSA analysts can query
the databases of Web giants, research documents, emails or
instant discussions. All within a legal framework that
overcomes the request of an individual mandate. The companies
named in the documents have denied that the NSA had a direct
and unilateral access to their servers.
In addition to this targeted surveillance, Snowden records
reveal another method of massive collection of the NSA called
Upstream. This system can collect data from the submarine
cable and Internet infrastructures. A logical strategy, when
we know that 99% of global communications now pass through
diving.
To learn more about the context of the revelations of the
World, the editorial read : "Fight Big Brother"
The British equivalent of the NSA, the Government Communications
Headquarters (GCHQ), plays a major role in this system, because
of the historical proximity of Great Britain and the United States,
confidentiality agreements and a financial dependence of those
services from London to Washington. There are also technical
reasons : a significant portion of submarine cables linking
Europe to America through Britain. With Edward Snowden, the
Tempora program , which aims to "control the Internet" by
monitoring these cables, has been revealed. "You're in an
enviable position, says a document presenting Tempora, presented
by the Guardian, have fun and pull in the best." Turning a page
of the document presenting the Prism program, we discover Upstream
relies on four programs (Blarney, Fairview, and oakstar Stormbrew)
which we know to date, the outline. Fairview, for example,
would largely on intercepted telephone conversations via the
major US carriers.
DATA ANALYSIS TOOLS
Many tools are needed to sort the mass of intercepted data.
One of them is called XKeyscore, and its operation has been
detailed in the columns of the Guardian. The extreme precision
of the data are clear. With XKeyscore, analysts can access
the content of e-mails to a list of websites visited by their
target or the keywords entered by the latter in the search
engines.
The framework for this research is not binding, as the Guardian
explained, and many Americans are data made available to agents.
According to the presentation materials, to promote the
capabilities of the tool, three hundred terrorists have been
arrested since 2008 thanks to XKeyscore.
NSA and GCHQ not only devote their considerable resources
monitoring the fight against terrorism, but also to spy allies.
At the G20 summit in London in 2009, computers of diplomats
and heads of state were monitored by GCHQ, as well as some of
their phone calls. NSA, she focused on the European Union (EU),
as revealed by Der Spiegel, always on the basis of documents
Snowden. NSA has installed cookies on the premises of the EU
representation in Washington. The EU delegation to the UN in
New York, and the building of the Council of the European Union
in Brussels were also scrutinized by the US agency. Brazil is
also one of the countries affected by this intelligence. According
to Brazilian media group O Globo, its political leaders as some
companies have been targeted.
The Snowden documents have informed the considerable efforts
made by the United States to start listening to Internet, in a
sometimes unclear legal framework and often away from real
democratic debate. Interviewed by Le Monde, the US authorities
have assured that the Prism program was the subject of a
parliamentary debate in the United States and was working
in a strictly regulated legal framework. Asked on September 12
revelations Snowden, James Clapper, the US Director of National
Intelligence, said: "What happened - and that is harmful - sparked
conversation and debate that it probably was necessary."
_______________________________________
¤ UN Resolution Against US Spying ::
http://cryptome.org/2013/10/un-v-us-spying.htm
¤ 21 Nations Line Up Behind UN Effort ::
http://thecable.foreignpolicy.com/posts/2013/10/25/exclusive_21_nations_line_up_behind_un_effort_to_restrain_nsa
¤ Government May Stop Spying On So-called
‘World Leaders’, But Not You ::
http://www.infowars.com/government-may-stop-spying-on-world-leaders-but-not-you/
NOBODY comments
100% expected. They will continue to
spy on 99.9% of the world, no doubt.
Any secret data-hoardering agency will.
We must adjust to it by learning how
to counter their surveillance.
¤ UPDATE ; Inside America’s Plan to Kill
Online Privacy Rights Everywhere ::
The United States and its key intelligence
allies are quietly working behind the scenes
to kneecap a mounting movement in the United
Nations to promote a universal human right
to online privacy, according to diplomatic
sources and an internal American government
document obtained by The Cable.
The diplomatic battle is playing out in an
obscure UN General Assembly committee that
is considering a proposal by Brazil and
Germany to place constraints on unchecked
internet surveillance by the National
Security Agency and other foreign intelligence
services. American representatives have made
it clear that they won’t tolerate such
checks on their global surveillance network.
The stakes are high, particularly in
Washington -- which is seeking to contain
an international backlash against NSA
spying -- and in Brasilia, where Brazilian
President Dilma Roussef is personally
involved in monitoring the UN negotiations.
http://cryptome.org/2013/11/us-kill-privacy.htm
http://thecable.foreignpolicy.com/posts/2013/11/20/exclusive_inside_americas_plan_to_kill_online_privacy_rights_everywhere
_______________________________________
¤ Keith Alexander Promotes NSA / Scorns
Public News Coverage ::
http://www.youtube.com/watch?v=6Kc5Xvr24Aw
http://www.politico.com/blogs/under-the-radar/2013/10/nsa-chief-stop-reporters-selling-spy-documents-175896.html
http://www.theguardian.com/commentisfree/2013/oct/25/europe-erupts-nsa-spying-chief-government
_______________________________________
¤ Leaked Memos Reveal GCHQ Efforts to
Keep Mass Surveillance Secret ::
http://www.theguardian.com/uk-news/2013/oct/25/leaked-memos-gchq-mass-surveillance-secret-snowden
_______________________________________
¤ US Dictatorship Spied Mexican Dictator ::
The National Security Agency (NSA) has
a division for particularly difficult
missions. Called “Tailored Access Operations”
(TAO), this department devises special
methods for special targets.
That category includes surveillance of
neighboring Mexico, and in May 2010,
the division reported its mission
accomplished. A report classified as
“top secret” said: “TAO successfully
exploited a key mail server in the
Mexican Presidencia domain within the
Mexican Presidential network to gain
first-ever access to President Felipe
Calderon’s public email account.”
http://www.spiegel.de/international/world/nsa-hacked-email-account-of-mexican-president-a-928817.html
http://cryptome.org/2013/10/nsa-leak-mx-2.htm
Cryptome comments ▼
This spying was apparently done from
the NSA’s Medina Regional SIGINT Operations
Center (MRSOC), Lackland Air Force Base
Annex, San Antonio, TX (formerly Medina
Regional SIGINT Operations Center):
http://cryptome.org/2012-info/nsa-mrsoc-2012/nsa-mrsoc-2012.htm
http://cryptome.org/mrsoc.pdf
_______________________________________
¤ More NSA Targets Revealed ::
http://cryptome.org/2013/10/nsa-selected-coverage.htm
¤ NSA Spies on French Government ::
http://cryptome.org/2013/10/nsa-close-access-sigads.pdf
¤ NSA Spies on Indian Government ::
http://cryptome.org/2013/10/india-close-access-sigads.pdf
¤ NSA Spies on Everyone ::
http://www.theguardian.com/world/2013/oct/24/nsa-surveillance-world-leaders-calls
¤ EU Rules New Policy to Curb NSA Spying ::
http://www.theguardian.com/world/2013/oct/17/eu-rules-data-us-edward-snowden
¤ Other Governments “Envious” of NSA ::
http://theweek.com/article/index/251628/why-the-nsa-spies-on-france-and-germany
David Addington, Cheney’s chief of staff,
thought that the NSA should use its
technology to intercept emails and
telephone calls sent from one domestic
terminal to another, and was upset to
learn that Hayden thought differently.
That was a line he would only cross,
deliberately, with court and congressional
approval. Addington dropped the idea,
but as we now know, the agency added
to its portfolio a mandate to monitor
suspicious communications that transited
the border of the United States, and
later began to collect reams of metadata
in order to analyze it.
Hayden wasn’t being cautious just for
the record: NSA’s job was to collect
foreign intelligence — to steal stuff,
or purloin letters, real and digital,
in order to provide policymakers with a
decision advantage. The advantage the
NSA provided was accurate information
about what people who interacted with
the United States said in private about
their intentions; that gap between saying
and doing, and the ability to predict
action from it, allows the president of
the United States to stay a step ahead.
It’s one thing to say that the United
States’ actions don’t always match up
with the values we espouse, and that’s
true. When our hypocrisy is exposed,
our moral authority wanes and our
ability to maneuver is reduced.
It’s quite another to assume that other
countries are any purer. They never have
been and probably won’t be. Many are much
purer than others, so the amount of
resources the intelligence community
devotes to harder strategic targets ought
to correspond with how honest our allies
are, or how little they deceive us. The
egg comes before the chicken: How the hell
can we figure out which allies are more
reliable if we don’t figure out the
correspondence between public and private
words and actions.
Of course, Brazil, France, Germany, and
Mexico do exactly the same thing. They
want their leaders to gain a decision
advantage in the give and take between
countries. They want to know what US
policymakers will do before the Americans
do it. And in the case of Brazil and
France, they aggressively spy on the
United States, on US citizens and
politicians, in order to collect that
information. The difference lies in the
scale of intelligence collection: The
US has the most effective, most distributed,
most sophisticated intelligence community
in the West. It is Goliath. And other
countries, rightly in their mind, are
envious.
_______________________________________
¤ NSA Involvement in Drone Kill Operations ::
http://www.washingtonpost.com/world/national-security/documents-reveal-nsas-extensive-involvement-in-targeted-killing-program/2013/10/16/29775278-3674-11e3-8a0e-4e2cf80831fc_story.html
_______________________________________
¤ 58 Things Learned About NSA Spying ::
http://www.tedgioia.com/nsa_facts.html
¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯
¤ Brazil Prepares to Counter NSA’s PRISM
with ‘Secure Email’ Plan ::
http://www.theregister.co.uk/2013/10/14/brazil_waxes_lyrical_on_security/
_______________________________________
¤ Dutch Cabinet Response to Parliamentary
Questions About NSA Wiretapping ::
http://blog.cyberwar.nl/2013/10/dutch-govt-response-to-parliamentary.html
_______________________________________
This week Edward Snowden received the
Integrity Award from the Sam Adams Associates
for Integrity in Intelligence. These videos
from the award ceremony are the first of
Mr Snowden after being granted asylum in
Russia.
http://wikileaks.org/Video-Edward-Snowden-wins-Sam.html
¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯
▼ GCHQ Freaks Out Over Recent Leaks ::
Andrew Parker, the director general
of the Security Service, said the
exposing of intelligence techniques,
by the Guardian newspaper, had given
fanatics the ability to evade the spy
agencies.
http://www.telegraph.co.uk/news/uknews/terrorism-in-the-uk/10365026/GCHQ-leaks-have-gifted-terrorists-ability-to-attack-at-will-warns-spy-chief.html
¤ NSA & GCHQ Counter-Tor Slides ::
“Use cookies to identify Tor users when
they are not using Tor.”
“Investigate Evercookie persistence.”
http://cryptome.org/2013/10/nsa-tor-stinks.pdf
---------------------------------------
Here is evercookie.sol found from an
old bleach log.
C:\Documents and Settings\Owner\Application Data\
Macromedia\Flash Player\#SharedObjects\ED5YHQQU\
bbcdn-bbnaut.ibillboard.com\server-static-files\
bbnaut.swf\evercookie.sol
bbnaut.swf holding evercookie.sol
“SWF is an Adobe Flash file format used
for multimedia, vector graphics and
ActionScript. Originating with FutureWave
Software, then transferred to Macromedia,
and then coming under the control of Adobe,
SWF files can contain animations or applets
of varying degrees of interactivity and
function.
There are also various third party
programs that can produce files in
this format, such as Multimedia Fusion,
Captivate and SWiSH Max.”
“.sol files are created by Adobe Flash
Player to hold Local Shared Objects,
data stored on the system running the
Flash player.”
---------------------------------------
▲ NOBODY comments on Evercookie
Evercookie is an .sol format, created
as a macromedia (or flashplayer) cache.
It can be found within Windows systems
and can be wiped out here ;
C:\Documents and Settings\User\
Application Data\Macromedia\
and may also be cloned here ;
C:\WINDOWS\system32\Macromed\Flash\
I recommend users ALWAYS bleach their
cache, cookies, logs, TEMP.
The %TEMP% directory can be found here ;
C:\Documents and Settings\User\
Local Settings\Temp\
---------------------------------------
• Adobe Flash Player Registry »
http://code.str0.be/view/1d23ed24
http://ae7.st/p/6ci (mirror)
• swflash.ocx Raw Data Dump »
http://code.str0.be/view/41185b11
http://ae7.st/p/1ve (mirror)
• Evercookie Cache Format Registry »
http://pb.stoleyour.com/view/1d527692
http://ae7.st/p/35m (mirror)
• Adobe “Asset Cache” Format Registry »
http://pb.stoleyour.com/view/722ea22f
http://ae7.st/p/4rq (mirror)
• Macromedia - a Third-party Cacher »
http://p.pomf.se/1252
http://ae7.st/p/5dk (mirror)
---------------------------------------
http://en.wikipedia.org/wiki/Evercookie
Evercookie is a JavaScript-based
application created by Samy Kamkar
which produces zombie cookies in a
web browser that are intentionally
difficult to delete. ... ...
An Evercookie is not merely difficult
to delete. It actively resists deletion
by copying itself in different forms on
the user’s machine and resurrecting
itself if it notices that some of the
copies are missing or expired.
Specifically, when creating a new cookie,
Evercookie uses the following storage
mechanisms when available:
• Standard HTTP cookies
• Local Shared Objects (Flash cookies)
• Silverlight Isolated Storage
• Storing cookies in RGB values of
auto-generated, force-cached PNGs
using HTML5 Canvas tag to read pixels
(cookies) back out
• Storing cookies in Web history
• Storing cookies in HTTP ETags
• Storing cookies in Web cache
• window.name caching
• Internet Explorer userData storage
• HTML5 Session Storage
• HTML5 Local Storage
• HTML5 Global Storage
• HTML5 Database Storage via SQLite
---------------------------------------
¤ Cookies Threaten Tor User Anonymity ::
“Just because you’re using Tor doesn’t
mean that your browser isn't storing
cookies,” said Jeremiah Grossman, a
colleague of Hansen’s who also specializes
in browser vulnerabilities.
As Grossman described the procedure to
CNET, the NSA is aware of Tor’s entry
and exit nodes because of its Internet
wide surveillance.
“The very feature that makes Tor a
powerful anonymity service, and the
fact that all Tor users look alike on
the Internet, makes it easy to
differentiate Tor users from other
Web users,” he wrote.
“The NSA then cookies that ad, so that
every time you go to a site, the cookie
identifies you. Even though your IP
address changed [because of Tor], the
cookies gave you away,” he said.
http://news.cnet.com/8301-1009_3-57606178-83/nsa-tracks-google-ads-to-find-tor-users/
---------------------------------------
¤ GCHQ ; MULLENIZE Operation to Tag and
Identify Packet Traffic From Machines ::
“Working together, CT and CNE have
devised a method to carry out large-scale
‘staining’ as a means to identify
individual machines linked to that
IP address. ... ...
User Agent Staining is a technique that
involves writing a unique marker (or stain)
onto a target machine. Each stain is
visible in passively collected SIGINT
and is stamped into every packet, which
enables all the events from that stained
machine to be brought back together to
recreate a browsing session.”
http://cryptome.org/2013/10/gchq-mullenize.pdf
http://s3.documentcloud.org/documents/801762/mullenize-28redacted-29.pdf
¤ Packet Staining ::
http://prezi.com/p5et9yawg2c6/ip-packet-staining/
http://tools.ietf.org/html/draft-macaulay-6man-packet-stain-00
http://tools.ietf.org/html/draft-macaulay-6man-packet-stain-01
http://cryptome.org/2013/10/packet-stain/packet-staining.htm
¤ NSA Peeling Back the Layers of Tor ::
http://cryptome.org/2013/10/nsa-egotisticalgiraffe.pdf
http://www.theguardian.com/world/interactive/2013/oct/04/egotistical-giraffe-nsa-tor-document
http://www.theguardian.com/world/2013/oct/04/tor-attacks-nsa-users-online-anonymity
http://www.theguardian.com/world/2013/oct/04/nsa-gchq-attack-tor-network-encryption
¤ NSA ; Tor Source Code Vulnerabilities ::
“We have seen several targets using Tor.
Our goal was to analyze Tor source code
and determine any vulnerabilities in
the system. We set up an internal Tor
network to analyze Tor traffic, in the
hopes of discovering ways to passively
identify it. We also worked to create
a custom Tor client which allows the
user finer control.” ... ...
“This accomplishes several things.
Most basically, the Tor servers, many
of which are listed on publicly advertised
directory servers, are chosen to act as
a series of proxies. This may seem to
be excessively complex, as a single
proxy server can be used to hide one’s
location, but a single-hop proxy is
vulnerable in two ways. First, by
analyzing the pattern of the traffic
going to and from the proxy server,
it is possible to deduce which clients
are making which requests. Second, if
an attacker owns the proxy server, then
it certainly knows who is asking for what,
and anonymization is ruined. By using
multiple hops, Tor is much more resistant
to both of these attacks. Traffic analysis
becomes extraordinarily difficult, as it
must be coordinated across several machines,
and an attacker must own all the hops
along the circuit in order to trace
requests back to the originating client.”
... ...
“In our time in the lab, we found that
running an nmap on a node that is offering
a hidden service will turn up the port
that the hidden service is using to deal
with incoming connections. It can then be
directly connected to, outside of Tor.”
... ...
“We would have to try to connect to
each of the ports we see open on a
machine to determine if there is a
hidden service being run. We would not
even know which protocol the hidden
service is running. It may be an HTTP
server, an FTP server, an SMTP server,
etc. The only thing we know is that
the protocol must run over TCP. It is
not enough to attempt to connect once
to each port, using an HTTP GET request.
Several protocols must be tried.”
... ...
“It may also be useful to study Tor
directory servers in more detail. Our
work focused solely on the client, but
many attacks would be much easier with
access to more Tor servers. The directory
servers ultimately control which Tor
servers are used by clients. We have found
that a server can put itself on a directory
server multiple times; all it takes is the
server running several Tor processes, each
having a different nickname, open port,
fingerprint, and LOG FILE. This only
requires different configuration files
for the different processes, which are
easy to set up. That machine will handle
a disproportionate amount of traffic,
since it is listed several times. This
increases the density of friendly servers
in the cloud without increasing the number
of servers we have set up. Unfortunately,
each listing has the same IP address,
which would be very noticeable to anyone
who inspecting the directories.”
http://cryptome.org/2013/10/nsa-tor.pdf
http://s3.documentcloud.org/documents/802061/ces-summer-2006-tor-paper-28redacted-29-1.pdf
http://www.washingtonpost.com/world/national-security/secret-nsa-documents-show-campaign-against-tor-encrypted-network/2013/10/04/610f08b6-2d05-11e3-8ade-a1f23cda135e_story.html
¤ NSA ; Types of IAT ::
http://cryptome.org/2013/10/nsa-iat-tor.pdf
¤ NSA Link Removed by Guardian ::
http://cryptome.org/2013/10/nsa-link-removed.htm
¤ Tor Media Reports Disinformative (?) ::
“This document doesn’t give much insight
into capabilities the IC has developed
against Tor. It’s apparently quite common
to run multiple research teams (either
known or unknown to each other) against
a single target, and a few summer students
with a dozen lab machines is a pretty
small investment. I’d expect there are
other programs with more sophisticated
attacks, especially now 7 years later.”
http://cryptome.org/2013/10/nsa-tor-disinfo.htm
_______________________________________
¤ Greenwald and Gibson Q&A @ Reddit ::
http://cryptome.org/2013/10/greenwald-gibson-reddit.pdf
_______________________________________
¤ Mike Rogers Says He’d Like To See
Snowden On a Hit List ::
http://www.infowars.com/former-nsa-head-says-hed-like-to-see-snowden-on-us-kill-list/
“I must admit, in my darker moment over
the past several months, I’d also thought
of nominating Mr. Snowden, but it was
for a different list,” Hayden said during
a panel discussion, according to Brendan
Sasso of The Hill.
Sasso notes that the audience laughed,
and Rep. Mike Rogers (R-Mich), chairman
of the House Intelligence Committee who
was also on the panel, responded, “I can
help you with that.”
http://thehill.com/blogs/hillicon-valley/technology/326315-former-nsa-chief-jokes-about-putting-snowden-on-kill-list
The conversation then turned specifically
to the government’s use of targeted
killings, with Hayden noting “Yes, we
do targeted killings, and I certainly
hope they make full use of the capacities
of the National Security Agency when we
do that.”
Hayden was responding to a question
about a new project announced by journalists
Glenn Greenwald and Jeremy Scahill,
delving into the NSA’s alleged role in
assassinations.
http://rt.com/usa/nsa-assassination-leaks-greenwald-514/
_______________________________________
¤ NSA Police Guard Threatens Reporters ::
Infowars crew arrive at Utah Data Center.
http://www.infowars.com/nsa-goons-confiscate-cameras-from-reporters/
http://www.sltrib.com/sltrib/politics/56958862-90/data-center-utah-amp.html.csp
_______________________________________
¤ Cost and Responsibility for Snowden’s
Breaches ::
http://cryptome.org/2013/10/snowden-cost.htm
¤ Questioning Snowden Truth ::
http://cryptome.org/2013/10/questioning-snowden-truth.htm
_______________________________________
¤ NSA Gathers Data on Social Networks
of US Citizens ::
The new disclosures add to the growing
body of knowledge in recent months about
the NSA’s access to and use of private
information concerning Americans, prompting
lawmakers in Washington to call for reining
in the agency and President Obama to order
an examination of its surveillance policies.
Almost everything about the agency’s
operations is hidden, and the decision
to revise the limits concerning Americans
was made in secret, without review by the
nation’s intelligence court or any public
debate. As far back as 2006, a Justice
Department memo warned of the potential
for the “misuse” of such information
without adequate safeguards.
http://cryptome.org/2013/09/nsa-syanpse.htm
http://cryptome.org/2013/09/nsa-syanpse-large.jpg
http://www.nytimes.com/2013/09/29/us/nsa-examines-social-networks-of-us-citizens.html?_r=0
¤ NSA Director Admits NSA Collects Data
From American Social Networks ::
http://hosted.ap.org/dynamic/stories/U/US_NSA_SURVEILLANCE_SOCIAL_NETWORKS?SITE=AP
_______________________________________
¤ GCHQ Faces Legal Challenge in European
Court Over Online Privacy ::
http://www.theguardian.com/uk-news/2013/oct/03/gchq-legal-challenge-europe-privacy-surveillance
_______________________________________
UNITED STATES ONLY COUNTRY TO VOTE “NO”
TO A NEW TREATY FOR DIGITAL PRIVACY ::
Led by the German government, a loose
coalition of privacy chiefs from countries
across the world is pushing to update an
influential international human rights
treaty that enshrines the right to privacy.
... ...
The annual conference was attended by a
diverse selection of privacy and data
protection officials from across the
world, with representatives attending
from countries including Japan, New Zealand,
France, Slovenia, Uruguay, Belgium, Ireland,
Finland, Spain, Australia, Germany, Burkina
Faso, Canada, the United States, and the
United Kingdom.
During a closed session at the conference
open only to the privacy chiefs, a
resolution was put forward for a vote
on the proposal to update Article 17.
They voted overwhelmingly in favor of
the idea, recognizing a need to “create
globally applicable standards for data
protection and the protection of privacy
in accordance with the rule of law.”
Notably, only one country did not approve
of the resolution ... the United States.
At this point, the proposed Article 17
protocol is still a long way off. It will
eventually need to be put forward at the
United Nations and voted on by member
states, and that could take time. But
the growing appetite to amend the
international treaty in light of the
Snowden revelations is highly symbolic
if nothing else, reflecting widespread
concerns about the power of mass surveillance
technology in the digital age to trample
over basic universal privacy rights.
https://privacyconference2013.org/web/pageFiles/kcfinder/files/5.%20International%20law%20resolution%20EN%281%29.pdf
http://www.slate.com/blogs/future_tense/2013/09/26/article_17_surveillance_update_countries_want_digital_privacy_in_the_iccpr.html
NOBODY comments
“The problem is not just the NSA, but
all secret agencies around the world,
in general. All secret agencies and
their third-party vendors or allies
break (or bypass) crypto and manufacture
backdoors in electronic communication
devices by stealth. Not just the NSA.
Not just the GCHQ. Not just the GFO.
Not just the ISNU, et al. The major
problem is trust. If you desire privacy,
you must kill any trust in security.
Security does not exist on the web.
Digital privacy is a hoax. It’s null.
It’s a wet dream. It’s justice FUBAR.”
_______________________________________
¤ Deutsche Telekom Defies NSA Spying ::
http://online.wsj.com/article/SB10001424052702303983904579096082938662594.html
¤ Deutsche DSL Phone Switch Data Dump ::
http://cryptome.org/2013/09/dtag-dsl-switches.txt
_______________________________________
¤ Senate FISA Hearings, September 2013 ::
http://cryptome.org/2013/09/edgar-13-0926.pdf
http://cryptome.org/2013/09/wittes-13-0926.pdf
http://cryptome.org/2013/09/dni-nsa-doj-13-0926.pdf
http://cryptome.org/2013/09/dni-13-0926.pdf
http://cryptome.org/2013/09/nsa-13-0926.pdf
¤ Dianne Feinstein Accidentally Confirms
NSA Tapped the Internet Backbone ::
http://www.techdirt.com/articles/20130927/13562624678/dianne-feinstein-accidentally-confirms-that-nsa-tapped-internet-backbone.shtml
http://www.infowars.com/dianne-feinstein-accidentally-confirms-that-nsa-tapped-the-internet-backbone/
http://www.c-spanvideo.org/clip/4466341
In short, “upstream” capabilities are tapping the
backbone itself, via the willing assistance of the
telcos (who still have remained mostly silent on all
of this) as opposed to “downstream” collection, which
requires going to the internet companies directly.
¤ Senators Blame Public News Covering Leaks ::
http://www.huffingtonpost.com/2013/09/26/senators-nsa-media_n_3998229.html
▼ Lawmakers Who Upheld NSA Phone Spying ::
(1) http://c.nopaste.dk/p56175
(2) http://c.nopaste.dk/p56176
(3) http://c.nopaste.dk/p56177
(4) http://c.nopaste.dk/p56178
(5) http://c.nopaste.dk/p56179
_______________________________________
¤ Declassified Documents Reveal the NSA
Wiretapped Martin Luther King, Muhammad
Ali and Two US Senators ::
http://www.theguardian.com/world/2013/sep/26/nsa-surveillance-anti-vietnam-muhammad-ali-mlk
_______________________________________
¤ NSA Hacked Indian Politicos, Scientists ::
According to a top secret document disclosed by NSA
whistleblower Edward Snowden and obtained by The Hindu,
the PRISM programme was deployed by the American agency
to gather key information from India by tapping directly
into the servers of tech giants which provide services
such as email, video sharing, voice-over-IPs, online chats,
file transfer and social networking services.
And, according to the PRISM document seen by The Hindu,
much of the communication targeted by the NSA is unrelated
to terrorism, contrary to claims of Indian and American
officials.
Instead, much of the surveillance was focused on India’s
domestic politics and the country’s strategic and commercial
interests.
http://www.thehindu.com/news/national/nsa-targets-indian-politics-space-nprogrammes/article5161299.ece
According to the 2010 COMINT (communication intelligence)
document about “Close Access SIGADs”, the offices of Indian
diplomats and high-ranking military officials stationed
at these important posts were targets of four different
kinds of electronic snooping devices:
Lifesaver, which facilitates imaging of the hard drive
of computers.
Highlands, which makes digital collection from implants.
Vagrant, which collects data of open computer screens.
Magnetic, which is a collection of digital signals.
http://www.thehindu.com/news/international/world/nsa-planted-bugs-at-indian-missions-in-dc-un/article5164944.ece
_______________________________________
¤ Secret Bunkers, a Challenge for US Intelligence ::
Accessing archived government documents, the National
Security Archive, an anti-secrecy group, has revealed a
decades-long effort by the US to detect, monitor, and
in some cases plan the destruction of, “more than 10,000
such facilities worldwide, many of them in hostile territory,
and many presumably intended to hide or protect lethal military
equipment and activities, including weapons of mass destruction,
that could threaten US or allied interests.”
http://www.thehindu.com/news/international/world/secret-bunkers-a-challenge-for-us-intelligence/article5164833.ece
_______________________________________
¤ More Unreported, Unredacted NSA Slides ::
http://leaksource.wordpress.com/2013/09/09/unreportedunredacted-nsa-slidesprogram-names-revealed-on-brazil-news/
_______________________________________
¤ Guardian’s Alan Rusbridger on the Inside Story of
NSA Leaks ::
http://leaksource.wordpress.com/2013/09/24/guardians-alan-rusbridger-on-the-inside-story-of-snowden-nsa-leaks/
_______________________________________
¤ PRISM Part of the BLARNEY Program ::
http://electrospaces.blogspot.nl/2013/09/prism-as-part-of-blarney-program.html
_______________________________________
¤ New Separate Internet Being Built by
Countries Targeted by NSA and GCHQ ::
http://www.bricscable.com/wp-content/uploads/2013/03/U564-Imphandze-BRICS-Leaflet.pdf
http://www.bricscable.com/wp-content/uploads/2013/04/2013-submarine-cable-market-industry-report.pdf
http://www.bricscable.com/wp-content/uploads/2013/04/BRICS-BUSINESS-FORUM-JOINT-COMMUNIQUE-26-March-2013.pdf
¤ New Separate Internet Will Not be
Under United States Control ::
The President of Brazil, Dilma Rousseff announces publicly
the creation of a world internet system INDEPENDENT from
US and Britain or “US-centric internet.”
Not many understand that, while the immediate trigger for
the decision (coupled with the cancellation of a summit with
the US president) was the revelations on NSA spying, the reason
why Rousseff can take such a historic step is that the
alternative infrastructure: The BRICS cable from Vladivostock,
Russia to Shantou, China to Chennai, India to Cape Town,
South Africa to Fortaleza, Brazil, is being built and it’s,
actually, in its final phase of implementation.
“The global backlash is only beginning and will get far more
severe in coming months,” said Sascha Meinrath, director
of the Open Technology Institute at the Washington-based New
America Foundation think-tank. “This notion of national
privacy sovereignty is going to be an increasingly salient
issue around the globe.”
http://proxy.rickmartensen.nl/www.globalresearch.ca/the-brics-independent-internet-in-defiance-of-the-us-centric-internet/5350272
http://www.thehindu.com/news/international/world/brazil-plans-to-go-offline-from-uscentric-internet/article5137689.ece
http://www.excitingrio.com/brazil-looks-break-us-centric-internet/
http://indrus.in/economics/2013/03/01/brics_cable_connecting_continents_brick_by_brick_22617.html
¤ The BRICS Fiber-optic Cable ::
A 34,000 km, 2 fibre pair, 12.8 Tbit/s capacity, fibre
optic cable system.
http://www.bricscable.com/
https://www.youtube.com/watch?v=OkQI4bJcDGw
_______________________________________
¤ No Phone Company Ever Challenged NSA Spying ::
A newly declassified opinion from the Foreign Intelligence
Surveillance Court from this summer shows the court’s
interpretation of the controversial Section 215 of the USA
PATRIOT Act that’s used to justify the National Security
Agency’s bulk telephone metadata collections, and reveals
that none of the companies that have been served with such
orders has ever challenged one.
http://proxy.rickmartensen.nl/threatpost.com/fisc-no-phone-company-ever-challenged-metadata-collection-orders/102334
_______________________________________
¤ Corporations Worry About Long-Term Blowback of NSA
Revelations ::
With all of the disturbing revelations that have come
to light in the last few weeks regarding the NSA’s
collection methods and its efforts to weaken cryptographic
protocols and security products, experts say that perhaps
the most worrisome result of all of this is that no one
knows who or what they can trust anymore.
The fallout from the most-recent NSA leaks, which revealed
the agency’s ability to subvert some cryptographic standards
and its “partnerships” with software and hardware vendors
to insert backdoors into various unnamed products, has
continued to accumulate over the course of the last couple
of weeks. Cryptographers and security researchers have been
eager to determine which products and protocols are suspect,
and the discussion has veered in a lot of different directions.
But one thing that’s become clear is that when the government
lost the so-called Crypto Wars in the 1990s, the NSA didn’t
just go back to Fort Meade and tend to its knitting.
http://proxy.rickmartensen.nl/threatpost.com/experts-worry-about-long-term-implications-of-nsa-revelations/102355
¤ The Sky is Not Falling – It’s Fallen ::
The security community didn’t invent the concept of fear,
uncertainty and doubt, but it has perfected it and raised
it to the level of religion. It’s the way that security products
are marketed and sold, but it’s also the way that the intelligence
community justifies its extra-legal and, in some cases,
unconstitutional, data-gathering practices. Just as vendors
use the specter of catastrophic hacks, data loss and public
embarrassment to push their wares, the NSA and its allies
have used the dark shadow of 9/11 and global terrorism to
justify their increasingly aggressive practices, some of which
have now been shown to have deliberately weakened some of the
fundamental building blocks of security.
The most damning bit of string in this ball is the news that
the NSA likely inserted a back door into a key cryptographic
algorithm known as DUAL EC DRBG. That’s bad. What’s worse
is that RSA on Thursday sent a warning to its developer
customers warning them to immediately stop using the company’s
BSAFE library because it uses the compromised random number
generator. That means that untold numbers of products that
include the BSAFE crypto libraries are compromised.
http://proxy.rickmartensen.nl/threatpost.com/the-sky-is-not-falling-its-fallen/102372
_______________________________________
¤ President Surveillance Program Review ::
“The program was reauthorized by the
President approximately every 45 days,
with certain modifications. Collectively,
the activities carried out under these
Authorizations are referred to as the
“President’s Surveillance Program” or
“PSP.” One of the activities authorized
as part of the PSP was the interception of
the content of communications into and out
of the United States where there was a
reasonable basis to conclude that one
party to the communication was a member
of al-Qa’ida or related terrorist organizations.
This aspect of the PSP was publicly
acknowledged and described by the President,
the Attorney General, and other Administration
officials beginning in December 2005 following
a series of articles published in The New York
Times. The Attorney General subsequently
publicly acknowledged the fact that other
intelligence activities were also authorized
under the same Presidential Authorization,
but the details of those activities remain
classified.” ... ...
“Prior to September 11,2001, the Foreign
Intelligence Surveillance Act of 1978 and
Executive Order 12333 were generally viewed
as the principal governing authorities for
conducting electronic surveillance for
national security purposes. The Foreign
Intelligence Surveillance Act, 50 U.S.C.
§ 1801, et seq., was enacted in 1978 to
"provide legislative authorization and
regulation for all electronic surveillance
conducted within the United States for
foreign intelligence purposes."”
http://cryptome.org/2013/09/psp-09-0710.pdf
¤ NSA ; PSP Analysis Loophole to Snoop
Domestic Contacts Along with Metadata ::
http://cryptome.org/2013/08/nsa-ig-09-0324.pdf
NOBODY comments (nsa-ig-09-0324.pdf)
The President’s Surveillance Program (PSP)
should be of high interest. As mentioned
on page 17, the PSP did not - “did not” -
require special approval. Therefore, just
another gap. Also take in consideration
other abuse against FISA laws, court order
to stifle FAA 702 upstream analysis, EO 12333,
and of-course NSA’s now admitted abuse -
deliberately ignoring restrictions against
domestic communications (a risk to comsec).
_______________________________________
¤ Britain’s GCHQ Hacked Belgian Telecom
Firm ::
Documents from the archive of whistleblower
Edward Snowden indicate that Britain’s
GCHQ intelligence service was behind a
cyber attack against Belgacom, a partly
state-owned Belgian telecoms company.
A “top secret” Government Communications
Headquarters (GCHQ) presentation seen by
SPIEGEL indicate that the goal of project,
conducted under the codename “Operation
Socialist,” was “to enable better
exploitation of Belgacom” and to
improve understanding of the provider’s
infrastructure. ... ...
According to the slides in the GCHQ
presentation, the attack was directed
at several Belgacom employees and
involved the planting of a highly
developed attack technology referred
to as a “Quantum Insert” (“QI”). It
appears to be a method with which the
person being targeted, without their
knowledge, is redirected to websites
that then plant malware on their
computers that can then manipulate
them. Some of the employees whose
computers were infiltrated had “good
access” to important parts of Belgacom’s
infrastructure, and this seemed to
please the British spies, according
to the slides.
http://www.spiegel.de/international/europe/british-spy-agency-gchq-hacked-belgian-telecoms-firm-a-923406.html
http://www.infowars.com/latest-snowden-leaks-show-gchq-gleefully-hacking-belgian-telco/
https://www.techdirt.com/articles/20130920/16112724595/latest-snowden-leaks-show-gchq-gleefully-hacking-belgian-telco.shtml
http://cryptome.org/2013/09/belgacom-hack-en.htm
http://cryptome.org/2013/09/belgacom.htm
_______________________________________
¤ European Parliament Brief on NSA ::
http://cryptome.org/2013/09/europarl-nsa.pdf
http://www.europarl.europa.eu/meetdocs/2009_2014/documents/libe/dv/briefingnote_/briefingnote_en.pdf
_______________________________________
¤ NSA Buys Vupen Exploits ::
http://cryptome.org/2013/09/nsa-vupen.pdf
http://news.softpedia.com/news/Security-Firm-VUPEN-Confirms-the-NSA-Bought-Exploits-Service-Subscription-383597.shtml
http://proxy.rickmartensen.nl/threatpost.com/nsa-bought-exploit-service-from-vupen-contract-shows
_______________________________________
¤ US Government Foreign Telecommunications
Providers Network Security Agreements ::
http://publicintelligence.net/us-nsas/
http://info.publicintelligence.net/US-NSAs.zip
http://www.washingtonpost.com/business/technology/agreements-with-private-companies-protect-us-access-to-cables-data-for-surveillance/2013/07/06/aa5d017a-df77-11e2-b2d4-ea6d8f477a01_story.html
_______________________________________
¤ FISA Court Releases FBI Spy Documents ::
http://cryptome.org/2013/09/fisc-13-0917-4.pdf
¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯
▼ FISC Orders All Spy Data Disclosure
Allocated to One Release ::
http://cryptome.org/2013/09/fisc-five-13-0918.pdf
¤ Linkedin Moves to Disclose Spy Data ::
http://cryptome.org/2013/09/fisc-linkedin-13-0917.pdf
¤ FISC Schedule for Microsoft, Google,
Yahoo and Facebook Spy Data Release ::
http://cryptome.org/2013/09/fisc-ms-google-yahoo-fb-13-0913.pdf
¤ Microsoft, Google Spy Data Briefing
Schedule ::
http://cryptome.org/2013/09/ms-goog-fisc-13-0909.pdf
¤ Google Moves to Disclose User Spy Data ::
http://cryptome.org/2013/09/google-fisc-13-0909.pdf
¤ Yahoo Moves to Disclose User Spy Data ::
http://cryptome.org/2013/09/yahoo-fisc-13-0909.pdf
¤ Facebook Moves to Disclose User Spy Data ::
http://cryptome.org/2013/09/facebook-fisc-13-0909.pdf
¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯
¤ DoJ Stonewalls USA Today ::
In response to a FOIA request from
USA TODAY, the Justice Department said
its ethics office never looked into
complaints from two federal judges
that they had been misled about NSA
surveillance.
http://cryptome.org/2013/09/usa-today-doj.pdf
http://cryptome.org/2013/09/usa-today-doj-shots.jpg
http://www.usatoday.com/story/news/nation/2013/09/19/nsa-surveillance-justice-opr-investigation/2805867/
¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯
Perry Metzger: Matthew Green tweeted
earlier today that Johns Hopkins will
be hosting a roundtable at 10am EDT
tomorrow (Wednesday, September 18th)
to discuss the NSA crypto revelations.
Livestream will be at:
https://connect.johnshopkins.edu/jhuisicrypto/
_______________________________________
¤ NSA Spying Documents to be Released as
Result of EFF Lawsuit Against NSA ::
https://www.eff.org/deeplinks/2013/09/hundreds-pages-nsa-spying-documents-be-released-result-eff-lawsuit
¤ Government Releases NSA Surveillance
Docs and Previously Secret FISA Court
Opinions In Response to EFF Lawsuit ::
https://www.eff.org/deeplinks/2013/09/government-releases-nsa-surveillance-docs-and-previously-secret-fisa-court
The Director of National Intelligence
(DNI) just today released hundreds of
pages of documents related to the
government’s secret interpretation of
Patriot Act Section 215 and the NSA’s
(mis)use of its massive database of
every American’s phone records. The
documents were released as a result
of EFF’s ongoing Freedom of Information
Act lawsuit.
We’ve posted links to each document
below. While the government also posted
many of the documents here ...
http://icontherecord.tumblr.com/
... our copies are completely searchable.
Links to the documents ;
• May 24, 2006 — Order from the Foreign
Intelligence Surveillance Court
https://www.eff.org/sites/default/files/filenode/docket_06-05_1dec201_redacted.ex_-_ocr_0.pdf
• December 12, 2008 — Supplemental Opinion
from the Foreign Intelligence Surveillance
Court
https://www.eff.org/sites/default/files/filenode/4_february_2011_production_br10-82_final_redacted.ex_-_ocr_1.pdf
• January 28, 2009 — Order Regarding Preliminary
Notice of Compliance Incident Dated January 15,
2009 from the Foreign Intelligence Surveillance
Court
https://www.eff.org/sites/default/files/filenode/br_08-13_alert_list_order_1-28-09_final_redacted1.ex_-_ocr_0.pdf
• January 28, 2009 — Order Regarding Preliminary
Notice of Compliance Incident Dated January 15,
2009 from the Foreign Intelligence Surveillance
Court - With Cover Letter and Attached Declarations
https://www.eff.org/sites/default/files/filenode/5_march_09_production-final_redacted.ex_-_ocr_1.pdf
• February 26, 2009 — Notice of Compliance
Incident
https://www.eff.org/sites/default/files/filenode/br_08-13_doj_notice_with_supp_decl_as_filed_26_feb_09_final_redacted.ex_-_ocr_1.pdf
• March 2, 2009 — Order from the Foreign
Intelligence Court
https://www.eff.org/sites/default/files/filenode/br_08-13_order_3-2-09_final_redacted.ex_-_ocr_1.pdf
• June 22, 2009 — Order from the Foreign
Intelligence Court
https://www.eff.org/sites/default/files/filenode/br_09-06_order_and_supplemental_order_6-22-09_final_redacted.ex_-_ocr_0.pdf
• June 25, 2009 — Implementation of the Foreign
Intelligence Surveillance Court Authorized
Business Records FISA
https://www.eff.org/sites/default/files/filenode/nsa_business_records_fisa_redacted.ex_-_ocr_0.pdf
• August 19, 2009 — Report of the United
States with Attachments and Cover Letter
https://www.eff.org/sites/default/files/filenode/4_september_09_production_final_redacted.ex_-_ocr_1.pdf
• September 3, 2009 — Primary Order from the
Foreign Intelligence Surveillance Court
https://www.eff.org/sites/default/files/filenode/br_09-13_orders_signed_3_sept_09_final_redacted.ex_-_ocr_0.pdf
• September 25, 2009 — Order Regarding Further
Compliance Incidence from the Foreign Intelligence
Surveillance Court
https://www.eff.org/sites/default/files/filenode/br_09-13_-_september_25_order_regarding_further_compliance_incidents_final_redacted.ex_-_ocr_0.pdf
• November 5, 2009 — Supplemental Opinion
and Order from the Foreign Intelligence
Surveillance Court
https://www.eff.org/sites/default/files/filenode/br_09-15_supplemental_order_and_opinion_11-5-09_final_redacted.ex_-_ocr_0.pdf
¤ Gems Mined from the NSA Documents and
FISA Court Opinions Released Today ::
https://www.eff.org/deeplinks/2013/09/gems-mined-nsa-docs-released-today
¤ NSA FISA Business Records Offer a Lot
to Learn (NSA Networks Not Encrypted) ::
http://cryptome.org/2013/09/nsa-fisa-business-records.htm
_______________________________________
¤ NSA Spy Community Architecture 2011 ::
http://cryptome.org/2013/09/nsa-spy-architecture.pdf
¤ DNI Spy Community Architecture 2009 ::
http://cryptome.org/2013/09/dni-spy-architecture.pdf
¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯
¤ Keith’s Information Dominance Center ::
http://cryptome.org/2013/09/info-dominance.pdf
http://www.foreignpolicy.com/articles/2013/09/08/the_cowboy_of_the_nsa_keith_alexander?print=yes
http://www.zerohedge.com/news/2013-09-15/man-charge-nsa-modeled-his-office-bridge-starship-enterprise
_______________________________________
¤ Germany’s Domestic Spy Agency Hands
Over Data to the NSA ::
Germany’s Federal Office for the
Protection of the Constitution regularly
hands over classified data to the NSA,
media report. The revelation comes as
Edward Snowden’s leaks show that
Germany’s foreign spy agencies share
troves of data with the US and UK.
Citing secret government documents,
Suddeutsche Zeitung reported that
Germany’s Federal Office for the
Protection of the Constitution, charged
with domestic security, works closely
with the US and regularly sends them
information.
The security service gathers intelligence
on internal security threats. The documents
obtained by Sueddeutsche Zeitung recorded
864 data packages sent to the NSA, as
well as regular meetings between officers
of the German Federal Office and the NSA.
http://rt.com/news/germany-shares-data-nsa-spying-858/
_______________________________________
¤ Dutch Government Response to Snowden’s
Revelations ::
This is an unofficial translation.
http://blog.cyberwar.nl/2013/09/dutch-govt-response-to-revelations-by.html
On September 13th 2013, the Dutch
government responded (.pdf, in Dutch)
to the revelations by Edward Snowded.
http://www.rijksoverheid.nl/bestanden/documenten-en-publicaties/kamerstukken/2013/09/14/kabinetsreactie-op-onthullingen-edward-snowden/nederlandse-kabinetsreactie-edward-snowden-13-sept-2013-1.pdf
https://www.aivd.nl/publish/pages/2533/nederlandse_kabinetsreactie_edward_snowden_13_sept_2013.pdf
_______________________________________
¤ NSA Spied Credit Card Transactions ::
http://cryptome.org/2013/09/nsa-finance-spy-de.pdf
http://cryptome.org/2013/09/nsa-finance-spy-slides.jpg
http://www.spiegel.de/international/world/spiegel-exclusive-nsa-spies-on-international-bank-transactions-a-922276.html
http://www.politico.com/story/2013/06/report-nsa-credit-card-transactions-92390.html
http://weaselzippers.us/2013/06/06/wsj-report-nsa-tracking-credit-card-transactions-also-has-access-to-phone-records-from-att-and-sprint-along-with-verizon/
_______________________________________
¤ NSA Brazil Spy Slides Decensored ::
http://cryptome.org/2013-info/09/nsa-br-mx-3/nsa-br-mx-3.htm
¤ All SATC Slides, Brazil Spying Reports ::
NSA_SATC_Slides.zip
(54 files | ZIP | 3.37MB)
http://filebeam.com/dacf6706b520431f2c4052484abd5b36
Why does the NSA spy on Brazil?
(1) The US wants to maintain global economic power,
(2) the US wants to maintain control over major natural
resources and (3) the US is afraid the new economic powers
(within the BRICS) may destabilize their economic power
and control over natural resources.
_______________________________________
¤ A Font to Discourage NSA Snooping ::
The ZXX font is designed to be difficult for
machines to read.
http://dl.dropbox.com/u/20517415/ZXX.zip
http://reason.com/blog/2013/06/21/dont-want-the-nsa-to-read-your-email-use
http://reason.com/archives/2013/09/14/a-font-to-discourage-nsa-snooping
_______________________________________
¤ IETF Draft to Prevent NSA Intercepts ::
http://cryptome.org/2013/09/prism-proof.htm
http://www.ietf.org/id/draft-hallambaker-prismproof-req-00.txt
_______________________________________
¤ NSA Targeted Israel for Surveillance,
Also Sharing Data With Israeli SIGINT
National Unit ::
A copy of a top-secret deal inked
in 2009 between the NSA and the
Israeli Signals-intelligence National
Unit (ISNU) was provided by NSA
leaker Edward J. Snowden to the
Guardian newspaper, which posted
it Wednesday.
It reveals that the NSA “routinely”
passed to its Israeli counterpart
raw signals intelligence, referred
to as “SIGINT,” including the vast
swathes of digital data traffic that
the agency gathers under secret court
authority from US Internet providers.
So sensitive is this data that even
before being disseminated to other US
agencies, the NSA has to subject it
to a court-mandated process called
minimization, under which the names
of any Americans are removed unless
they are essential for foreign
intelligence interest.
But the US-Israeli agreement states
that the data shared with Israel
“includes, but is not limited to,
unevaluated and unminimized transcripts,
gists, facsimiles, telex, voice and
Digital Network Intelligence metadata
and content.”
“NSA routinely sends ISNU minimized
and unminimized raw collection associated
with selectors from multiple Target office
Primary Interest (TOPI) offices in Analysis
and Production, S2 as part of SIGINT
relationship between the two organizations.”
http://cryptome.org/2013/09/nsa-israel-spy-share.pdf
http://s3.documentcloud.org/documents/785495/doc1.pdf
http://www.theguardian.com/world/2013/sep/11/nsa-americans-personal-data-israel-documents
http://www.washingtontimes.com/news/2013/sep/11/nsa-shares-raw-data-americans-israeli-spy-agency/
http://www.washingtonpost.com/blogs/the-switch/wp/2013/09/11/the-nsa-is-sharing-data-with-israel-before-filtering-out-americans-information/
http://killerapps.foreignpolicy.com/posts/2013/09/11/irony_alert_nsa_targets_israel_and_still_gives_your_data_to_its_spies
Other documents leaked by Mr. Snowden
reveal that Israel was one of the nations
that spy most aggressively against the
United States.
“To further safeguard our classified
networks, we continue to strengthen
insider threat detection capabilities
across the Community. In addition, we
are investing in target surveillance
and offensive CI against key targets,
such as China, Russia, Iran, Israel,
Pakistan, and Cuba.” - Page 3
http://cryptome.org/2013/08/spy-budget-fy13.pdf
http://s3.documentcloud.org/documents/781537/cbjb-fy13-v1-extract.pdf
http://thehill.com/blogs/global-affairs/middle-east-north-africa/319513-leaked-documents-reveal-us-sees-israel-as-a-major-spying-threat
NOBODY comments
Ironic NSA considers Israel an “insider
threat” - meanwhile we provide them with
plenty of inside information.
However the NSA used cryptanalysis and
exploitation against Brazil leadership
and Brazil was never a “key target.”
This reminds of a quote ;
“What if all secret agencies were of one
accord spiritually, like in the paintings
of dogs playing poker, just using humanity
to play out one big game of destruction
and domination with humans as the visible
and spiritual puppets?”
_______________________________________
¤ DNI Releases Phone Metadata Spying Docs ::
http://cryptome.org/2013/09/dni-13-0910.pdf
_______________________________________
¤ Smartphones Are Gold Mines to NSA ::
(EN)
http://cryptome.org/2013/09/nsa-smartphones-en.pdf
(DE)
http://cryptome.org/2013/09/nsa-smartphones.pdf
¤ NSA Presentation You Won’t Believe ::
Referring to customers as “zombies” is
the sort of thing you’d expect from
neckbearded hipsters and other self-
proclaimed individualists who tend to
take a dim view of any popular activity.
It’s rather jarring to hear the lingo
deployed in a government intelligence
agency presentation.
http://cryptome.org/2013/09/nsa-smartphones-en.pdf
https://www.techdirt.com/articles/20130909/08582024452/steve-jobs-is-big-brother-smartphone-users-are-zombies-according-to-nsa-cell-phone-tapping-presentation.shtml
http://www.infowars.com/steve-jobs-is-big-brother-and-smartphone-users-are-zombies-according-to-nsa-cell-phone-tapping-presentation/
¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯
¤ DNI and NSA Blame Obama to Cover Up
Violations Against a 2011 Court Order ::
The Obama regime secretly won permission
from a surveillance court in 2011 to
reverse restrictions on the National
Security Agency’s use of intercepted
phone calls and e-mails, permitting
the agency to search deliberately for
Americans’ communications in its massive
databases, ACCORDING TO INTERVIEWS WITH
GOVERNMENT OFFICIALS and recently
“declassified material” - (which, by
the way, had NO classification, NO date,
NO stamp, NO names, NO identification
of which agency it came from and most
shocking of all NO blackouts, odd.)
http://www.dni.gov/files/documents/DNI%20Clapper%20Section%20702%20Declassification%20Cover%20Letter.pdf
In addition, the court extended the
length of time that the NSA is allowed
to retain intercepted US communications
from five years to six years — and more
under special circumstances, according
to the documents, which include a
recently released 2011 opinion by US
District Judge John D. Bates, then
chief judge of the Foreign Intelligence
Surveillance Court.
http://www.washingtonpost.com/world/national-security/obama-administration-had-restrictions-on-nsa-reversed-in-2011/2013/09/07/c26ef658-0fe5-11e3-85b6-d27422650fd5_story.html
NOBODY comments
The document which was declassified by
US intelligence officials explains the
chief judge of the Foreign Intelligence
Surveillance Court ruled the FAA 702
upstream collection unconstitutional.
http://cryptome.org/2013/08/fisa-shut-nsa-phone-records.pdf
http://apps.washingtonpost.com/g/page/national/fisa-court-documents-on-illegal-nsa-e-mail-collection-program/409/
http://www.washingtonpost.com/world/national-security/nsa-gathered-thousands-of-americans-e-mails-before-court-struck-down-program/2013/08/21/146ba4b6-0a90-11e3-b87c-476db8ac34cd_story.html
National Security Agency analysts
deliberately ignored restrictions on
their authority to spy on Americans.
http://www.bloomberg.com/news/2013-08-23/nsa-analysts-intentionally-abused-spying-powers-multiple-times.html
NSA analysts admitted to abuse after
the 2012 FISA Court audit was released.
http://cryptome.org/2013/08/nsa-fisa-audit.pdf
http://apps.washingtonpost.com/g/page/national/nsa-report-on-privacy-violations-in-the-first-quarter-of-2012/395/
And this is not the first attempt to
try to cover up their FISA violations.
http://cryptome.org/2013/08/nsa-fisa-audit-note.pdf
http://apps.washingtonpost.com/g/page/national/what-to-say-and-not-to-say-to-our-overseers/390/
The new Washington Post report has
linked to disinformation from a DNI
(press) release exposing yet another
attempt to dodge any criminal charges
or take responsibility for the abuses
exposed from the FISA Court audit.
http://www.washingtonpost.com/world/national-security/obama-administration-had-restrictions-on-nsa-reversed-in-2011/2013/09/07/c26ef658-0fe5-11e3-85b6-d27422650fd5_story.html
I suspect another attempt by the DNI
and NSA to cover up FISA violations.
Just blame the puppet-in-charge, Obama,
to use as a scapegoat - go figure.
All of this information is backed up
and will be mirrored soon. Meanwhile,
here is the leaked 2012 audit exposing
2,776 violations one year after the
FISA Court order.
http://cryptome.org/2013/08/nsa-fisa-audit.pdf
As for Congress they will lay down like
a bunch of leashed dogs who are getting
kickbacks for doing nothing to prevent
this abuse nor fix any problems. I will not
link to their PR circus stunts anymore and
I encourage voters to throw a majority of
them out of office come next election.
_______________________________________
¤ Snowden, NSA, and Counterintelligence? ::
http://20committee.com/2013/09/04/snowden-nsa-and-counterintelligence/
_______________________________________
¤ NSA SATC Slide [Images] Leak ::
http://www.youtube.com/watch?v=XlkHBB3-DhY
Screen shots of Brazilian Fanstastico
TV show on NSA spying Brazil and Mexico
presidents, aired 1 September 2013. ▼
http://cryptome.org/2013-info/09/nsa-br-mx/nsa-br-mx.htm
¤ NSA Spying Brazil, Mexico Presidents ::
Translation by Google, tidied by Cryptome.
http://cryptome.org/2013/09/nsa-spying-brazil.htm
¤ NSA SATC Eavesdropping Case Study ::
http://electrospaces.blogspot.com/2013/09/an-nsa-eavesdropping-case-study.html
▲ All 14 SATC Slides Released (Mirrored) ::
http://up.inet.ge/download.php?file=eb9465849119fa5efe4256304d2c5630
http://filebeam.com/eb9465849119fa5efe4256304d2c5630
http://tishare.com/y7ldwxx397kl.htm
http://f.lui.li/get_822_b946.html
¤ Brazil Senate Committee to Probe Espionage ::
Brazil’s senate has formed an Investigative
Parliamentary Commission to follow up on
reports that the US National Security Agency
(NSA) spied on Brazilian Prez Dilma Rousseff.
“We intend to protect national sovereignty,”
Xinhua quoted Senator Vanessa Graziotin of
the Communist Party of Brazil as saying
Tuesday.
The committee, comprising 11 main members
and seven substitutes, initially has 180
days to investigate claims that the NSA
monitored emails between Rousseff and
several of her top aides, and tapped
her phone.
http://news.yahoo.com/brazil-senate-committee-probe-us-spying-032012289.html
¤ BLOWBACK ; US/Brazil Bilateral Relation
Impacted ::
Revelations of a US spy program that
allegedly allows digital surveillance
of the presidents of Brazil and Mexico
have drawn cries of indignation and anger
in both nations, but the fallout may be
strongest for US-Brazil relations.
At stake is whether Brazilian Prez Dilma
Rousseff will cancel a planned state
visit to Washington in October, the
first offered by Prez Barack Obama this
year, or will take action on digital
security that may affect US companies
such as Google, Facebook and Yahoo.
Rousseff is reported to be considering
a proposal that would suspend operations
of companies that cooperate with the
NSA or US intelligence agencies.
http://www.mcclatchydc.com/2013/09/03/201125/nsa-leak-might-lead-to-cancellation.html
_______________________________________
¤ ACLU Sues the NSA Update 02 ::
http://thehill.com/blogs/hillicon-valley/technology/320357-nra-claims-nsa-illegally-created-a-gun-database
¤ ACLU Sues the NSA Update 01 ::
http://www.theguardian.com/world/2013/aug/27/nsa-surveillance-program-illegal-aclu-lawsuit
¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯
¤ Top Secret US Spy Budget FY 2013 Vol 1 ::
“We are bolstering our support for
clandestine SIGINT capabilities to
collect against high priority targets,
including foreign leadership targets.
Also, we are investing in groundbreaking
cryptanalytic capabilities to defeat
adversarial cryptography and exploit
internet traffic.”
http://cryptome.org/2013/08/spy-budget-fy13.pdf
http://s3.documentcloud.org/documents/781537/cbjb-fy13-v1-extract.pdf
▲ Snapshots of Budget Exhibit ::
http://cryptome.org/2013/08/spy-budget-fy13-exhibit-13.pdf
http://cryptome.org/2013/08/spy-tidbits.pdf
▼ US Spy Budget FY 2013 - Spoon Fed ::
“The Post is withholding some information
after consultation with US officials who
expressed concerns about the risk to
intelligence sources and methods.
Sensitive details are so pervasive in
the documents that The Post is publishing
only summary tables and charts online.”
http://www.washingtonpost.com/world/national-security/black-budget-summary-details-us-spy-networks-successes-failures-and-objectives/2013/08/29/7e57bb78-10ab-11e3-8cdd-bcdc09410972_story.html
▲ Declassified, Censored US Spy Budget
FY 2013 Vol 4 ::
http://cryptome.org/2013/08/spy-budget-fy13-v4.pdf
http://www.fas.org/irp/nro/fy2013cbjb.pdf
▲ Declassified, Censored US Spy Budget
FY 2013 Vol 12 ::
http://cryptome.org/2013/08/spy-budget-fy13-v12.pdf
http://www.fas.org/irp/dni/cbjb-2013.pdf
¤ Intelligence vs Intelligence ::
The Obama regime views Israel as one
of the top spying threats facing it’s
intelligence services, leaked documents
reveal.
“Israel should be assumed to continue
to have an aggressive intelligence
collection operations against the
United States,” Pillar said. While
much information is collected through
traditional political contacts, “I
would personally have no doubt that
that is supplemented by whatever means
they can use to find out as much as
they can about what we’re doing,
thinking, deciding on anything of
interest to Israel, which would include
just about any Middle Eastern topic.”
http://thehill.com/blogs/global-affairs/middle-east-north-africa/319513-leaked-documents-reveal-us-sees-israel-as-a-major-spying-threat
From US Spy Budget FY 2013 Vol 1 ...
“To further safeguard our classified
networks, we continue to strengthen
insider threat detection capabilities
across the Community. In addition, we
are investing in target surveillance
and offensive CI against key targets,
such as China, Russia, Iran, Israel,
Pakistan, and Cuba.”
_______________________________________
¤ NSA Exploit Isn’t Crypto, It’s SMTP ::
“The crypto is the easy part. The hard
part is the traffic analysis, of which
the worst part is the Received headers.
Everyone should look at their own headers
-- especially people on this list and
at least comprehend that your email
geotracks you forever, as it’s all in
the Mailman archive.
There are plenty of other leaks like
Message-ID, Mime-Version, X-Mailer,
the actual separators in MIME part
breaks, and so on.
It’s absolutely correct that some
combination of VPNs, Tor, remailers of
whatever stripe, and so on can help
with this, but we’re all lazy and we
don’t do it all the time.
What we’re learning from Snowden is
that they’re doing traffic analysis --
analyzing movements, social graphs,
and so on and so forth. The irony here
is that this tells us that the crypto
works. That’s where I’ve been thinking
for quite some time.
Imagine that you’re a SIGINT group trying
to deal with the inevitability of crypto
that works being deployed everywhere.
What do you do? You just be patient and
start filling in scatter plots of traffic
analysis.
The problem isn’t the crypto, it’s SMTP.”
http://cryptome.org/2013/08/callas-nsa-smtp.htm
¤ NSA Trying to Break Encryption ::
Among the NSA’s annual budget of $52.6
billion are requests to bankroll ground-
breaking cryptanalytic capabilities that
can beat cryptography and mine regular
Internet traffic, new documents leaked
by Edward Snowden to the Washington Post
reveal.
http://news.cnet.com/8301-13578_3-57600647-38/nsa-seeks-groundbreaking-spying-powers-new-leak-reveals/
“We are bolstering our support for
clandestine SIGINT capabilities to
collect against high priority targets,
including foreign leadership targets.
Also, we are investing in groundbreaking
cryptanalytic capabilities to defeat
adversarial cryptography and exploit
internet traffic.” ... ...
Processing & Exploitation 15% of budget.
Cryptanalysis & Exploitation Services ;
Analysis of Target Systems, Cryptanalytic
IT Systems, Cyber Cryptanalysis, Exploitation
Solutions, Microelectronics, PEO Program,
PEO Program B, PEO Program C, Target Pursuit,
Target Reconnaissance & Survey.
SIGINT Stations ; Cryptologic Centers,
Field Sites, OCMC, SIGINT Ground Operations.
http://cryptome.org/2013/08/spy-budget-fy13.pdf
http://s3.documentcloud.org/documents/781537/cbjb-fy13-v1-extract.pdf
¤ NSA Rigging the Crypto Market Repost ::
http://cryptome.org/jya/nsa-sun.htm
▲ NSA May Have SSL Encryption Keys ::
The US government has attempted to
obtain the master encryption keys that
Internet companies use to shield millions
of users’ private web communications
from eavesdropping.
These demands for master encryption keys,
which have not been disclosed previously,
represent a technological escalation in
the clandestine methods that the FBI and
the National Security Agency employ when
conducting electronic surveillance against
Internet users. ... ...
Leaked NSA surveillance procedures,
authorized by Attorney General Eric
Holder, suggest that intercepted domestic
communications are typically destroyed
-- unless they’re encrypted. If that’s
the case, the procedures say, “retention
of all communications that are enciphered”
is permissible.
http://news.cnet.com/8301-13578_3-57595202-38/feds-put-heat-on-web-firms-for-master-encryption-keys/
_______________________________________
¤ NSA Arrangements with Foreign Internet
Providers and Foreign Intelligence ::
“The NSA started setting up Internet
intercepts well before 2001, former
intelligence officials say. Run by NSA’s
secretive Special Services Office,
these types of programs were at first
designed to intercept communications
overseas through arrangements with
foreign Internet providers, the former
officials say. NSA still has such
arrangements in many countries,
particularly in the Middle East and
Europe, the former officials say.”
http://electrospaces.blogspot.com/2013/08/nsa-has-also-arrangements-with-foreign.html
¤ NSA’s Global Surveillance ::
http://online.wsj.com/public/resources/documents/WSJ-NSAB08202013.jpg
http://www.presstv.ir/detail/2013/08/21/319731/nsa-surveillance-new-detail/
http://www.dailypaul.com/296515/wsj-new-details-show-broader-nsa-surveillance-reach-programs-cover-seventy-five-of-nations-traffic
¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯
¤ Another Loophole Around FISA Laws for
the NSA - Postpone Timestamp Process ::
A common hacking technique can be used
to make emails look as if they came from
outside the United States.
http://paste.servut.us/wsiq
_______________________________________
¤ Google and the NSA ; Who’s Holding the
Shit-Bag Now? ::
http://cryptome.org/2013/08/assange-google-nsa.htm
http://thestringer.com.au/google-and-the-nsa-whos-holding-the-shit-bag-now
▲ Related ; Surveillance Industry Profit ::
http://rt.com/usa/nsa-payed-internet-companies-911/
http://www.infowars.com/leaked-document-reveals-government-paid-millions-to-prism-participants/
http://www.theguardian.com/world/2013/aug/23/nsa-prism-costs-tech-companies-paid
http://www.informationweek.com/security/government/nsa-paid-tech-companies-millions-for-pri/240160383
¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯
¤ Judge Walton FISA Letter to Senator
Patrick Leahy ::
http://cryptome.org/2013/08/walton-leahy-13-0729.pdf
¤ USA to Provide Declassified FISA Documents ::
http://cryptome.org/2013/08/usa-fisa-13-0729.pdf
_______________________________________
¤ NSA Analysts Admit Deliberate Abuse ::
Some National Security Agency analysts
deliberately ignored restrictions on
their authority to spy on Americans
multiple times in the past decade,
contradicting Obama regime officials’
and lawmakers’ statements that no
willful violations occurred. ...
Legal opinions declassified on Aug. 21
revealed that the NSA intercepted as
many as 56,000 electronic communications
a year of Americans who weren’t suspected
of having links to terrorism, before a
secret court that oversees surveillance
found the operation unconstitutional
in 2011.
http://www.bloomberg.com/news/2013-08-23/nsa-analysts-intentionally-abused-spying-powers-multiple-times.html
¤ FISA Court Shut Down NSA’s Authority to
Collect Domestic Calls (FAA 702 Upstream)
in 2011 but the NSA Kept Collecting ::
The 86-page document, which was declassified
by US intelligence officials Wednesday,
explains why the chief judge of the Foreign
Intelligence Surveillance Court ruled the
collection method unconstitutional. ...
The documents were released in response
to a Freedom of Information Act lawsuit
filed by the Electronic Frontier Foundation.
“It’s unfortunate it took a year of
litigation and the most significant leak
in American history to finally get them
to release this opinion,” EFF staff
attorney Mark Rumold said Wednesday,
“but I’m happy that the administration
is beginning to take this debate seriously.”
http://cryptome.org/2013/08/fisa-shut-nsa-phone-records.pdf
http://apps.washingtonpost.com/g/page/national/fisa-court-documents-on-illegal-nsa-e-mail-collection-program/409/
http://www.washingtonpost.com/world/national-security/nsa-gathered-thousands-of-americans-e-mails-before-court-struck-down-program/2013/08/21/146ba4b6-0a90-11e3-b87c-476db8ac34cd_story.html
¤ NSA Audit of 2,776 FISA Violations ::
http://cryptome.org/2013/08/nsa-fisa-audit.pdf
http://apps.washingtonpost.com/g/page/national/nsa-report-on-privacy-violations-in-the-first-quarter-of-2012/395/
¤ NSA Fudging FISA Violations ::
http://cryptome.org/2013/08/nsa-fisa-audit-note.pdf
http://apps.washingtonpost.com/g/page/national/what-to-say-and-not-to-say-to-our-overseers/390/
¤ Leaked NSA Audit Found Agency Broke
Privacy Rules Thousands of Times ::
http://apps.washingtonpost.com/g/page/national/nsa-report-on-privacy-violations-in-the-first-quarter-of-2012/395/
http://www.washingtonpost.com/world/national-security/nsa-broke-privacy-rules-thousands-of-times-per-year-audit-finds/2013/08/15/3310e554-05ca-11e3-a07f-49ddc7417125_story_1.html
http://www.dailybinarynews.com/leaked-nsa-audit-found-agency-broke-privacy-rules-thousands-of-times/
http://www.dailybinarynews.com/wapo-nsa-broke-privacy-rules-thousands-of-times-harms-uncertain/
http://www.infowars.com/uncontrolled-by-fisa-court-nsa-commits-thousands-of-privacy-violations-per-year/
http://www.theguardian.com/world/2013/aug/16/nsa-violated-privacy-rules-audit
The account is based on top-secret
documents and a May 2012 internal NSA
audit that found 2,776 infractions –
including unauthorized collection,
storage, access to or distribution of
legally protected communications – in
the preceding 12 months alone. The audit,
originally only meant to be seen by top
NSA leaders, only accounted for violations
at NSA headquarters at Fort Meade, Virginia,
and other locations in the Washington DC
region.
▲ NSA Claims to Have Zero Tolerance Policy ::
“I do think in a lot of the headlines
and other things, there’s people talking
about privacy violations or abuses or
willful or violations, right, it is
important for people to understand,
NSA has a zero tolerance policy for
willful misconduct. Zero. That’s our
tolerance, it’s very simple.
Right, we do realize mistakes do occur.
We detect them, as early as we can.
We correct them, right. None of the
mistakes, the incidents that were in
the document released were willful.
Right, it doesn’t mean that we have
any desire to have any mistakes; it
doesn’t mean we think a mistake is okay.”
http://cryptome.org/2013/08/nsa-13-0816.pdf
¤ NSA Reveals That It Does 20,000,000
Database Queries Per Month ::
http://www.techdirt.com/articles/20130819/02153624228/nsa-reveals-that-it-does-20-million-database-queries-per-month.shtml
¤ Breaking Down Mass NSA Spying & Lies ::
http://www.infowars.com/you-wont-believe-whats-going-on-with-government-spying-on-americans/
_______________________________________
¤ UK GCHQ Bude and NSA Exchange Data ::
Britain runs a secret internet-monitoring
station in the Middle East to intercept
and process vast quantities of emails,
telephone calls and web traffic on behalf
of Western intelligence agencies, The
Independent has learnt. ... ...
The information is then processed for
intelligence and passed to GCHQ in
Cheltenham and shared with the National
Security Agency (NSA) in the United States.
The Government claims the station is a
key element in the West’s “war on terror”
and provides a vital “early warning”
system for potential attacks around
the world.
The Independent is not revealing the
precise location of the station but
information on its activities was
contained in the leaked documents
obtained from the NSA by Edward Snowden.
The Guardian newspaper’s reporting on
these documents in recent months has
sparked a dispute with the Government,
with GCHQ security experts overseeing
the destruction of hard drives containing
the data. ... ...
The data-gathering operation is part of
a £1,000,000,000 internet project still
being assembled by GCHQ. It is part of
the surveillance and monitoring system,
code-named “Tempora”, whose wider aim is
the global interception of digital
communications, such as emails and text
messages.
Across three sites, communications –
including telephone calls – are tracked
both by satellite dishes and by tapping
into underwater fibre-optic cables.
http://www.independent.co.uk/news/uk/politics/exclusive-uks-secret-mideast-internet-surveillance-base-is-revealed-in-edward-snowden-leaks-8781082.html
¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯
¤ Backbone Wiretaps to Backdoor Microcode ::
http://cryptome.org/2013/08/callas-snowden.htm
_______________________________________
¤ FISA Reauthorization to John Boehner,
Harry Reid, Nancy Pelosi, Mitch McConnell,
Mike Rodgers, Dutch Ruppersberger, Lamar
Smith, John Conyers Jr, Dianne Feinstein,
Sexby Chambliss, Patrick J Leahy, Charles
E Grassley ::
http://cryptome.org/2013/08/fisa-dni-12-0326.pdf
http://cryptome.org/2013/08/fisa-dni-ag-12-0208.pdf
¤ FISA 2008 Heavy Censorship March 2009 ::
http://cryptome.org/2013/08/fisa-march-2009.pdf
¤ FISA 2008 Heavy Censorship May 2010 ::
http://cryptome.org/2013/08/fisa-may-2010.pdf
¤ FISA 2008 Heavy Censorship December 2009 ::
http://cryptome.org/2013/08/fisa-december-2009.pdf
¤ FISA Horse Droppings ::
http://cryptome.org/2013/08/fisa-droppings.htm
¤ FISA Documents Withheld From Most of
Congress ::
“I can now confirm that the House
Permanent Select Committee on Intelligence
did NOT, in fact, make the 2011 document
available to Representatives in Congress,
meaning that the large class of Representatives
elected in 2010 did not receive either of
the now declassified documents detailing
these programs.” - Justin Amash
http://www.theguardian.com/world/2013/aug/12/intelligence-committee-nsa-vote-justin-amash
http://www.infowars.com/amash-nsa-docs-were-withheld-from-congress-by-higher-ups/
▼
http://www.youtube.com/watch?v=4Sg4AtcW0LU
Youtube video ; 27:18 “So on this program,
100% audibility on every query that we make.
And that is overseen by our Inspector General,
our General Council. In 2009 in our
discussions with the president when he
first came on board we talked to him about
these programs and the issue was how do
we know the compliance is there and what
more could we do? We stood up working with
the COMMITTEES IN CONGRESS a directorate
of compliance. This directorate of
compliance is headed by legal professionals
and information specialists that can look
at everything that we do in these programs
and ensure they (comply ?) with the court
orders but we also have oversight from
the Director of National Intelligence,
General Council and IEG, from the Defense
Department, from the Department of Justice,
from the White House, FROM CONGRESS, the
Intel(ligence) committees and from the
courts.” - Keith Alexander
_______________________________________
¤ EU Privacy Watchdogs Seek PRISM Slides ::
Only 9 out of 41 slides have become
public so far.
http://cnsnews.com/news/article/eu-privacy-watchdogs-seek-details-nsa-spying
_______________________________________
¤ NEVER LET SURVEILLANCE SHUT YOU UP ::
http://online.wsj.com/article/SB10001424127887323639704579015101857760922.html
_______________________________________
¤ NSA Funds New “Top Secret” $60,000,000
Data Lab ::
http://www.infowars.com/nsa-funds-new-top-secret-60-million-dollar-data-lab/
http://www.newsobserver.com/2013/08/15/3109412/nc-state-teams-up-with-nsa-on.html
_______________________________________
¤ What the NSA’s Massive Org Chart
(Probably) Looks Like ::
http://www.defenseone.com/ideas/2013/08/what-nsas-massive-org-chart-probably-looks/68642/
http://www.mindmeister.com/308518551/the-national-security-agency-operates-more-than-500-separate-signals-intelligence-platforms-employs-roughly-30-000-civilians-and-military-budget-10-billion
http://cdn.govexec.com/media/gbc/docs/pdfs_edit/d1nsaorgmapimg.jpg
_______________________________________
¤ NSA Spying Under Fire in Latin America ::
The massive NSA snooping revelations
have cast a shadow over John Kerry’s
trip to Latin America – his first visit
there since he assumed the position
of Secretary of State. He has already
received a chilly reception in Colombia
– where officials demanded an explanation
to reports that Washington had collected
vast amounts of internet data there.
The next stop on his trip is Brazil –
which allegedly was the top regional
target of the surveillance program.
http://www.youtube.com/watch?v=fpRPnc6Ucy8
http://sgtreport.com/2013/08/kerry-on-damage-control-nsa-spying-under-fire-in-latin-america/
¤ Brazil Demands Clarifications on NSA
Surveillance ::
http://www.youtube.com/watch?v=txCcJ0wqdFc
http://www.youtube.com/watch?v=cv1WjVI3lQA
http://news.yahoo.com/brazil-demands-clarifications-nsa-surveillance-200545031.html
_______________________________________
¤ Ten Operational Directorates of NSA ::
http://williamaarkin.wordpress.com/2013/08/13/nsa-a-little-help-with-transparency/
¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯
¤ NSA Strategy and Core Values ::
http://www.nsa.gov/about/_files/nsacss_strategy.pdf
http://cryptome.org/2013/08/nsa-strategy-values.htm
¤ NSA Deputy Director on NSA Core Values ::
http://www.nsa.gov/about/values/core_values.shtml
http://cryptome.org/2013/08/nsa-core-values-inglis.htm
_______________________________________
¤ Edward Snowden Speaks to Peter Maass ::
http://www.nytimes.com/2013/08/18/magazine/snowden-maass-transcript.html
http://cryptome.org/2013/08/snowden-maass.htm
_______________________________________
¤ Detail Into FAA Section 702 ::
http://www.theguardian.com/world/2013/aug/09/nsa-loophole-warrantless-searches-email-calls
“While the FAA 702 minimization procedures
approved on 3 October 2011 now allow for
use of certain United States person names
and identifiers as query terms when reviewing
collected FAA 702 data, analysts may NOT/NOT
implement any USP queries until an effective
oversight process has been developed by NSA
and agreed to by DOJ/ODNI. Until further
notice, collected FAA 702 data (702 data is
contained in MARINA, MAINWAY, NUCLEON, PINWALE
(Sweet* and Sour* partitions) and other
databases).”
http://static.guim.co.uk/sys-images/Guardian/Pix/pictures/2013/8/9/1376060880108/FAA-document-001.jpg
NOBODY comments
Refer to this leaked FISA document.
http://cryptome.org/2013/06/nsa-fisa-minimization.pdf
Under the FISA minimization, section 3
(b) (2) “Monitoring, Recording, and
Processing (U)” the NSA can hold domestic
communications not related to foreign
information or foreign activity for up
to five years.
Found in section 3 (1) “Such inadvertently
acquired communications of or concerning a
United States person may be retained no
longer than five years in any event.”
Under the FISA minimization, section 5
“Domestic Communications (U)” there is
more than one loophole the NSA can use to
be granted authorization to snoop domestic
communications that have been stored.
Look into section 5, sub-sections (2) and
(3). ║ (2) refers to criminal activity and
*suspected* criminal activity. (3) refers
to “communications security vulnerability”
both being used as excuses to snoop.
_______________________________________
¤ NSA ; Adobe Reader Very Vulnerable ::
http://cryptome.org/2013/08/nsa-adobe-reader-XI.pdf
_______________________________________
¤ NSA ; Mobility Capability Package ::
http://cryptome.org/2013/08/nsa-mobility-capability.pdf
_______________________________________
¤ Obama Meets With Third-Party Corporate
Executives Behind Closed Doors ::
As the steady stream of revelations
continues, the White House has choosen
to meet quietly with tech executives and
consumer groups behind closed doors.
http://www.politico.com/story/2013/08/tim-cook-barack-obama-technology-95362.html
_______________________________________
¤ Obama Press Conference on NSA Spying ::
http://cryptome.org/2013/08/obama-nsa-13-0809.htm
¤ Luke Rudkowski Talks About Obama’s NSA
Spying Press Conference ::
Luke Rudkowski breaks down today’s
Presidential press conference in which the
focus was predominantly on the NSA spying
program. Luke points out many of the lies
that Obama told today about the program
by citing multiple articles with information
that completely contradict what Obama said.
http://www.youtube.com/watch?v=adZyfrcvtgg
¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯
¤ NSA Missions, Authorities, Oversight,
Partners ::
http://cryptome.org/2013/08/nsa-13-0809.pdf
¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯
¤ DoJ ; NSA Bulk Collection of Telephony
Metadata ::
http://cryptome.org/2013/08/doj-13-0809.pdf
¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯
¤ National Security Run Amok ::
http://www.washingtontimes.com/news/2013/aug/9/paul-national-security-run-amok/
_______________________________________
The Western Center for Journalism released
a video briefing over Russel Tice former
NSA whistleblower and his story about
blackmailing former senator Barack Obama.
http://www.youtube.com/watch?v=K31xCh6f_VY
Abby Martin talks to Russell Tice, former
intelligence analyst and original NSA
whistleblower, about how the recent NSA
scandal is only scratches the surface of
a massive surveillance apparatus, citing
specific targets the he saw spying orders
for including former senators Hillary
Clinton and Barack Obama.
http://www.youtube.com/watch?v=d6m1XbWOfVk
¤ Boiling Frogs Post Podcast Show of NSA
whistleblower Russell Tice ::
http://www.youtube.com/watch?v=2DmN80yi5mo
http://www.boilingfrogspost.com/podpress_trac/web/20927/0/BF.0112.Tice_20130617.mp3
¤ Corbett Report ; NSA Wiretapped Obama,
Petraeus, Alito, and Others ::
http://www.youtube.com/watch?v=H1ZAzu_0YZU
Ron Paul talks about NSA spying and
why they want to sweep it under the rug.
http://www.youtube.com/watch?v=0h4yOr-27mA
¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯
¤ NSA and Spying Nicknames and Codewords ::
http://electrospaces.blogspot.com/p/nicknames-and-codewords.html
¤ NSA’s Code Names Revealed (2012) ::
http://williamaarkin.wordpress.com/2012/03/13/nsa-code-names-revealed/
NOBODY comments
RAGTIME is the codename for Stellar Wind.
This operation was debated years ago, yet
the document was still classified. It was
leaked to cryptome.org last month. ▼
http://cryptome.org/2013/06/nsa-stellar-wind.pdf
OCELOT and STORMBREW are both managed
by Stu Bathurst - both telephony data
grabbing operations. RAGTIME sponsored
many of these operations being leaked.
_______________________________________
¤ Uncensored NSA FAIRVIEW Slides Air
on Brazilian Television ::
http://www.youtube.com/watch?v=kOAv7zbJkCk
http://www.dailydot.com/news/nsa-fairview-slides-brazil-spying/
http://cryptome.org/2013/08/nsa-codenames.htm
NOBODY comments
Upstream collection via FAA 702 includes
FAIRVIEW, STORMBREW, BLARNEY and OAKSTAR.
Original leaks of FAIRVIEW slides censored
program managers - for FAIRVIEW “Craig Hicks”
and for STORMBREW “Stu Bathurst.” ▼
http://postimg.org/image/9viuxblpd/
¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯
¤ Transfers From Germany Aid US Surveillance,
English Report ::
German intelligence sends massive amounts
of intercepted data to the NSA, according
to documents from whistleblower Edward
Snowden, which SPIEGEL has seen. The
trans-Atlantic cooperation on technical
matters is also much closer than first
thought. ... ...
Day after day and month after month,
the BND passes on to the NSA massive
amounts of connection data relating
to the communications it had placed
under surveillance. The so-called
metadata -- telephone numbers, email
addresses, IP connections -- then flow
into the Americans’ giant databases.
http://www.spiegel.de/international/world/german-intelligence-sends-massive-amounts-of-data-to-the-nsa-a-914821.html
¤ Transfers from Germany Aid US Surveillance,
Deutsch Report ::
http://cryptome.org/2013/08/der-spiegel-13-0804.pdf
¤ Germany Nixes Spy Pact With US, UK (?) ::
http://bigstory.ap.org/article/germany-nixes-surveillance-pact-us-britain
¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯
¤ NSA XKEYSCORE Slides, 2008 ::
http://cryptome.org/2013/07/nsa-xkeyscore.pdf
http://www.slideshare.net/xkeyscore/xkeyscore-nsa-program-presentation
http://www.documentcloud.org/documents/743244-xkeyscore-slidedeck.html
¤ XKEYSCORE God-terminal Into Internet ::
http://www.dw.de/xkeyscore-a-god-terminal-into-internet/a-16994780
The latest revelations will add to the intense public
and congressional debate around the extent of NSA
surveillance programs. They come as senior intelligence
officials testify to the Senate judiciary committee on
Wednesday, releasing classified documents in response to
the Guardian’s earlier stories on bulk collection of
phone records and FISA surveillance court oversight.
http://www.theguardian.com/world/interactive/2013/jul/31/nsa-xkeyscore-program-full-presentation
http://www.theguardian.com/world/2013/jul/31/nsa-top-secret-program-online-data
http://www.reuters.com/article/2013/07/31/us-usa-security-intelligence-idUSBRE96U03320130731
http://www.washingtontimes.com/news/2013/jul/31/declassified-documents-show-nsa-snooping-had-compl/
¤ NSA XKeyscore Produced by SAIC ::
http://cryptome.org/2013/08/nsa-xkeyscore-saic.htm
¤ NSA Press Statement on XKEYSCORE ::
http://cryptome.org/2013/07/nsa-xkeystore.htm
http://www.nsa.gov/public_info/press_room/2013/30_July_2013.shtml
¤ NSA X-KEYSCORE Server Locations ::
http://cryptome.org/2013/08/nsa-x-keyscore-servers.htm
¤ NSA X-KEYSCORE Global Cyber-espionage ::
http://cryptome.org/2013/08/nsa-x-keyscore-family.htm
¤ Instrument of Mass Surveillance ::
http://www.infowars.com/xkeyscore-instrument-of-mass-surveillance/
¤ NSA’s X-Keyscore One of Many More ::
http://www.infowars.com/nsas-x-keyscore-one-of-many-surveillance-programs-used-on-americans/
¤ RAGTIME and X-KEYSCORE @ Fort Meade ::
“At Fort Meade, a program called
XKEYSCORE processes all signals before
they are shunted off to various “production
lines” that deal with specific issues.
PINWALE is the main NSA database for
recorded signals intercepts. It is
compartmentalized by keywords (the NSA
calls them “selectors”). Metadata is
stored in a database called MARINA and
is generally retained for five years.
... ...
“Congress repeatedly resisted the
entreaties of the Bush Administration
to change the surveillance laws once the
RAGTIME program had been institutionalized.
This was for a simple reason: they did
not want to be responsible for a program
that was not legal.”
https://www.law.upenn.edu/live/files/1718-ambinder10-things.pdf
NOBODY comments
Under the FISA minimization, section 3
(b) (2) “Monitoring, Recording, and
Processing (U)” the NSA can hold domestic
communications not related to foreign
information or foreign activity for up
to five years.
This confirms an XKeyscore presentation
posted by the Guardian regarding the
metadata aggregation to PINWALE databank
seen in the DNI discovery options.
¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯
¤ NSA Pays £100,000,000 in Secret Funding
for GCHQ Bude ::
http://www.theguardian.com/uk-news/2013/aug/01/nsa-paid-gchq-spying-edward-snowden
_______________________________________
¤ Other Agencies Clamor for Data NSA
Compiles but Claim Rejections ::
Agencies working to curb drug trafficking,
cyberattacks, money laundering,
counterfeiting and even copyright
infringement complain that their
attempts to exploit the security
agency’s vast resources have often
been turned down because their own
investigations are not considered a
high enough priority, current and
former government officials say.
Intelligence officials say they have
been careful to limit the use of the
security agency’s troves of data and
eavesdropping spyware for fear they
could be misused in ways that violate
Americans’ privacy rights. ...
“It’s a very common complaint about
NSA,” said Timothy H. Edgar, a former
senior intelligence official at the
White House and at the office of the
director of national intelligence.
“They collect all this information,
but it’s difficult for the other
agencies to get access to what
they want.”
http://www.nytimes.com/2013/08/04/us/other-agencies-clamor-for-data-nsa-compiles.html?hp&_r=0
_______________________________________
¤ NSA’s Keith Alexander Remarks at Aspen
Security Forum ::
http://cryptome.org/2013/07/nsa-aspen.pdf
¤ NSA’s Keith Alexander Remarks at AFCEA
Conference ::
http://cryptome.org/2013/07/nsa-afcea.pdf
¤ NSA’s Keith Alexander Remarks at Blackhat
Conference ::
http://www.youtube.com/watch?v=4Sg4AtcW0LU
https://soundcloud.com/larrymagid/nsa-director-general-keith
http://cryptome.org/2013/08/nsa-13-0731.pdf
Youtube video ; 27:18 “So on this program,
100% audibility on every query that we make.
And that is overseen by our Inspector General,
our General Council. In 2009 in our
discussions with the president when he
first came on board we talked to him about
these programs and the issue was how do
we know the compliance is there and what
more could we do? We stood up working with
the committees in Congress a directorate
of compliance. This directorate of
compliance is headed by legal professionals
and information specialists that can look
at everything that we do in these programs
and ensure they (comply ?) with the court
orders but we also have oversight from
the Director of National Intelligence,
General Council and IEG, from the Defense
Department, from the Department of Justice,
from the White House, from Congress, the
Intel(ligence) committees and from the
courts.” - Keith Alexander
▲ NSA’s Keith Alexander Angers a Few at
Blackhat Conference ::
“Read the constitution” someone shouts.
“I did, you should too” replied Keith.
http://www.infowars.com/security-consultant-heckles-nsa-head-shouts-freedom-read-the-constitution/
http://www.forbes.com/sites/andygreenberg/2013/07/31/nsa-director-heckled-at-conference-as-he-asks-for-security-communitys-understanding/
¤ NSA’s Keith Alexander Remarks to Workforce ::
http://cryptome.org/2013/07/nsa-workforce.htm
http://www.nsa.gov/public_info/speeches_testimonies/25jun13_dir.shtml
_______________________________________
¤ Obama Releases Three Patriot Act Docs ::
http://cryptome.org/2013/07/obama-releases-13-0731.pdf
¤ US Outlines NSA Culling of Data for
All Domestic Calls ::
On Wednesday, the Obama regime released
three documents related to the National
Security Agency’s collection of phone
records, including briefings to Congress
as the relevant provision of the Patriot
Act was up for renewal, and a ruling
from the Foreign Intelligence Surveillance
Court that outlines rules that must be
followed when accessing data provided by
a Verizon subsidiary.
http://www.nytimes.com/interactive/2013/08/01/us/01nsa-docs.html
Before Mr. Snowden’s leaks made clear
what the government was doing with the
Patriot Act program, several senators
on the Intelligence Committee had made
cryptic warnings that it was interpreting
the law in a twisted way to do something
alarming and made reference to the 2011
briefing paper. The New York Times filed
a lawsuit under the Freedom of Information
Act to obtain that document.
https://www.documentcloud.org/documents/743215-2011-coverletters-report-collection.html
_______________________________________
¤ Senate FISA Spying Hearing Statements ::
http://cryptome.org/2013/07/fisa-hearing-13-0731.pdf
http://cryptome.org/2013/07/fisa-hearing-13-0731-2.pdf
_______________________________________
¤ Monitoring Emails Purely “Accidental” ::
Saxby Chambliss ; “no emails are monitored
now” ... “they used to be but that stopped
two or three years ago.”
http://abcnews.go.com/blogs/politics/2013/07/glenn-greenwald-low-level-nsa-analysts-have-powerful-and-invasive-search-tool/
_______________________________________
▼ Lawmakers Who Upheld NSA Phone Spying
Received Dox ::
(1) http://c.nopaste.dk/p56175
(2) http://c.nopaste.dk/p56176
(3) http://c.nopaste.dk/p56177
(4) http://c.nopaste.dk/p56178
(5) http://c.nopaste.dk/p56179
▼ Lawmakers Who Sold Out ::
http://pastebin.com/6fhaDJMp
¤ Lawmakers Who Upheld NSA Phone Spying
Received Double Defense Campaign Funds ::
The numbers tell the story — in votes
and dollars. On Wednesday, the house
voted 217 to 205 not to rein in the
NSA’s phone-spying dragnet. It turns
out that those 217 “no” voters received
twice as much campaign financing from
the defense and intelligence industry
as the 205 “yes” voters.
http://www.wired.com/threatlevel/2013/07/money-nsa-vote/
¤ These Are The 217 People Who Voted
To Preserve NSA Surveillance ::
http://www.infowars.com/these-are-the-217-people-who-voted-to-preserve-nsa-surveillance/
http://clerk.house.gov/evs/2013/roll412.xml
http://www.zerohedge.com/sites/default/files/images/user5/imageroot/2013/07/NOES_0.jpg
▲ US Congress Doxed, July 2013 ::
http://slexy.org/view/s2fZ764IzB
¤ Justin Amash’s Amendment to Defund
the NSA Will Get a Vote [Failed] ::
http://www.youtube.com/watch?v=IUy3IT0A8hM
http://washingtonexaminer.com/defund-nsa-amendment-will-get-a-vote/article/2533380
http://www.mcclatchydc.com/2013/07/23/197485/sen-wyden-says-he-tried-to-warn.html
http://www.infowars.com/house-fight-brews-over-nsa-stasi-state/
¤ White House Responds to Amash’s
Amendment [Before It Failed] ::
“In light of the recent unauthorized
disclosures, the President has said
that he welcomes a debate about how
best to simultaneously safeguard both
our national security and the privacy
of our citizens. The Administration
has taken various proactive steps to
advance this debate including the
President’s meeting with the Privacy
and Civil Liberties Oversight Board,
his public statements on the disclosed
programs, the Office of the Director
of National Intelligence’s release of
its own public statements, ODNI General
Counsel Bob Litt’s speech at Brookings,
and ODNI’s decision to declassify and
disclose publicly that the Administration
filed an application with the Foreign
Intelligence Surveillance Court. We
look forward to continuing to discuss
these critical issues with the American
people and the Congress.
However, we oppose the current effort
in the House to hastily dismantle one
of our Intelligence Community’s
counterterrorism tools. This blunt
approach is not the product of an
informed, open, or deliberative process.
We urge the House to reject the Amash
Amendment, and instead move forward
with an approach that appropriately
takes into account the need for a
reasoned review of what tools can
best secure the nation.” - WH Press
http://www.whitehouse.gov/the-press-office/2013/07/23/statement-press-secretary-amash-amendment
http://washingtonexaminer.com/white-house-scrambles-to-defeat-bill-to-defund-nsa-program/article/2533418
▲ RELATED ; Privacy and Civil Liberties
Board Meets Behind Closed Doors ::
http://cryptome.org/2013/06/pclob-13-0617.htm
¤ NSA Director Calls Emergency Meeting to
Lobby Against Justin Amash’s Amendment
to Defund NSA ::
http://washingtonexaminer.com/nsa-director-calls-emergency-meeting-to-lobby-against-rep.-justin-amashs-nsa-amendment/article/2533407
_______________________________________
Yesterday, German media wrote about an
official letter from the NSA, which was
sent to the German government to clarify
some misconceptions about PRISM. This
because German media and politics were
heavily confused after it became clear
that there’s more than one program named
PRISM.
The NSA letter explains what the PRISM
data collection program is about and
then confirms that this program is
different from a more common military
web tool called "Planning tool for
Resource Integration, Synchronization
and Management" (PRISM).
Surprisingly, the NSA also reveals that
there’s even a third program called
PRISM. In this case the name stands
for “Portal for Real-time Information
Sharing and Management” and it’s
apparently an internal NSA information
sharing program. It was unknown until
now, probably because it’s used in the
NSA’s highly sensitive Information
Assurance Directorate (IAD). ... ...
Here’s a short summary of all three
different PRISM programs:
1. PRISM
This is a codeword for an NSA project
of collecting information about foreign
targets from data of nine major US
internet companies. This program started
in 2007 and was unveiled by Edward Snowden
in June 2013.
2. Planning tool for Resource Integration,
Synchronization and Management (PRISM)
This is a web tool used by US military
intelligence to send tasking instructions
to data collection platforms deployed to
military operations. This program is
not very secret and was first mentioned
in 2002.
3. Portal for Real-time Information
Sharing and Management (PRISM)
This is an internal NSA program for
real-time sharing of information,
apparently in the NSA’s Information
Assurance Directorate. Its existance
was revealed by the NSA in July 2013.
http://electrospaces.blogspot.com/2013/07/nsa-says-there-are-three-different.html
¤ Three Different PRISM Programs? German
Parliament Seeks Clarity in NSA Scandal ::
A Thursday meeting in German parliament
was supposed to shed light on NSA
surveillance activities in Germany.
It only added to the mystery. A US
response to a Berlin inquiry claims
that there are actually three unrelated
Prism programs. ... ...
In addition to testimony from Schindler
and Maassen, officials also read a
written statement from the NSA in
response to a query from the German
government. According to the statement,
there are three separate Prism programs,
all of them unconnected to each other.
Meeting participants say the NSA response
said that one of the Prism programs was
only used internally. That program had
thus far remained secret. Another of
the programs was used by the Pentagon
in Afghanistan. Yet another NSA tool
-- vaguely described in the statement
and allegedly “totally unrelated to the
first” -- carries the name PRISM and
“tracks and queries requests pertaining
to our Information Assurance Directorate.”
http://www.spiegel.de/international/germany/merkel-chief-of-staff-testifies-before-parliament-on-nsa-spying-a-913268.html
NOBODY comments
The snapshot of the PRISM input tool
posted on electrospaces blogspot must
have been from the Pentagon’s PRISM.
_______________________________________
¤ UPDATE ; NSA Utah Data Center Probe ::
http://cryptome.org/2013/07/nsa-utah-probe/nsa-utah-probe.htm
¤ NSA Utah Data Center Construction ::
http://cryptome.org/2013-info/07/nsa-utah-dc/nsa-utah-dc.htm
Description and drawings by US Army
Corps of Engineers.
http://cryptome.org/nsa-utah-data.zip
http://cryptome.org/dodi/nsa-utah-award.pdf
http://cryptome.org/dodi/nsa-utah-data-02.pdf
_______________________________________
¤ Eyeballing the UK’s GCHQ Spy Policy ::
http://cryptome.org/2013/07/uk-spy-commish-2012.pdf
¤ Eyeballing the UK’s RIPA Spy Policy ::
http://cryptome.org/2013/07/uk-cop-spy-2012-13.pdf
¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯
¤ NSA Organizational Chart 1950 ::
http://cryptome.org/2013/07/nsa-org-chart-1950.pdf
¤ NSA Headquarters Plans/Drawings 1953 ::
http://cryptome.org/2013/07/nsa-hq-plans-1953.pdf
¤ NSA Employee Conduct Guide 1955 ::
http://cryptome.org/2013/07/nsa-conduct-guide-1955.pdf
_______________________________________
¤ DoJ Responds to Snowden Russia Asylum ::
“First, the United States would not seek
death penalty for Mr. Snowden should he
return to the United States. The charges
he faces do not carry that possibility,
and the United States would not seek the
death penalty even if Mr. Snowden were
charged with additional, death penalty-
eligible crimes.”
“Second, Mr. Snowden will not be tortured.”
http://cryptome.org/2013/07/usdoj-rumoj-snowden.pdf
_______________________________________
¤ Edward Snowden Nominated for Nobel
Peace Prize ::
Edward Snowden, the National Security
Agency whistleblower who revealed the
agency’s data collection program, has
been nominated for a Nobel Peace Prize.
“Edward Snowden has — in a heroic effort
at great personal cost — revealed the
existence and extent of the surveillance,
the US government devotes electronic
communications worldwide,” read the
nomination. “By putting light on this
monitoring program — conducted in
contravention of national laws and
international agreements — Edward Snowden
has helped to make the world a little
bit better and safer.” ...
“The decision to award the 2013 prize
to Edward Snowden would — in addition
to being well justified in itself —
also help to save the Nobel Peace Prize
from the disrepute that incurred by the
hasty and ill-conceived decision to
award [war criminal] Barack Obama the 2009
award,” Svallfors wrote to the committee.
http://washingtonexaminer.com/edward-snowden-nominated-for-nobel-peace-prize/article/2533071
_______________________________________
¤ Glenn Greenwald Interviewed Moskovsky
Komsomolets News ::
http://cryptome.org/2013/07/gg-snowden-leak-halt.htm
¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯
¤ Minute Details of How the NSA Installs
Their Surveillance Equipment ::
Pete Ashdown, the CEO of XMission, detailed
his experience when he received a Foreign
Intelligence Surveillance Act (FISA) warrant
in 2010 which forced him to allow the
federal government to monitor a customer
of his.
Of course, like all FISA orders, it also
contained a broad gag order, which still
prevents him from telling all the details.
“The FISA request was a tricky one, because
it was a warrant through the FISA court —
whether you believe that is legitimate or
not,” Ashdown wrote.
He had to help the agents “set up a
duplicate port to tap in to monitor that
customer’s traffic. It was a 2U (two-unit)
PC that we ran a mirrored ethernet port to.”
Ashdown eventually had a box in his
facility that was capturing all of the
traffic sent to his customer. He did not
remember if it was connected to the internet,
but wrote that it was likely capturing
all data to a hard drive for later analysis.
http://endthelie.com/2013/07/21/owner-of-small-utah-isp-describes-how-the-nsa-attempted-to-get-him-to-install-surveillance-equipment/
_______________________________________
¤ NSA Briefs a New Administration, 2004 ::
http://tinyurl.com/kqmpf4w
_______________________________________
¤ New Slides About NSA Collection Programs ::
http://electrospaces.blogspot.com/2013/07/new-slides-about-nsa-collection-programs.html
¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯
¤ NSA Admits They Snoop Targets’ Contacts’
Contacts’ Contacts (3 Hops) ::
As an aside during testimony on Capitol
Hill today, a National Security Agency
representative rather casually indicated
that the government looks at data from
a universe of far, far more people than
previously indicated.
Chris Inglis, the agency’s deputy director,
was one of several government representatives
—including from the FBI and the office of
the Director of National Intelligence—
testifying before the House Judiciary
Committee this morning. Most of the testimony
largely echoed previous testimony by the
agencies on the topic of the government’s
surveillance, including a retread of the
same offered examples for how the Patriot
Act and Foreign Intelligence Surveillance
Act had stopped terror events.
But Inglis’ statement was new. Analysts
look “two or three hops” from terror
suspects when evaluating terror activity,
Inglis revealed. Previously, the limit of
how surveillance was extended had been
described as two hops. This meant that
if the NSA were following a phone metadata
or web trail from a terror suspect, it
could also look at the calls from the
people that suspect has spoken with one
hop. And then, the calls that second person
had also spoken with two hops. Terror suspect
to person two to person three. Two hops.
And now: A third hop. ... ...
So all of your friends, that’s one hop.
Your friends’ friends, whether you know
them or not - two hops.
Your friends’ friends’ friends, whoever
they happen to be, are that third hop.
http://www.theatlanticwire.com/politics/2013/07/nsa-admits-it-analyzes-more-peoples-data-previously-revealed/67287/
¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯
¤ The Private Global Information Grid ::
It is a good thing that people are
becoming aware of the fact that they
are being monitored - it is not only
speculation anymore. We have seen PRISM,
FinSpy and ECHELON. These programs are
made to collect information and to store
them in a database. Now just imagine the
resources that PRISM used and how it
could combine these resources to multiple
databases. This is where GiG comes in.
http://cyberwarzone.com/government-spying-database-global-information-grid
_______________________________________
¤ Edward Snowden Application for Asylum ::
http://cryptome.org/2013/07/snowden-ru-asylum.htm
¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯
¤ NSA Leaks Nothing Compared to Further
Leaks Not-Yet-Released-to-Public ::
Fugitive NSA leaker Edward Snowden today
applied for asylum in Russia and, as a
condition, agreed to stop ‘harming’ the
US, according to a Russian lawyer who
is advising him, but that doesn’t
necessarily mean headline-grabbing
stories about the US government’s vast
foreign and domestic spying programs
will stop. ... ...
Putin has said that Snowden can stay
in Russia, but only if he stops “harming”
the United States by releasing more
intelligence secrets. ... ...
But while Snowden agreed to stop leaking
secrets, it could prove a technicality
since he has already said that he gave
all of his classified information --
thousands of documents -- to several
journalists. The most prominent of which,
The Guardian columnist Glenn Greenwald,
told ABC News Friday that he’s not even
half done with the stories he plans to
write based on the secret information.
http://abcnews.go.com/Blotter/edward-snowden-legal-apply-russian-asylum/story?id=19678502
¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯
¤ Mirror of Removed NSA Recruitment Drive ::
http://cypherpoet.com/nsa/
_______________________________________
¤ Snowden NSA Revelations Mirrored ::
http://cryptome.org/2013/07/cryptogram-13-0715.htm
¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯
¤ When You’re Online, You’re Hacked ::
In Russia, Prez Putin’s office just
stopped using PC’s and switched to
typewriters. What do they know that
we don’t?
http://steveblank.com/2013/07/15/your-computer-may-already-be-hacked-nsa-inside/
¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯
¤ MITRE Corporation Outlined Collection
Management for PRISM and Other Spying ::
Planning Tool for Resource Integration,
Synchronization, and Management aka PRISM
has existed since at least 2002. The
following document refers to it directly.
This demonstrates PRISM not only existed
in July 2002, but it had been undergoing
usage for some time, enough time to recognize
limitation of it and similar projects.
http://pastebin.com/h5a1c1Pd
http://www.mitre.org/work/tech_papers/tech_papers_02/kane_isrplatforms/isrinformationservices.pdf
_______________________________________
¤ Brasil é alvo da Maciça Operação de
Espionagem da NSA (TRANSLATED) ::
http://code.str0.be/view/raw/540c2ebf
¤ Brazil is the Most Monitored Country
in Latin America ::
http://cryptome.org/2013/07/nsa-tracking/nsa-tracking.htm
http://oglobo.globo.com/infograficos/volume-rastreamento-governo-americano/
http://www.washingtonpost.com/world/the_americas/paper-reveals-nsa-ops-in-latin-america/2013/07/09/eff0cc7e-e8e3-11e2-818e-aa29e855f3ab_print.html
_______________________________________
¤ US Dictatorship in Damage Control,
Hyper-paranoia Over Snowden’s Leaks ::
http://cryptome.org/2013/07/snowden-us-threat.htm
http://in.reuters.com/article/2013/07/13/usa-security-snowden-greenwald-idINDEE96C05520130713
¤ Future PRISM Leaks May Be Used As An
Excuse for Global Internet Censorship ::
http://in.reuters.com/article/2013/07/15/usa-security-cybertruce-idINDEE96E0DQ20130715
_______________________________________
¤ Intel in Bed with NSA ::
http://cryptome.org/2013/07/intel-bed-nsa.htm
_______________________________________
¤ News Media Censoring or Editing PRISM
Slides / Slides Differ ::
http://cryptome.org/2013/07/nsa-upstream-differ.htm
http://cryptome.org/2013/07/nsa-upstream-differ.jpg
http://www.washingtonpost.com/business/economy/the-nsa-slide-you-havent-seen/2013/07/10/32801426-e8e6-11e2-aa9f-c03a72e2d342_story.html
¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯
¤ NSA Policy on IP Encryptor ::
http://cryptome.org/2013/07/CNSSP-19.pdf
¤ NSA Policy on Information Assurance ::
http://cryptome.org/2013/07/CNSSP-11.pdf
_______________________________________
¤ PRISM Method of Storing and Transferring
Metadata ::
http://electrospaces.blogspot.com/2013/07/new-insights-into-prism-program.html
_______________________________________
¤ NSA Rejecting Every FOIA Request Made
by US Citizens ::
http://www.dailykos.com/story/2013/07/06/1221694/-NSA-Rejecting-Every-FOIA-Request-Made-by-U-S-Citizens
¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯
¤ National Security Agency DNS Tunnels ::
http://pastebin.com/TpGTHDSy
“This may look like a small release, but
it's actually huge. See, we hacked the
NSA yet again because we just love doing
that. These are DNS tunnels that are
sending encrypted data to and from the
PRISM databases. We have the IP's of
those servers. If you crash these servers
with DDoS, you literally render PRISM
"broken". We are also planning to release
some of that data (which we have access
to) if we can decrypt it.”
¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯
¤ BEFORE PRISM ; Presidents Surveillance
Program 2001 - 2006 ::
Contractors include Booze Allen Hamilton,
Snowden’s employer.
http://cryptome.org/2013/07/Presidents-Spy-Program-Sept14-2001.htm
¤ History Behind Fiber-optic Wiretapping ::
http://pastebin.com/VzqpaF8y
_______________________________________
¤ France Has Own PRISM Spy System ::
http://www.megapastebin.com.ar/DU5BPIIK
_______________________________________
¤ Edward Snowden’s WikiLeaks Statement ::
“One week ago I left Hong Kong after
it became clear that my freedom and
safety were under threat for revealing
the truth. My continued liberty has been
owed to the efforts of friends new and
old, family, and others who I have never
met and probably never will. I trusted
them with my life and they returned that
trust with a faith in me for which I will
always be thankful.
On Thursday, President Obama declared
before the world that he would not permit
any diplomatic “wheeling and dealing” over
my case. Yet now it is being reported that
after promising not to do so, the President
ordered his Vice President to pressure the
leaders of nations from which I have
requested protection to deny my asylum
petitions.
This kind of deception from a world leader
is not justice, and neither is the extralegal
penalty of exile. These are the old, bad
tools of political aggression. Their purpose
is to frighten, not me, but those who would
come after me.
For decades the United States of America
have been one of the strongest defenders
of the human right to seek asylum. Sadly,
this right, laid out and voted for by the
US in Article 14 of the Universal Declaration
of Human Rights, is now being rejected by
the current government of my country. The
Obama administration has now adopted the
strategy of using citizenship as a weapon.
Although I am convicted of nothing, it has
unilaterally revoked my passport, leaving
me a stateless person. Without any judicial
order, the administration now seeks to stop
me exercising a basic right. A right that
belongs to everybody. The right to seek
asylum.
In the end the Obama administration is
not afraid of whistleblowers like me,
Bradley Manning or Thomas Drake. We are
stateless, imprisoned, or powerless. No,
the Obama administration is afraid of you.
It is afraid of an informed, angry public
demanding the constitutional government
it was promised – and it should be.
I am unbowed in my convictions and
impressed at the efforts taken by so
many.”
http://www.telegraph.co.uk/news/worldnews/europe/russia/10154064/Edward-Snowdens-WikiLeaks-statement-in-full.html
¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯
¤ The Internet Counter-culture ::
http://media.risky.biz/RB284.mp3
¤ Surveillance Scandals and Thought Crimes ::
http://media.risky.biz/RB283.mp3
_______________________________________
¤ Cyber Command Suffers Second Defeat ::
http://cryptome.org/2013/07/uscybercom-dump.htm
¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯
¤ Washington Post Publishes More PRISM ::
http://www.washingtonpost.com/wp-srv/special/politics/prism-collection-documents/
http://www.guardian.co.uk/world/2013/jun/30/washington-post-new-slides-prism
http://cryptome.org/2013-info/06/wapo-13-0629/prism-wapo-13-0629.htm
_______________________________________
¤ US Army Blocked Access to The Guardian ::
http://www.infowars.com/u-s-army-now-censoring-the-guardian/
http://www.montereyherald.com/local/ci_23554739/restricted-web-access-guardian-is-army-wide-officials
http://endthelie.com/2013/06/28/u-s-army-restricting-access-to-the-guardian-across-all-of-their-networks-over-security-concerns/
_______________________________________
¤ Mirror of Deleted Article by Guardian ::
http://pastebin.com/NTJvUZdJ
Revealed: secret European deals to hand
over private data to America.
Germany among countries offering intelligence
according to new claims by former US defence
analyst.
At least six European Union countries in
addition to Britain have been colluding
with the US over the mass harvesting of
personal communications data, according
to a former contractor to America’s
National Security Agency, who said the
public should not be “kept in the dark.”
Wayne Madsen, a former US navy lieutenant
who first worked for the NSA in 1985
and over the next 12 years held several
sensitive positions within the agency,
names Denmark, the Netherlands, France,
Germany, Spain and Italy as having secret
deals with the US.
Madsen said the countries had “formal
second and third party status” under
signal intelligence (sigint) agreements
that compels them to hand over data,
including mobile phone and internet
information to the NSA if requested.
Under international intelligence agreements,
confirmed by declassified documents,
nations are categorised by the US according
to their trust level. The US is first party
while the UK, Canada, Australia and New
Zealand enjoy second party relationships.
Germany and France have third party
relationships.
In an interview published last night
on the PrivacySurgeon.org blog, Madsen,
who has been attacked for holding
controversial views on espionage issues,
said he had decided to speak out after
becoming concerned about the “half story”
told by EU politicians regarding the
extent of the NSA’s activities in Europe.
He said that under the agreements,
which were drawn up after the second
world war, the “NSA gets the lion’s
share” of the sigint “take.” In return,
the third parties to the NSA agreements
received “highly sanitised intelligence.”
Madsen said he was alarmed at the
“sanctimonious outcry” of political
leaders who were “feigning shock”
about the spying operations while staying
silent about their own arrangements
with the US, and was particularly
concerned that senior German politicians
had accused the UK of spying when their
country had a similar third-party deal
with the NSA.
Although the level of co-operation provided
by other European countries to the NSA is
not on the same scale as that provided by
the UK, the allegations are potentially
embarrassing.
“I can’t understand how Angela Merkel can
keep a straight face, demanding assurances
from [Barack] Obama and the UK while Germany
has entered into those exact relationships,”
Madsen said.
The Liberal Democrat MEP Baroness Ludford,
a senior member of the European parliament’s
civil liberties, justice and home affairs
committee, said Madsen’s allegations
confirmed that the entire system for
monitoring data interception was a mess,
because the EU was unable to intervene
in intelligence matters, which remained
the exclusive concern of national
governments.
“The intelligence agencies are exploiting
these contradictions and no one is really
holding them to account,” Ludford said.
“It’s terribly undermining to liberal
democracy.”
Madsen’s disclosures have prompted calls
for European governments to come clean
on their arrangements with the NSA.
“There needs to be transparency as to
whether or not it is legal for the US
or any other security service to
interrogate private material,” said
John Cooper QC, a leading international
human rights lawyer. “The problem here
is that none of these arrangements has
been debated in any democratic arena.
I agree with William Hague that sometimes
things have to be done in secret, but you
don’t break the law in secret.”
Madsen said all seven European countries
and the US have access to the Tat 14
fibre-optic cable network running between
Denmark and Germany, the Netherlands,
France, the UK and the US, allowing them
to intercept vast amounts of data,
including phone calls, emails and records
of users’ access to websites.
He said the public needed to be made
aware of the full scale of the communication
-sharing arrangements between European
countries and the US, which predate the
internet and became of strategic importance
during the cold war.
The covert relationship between the
countries was first outlined in a 2001
report by the European parliament, but
their explicit connection with the NSA
was not publicised until Madsen decided
to speak out.
The European parliament’s report followed
revelations that the NSA was conducting a
global intelligence-gathering operation,
known as Echelon, which appears to have
established the framework for European
member states to collaborate with the US.
“A lot of this information isn’t secret,
nor is it new,” Madsen said. “It’s just
that governments have chosen to keep the
public in the dark about it. The days
when they could get away with a conspiracy
of silence are over.”
This month another former NSA contractor,
Edward Snowden, revealed to the Guardian
previously undisclosed US programmes to
monitor telephone and internet traffic.
The NSA is alleged to have shared some of
its data, gathered using a specialist tool
called Prism, with Britain’s GCHQ.
¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯
¤ Wayne Madsen, Former Contractor for NSA,
Talks About Global SIGINT Interception ::
A former contractor to the US National
Security Agency (NSA) has told the
Privacy Surgeon that communications
intelligence arrangements between the
US and Europe are much more “complex,
murky and far reaching” than the public
has been led to believe. ...
He was particularly concerned about the
“sanctimonious outcry” of political leaders
who were “feigning shock” about recently
disclosed spying operations such as PRISM
while staying silent about their own role
in global interception arrangements with
the United States. ...
Madsen also expressed anger over the
NSA’s hypocrisy over Edward Snowden.
“Snowden is being roundly condemned by
many who say he had no authority or right
to provide the public with details of
NSA snooping. But what right or authority
did NSA director, General Keith Alexander,
have to provide information on NSA
surveillance at five meetings of the
global Bilderberg Conference – two in
Virginia and one meeting each in Greece,
Spain and Switzerland?”
“Alexander claims he is protecting the
American people from a constantly changing
number of terrorist attacks. In fact, he
is providing information to elites on
the methods NSA uses to spy on labor,
student, religious and progressive
organizations.”
“When Alexander leaks to the elites,
he’s thanked. When Snowden does it,
he’s called a traitor and a coward.”
http://www.privacysurgeon.org/blog/incision/former-nsa-contractor-warns-of-murky-interception-arrangements/
_______________________________________
¤ NSA Spying Pisses Off European Union ::
http://www.rawstory.com/rs/2013/06/30/new-nsa-leak-documents-show-how-the-us-is-bugging-its-european-allies/
http://www.cbsnews.com/8301-202_162-57591678/european-officials-lash-out-at-new-nsa-spying-report/
http://www.guardian.co.uk/world/2013/jun/30/nsa-spying-europe-claims-us-eu-trade
http://www.infowars.com/report-nsa-joint-wiretapping-operations-with-foreign-nations/
http://www.waynemadsenreport.com/articles/20130630
http://www.spiegel.de/international/world/secret-documents-nsa-targeted-germany-and-eu-buildings-a-908609.html
http://www.telegraph.co.uk/news/worldnews/northamerica/usa/10152478/Francois-Hollande-tells-the-US-to-stop-eavesdropping-on-Europe-if-it-wants-progress-on-trade-deal.html
¤ FLASHBACK ; Why We Spy on Our Allies ::
http://cryptome.org/echelon-cia2.htm
¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯
¤ NSA Stellar Wind Email Internet Data Collection ::
http://cryptome.org/2013/06/nsa-stellar-wind.pdf
_______________________________________
¤ Two NSA IG Reports Differ ::
http://cryptome.org/2013/06/nsa-reports-differ.htm
_______________________________________
¤ Congress Insisted They Be Kept in the Dark on NSA Spying ::
http://www.infowars.com/congress-insisted-they-be-kept-in-the-dark-on-nsa-spying/
_______________________________________
¤ DoJ Memo on NSA Data Collection on Americans 2007 ::
http://cryptome.org/2013/06/doj-nsa-memo.pdf
_______________________________________
¤ NSA FISA Surveillance Leaks ::
http://cryptome.org/2013/06/nsa-fisa-targeting.pdf
http://cryptome.org/2013/06/nsa-fisa-minimization.pdf
http://cryptome.org/2013/06/nsa-fisa-certification.pdf
¤ Mass Spying of All Telecommunication via FISA ::
http://cryptome.org/2014/01/nsa-prism-dk.pdf
http://www.washingtonpost.com/wp-srv/special/politics/prism-collection-documents/
http://apps.washingtonpost.com/g/page/national/inner-workings-of-a-top-secret-spy-program/282/
http://www.guardian.co.uk/world/2013/jun/20/fisa-court-nsa-without-warrant
http://techcrunch.com/2013/06/21/new-nsa-warrantless-tactics-reveal-little-room-for-presumption-of-innocence/
http://www.informationweek.com/global-cio/interviews/nsa-dragnet-debacle-what-it-means-to-it/240156243
http://www.independent.co.uk/news/world/americas/inside-the-nsa-peeling-back-the-curtain-on-americas-intelligence-agency-8658016.html
http://www.washingtonsblog.com/2013/06/nsa-whistleblower-nsa-spying-on-and-blackmailing-high-level-government-officials-and-military-officers.html
http://boilingfrogspost.com/wp-content/uploads/BF.0112.Tice_20130617.mp3
http://boilingfrogspost.com/wp-content/uploads/BF.0111.Young_20130613.mp3
http://www.bloomberg.com/news/2013-06-14/u-s-agencies-said-to-swap-data-with-thousands-of-firms.html
http://cryptome.org/2013/06/nsa-arch-spy.htm
http://www.usnews.com/news/newsgram/articles/2013/06/12/prism-class-action-lawsuit-filed-20b-injunction-sought-against-complicit-companies-and-officials
http://www.usnews.com/news/newsgram/articles/2013/06/11/nine-companies-tied-to-prism-obama-will-be-smacked-with-class-action-lawsuit-wednesday
http://www.washingtonpost.com/blogs/federal-eye/wp/2013/06/13/former-justice-prosecutor-seeks-23-billion-in-damages-for-nsa-surveillance-programs/
http://www.washingtonpost.com/blogs/post-politics/wp/2013/06/09/rand-paul-planning-class-action-lawsuit-against-surveillance-programs/
http://www.chicagotribune.com/news/chi-nsa-prism-scandal-20130609,0,432240.story
http://cryptome.org/2013/06/snowden-censored.htm
http://www.cbsnews.com/8301-250_162-57588385/nsa-seeks-criminal-probe-of-program-leaker/
http://theweek.com/article/index/245311/sources-nsa-sucks-in-data-from-50-companies
http://theweek.com/article/index/245360/solving-the-mystery-of-prism
http://www.nationaljournal.com/politics/welcome-to-the-bush-obama-white-house-they-re-spying-on-us-20130606
http://www.guardian.co.uk/world/2013/jun/06/us-tech-giants-nsa-data
http://www.washingtonpost.com/investigations/us-intelligence-mining-data-from-nine-us-internet-companies-in-broad-secret-program/2013/06/06/3a0c0da8-cebf-11e2-8845-d970ccb04497_print.html
http://cryptome.org/2013/06/obama-prism.pdf
http://cryptome.org/2013/06/tpm-palantir-prism.pdf
http://cryptome.org/2013/06/prism-spy-tools.htm
http://openchannel.nbcnews.com/_news/2013/06/07/18831985-officials-nsa-mistakenly-intercepted-emails-phone-calls-of-innocent-americans
http://rt.com/usa/nsa-payed-internet-companies-911/
http://www.infowars.com/leaked-document-reveals-government-paid-millions-to-prism-participants/
http://threatpost.com/fisc-no-phone-company-ever-challenged-metadata-collection-orders/102334
http://www.foreignpolicy.com/articles/2013/11/21/the_obscure_fbi_team_that_does_the_nsa_dirty_work
http://www.infowars.com/new-nsa-revelations-another-limited-hangout-whitewash/
http://electrospaces.blogspot.com/2013/12/nsas-global-interception-network.html
http://www.washingtonpost.com/world/national-security/nsa-tracking-cellphone-locations-worldwide-snowden-documents-show/2013/12/04/5492873a-5cf2-11e3-bc56-c6ca94801fac_print.html
http://www.theguardian.com/world/2013/dec/04/nsa-storing-cell-phone-records-daily-snowden
http://www.washingtonpost.com/opinions/meet-executive-order-12333-the-reagan-rule-that-lets-the-nsa-spy-on-americans/2014/07/18/93d2ac22-0b93-11e4-b8e5-d0de80767fc2_story.html
_______________________________________
¤ FLASHBACK ; Pentagon Wanted Searchable
Database of People’s Lives in 2003 ::
http://dailycaller.com/2013/07/01/pentagon-wanted-searchable-database-of-peoples-lives-in-2003/?print=1
_______________________________________
¤ FLASHBACK ; NSA Undersea Fiber Cable Tapping 1 & 2 ::
http://cryptome.org/nsa-fibertap.htm
http://cryptome.org/telecomm-weak.htm
¤ FLASHBACK ; NSA Undersea Fiber Optic Tapping ::
http://cryptome.org/nsa-seatap.htm
_______________________________________
¤ RELATED ; All Online Spy Guides 7zip ::
http://cryptome.org/isp-spy/online-spying.htm
http://cryptome.org/online-spying-11-1206.7z
{[▓▒▒▒▓██▓░░▓██▓░░▓██▓░░▓██▓░░▓██▓▒▒▒▓]}
{[▓▒▒▒▓██▓░░▓██▓░░▓██▓░░▓██▓░░▓██▓▒▒▒▓]}