- VIEW FULL @ http://slexy.org/view/s20fcIPvBI
- DOWNLOAD TXT-HTML @ http://upsto.re/RFkA4n
- �Defeat adversary cyber-security practices
- in order to acquire the SIGINT data we need
- from anyone, anytime, anywhere.�
- - NSA ; SIGINT Strategy 2012 - 2016
- � FISA Court Rules to Retain Spy Data Past 5 Years ::
- http://cryptome.org/2014/04/fisc-br14-01-14-0410.pdf
- _______________________________________
- � NSA, Google Inc. Relationship Emails ::
- http://cryptome.org/2014/05/nsa-google.pdf
- � NSA Scares CEOs Into Cyber Spying (Related) ::
- http://cryptome.org/2014/05/nsa-scares-ceos.pdf
- � Emails Reveal Close Google Relationship With NSA ::
- http://america.aljazeera.com/articles/2014/5/6/nsa-chief-google.html
- _______________________________________
- � GCHQ Director Visits NSA for PRISM Data Access ::
- Hosted Dinner: 30 April 2013//1830Hrs - Quarters
- Hosted Discussions: 1 May 2013//0800-0830
- �PURPOSE OF THE VISIT: (U//FOUO) As the Director
- of GCHQ, Sir Iain wants to reconnect with NSA
- Leadership on matters of mutual concern, and to
- ensure each partner is aware of the other�s
- activities and future plans.� � �
- �Unsupervised access to FAA 702 data, in a manner
- similar to Olympics Option, remains on GCHQ�s wish
- list and is something its leadership still desires.�
- http://cryptome.org/2014/04/nsa-gchq-lobban-visit.pdf
- � GCHQ Unsupervised PRISM Access in 2012 ::
- http://cryptome.org/2014/04/nsa-prism-olympics.pdf
- � NSA Spied �Suspected Terrorists� At 2012 Olympics ::
- http://cryptome.org/2014/04/nsa-ghostmachine-echobase.pdf
- � NSA & GCHQ Eyeballed �Suspected Terrorists� Before,
- During and After 2012 Olympics ::
- The Snowden files do not indicate whether NSA granted
- GCHQ�s request, but they do show that the NSA was
- �supportive� of the idea, and that GCHQ was permitted
- extensive access to PRISM during the London Olympics
- in 2012. The request for the broad access was
- communicated at �leadership� level, according to
- the documents. Neither agency would comment on the
- proposed arrangement or whether it was approved. � �
- The data sharing between the agencies during the
- Olympics, though, was not isolated to PRISM. � �
- The NSA was funneling troves of intercepted data
- to GCHQ from a system called GHOSTMACHINE, a massive
- cloud database used by the NSA to analyze metadata
- and store, according to one document in the Snowden
- archive, �100s of billions of entries.�
- https://firstlook.org/theintercept/article/2014/04/30/gchq-prism-nsa-fisa-unsupervised-access-snowden/
- _______________________________________
- � NSA/NIS Dagbladet Documents Decensored ::
- There are a couple images in the latest Dagbladet
- story from the Snowden trove that were originally
- blurred instead of blacked out. This allowed the
- text to be recovered. There was no particular point
- in making a project out of the first, since it had
- already been published previously. The second was
- completely decoded in a matter of a few hours.
- http://cryptome.org/2014/04/DagbladetDecensor.pdf
- � NSA/NIS Aquired Supercomputer to Break Crypto ::
- The Norwegian Inteligence Service (NIS) is also
- nauseous from the unmanageable amounts of data it
- is served daily. This is partly the reason why NSA
- now purchases a supercomputer codenamed Steelwinter.
- This information comes from a document Edward Snowden
- took from NSA and has later shared with Dagbladet.
- The document, marked �top secret� is a summary of
- how the NSA sees the collaboration with Norway after
- a meeting between the two services in March 2013.
- The supercomputer NIS buys is a derivation of the
- so-called Windsor Blue supercomputer.
- �NIS is in the process of acquiring STEEL WINTER
- (a WINDSORBLUE derivative supercomputer) and has
- entered into a partnership with NSA - cryptanalysis
- ( ...) service to develop applications of mutual
- benefit� the document says.
- �Windsor Blue� is the name of a program for
- supercomputers at the American IT-giant IBM. The
- company is working towards creating a so-called
- exascale supercomputer which means it can make a
- quintillion - 1,000,000,000,000,000,000 - calculations
- per second.
- http://www.dagbladet.no/2014/04/26/nyheter/snowden_i_norge/edward_snowden/nsa/etterretningstjenesten/32991102/
- _______________________________________
- � Germany Blocks Edward Snowden From Testifying ::
- http://www.theguardian.com/world/2014/may/01/germany-edward-snowden-nsa-inquiry
- _______________________________________
- � NSA Spies More on Americans Than Russians ::
- http://www.nationaljournal.com/tech/edward-snowden-nsa-spies-more-on-americans-than-russians-20140430
- _______________________________________
- � Snowden Asks Putin About Russian Spying ::
- http://www.youtube.com/watch?v=w1yH554emkY
- http://rt.com/news/snowden-putin-spy-online-140/
- http://www.zerohedge.com/news/2014-04-17/snowden-calls-putin-telethon-discuss-legality-mass-surveillance
- _______________________________________
- � NSA Spied on Human Rights Workers ::
- The US has spied on the staff of prominent
- human rights organisations, Edward Snowden has
- told the Council of Europe in Strasbourg, Europe�s
- top human rights body.
- Giving evidence via a videolink from Moscow,
- Snowden said the National Security Agency � for
- which he worked as a contractor � had deliberately
- snooped on bodies like Amnesty International and
- Human Rights Watch.
- http://www.theguardian.com/world/2014/apr/08/edwards-snowden-us-government-spied-human-rights-workers
- � Edward Snowden Testimony @ Parliamentary Assembly
- of the Council of Europe (Full) ::
- http://www.youtube.com/watch?v=3f8Lunf1a2w
- _______________________________________
- � EU High Court Allows Banning Metadata Collection ::
- Due to the particularities of EU lawmaking, the
- effects of the directive (spying) will still be in
- place in most EU member states for the time being.
- According to EU legal procedure, a directive is
- a type of law that requires each of the 28 member
- countries to �transpose� it into their own national
- laws. In this case, countries could even choose
- whether to expand the six-month requirement to as
- high as two years. ... ...
- Current EU data retention law will remain in
- effect until repealed legislatively or invalidated
- by domestic courts.
- http://arstechnica.com/tech-policy/2014/04/eu-high-court-strikes-down-metadata-collection-law/
- _______________________________________
- � Masterspy Orders Snub on Media Contacts ::
- http://www.infowars.com/intelligence-head-who-lied-to-congress-bans-employees-from-talking-to-media/
- _______________________________________
- � US Whines - �Anti-Snooping Plans are Unfair� ::
- �Recent proposals from countries within the
- European Union to create a Europe-only electronic
- network (dubbed a �Schengen cloud� by advocates) or
- to create national-only electronic networks could
- potentially lead to effective exclusion or discrimination
- against foreign service suppliers that are directly
- offering network services, or dependent on them,�
- the USTR said in its annual report.
- http://www.ustr.gov/sites/default/files/2014%20NTE%20Report%20on%20FTB.pdf
- http://inserbia.info/today/2014/04/us-blasts-eus-plan-for-schengen-cloud/
- http://rt.com/news/us-europe-nsa-snowden-549/
- ���������������������������������������
- � More Details on GCHQ Propaganda/Deception Tactics ::
- https://firstlook.org/theintercept/2014/04/04/cuban-twitter-scam-social-media-tool-disseminating-government-propaganda/
- This week, the Associated Press exposed a secret
- program run by the US Agency for International
- Development to create �a Twitter-like Cuban
- communications network� run through �secret shell
- companies� in order to create the false appearance
- of being a privately owned operation. Unbeknownst
- to the service�s Cuban users was the fact that
- �American contractors were gathering their private
- data in the hope that it might be used for political
- purposes��specifically, to manipulate those users
- in order to foment dissent in Cuba and subvert its
- government. According to top-secret documents
- published today by The Intercept, this sort of
- operation is frequently discussed at western
- intelligence agencies, which have plotted ways to
- covertly use social media for �propaganda,� �deception,�
- �mass messaging,� and �pushing stories.� ...
- � GCHQ Full Spectrum Cyber Effects ::
- �Destroy Deny Degrade Disrupt Deceive Protect�
- http://cryptome.org/2014/04/gchq-full-spectrum-cyber.pdf
- ... The annual SIGDEV conference, according to one
- NSA document published today by The Intercept, �enables
- unprecedented visibility of SIGINT Development activities
- from across the Extended Enterprise, Second Party and US
- Intelligence communities.� The 2009 Conference, held at
- Fort Meade, included �eighty-six representatives from
- the wider US Intelligence Community, covering agencies
- as diverse as CIA (a record 50 participants), the Air
- Force Research Laboratory and the National Air and
- Space Intelligence Center.�
- Defenders of surveillance agencies have often insinuated
- that such proposals are nothing more than pipe dreams
- and wishful thinking on the part of intelligence agents.
- But these documents are not merely proposals or hypothetical
- scenarios. As described by the NSA document published
- today, the purpose of SIGDEV presentations is �to
- synchronize discovery efforts, share breakthroughs,
- and swap knowledge on the art of analysis.�
- For instance: One of the programs described by the newly
- released GCHQ document is dubbed �Royal Concierge,� under
- which the British agency intercepts email confirmations
- of hotel reservations to enable it to subject hotel
- guests to electronic monitoring. It also contemplates
- how to �influence the hotel choice� of travelers and
- to determine whether they stay at �SIGINT friendly�
- hotels. The document asks: �Can we influence the hotel
- choice? Can we cancel their visit?� ...
- � NSA 5 Eyes 2009 SIGDEV Conference ::
- http://cryptome.org/2014/04/nsa-5-eyes-2009-sigdev.pdf
- ---------------------------------------
- � GCHQ Trolls, Spies and Deceives Online Users ::
- http://cryptome.org/2014/02/gchq-online-deception.pdf
- � GCHQ Disruption Operations ::
- http://cryptome.org/2014/02/gchq-disruption.pdf
- � GCHQ Spreads Propaganda to Discredit Critics ::
- The documents from the GCHQ (the British equivalent
- of the NSA), titled �The Art of Deception: Training
- for Online Covert Operations,� were given to the
- NSA and leaked by Snowden. They reveal that the
- GCHQ is involved, through a unit known as JTRIG
- (Joint Threat Research Intelligence Group), in
- �the monitoring of YouTube and Blogger, the
- targeting of Anonymous with the very same DDoS
- attacks they accuse �hacktivists� of using, the
- use of honey traps (luring people into compromising
- situations using sex) and destructive viruses.�
- The goals of the JTRIG program are �(1) to inject
- all sorts of false material onto the internet in
- order to destroy the reputation of its targets;
- and (2) to use social sciences and other techniques
- to manipulate online discourse and activism to
- generate outcomes it considers desirable.�
- https://firstlook.org/theintercept/2014/02/24/jtrig-manipulation/
- http://www.examiner.com/article/government-infiltrating-websites-to-deny-disrupt-degrade-deceive
- http://rt.com/news/five-eyes-online-manipulation-deception-564/
- ---------------------------------------
- � GCHQ Attacked Anonymous in 2012 ::
- http://cryptome.org/2014/02/gchq-anonymous.pdf
- http://msnbcmedia.msn.com/i/msnbc/sections/news/snowden_anonymous_nbc_document.pdf
- � GCHQ Cyber Attack Operations ::
- http://cryptome.org/2014/02/gchq-cyber-attack.pdf
- http://s3.documentcloud.org/documents/1015553/snowden-cyber-offensive1-nbc-document.pdf
- � GCHQ Full-Spectrum Cyber Effects ::
- http://cryptome.org/2014/02/gchq-cyber-effects.pdf
- � GCHQ Spies Attacked Anonymous IRC Chats ::
- http://www.nbcnews.com/news/investigations/war-anonymous-british-spies-attacked-hackers-snowden-docs-show-n21361
- http://www.zdnet.com/uk-used-denial-of-service-against-anonymous-7000025993/
- http://www.wired.co.uk/news/archive/2014-02/05/gchq-ddos-attack-anonymous
- � British Spies Used Porn and Dirty Tricks to
- Lure Targets to Honeypots ::
- http://www.nbcnews.com/news/investigations/snowden-docs-british-spies-used-sex-dirty-tricks-n23091
- ---------------------------------------
- � NSA & GCHQ Spies on Wikileaks, TPB Visitors ::
- https://firstlook.org/theintercept/article/2014/02/18/snowden-docs-reveal-covert-surveillance-and-pressure-tactics-aimed-at-wikileaks-and-its-supporters/
- http://wikileaks.org/NSA-and-GCHQ-spying-on-WikiLeaks.html
- https://www.eff.org/deeplinks/2014/02/surveillance-and-pressure-wikileaks-readers
- http://torrentcrazy.com/news/nsa-authorized-monitoring-of-pirate-bay-and-proxy-users
- � NSA-GCHQ Discovery SIGINT Targeting ::
- http://cryptome.org/2014/02/nsa-gchq-discovery.pdf
- � Youtube Targets by SQUEAKYDOLPHIN Presentation ::
- http://cryptome.org/2014/02/gchq-squeakydolphin-videos.htm
- � GCHQ Psychology SIGDEV ::
- http://cryptome.org/2014/02/gchq-psychology.pdf
- ---------------------------------------
- ? Reddit Censors All Stories Above ::
- http://www.infowars.com/reddit-censors-big-story-about-government-manipulation-and-disruption-of-the-internet/
- _______________________________________
- � ACLU Offers NSA Document Search ::
- https://www.aclu.org/nsa-documents-search
- � ACLU Offers Mirrored NSA Documents ::
- https://www.aclu.org/nsa-documents-released-public-june-2013
- _______________________________________
- � KILLCEN ; Eyeballing_Snowden_Info.zip ::
- Includes all news reports, videos, images, slides
- and documents from and related to Snowden�s leaks
- so far, up to April 2nd of 2014. I�m still collecting
- any information that comes out and will provide an
- updated archive from time to time.
- After decompression - the main folder is titled
- �Eyeballing_Snowden_Info� and it holds a total of
- 927MB decompressed.
- This was stored on an old OFFLINE system, without
- any WiFi card or modem attached so the archive is
- safe from being modified, exploited or stolen.
- Eyeballing_Snowden_Info.zip
- (1,325 files | ZIP | 743MB)
- http://fileb.ag/1ixi6dqmbj80
- http://fpsbay.com/download/64465X13965734822241X344921/Eyeballing_Snowden_Info.zip
- http://davvas.com/l21m47ls819e
- http://jumbofiles.org/newfile?n=528498&Eyeballing_Snowden_Info.zip
- _______________________________________
- � It�s Finally Admitted! ::
- https://www.documentcloud.org/documents/1100298-unclassified-702-response.html
- http://www.emptywheel.net/2014/04/01/james-clapper-confirms-vadm-mike-rogers-needlessly-obfuscated-in-confirmation-hearing/
- http://www.theguardian.com/world/2014/apr/01/nsa-surveillance-loophole-americans-data
- http://www.zdnet.com/nsa-searched-u-s-calls-emails-without-warrant-u-s-intelligence-chief-admits-7000027938/
- http://rt.com/usa/clapper-wyden-nsa-fisa-665/
- _______________________________________
- � NSA Spy Chiefs of State ::
- http://cryptome.org/2014/03/nsa-spy-cos.pdf
- � NSA Spy Chiefs of State (Full List) ::
- http://cryptome.org/2014/03/nsa-nymrod-spy-cos.pdf
- � GCHQ and NSA Targeted Private German Companies ::
- http://www.spiegel.de/international/germany/gchq-and-nsa-targeted-private-german-companies-a-961444.html
- https://firstlook.org/theintercept/article/2014/03/29/der-spiegel-nsa-ghcq-hacked-german-companies-put-merkel-list-122-targeted-leaders/
- https://www.wsws.org/en/articles/2014/03/31/nsas-m31.html
- http://leaksource.info/2014/03/31/122-country-leaders-in-nsas-target-knowledge-database-2009-document/
- ? UPDATE ; European Parliament Suspends US
- Trade Talks Due to Political Spying ::
- http://falkvinge.net/2014/03/12/europarl-suspends-u-s-trade-talks-data-sharing-over-mass-surveillance/
- _______________________________________
- � Video Demonstration of Two Intelligence Analysis Tools ::
- http://electrospaces.blogspot.se/2014/03/video-demonstration-of-two-intelligence.html
- � Telephone Call Data Record Link Analysis Software ::
- http://www.youtube.com/watch?v=J38tKqq9kpY
- � IBM i2 Analysts Notebook - Esri Edition ::
- http://www.youtube.com/watch?v=MJ5CovDQDYU
- � Report and Both Videos ZIPPED & Mirrored ::
- http://fpsbay.com/download/64445X13961058822231X344721/Two%20Intelligence%20Analysis%20Tools.zip
- _______________________________________
- � NSA�s New Civil Liberties and Privacy Officer ::
- Becky Richards promises more transparency. She
- also promises the NSA will �build privacy into
- new technologies� to �protect privacy and civil
- liberties� and �to be as transparent with the
- public as possible� as well helping the public
- �understand how we�re protecting their privacy,
- how we�re protecting national security.�
- http://cryptome.org/2014/03/nsa-richards-14-0320.htm
- ���������������������������������������
- � NSA Huawei SHOTGIANT Hardware Exploit ::
- http://cryptome.org/2014/03/nsa-huawei.pdf
- http://cryptome.org/2014/03/nsa-huawei-02.pdf
- � Huawei Global Cyber Security Assurance ::
- http://cryptome.org/2014/03/huawei-cyber-security.pdf
- � Huawei Network Migration Tool (48.7MB) ::
- http://cryptome.org/2014/03/huawei-network-migration.zip
- � NSA Breached Chinese Telecom Giant Huawei ::
- The American government conducted a major intelligence
- offensive against China, with targets including the
- Chinese government and networking company Huawei,
- according to documents from former NSA worker Edward
- Snowden that have been viewed by SPIEGEL and the
- New York Times. Among the American intelligence
- service�s targets were former Chinese President
- Hu Jintao, the Chinese Trade Ministry, banks, as
- well as telecommunications companies.
- But the NSA made a special effort to target Huawei.
- With 150,000 employees and �28 billion ($38.6 billion)
- in annual revenues, the company is the world�s second
- largest network equipment supplier. At the beginning
- of 2009, the NSA began an extensive operation, referred
- to internally as �Shotgiant,� against the company, which
- is considered a major competitor to US-based Cisco. The
- company produces smartphones and tablets, but also mobile
- phone infrastructure, WLAN routers and fiber optic cable
- -- the kind of technology that is decisive in the NSA�s
- battle for data supremacy.
- A special unit with the US intelligence agency succeeded
- in infiltrating Huwaei�s network and copied a list of
- 1,400 customers as well as internal documents providing
- training to engineers on the use of Huwaei products,
- among other things.
- http://www.nytimes.com/2014/03/23/world/asia/nsa-breached-chinese-servers-seen-as-spy-peril.html
- http://www.spiegel.de/international/world/nsa-spied-on-chinese-government-and-networking-firm-huawei-a-960199.html
- http://news.yahoo.com/nsa-infiltrates-servers-china-telecom-giant-huawei-report-022030765--finance.html
- http://www.forbes.com/sites/rosatrieu/2014/03/24/chinas-huawei-condemns-nsa-spying-calls-for-unity-against-cyber-mischief/
- � Hong Lei Responds to Huawei NSA Backdoors ::
- �We are seriously concerned with relevant reports. The
- media has disclosed a lot about the eavesdropping,
- surveillance and spying activities that the US has
- carried out on other countries, including China. China
- has lodged representations with the American side on
- many occasions. We require the American side to give a
- clear explanation and stop such behaviours.�
- http://www.fmprc.gov.cn/eng/xwfw/s2510/t1140281.shtml
- _______________________________________
- � NSA Mapping and Spying System Administrators ::
- The document consists of several posts � one of
- them is titled �I hunt sys admins� � that were
- published in 2012 on an internal discussion board
- hosted on the agency�s classified servers. They
- were written by an NSA official involved in the
- agency�s effort to break into foreign network
- routers, the devices that connect computer
- networks and transport data across the Internet.
- By infiltrating the computers of system administrators
- who work for foreign phone and Internet companies,
- the NSA can gain access to the calls and emails
- that flow over their networks.
- The classified posts reveal how the NSA official
- aspired to create a database that would function
- as an international hit list of sys admins to
- potentially target. Yet the document makes clear
- that the admins are not suspected of any criminal
- activity � they are targeted only because they
- control access to networks the agency wants to
- infiltrate. �Who better to target than the person
- that already has the �keys to the kingdom�?� one
- of the posts says.
- The NSA wants more than just passwords. The document
- includes a list of other data that can be harvested
- from computers belonging to sys admins, including
- network maps, customer lists, business correspondence
- and, the author jokes, �pictures of cats in funny
- poses with amusing captions.�
- http://cryptome.org/2014/03/nsa-hunt-sysadmins.pdf
- https://firstlook.org/theintercept/document/2014/03/20/hunt-sys-admins/
- https://firstlook.org/theintercept/article/2014/03/20/inside-nsa-secret-efforts-hunt-hack-system-administrators/
- _______________________________________
- � NSA Culture, 1980s to the 21st Century ::
- http://cryptome.org/2014/03/nsa-sid-culture.pdf
- _______________________________________
- � CSEC SNOWGLOBE Slides ::
- http://cryptome.org/2014/03/cse-snowglobe.pdf
- http://s3.documentcloud.org/documents/1094526/babarfull.pdf
- � Default Le Monde Report ::
- http://www.lemonde.fr/international/article/2014/03/21/quand-les-canadiens-partent-en-chasse-de-babar_4387233_3210.html
- � Le Monde Report Translated to English ::
- http://slexy.org/view/s20ThA9Vog
- _______________________________________
- � DNI National Security / Secrecy Panic ::
- http://cryptome.org/2014/03/litt-14-0318.pdf
- _______________________________________
- � TED ; Ask Snowden ::
- http://www.youtube.com/watch?v=yVwAodrjZMY
- http://iroots.org/2014/03/18/transcript-edward-snowden-today-at-ted-talk/
- _______________________________________
- � SXSW ; Ask Snowden ::
- http://www.youtube.com/watch?v=nRQTDNbYjqY
- http://cryptome.org/2014/03/snowden-sxsw.htm
- http://blog.inside.com/blog/2014/3/10/edward-snowden-sxsw-full-transcription-and-video
- _______________________________________
- � NSA ; Ask Zelda ::
- http://cryptome.org/2014/03/nsa-ask-zelda.pdf
- https://firstlook.org/theintercept/article/2014/03/07/nsa-advice-columnist-seriously/
- _______________________________________
- � NSA MYSTIC Telephone Interception Program ::
- http://s3.documentcloud.org/documents/1086618/mysticssoweeklybrief.pdf
- http://s3.documentcloud.org/documents/1086616/fromsso-key-brief-overview.pdf
- http://s3.documentcloud.org/documents/1088934/mystic-tearsheet-cropped-v2.pdf
- The National Security Agency has built a surveillance
- system capable of recording �100 percent� of a foreign
- country�s telephone calls, enabling the agency to rewind
- and review conversations as long as a month after they
- take place, according to people with direct knowledge of
- the effort and documents supplied by former contractor
- Edward Snowden.
- A senior manager for the program compares it to a time
- machine � one that can replay the voices from any call
- without requiring that a person be identified in advance
- for surveillance.
- The voice interception program, called MYSTIC, began in
- 2009. Its RETRO tool, short for �retrospective retrieval,�
- and related projects reached full capacity against the
- first target nation in 2011. Planning documents two years
- later anticipated similar operations elsewhere.
- In the initial deployment, collection systems are recording
- �every single� conversation nationwide, storing billions of
- them in a 30-day rolling buffer that clears the oldest
- calls as new ones arrive, according to a classified summary.
- The call buffer opens a door �into the past,� the summary
- says, enabling users to �retrieve audio of interest that
- was not tasked at the time of the original call.� Analysts
- listen to only a fraction of 1 percent of the calls, but
- the absolute numbers are high. Each month, they send
- millions of voice clippings, or �cuts,� for processing
- and long-term storage.
- http://www.washingtonpost.com/world/national-security/nsa-surveillance-program-reaches-into-the-past-to-retrieve-replay-phone-calls/2014/03/18/226d2646-ade9-11e3-a49e-76adc9210f19_story.html
- � Washington Post Censors MYSTIC Slides ::
- The Washington Post is reporting, based on the
- files of whistleblower Edward Snowden, that the NSA
- is able to store every phone call made in an entire
- nation and replay them for up to 30 days. Not only
- can the agency do this, but there is a country where
- it�s actually doing this now�the Post knows where,
- but they won�t say.
- http://www.fair.org/blog/2014/03/19/the-nsa-built-a-time-machine-but-washington-post-wont-say-where/
- _______________________________________
- � NSA Third Party (Five Eye) Relationships ::
- http://cryptome.org/2014/03/nsa-third-parties.pdf
- _______________________________________
- � Comsec as Essential Public Utility ::
- http://cryptome.org/2014/03/comsec-public-utility.htm
- � Update ; Comsec as Essential Failure ::
- http://cryptome.org/2014/03/comsec-ewafmss.htm
- _______________________________________
- � NSA/FISA Spying Timeline ::
- 1978 FISA ; 1981 EO 12333, 1982 DoD Reg 5240.1-R,
- 1993 USSID SP0018 ; 2001 USA Patriot Act, 2002 FISC
- �Raw Take� Share Motion ; 2003 SP002 ; 2004 PR/TT FISA ;
- 2004 NSA/CSS Policy 1-23 ; 2006 BR FISA ; 2006 RAS Memo ;
- 2007 PAA (expired) ; 2008 FAA ; 2008 SP002 (Revised) ;
- 2008 EO 12333 (Revised) ; 2008 RAS Memo (Revised) ;
- 2009 NSA/CSS Policy 1-23 (Revised).
- http://cryptome.org/2014/03/nsa-spy-timeline.pdf
- ? FISA Surveillance Leaks ::
- http://cryptome.org/2013/06/nsa-fisa-targeting.pdf
- http://cryptome.org/2013/06/nsa-fisa-minimization.pdf
- http://cryptome.org/2013/06/nsa-fisa-certification.pdf
- ? Executive Order 12333 (Default 1981) ::
- http://www.archives.gov/federal-register/codification/executive-order/12333.html
- ? DoD Regulation 5240.1-R (1982) ::
- Guidance to DoD components in implementing EO 12333
- and general rules pursuant to FISA.
- http://cryptome.org/dod5240-1-r.htm
- ? USSID SP0018 (2003) ::
- http://www.dni.gov/files/documents/1118/CLEANEDFinal%20USSID%20SP0018.pdf
- ? FISA ; Pen Register and Trap and Trace (PR/TT) ::
- Opinion of the FISC granting the government application
- seeking the collection of bulk electronic communications
- metadata pursuant to Section 402 of FISA, the Pen Register
- and Trap and Trace (PR/TT) provision.
- http://cryptome.org/2013/11/nsa-13-1118/CLEANEDPRTT%201.pdf
- ? Bulk Collection Programs Under PATRIOT ACT ::
- http://cryptome.org/2013/07/obama-releases-13-0731.pdf
- ? NSA/CSS Policy 1-23 (Default 2004) ::
- http://cryptome.org/nsa-css-1-23.pdf
- ? Executive Order 12333 (Revised 2008) ::
- http://cryptome.org/eo12333-amend.htm
- NSA�s FOIA Release � http://cryptome.org/nsa-eo12333.pdf
- ? NSA ; FISA/PAA/FAA Classification Guide ::
- http://cryptome.org/2014/03/nsa-fisa-faa-class.pdf
- ? NSA Attorney General Dissemination Procedures ::
- http://cryptome.org/2014/03/nsa-ag-dissemination.pdf
- _______________________________________
- � NSA/CSS Classification/Damage Control ::
- http://cryptome.org/2014/03/nsa-policy-1-52.pdf
- _______________________________________
- � NSA/FBI Cryptanalysts Database Sharing ::
- http://cryptome.org/2014/03/nsa-crypt-fisa-share.pdf
- ? FBI�s Data Intercept Technology Unit (DITU) ::
- http://www.foreignpolicy.com/articles/2013/11/21/the_obscure_fbi_team_that_does_the_nsa_dirty_work
- ? FISA Court Releases FBI Spy Documents ::
- http://cryptome.org/2013/09/fisc-13-0917-4.pdf
- _______________________________________
- � STELLARWIND Classification Guide ::
- http://cryptome.org/2014/03/nsa-stellarwind-class.pdf
- ? NSA ; STELLARWIND Program ::
- http://cryptome.org/2013/06/nsa-stellar-wind.pdf
- _______________________________________
- � FISC Orders to Preserve NSA Metadata Spying ::
- http://cryptome.org/2014/03/fisc-br14-01-order-14-0312.pdf
- http://cryptome.org/2014/03/fisc-br14-01-tro-14-0311.pdf
- _______________________________________
- � How the NSA Plans to Infect Millions of Computers
- With Malware ::
- Top-secret documents reveal that the National
- Security Agency is dramatically expanding its
- ability to covertly hack into computers on a mass
- scale by using automated systems that reduce the
- level of human oversight in the process.
- The classified files � provided previously by NSA
- whistleblower Edward Snowden � contain new details
- about groundbreaking surveillance technology the
- agency has developed to infect potentially millions
- of computers worldwide with malware �implants.� The
- clandestine initiative enables the NSA to break into
- targeted computers and to siphon out data from foreign
- Internet and phone networks.
- https://prod01-cdn02.cdn.firstlook.org/wp-uploads/2014/03/nsa_malware_feature.jpg
- https://prod01-cdn01.cdn.firstlook.org/wp-uploads/2014/03/turbine-large.jpg
- https://prod01-cdn01.cdn.firstlook.org/wp-uploads/2014/03/tao-2-1024x768.png
- https://s3.amazonaws.com/s3.documentcloud.org/documents/1076889/nsa-technology-directorate-analysis-of-converged.pdf
- https://s3.amazonaws.com/s3.documentcloud.org/documents/1077724/industry-scale-exploitation.pdf
- https://s3.amazonaws.com/s3.documentcloud.org/documents/1077721/thousands-of-implants.pdf
- https://s3.amazonaws.com/s3.documentcloud.org/documents/1076859/nsa-phishing-tactics-and-man-in-the-middle-attacks.pdf
- https://s3.amazonaws.com/s3.documentcloud.org/documents/1076891/there-is-more-than-one-way-to-quantum.pdf
- https://s3.amazonaws.com/s3.documentcloud.org/documents/1076862/quantum-insert-diagrams.pdf
- The covert infrastructure that supports the hacking
- efforts operates from the agency�s headquarters in
- Fort Meade, Maryland, and from eavesdropping bases
- in the United Kingdom and Japan. GCHQ, the British
- intelligence agency, appears to have played an integral
- role in helping to develop the implants tactic.
- The implants being deployed were once reserved for
- a few hundred hard-to-reach targets, whose communications
- could not be monitored through traditional wiretaps. But
- the documents analyzed by The Intercept show how the NSA
- has aggressively accelerated its hacking initiatives in
- the past decade by computerizing some processes previously
- handled by humans. The automated system � codenamed TURBINE
- � is designed to �allow the current implant network to
- scale to large size (millions of implants) by creating
- a system that does automated control implants by groups
- instead of individually.�
- https://firstlook.org/theintercept/article/2014/03/12/nsa-plans-infect-millions-computers-malware/
- � �Thousands of Implants� ::
- �Building the operations floor and increasing the number
- of break-out rooms will enable us to grow from the current
- average of these operations per clay to over per day and will
- facilitate the integration of 55 computer network operations
- and real--time customer support. Sustained collection involving
- automated implants pushing collected data from targets to the
- RDC as well as voice and geolocation collection are managed from
- the Operations Teaming Areas. The increased capacity in this
- area will support a growth from managing an average of I 543
- active implants today to simultaneously managing thousands of
- implanted targets. The increased personnel capacity will support
- this net growth in operations tempo and will allow the integration
- of TAD's Requirements Targeting Division alongside the operators
- in order to better target development and efficiently plan and
- execute endpoint operations.�
- http://cryptome.org/2014/03/nsa-thousands-implants.pdf
- According to one top-secret document from 2012, the agency
- can deploy malware by sending out spam emails that trick targets
- into clicking a malicious link. Once activated, a �back-door
- implant� infects their computers within eight seconds.
- There�s only one problem with this tactic, codenamed WILLOWVIXEN:
- According to the documents, the spam method has become less
- successful in recent years, as Internet users have become wary
- of unsolicited emails and less likely to click on anything that
- looks suspicious.
- Consequently, the NSA has turned to new and more advanced
- hacking techniques. These include performing so-called
- �man-in-the-middle� and �man-on-the-side� attacks, which
- covertly force a user�s internet browser to route to NSA
- computer servers that try to infect them with an implant.
- To perform a man-on-the-side attack, the NSA observes a
- target�s Internet traffic using its global network of covert
- �accesses� to data as it flows over fiber optic cables or
- satellites. When the target visits a website that the NSA
- is able to exploit, the agency�s surveillance sensors alert
- the TURBINE system, which then �shoots� data packets at the
- targeted computer�s IP address within a fraction of a second.
- In one man-on-the-side technique, codenamed QUANTUMHAND,
- the agency disguises itself as a fake Facebook server. When
- a target attempts to log in to the social media site, the
- NSA transmits malicious data packets that trick the target�s
- computer into thinking they are being sent from the real
- Facebook. By concealing its malware within what looks like
- an ordinary Facebook page, the NSA is able to hack into the
- targeted computer and covertly siphon out data from its
- hard drive. A top-secret animation demonstrates the tactic
- in action.
- � How the NSA Secretly Masqueraded as Facebook to Hack
- Computers for Surveillance ::
- https://player.vimeo.com/video/88822483
- and @ https://www.youtube.com/watch?v=Td8nZscYvT4
- Mirrored � http://megaswf.com/f/2647410
- According to Matt Blaze, a surveillance and cryptography
- expert at the University of Pennsylvania, it appears that
- the QUANTUMHAND technique is aimed at targeting specific
- individuals. But he expresses concerns about how it has
- been covertly integrated within Internet networks as part
- of the NSA�s automated TURBINE system.
- � NSA TURBINE Automated Hacking Documents (Mirrored) ::
- http://cryptome.org/2014/03/nsa-turbine-turmoil.pdf
- http://cryptome.org/2014/03/nsa-industry-exploit.pdf
- http://cryptome.org/2014/03/nsa-converged.pdf
- http://cryptome.org/2014/03/nsa-quantum-insert.pdf
- http://cryptome.org/2014/03/nsa-thousands-implants.pdf
- http://cryptome.org/2014/03/nsa-gchq-quantumtheory.pdf
- http://cryptome.org/2014/03/nsa-more-than-one-way.pdf
- http://cryptome.org/2014/03/nsa-hammerchant.pdf
- http://cryptome.org/2014/03/nsa-phishing-mtm.pdf
- http://cryptome.org/2014/03/tao-quantuminsert-bonanza.htm
- � Compare TURBINE Slides (Spiegel vs Intercept) ::
- http://cryptome.org/2014/03/nsa-spot-differences.pdf
- � NSA Denies Thousands of Implants ::
- http://cryptome.org/2014/03/nsa-14-0313.pdf
- _______________________________________
- � NSA Hacking Routers & Social Media (Misc) ::
- http://cryptome.org/2014/03/nsa-5-eyes-hacking.pdf
- http://cryptome.org/2014/03/nsa-menwith-xkeyscore.pdf
- http://cryptome.org/2014/03/nsa-selector.pdf
- _______________________________________
- � Cryptome Eyeballs Deputy Director Richard Ledgett ::
- http://cryptome.org/2014-info/richard-ledgett/richard-ledgett.htm
- _______________________________________
- � NSA Assistance to Dutch Somali Piracy Control ::
- Alliances between security services are usually
- kept secret. But thousands of NSA documents are
- now in the hands of a select group of journalists,
- thanks to former NSA worker Edward Snowden. They
- show that the NSA is the central organisation in
- an international exchange of tapped telephone and
- internet traffic.
- The Netherlands is also a part of this. In September,
- the German weekly Der Spiegel published an NSA document
- about the Netherlands. The graph, entitled �Netherlands
- � 30 days�, appeared to show that the NSA had listened
- in to 1.8 million Dutch telephone calls.
- But last month, the cabinet showed that the reality
- was different. The 1.8 million telephone calls, wrote
- home affairs minister Ronald Plasterk and defence
- minister Jeanine Hennis, were not intercepted by
- the Americans, but by the Dutch and then shared with
- the NSA. It was not American, but Dutch espionage.
- Two new documents give further details. The Netherlands,
- it transpires, intercepts vast amounts of Somali
- telephone traffic and shares it with the NSA. The
- Dutch use the information to combat piracy. But the
- Americans may possibly use the information for
- something else as well: taking out terrorism suspects
- by attacking them with armed drones.
- http://cryptome.org/2014/03/nsa-dutch-assist.pdf
- http://www.nrc.nl/nieuws/2014/03/05/the-secret-role-of-the-dutch-in-the-american-war-on-terror/
- _______________________________________
- � NSA Blames Tech Firms, Vice Versa ::
- http://cryptome.org/2014/03/tech-stop-spying.htm
- http://cryptome.org/2014/03/big-data-spying.htm
- ---------------------------------------
- � Tech Firms Spy ::
- http://cryptome.org/isp-spy/online-spying.htm
- � NSA Spies Too ::
- https://www.aclu.org/nsa-documents-released-public-june-2013
- _______________________________________
- � GCHQ �OPTIC NERVE� Spy Programme ::
- http://cryptome.org/2014/02/gchq-optic-nerve.pdf
- � GCHQ Collects Webcam Photos of Yahoo Users ::
- The documents show that images were collected
- from webcams at regular intervals, one image
- every five minutes, and were used by the spy
- agency to trial automated facial recognition
- programs.
- http://www.theguardian.com/world/2014/feb/27/gchq-nsa-webcam-images-internet-yahoo
- http://www.infowars.com/you-read-it-here-first-government-spies-on-innocent-people-via-webcams-laptops-xbox/
- http://news.softpedia.com/news/GCHQ-Collected-Webcam-Images-of-Millions-of-Yahoo-Fans-429705.shtml
- https://www.wsws.org/en/articles/2014/02/28/gchq-f28.html
- � FLASHBACK ; Infowars Warned Users in 2006 ::
- http://www.infowars.com/articles/bb/gov_industry_use_computer_mics_spy_on_americans.htm
- _______________________________________
- � NSA Director Alexander�s Phones ::
- http://electrospaces.blogspot.com/2014/02/nsa-director-alexanders-phones.html
- _______________________________________
- � NSA Seeks to Expand Database, 26 Feb 2014 ::
- http://www.breitbart.com/InstaBlog/2014/02/27/NSA-Seeks-to-Expand-Database
- http://www.uscourts.gov/uscourts/courts/fisc/br14-01-motion-140226.pdf
- _______________________________________
- � NSA Bugged Top German Officials After Orders
- Not to Spy On Chancellor Claims New Whistleblower ::
- http://www.mintpressnews.com/snowden-2-0-new-active-duty-nsa-whistleblower/180502/
- http://techcrunch.com/2014/02/24/report-nsa-bugged-top-german-officials-after-obama-ordered-cease-of-spying-on-chancellor/
- _______________________________________
- � NSA Observer ::
- https://nsa-observer.laquadrature.net/
- _______________________________________
- � Spy Documents Released Since June 2013 ::
- https://www.aclu.org/nsa-documents-released-public-june-2013
- http://cryptome.org/2014/02/snowden-tabulations.htm
- _______________________________________
- � NSA Spying Zero Hedge Connections ::
- http://www.zerohedge.com/sites/default/files/images/user5/imageroot/2014/02/ZH%20browsing%20govt_1.jpg
- http://www.zerohedge.com/news/2014-02-19/while-browsing-zero-hedge-certain-government-agency
- _______________________________________
- � NYT Samantha Storey Inept Redactions ::
- Inlcudes two GCHQ documents.
- 01 �MOBILE THEME BRIEFING MAY 28 2010�
- 02 �Converged Analysis of Smartphone Devices�
- http://cryptome.org/2014/02/nyt-leak.zip
- _______________________________________
- � NSA�s Secret Role in the US Assassination Program ::
- An anonymous former drone operator for Joint
- Special Operations Command (JSOC) told The
- Intercept � a new publication helmed by
- Glenn Greenwald, who broke the first of many
- NSA revelations last year � that the US military
- and CIA use the NSA�s metadata analysis and
- phone-tracking abilities to identify airstrike
- targets without confirming their veracity on
- the ground.
- https://firstlook.org/theintercept/article/2014/02/10/the-nsas-secret-role/
- https://www.activistpost.com/2013/10/add-death-by-drone-to-nsas-list-of.html
- http://www.infowars.com/new-whistleblower-reveals-nsa-picking-drone-targets-based-on-bad-data-death-by-unreliable-metadata/
- _______________________________________
- � ASD Helps NSA Spy on Law Firms, Laywers ::
- A top-secret document, obtained by the
- former NSA contractor Edward J. Snowden,
- shows that an American law firm was
- monitored while representing a foreign
- government in trade disputes with the
- United States. The disclosure offers a
- rare glimpse of a specific instance in
- which Americans were ensnared by the
- eavesdroppers, and is of particular
- interest because lawyers in the United
- States with clients overseas have
- expressed growing concern that their
- confidential communications could be
- compromised by such surveillance.
- http://www.nytimes.com/2014/02/16/us/eavesdropping-ensnared-american-law-firm.html
- http://www.activistpost.com/2014/02/new-snowden-docs-implicate-nsa-in.html
- http://thehill.com/blogs/global-affairs/asia-pacific/198506-report-spies-watched-us-lawyers-in-trade-deal
- NOBODY comments
- NY Times has not provided any documentation.
- There should be an FOIA request to the IC
- and perhaps to the DNI for this document to
- be declassified for research in public domain.
- _______________________________________
- � NSA FISA Business Spying ::
- http://cryptome.org/2014/02/nsa-fisa-business.pdf
- � NSA Course on FISA Spying Operations ::
- http://cryptome.org/2014/02/nsa-fisa-course.pdf
- _______________________________________
- � Snowden Allegedly Used Web Scraper Tool ::
- http://www.nytimes.com/2014/02/09/us/snowden-used-low-cost-tool-to-best-nsa.html?hp&_r=1
- _______________________________________
- � Ex-chancellor Gerhard Schr�der Allegedly
- Spied by NSA (No Documentation Presented) ::
- Munich daily Sueddeutsche Zeitung and
- public broadcaster NDR reported Tuesday
- that Merkel�s predecessor Gerhard Schroeder
- was added to the NSA�s National Sigint
- Requirement List as number 388 in 2002.
- http://www.dw.de/reports-nsa-first-targeted-german-chancellor-schr%C3%B6der-then-merkel/a-17408683
- http://www.theguardian.com/world/2014/feb/04/us-nsa-gerhard-schroeder-surveillance?view=mobile
- http://www.faz.net/aktuell/politik/ausland/ausspaeh-affaere-die-spionage-botschaft-12635377.html
- � New Interpretations of NSA Monitoring
- the German Chancellor ::
- http://electrospaces.blogspot.de/2014/02/new-interpretations-of-nsa-monitoring.html
- _______________________________________
- � Dutch Intelligence Claims Responsibility for
- Phone Call Spying ::
- http://www.dutchnews.nl/news/archives/2014/02/the_netherlands_not_usa_gather.php
- http://static3.volkskrant.nl/static/asset/2014/kamerbrief_met_reactie_op_berichtgeving_metadata_telefoonverkeer_3761.pdf
- _______________________________________
- � First Congressman To Battle the NSA is Dead ::
- http://pando.com/2014/02/04/the-first-congressman-to-battle-the-nsa-is-dead-no-one-noticed-no-one-cares/
- _______________________________________
- � Mike Rogers Wants Journalists With Leaks Jailed ::
- http://nypost.com/2014/02/05/pol-journalist-fencing-snowden-secrets-should-be-jailed/
- _______________________________________
- On Saturday 20 July 2013, in the basement of the
- Guardian�s office in Kings Cross, London, watched by
- two GCHQ technicians, Guardian editors destroyed
- hard drives and memory cards on which encrypted files
- leaked by Edward Snowden had been stored. This is
- the first time footage of the event has been released.
- http://www.youtube.com/watch?v=bUokM5d1qic
- ���������������������������������������
- � CSEC IP Profiling & Mission Impacts ::
- http://www.cbc.ca/news2/pdf/airports_redacted.pdf
- http://cryptome.org/2014/01/csec-ip-profile.pdf
- � CSEC Objects to Disclosure of IP Profiling ::
- http://cryptome.org/2014/01/csec-14-0131.pdf
- � CSEC Used Airport Wi-Fi to Track Travellers ::
- A top secret document retrieved by US whistleblower
- Edward Snowden and obtained by CBC News shows
- that Canada�s electronic spy agency used information
- from the free internet service at a major Canadian
- airport to track the wireless devices of thousands
- of ordinary airline passengers for days after they
- left the terminal.
- After reviewing the document, one of Canada�s
- foremost authorities on cyber-security says the
- clandestine operation by the Communications
- Security Establishment Canada (CSEC) was almost
- certainly illegal. ... ...
- The document indicates the passenger tracking
- operation was a trial run of a powerful new
- software program CSEC was developing with help
- from its US counterpart, the NSA.
- In the document, CSEC called the new technologies
- �game-changing,� and said they could be used for
- tracking �any target that makes occasional forays
- into other cities/regions.�
- http://www.cbc.ca/news/politics/csec-used-airport-wi-fi-to-track-canadian-travellers-edward-snowden-documents-1.2517881
- CSEC concluded: �Can then take seeds from these
- airports and repeat to cover whole world.�
- http://arstechnica.com/tech-policy/2014/01/new-snowden-docs-show-canadian-spies-tracked-thousands-of-travelers/
- � More Details Into CSEC IP Profiling ::
- http://electrospaces.blogspot.fr/2014/02/did-csec-really-tracked-canadian.html
- � How Canada�s CSEC Maps Phone and Internet Connections ::
- http://electrospaces.blogspot.com/2014/03/olympia-how-canadas-csec-maps-phone-and.html
- _______________________________________
- � NSA, GCHQ Allegedly Hack Cryptographer ::
- http://cryptome.org/2014/02/nsa-gchq-quisquater.pdf
- � ... And Now It�s Personal ::
- http://cryptome.org/2014/02/stopping-nsa.htm
- _______________________________________
- � GCHQ Snooped on YouTube and Facebook ::
- Documents taken from the National Security
- Agency by Edward Snowden and obtained by NBC
- News detail how British cyber spies demonstrated
- a pilot program to their US partners in 2012
- in which they were able to monitor YouTube in
- real time and collect addresses from the billions
- of videos watched daily, as well as some user
- information, for analysis. At the time the
- documents were printed, they were also able to
- spy on Facebook and Twitter.
- Called �Psychology A New Kind of SIGDEV�
- (Signals Development), the presentation includes
- a section that spells out �Broad real-time
- monitoring of online activity� of YouTube videos,
- URLs �liked� on Facebook, and Blogspot/Blogger
- visits. The monitoring program is called
- �Squeaky Dolphin.�
- Experts told NBC News the documents show the
- British had to have been either physically able
- to tap the cables carrying the world�s web
- traffic or able to use a third party to gain
- physical access to the massive stream of data,
- and would be able to extract some key data
- about specific users as well.
- http://cryptome.org/2014/01/gchq-squeaky-dolphin.pdf
- http://cryptome.org/2014/01/gchq-newtons-cat.pdf
- http://msnbcmedia.msn.com/i/msnbc/Sections/NEWS/snowden_youtube_nbc_document.pdf
- http://investigations.nbcnews.com/_news/2014/01/27/22469304-snowden-docs-reveal-british-spies-snooped-on-youtube-and-facebook?lite
- _______________________________________
- � NSA/GCHQ Smartphone App Location Spying ::
- http://www.theguardian.com/world/2014/jan/27/nsa-gchq-smartphone-app-angry-birds-personal-data
- https://www.propublica.org/article/spy-agencies-probe-angry-birds-and-other-apps-for-personal-data
- http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html?_r=0
- � GCHQ Mobile Theme Briefing ::
- �Over 200 3rd party Location Aware Applications
- on the iPhone alone.�
- http://cryptome.org/2014/01/gchq-mobile-theme.pdf
- � NSA Converged Analysis of Smartphone Devices ::
- �Android Phones pass GPS data in the clear.�
- http://cryptome.org/2014/01/nsa-smartphones-analysis.pdf
- _______________________________________
- � Obama Grants NSA Exemption From Law ::
- The National Security Agency program that
- collects data on nearly every US phone call
- isn�t legal, a privacy review board said
- Thursday in a newly released report.
- http://cryptome.org/2014/01/pclob-14-0123.pdf
- �We have not identified a single instance
- involving a threat to the United States in
- which the program made a concrete difference
- in the outcome of a counterterrorism
- investigation,� the board wrote in the
- report released Thursday.
- Despite Obama�s promise to reform the NSA,
- domestic spying will continue.
- http://edition.cnn.com/2014/01/23/politics/nsa-telephone-records-privacy/index.html?hpt=hp_t3
- _______________________________________
- � Snowden Speaks ::
- http://cryptome.org/2014/01/snowden-video-13-0126.zip
- _______________________________________
- ? Snowden Calls Russian-Spy Story �Absurd� ::
- http://www.newyorker.com/online/blogs/newsdesk/2014/01/snowden-calls-russian-spy-story-absurd.html
- ? NSA is NOT the Source of All Spying ::
- ���
- http://20committee.com/2014/01/18/the-end-of-the-snowden-operation/
- NOBODY�s comment blocked @ 20committee.com
- Reform? Reform was never intended to come
- from politicians or the white house. Reform
- will come from peoples� change of online use ;
- growing public use of open-source encryption,
- growing use of services such as Tor, a growing
- amount of computers air-gapped, growing use of
- hardcopy backups rather than �the cloud� - and
- add to that, more people bleaching their cookies
- among other web browser cache, surging VPN use,
- growing use of proxies. Sudden disconnections
- of users� modems when not actually being used. The
- use of alternative search engines (such as ixquick,
- duckduckgo, startpage, privatelee, et al) and
- also consider the growing use of XPIs such as
- Noscript, Ghostery, HTTPS Everywhere and others.
- Reform?
- How about the death of RSA and a new generation
- of young privacy-crypto-enthusiasts who start to
- say �fuck the corporate platforms� and change it
- whether legal or not?
- The reform will come from people taking action.
- Here�s what I�d like to know - will �big government�
- follow up reform with their �internet kill switch?�
- _______________________________________
- � NSA Redactions Fail, Fail and Fail Again ::
- http://cryptome.org/2014/01/nsa-redaction-fails.pdf
- _______________________________________
- � NSA�s Upstream Collection Detailed ::
- The corporate partnerships are one of
- three ways NSA is intercepting the world�s
- main internet cables:
- - Cooperation with telecommunication companies
- - Cooperation with foreign intelligence agencies
- - Unilateral cable tapping operations
- http://electrospaces.blogspot.de/2014/01/slides-about-nsas-upstream-collection.html
- ---------------------------------------
- http://postimg.org/image/9viuxblpd/
- http://www.youtube.com/watch?v=kOAv7zbJkCk
- http://www.dailydot.com/news/nsa-fairview-slides-brazil-spying/
- http://cryptome.org/2013/08/nsa-codenames.htm
- _______________________________________
- � 24 FISA Court Documents DECLASSIFIED ::
- http://cryptome.org/2014/01/fisc-13-0117.zip
- � FISA Court Orders Comparison ::
- http://cryptome.org/vz-slip.jpg
- http://cryptome.org/2014/01/fisc/fisc-orders-compare.htm
- http://cryptome.org/2014/01/fisc2/fisc-before-after-obama.htm
- http://cryptome.org/2014/01/fisc3/fisc-br-11-07-v-11-57.htm
- ---------------------------------------
- http://icontherecord.tumblr.com/
- _______________________________________
- � SMS Text Messages - A Goldmine to Exploit ::
- http://cryptome.org/2014/01/nsa-sms-exploit.pdf
- http://s3.documentcloud.org/documents/1006111/sms.pdf
- � NSA Vacuuming SMS Texts Around the World ::
- The documents also reveal the UK spy agency
- GCHQ has made use of the NSA database to search
- the metadata of �untargeted and unwarranted�
- communications belonging to people in the UK.
- The NSA program, codenamed Dishfire, collects
- �pretty much everything it can�, according to
- GCHQ documents, rather than merely storing the
- communications of existing surveillance targets.
- The NSA has made extensive use of its vast
- text message database to extract information
- on people�s travel plans, contact books, financial
- transactions and more � including of individuals
- under no suspicion of illegal activity.
- http://www.theguardian.com/world/2014/jan/16/nsa-collects-millions-text-messages-daily-untargeted-global-sweep
- _______________________________________
- � NSA Covert Radio Signals Break Air-gaps ::
- http://cryptome.org/2014/01/nsa-quantum-radio.htm
- http://www.nytimes.com/2014/01/15/us/nsa-effort-pries-open-computers-not-connected-to-internet.html
- The technology, which the agency has used
- since at least 2008, relies on a covert
- channel of radio waves that can be transmitted
- from tiny circuit boards and USB cards inserted
- surreptitiously into the computers. In some
- cases, they are sent to a briefcase-size
- relay station that intelligence agencies can
- set up miles away from the target.
- The radio frequency technology has helped
- solve one of the biggest problems facing
- American intelligence agencies for years:
- getting into computers that adversaries,
- and some American partners, have tried to
- make impervious to spying or cyberattack.
- In most cases, the radio frequency hardware
- must be physically inserted by a spy, a
- manufacturer or an unwitting user.
- ---------------------------------------
- Refer to NSA�s Tailored Access Operations
- http://paste.cdtag.de/view.php?id=23643
- _______________________________________
- � NSA Windows Event Monitoring ::
- http://cryptome.org/2014/01/nsa-windows-event.pdf
- ---------------------------------------
- � Locate And Destroy WinRM Registry ::
- http://pastebin.jity.de/view/e8a662d4
- _______________________________________
- � NSA Reducing the Effectiveness of Hash ::
- http://cryptome.org/2014/01/nsa-pass-hash.pdf
- _______________________________________
- � NSA�s Organizational Designations ::
- http://electrospaces.blogspot.com/2014/01/nsas-organizational-designations.html
- _______________________________________
- � Analysis of NSA�s 215 Metadata Spy Programs ::
- http://politicalscience.osu.edu/faculty/jmueller/NSAshane3.pdf
- _______________________________________
- � John Inglis Explains Why US-Based Collection
- of Internet Metadata Doesn�t Work ::
- http://www.npr.org/2014/01/10/261282601/transcript-nsa-deputy-director-john-inglis?live=1
- http://www.emptywheel.net/2014/01/10/john-inglis-explains-why-us-based-collection-of-internet-metadata-doesnt-work/
- _______________________________________
- � Rand Paul to Lead Class-Action Lawsuit
- Against Obama Over NSA Spying ::
- http://www.breitbart.com/Big-Government/2014/01/03/Rand-Paul-to-Sue-Obama-over-NSA-Spying
- _______________________________________
- � NSA Quantum Computing Research for Cracking
- All Encryption ::
- In room-size metal boxes �secure against
- electromagnetic leaks, the National Security
- Agency is racing to build a computer that
- could break nearly every kind of encryption
- used to protect banking, medical, business
- and government records around the world.
- According to documents provided by former
- NSA contractor Edward Snowden, the effort
- to build �a cryptologically useful quantum
- computer� � a machine exponentially faster
- than classical computers � is part of a
- $79.7 million research program titled
- �Penetrating Hard Targets.� Much of the
- work is hosted under classified contracts
- at a laboratory in College Park, Md.
- http://cryptome.org/2014/01/nsa-quantum-computer.pdf
- http://cryptome.org/2014/01/nsa-quantum-computer-2.pdf
- http://www.washingtonpost.com/world/national-security/nsa-seeks-to-build-quantum-computer-that-could-crack-most-types-of-encryption/2014/01/02/8fff297e-7195-11e3-8def-a33011492df2_print.html
- _______________________________________
- � NSA and Random Number Generators ::
- http://blog.cryptographyengineering.com/2013/12/a-few-more-notes-on-nsa-random-number.html
- _______________________________________
- � Updated List of NSA Codenames ::
- http://cryptome.org/2014/01/nsa-codenames.htm
- _______________________________________
- � Jacob Appelbaum Explains New NSA Leaks ::
- https://www.youtube.com/watch?v=b0w36GAyZIA
- Mirror � http://fileb.ag/xwcp0jrewk2o
- � Jacob�s NSA Slides @ioerror (ZIP) ::
- http://cryptome.org/2013/12/nsa-catalog.zip
- � NSA Catalog Image Formats (16.7MB) Mirrored ::
- http://upsto.re/CtXqio
- http://f.lui.li/get_1228_a2b4.html
- http://blakker.pl/files/get/fenW1XyGrl/nsa-catalog-images.zip
- � Documents Reveal Top NSA Hacking Unit ::
- The NSA�s TAO hacking unit is considered
- to be the intelligence agency�s top secret
- weapon. It maintains its own covert network,
- infiltrates computers around the world and
- even intercepts shipping deliveries to plant
- back doors in electronics ordered by those
- it is targeting. ... ...
- http://www.spiegel.de/international/world/the-nsa-uses-powerful-toolbox-in-effort-to-spy-on-global-networks-a-940969.html
- The insert method and other variants of
- QUANTUM are closely linked to a shadow
- network operated by the NSA alongside the
- Internet, with its own, well-hidden
- infrastructure comprised of �covert�
- routers and servers. It appears the NSA
- also incorporates routers and servers
- from non-NSA networks into its covert
- network by infecting these networks with
- �implants� that then allow the government
- hackers to control the computers remotely.
- In this way, the intelligence service seeks
- to identify and track its targets based on
- their digital footprints. These identifiers
- could include certain email addresses or
- website cookies set on a person�s computer.
- Of course, a cookie doesn�t automatically
- identify a person, but it can if it includes
- additional information like an email address.
- In that case, a cookie becomes something
- like the web equivalent of a fingerprint.
- ---------------------------------------
- � NSA QUANTUM Theory (FOXACID) ::
- http://cryptome.org/2013/12/nsa-quantumtheory.pdf
- � NSA/GCHQ QUANTUM Tasking Techniques ::
- �YahooBcookie�s are unique to a specific
- computer and can hold other <yahoo> addresses
- that are being logged into on that computer
- as long as the user does not clear browser
- cookies.�
- http://cryptome.org/2013/12/nsa-quantum-tasking.pdf
- � NSA QFIRE Packet Injection Attacks ::
- http://cryptome.org/2013/12/nsa-qfire.pdf
- ---------------------------------------
- � NSA Catalog for Hardware Backdoors ::
- The specialists at ANT, which presumably
- stands for Advanced or Access Network Technology,
- could be described as master carpenters for
- the NSA�s department for Tailored Access
- Operations (TAO). In cases where TAO�s usual
- hacking and data-skimming methods don�t suffice,
- ANT workers step in with their special tools,
- penetrating networking equipment, monitoring
- mobile phones and computers and diverting or
- even modifying data. Such implants, as they are
- referred to in NSA parlance, have played a
- considerable role in the intelligence agency�s
- ability to establish a global covert network
- that operates alongside the Internet.
- Some of the equipment available is quite
- inexpensive. A rigged monitor cable that
- allows �TAO personnel to see what is displayed
- on the targeted monitor,� for example, is
- available for just $30. But an �active GSM
- base station� -- a tool that makes it possible
- to mimic a mobile phone tower and thus monitor
- cell phones -- costs a full $40,000. Computer
- bugging devices disguised as normal USB plugs,
- capable of sending and receiving data via radio
- undetected, are available in packs of 50 for
- over $1 million.
- The ANT division doesn�t just manufacture
- surveillance hardware. It also develops software
- for special tasks. The ANT developers have a
- clear preference for planting their malicious
- code in so-called BIOS, software located on a
- computer�s motherboard that is the first thing
- to load when a computer is turned on.
- This has a number of valuable advantages: an
- infected PC or server appears to be functioning
- normally, so the infection remains invisible
- to virus protection and other security programs.
- And even if the hard drive of an infected
- computer has been completely erased and a new
- operating system is installed, the ANT malware
- can continue to function and ensures that new
- spyware can once again be loaded onto what is
- presumed to be a clean computer. The ANT
- developers call this �Persistence� and believe
- this approach has provided them with the
- possibility of permanent access.
- Another program attacks the firmware in
- hard drives manufactured by Western Digital,
- Seagate, Maxtor and Samsung, all of which,
- with the exception of latter, are American
- companies. Here, too, it appears the US
- intelligence agency is compromising the
- technology and products of American companies.
- http://cryptome.org/2013/12/nsa-tao-ant-pdf.pdf
- http://www.spiegel.de/international/world/catalog-reveals-nsa-has-back-doors-for-numerous-devices-a-940994.html
- http://gizmodo.com/the-nsa-actually-intercepted-packages-to-put-backdoors-1491169592
- http://www.theguardian.com/world/2013/dec/29/der-spiegel-nsa-hacking-unit-tao
- https://www.wsws.org/en/articles/2013/12/31/snow-d31.html
- � NSA Cisco / Juniper Router Backdoors ::
- http://cryptome.org/2013/12/nsa-ant-firewalls.pdf
- http://cryptome.org/2013/12/nsa-ant-router.pdf
- � NSA Computer Monitor Backdoor ::
- http://cryptome.org/2013/12/nsa-ant-bildschirm.pdf
- � NSA PCI Bus Backdoor ::
- http://cryptome.org/2013/12/nsa-ant-rechner.pdf
- � NSA Motherboard Backdoor (#BadBIOS) ::
- http://cryptome.org/2013/12/nsa-ant-server.pdf
- � NSA Keyboard Backdoor ::
- http://cryptome.org/2013/12/nsa-ant-tastatu.pdf
- � NSA Apple iPhone Backdoor ::
- http://cryptome.org/2013/12/nsa-ant-handys.pdf
- � NSA WiFi Card / Apple Airport Backdoors ::
- http://cryptome.org/2013/12/nsa-ant-mobilfunk.pdf
- � NSA Active 802.11 Netcard Backdoor ::
- http://cryptome.org/2013/12/nsa-ant-w-lan.pdf
- � NSA USB Backdoor to Bridge Air-gaps ::
- http://cryptome.org/2013/12/nsa-ant-usb.pdf
- � NSA Alternative SIGINT Hunter ::
- http://cryptome.org/2013/12/nsa-ant-raumuber.pdf
- � NSA Keystroke, Screenshot & SIGINT Hunting ::
- http://cryptome.org/2013/12/greenwald-13-1231.pdf
- http://truth-out.org/news/item/20948-glenn-greenwald-the-nsa-can-literally-watch-every-keystroke-you-make
- � Jacob Appelbaum Comment on Der Spiegel Reports ::
- http://cryptome.org/2014/01/appelbaum-der-spiegel.htm
- ---------------------------------------
- BLOWBACK SETS IN ...
- � IT Firms Lose Billions After NSA Scandal ::
- http://www.independent.co.uk/life-style/gadgets-and-tech/news/it-firms-lose-billions-after-nsa-scandal-exposed-by-whistleblower-edward-snowden-9028599.html
- � Foreign Firms Won�t Buy American Tech ::
- https://www.informationweek.com/security/risk-management/nsa-fallout-why-foreign-firms-wont-buy-american-tech/d/d-id/1113384
- ---------------------------------------
- � Apple Claims They Know Nothing About Backdoors ::
- http://www.infowars.com/apple-says-it-knows-nothing-about-your-iphone-spying-on-you/
- � Apple Inc. Lying Exposed ::
- Logs from a properly air-gapped Mac OSX show
- the system attempting to access the Airport -
- yet the Airport card was physically disconnected.
- http://pastebin.jity.de/view/77d624be
- � Cyber�Security Experts Ask If Apple �Flaw�
- Was Really NSA Backdoor ::
- Following an admission by Apple that a �bug�
- in its operating system had left devices open
- to potential hacking, experts are questioning
- whether the security hole was intentional, in
- order to allow the NSA backdoor access as part
- of its mass spying program.
- http://www.infowars.com/cyber-security-experts-ask-apple-flaw-was-really-nsa-backdoor/
- ---------------------------------------
- � Intel CEO Refuses To Answer Questions On
- Whether NSA Can Access Processors ::
- http://www.infowars.com/intel-ceo-refuses-to-answer-questions-on-whether-nsa-can-access-processors/
- � Dell Inc. Apologizes for the �Inconvenience�
- of Helping NSA Install Backdoors ::
- http://www.techdirt.com/articles/20131230/17174425718/dells-twitter-account-apologizes-inconvenience-helping-nsa-place-hidden-bios-bug.shtml
- http://www.infowars.com/dells-twitter-account-apologizes-for-the-inconvenience-of-helping-nsa-install-spyware/
- � Locate And Destroy 802.11 Registry ::
- How to disable SOMBERKNAVE implant to
- properly air-gap the Windows XP system.
- http://pastebin.jity.de/view/bdd440b3
- _______________________________________
- � NSA Whistleblower ; Planned Police State ::
- http://www.youtube.com/watch?v=x9Kcgme2I0c
- � NSA Whistleblower ; National Security Scam ::
- http://www.youtube.com/watch?v=xPemLhvwfos
- _______________________________________
- � Edward Snowden Interview by Barton Gellman ::
- http://www.washingtonpost.com/world/national-security/edward-snowden-after-months-of-nsa-revelations-says-his-missions-accomplished/2013/12/23/49fc36de-6c1c-11e3-a523-fe73f0ff6b8d_story.html
- Beginning in October 2012, he said, he
- brought his misgivings to two superiors
- in the NSA�s Technology Directorate and
- two more in the NSA Threat Operations
- Center�s regional base in Hawaii. For
- each of them, and 15 other co-workers,
- Snowden said he opened a data query tool
- called BOUNDLESSINFORMANT, which used
- color-coded �heat maps� to depict the
- volume of data ingested by NSA taps.
- His colleagues were often �astonished to
- learn we are collecting more in the United
- States on Americans than we are on Russians
- in Russia,� he said. Many of them were
- troubled, he said, and several said they
- did not want to know any more.
- ---------------------------------------
- BOUNDLESS INFORMANT REPORTS/DOCS REFER HERE ;
- http://paste.cdtag.de/view.php?id=19580
- _______________________________________
- � New York Judge, William Pauley III, Declares
- Metadata Hoarding Legal ::
- http://cryptome.org/2013/12/pauley-13-1227.pdf
- http://www.scribd.com/doc/194082600/NSA-Opinion
- http://www.politico.com/story/2013/12/nsa-phone-surveillance-ruling-101569.html
- http://www.infowars.com/judge-falls-for-the-big-lie-about-nsa-spying/
- /\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/
- \/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\
- � Judge Declares Metadata Hoarding Violates
- Fourth Amendment Rights ::
- http://cryptome.org/2013/12/klayman-048-049.pdf
- A federal judge ruled Monday that the
- National Security Agency program which
- collects information on nearly all telephone
- calls made to, from or within the United
- States is likely unconstitutional.
- US District Court Judge Richard Leon found
- that the program appears to violate the
- Fourth Amendment ban on unreasonable
- searches and seizures. He also said the
- Justice Department had failed to demonstrate
- that collecting the information had helped
- to head off terrorist attacks.
- Acting on a lawsuit brought by conservative
- legal activist Larry Klayman, Leon issued
- a preliminary injunction barring the NSA
- from collecting so-called metadata pertaining
- to the Verizon accounts of Klayman and one
- of his clients. However, the judge stayed
- the order to allow for an appeal.
- http://www.politico.com/story/2013/12/national-security-agency-phones-judge-101203.html
- http://www.wsws.org/en/articles/2013/12/17/cour-d17.html
- Leon�s 68-page opinion is the first
- significant legal setback for the NSA�s
- surveillance program since it was disclosed
- in June in news stories based on leaks
- from former NSA contractor Edward Snowden.
- For seven years, the metadata program has
- been approved repeatedly by numerous judges
- on the Foreign Intelligence Surveillance
- Court and found constitutional by at least
- one judge sitting in a criminal case.
- https://ecf.dcd.uscourts.gov/cgi-bin/show_public_doc?2013cv0851-48
- � Klayman v. NSA 7 Court Documents ::
- http://cryptome.org/2013/12/klayman-051-058.zip
- ? Delay Motion for Class Action Lawsuit ::
- http://cryptome.org/2013/12/klayman-060.pdf
- ? White House Tries to Prevent Judge From
- Ruling on Surveillance Efforts ::
- http://www.nytimes.com/2013/12/22/us/white-house-tries-to-prevent-judge-from-ruling-on-surveillance-efforts.html?_r=0
- � Bulk Metadata Collection Ruled Illegal ::
- http://cryptome.org/2013/12/leon-13-1216.pdf
- ---------------------------------------
- � White House Spying Review Group Report ::
- http://cryptome.org/2013/12/obama-nsa-report.pdf
- � White House Spy Report Commentary ::
- http://cryptome.org/2013/12/prgi-comments-001.htm
- http://cryptome.org/2013/12/prgi-comments-002.htm
- � Obama Advisory Committee Whitewashes US
- Spying Programs ::
- http://www.wsws.org/en/articles/2013/12/19/spyi-d19.html
- ---------------------------------------
- ? FLASHBACK ; Michael Hayden Admits They
- Will NOT Stifle Surveillance ::
- http://www.youtube.com/watch?v=XS6nfkbNvlo
- http://www.infowars.com/former-nsa-boss-government-will-continue-surveillance-so-get-used-to-it/
- ? Counter-spy_Manual.zip
- (22 files | ZIP | 2.93MB)
- http://paste.darkbyte.ru/view/5459487
- http://ae7.st/p/26c (mirror)
- _______________________________________
- � NSA/CSS Mission Slides ::
- These slides, from an internal presentation
- in the first week of October 2001, show how
- critical the NSA sees electronic eavesdropping.
- http://cryptome.org/2013/12/nsa-css-mission.pdf
- � 1B. Ability to exploit:
- - Military Information
- - Economic Information
- - Information Operations Information
- - Political Information �
- _______________________________________
- � Eben Moglen & Bruce Schneier Talk About
- NSA Leaks, Software and Cryptography ::
- https://www.youtube.com/watch?v=N8Sc6pUR1mA
- ���������������������������������������
- � NSA Rigging RSA Crypto Market ::
- http://www.reuters.com/article/2013/12/20/us-usa-security-rsa-idUSBRE9BJ1C220131220
- � RSA Cryptographers Duped and Bribed by NSA ::
- http://cryptome.org/2013/12/nsa-kills-rsa.htm
- � NSA Kills RSA Trust and Therefore RSA Jobs ::
- http://cryptome.org/2013/12/nsa-kills-rsa-workers.htm
- � List of Canceled RSA Talks Continues to Grow ::
- http://threatpost.com/list-of-canceled-rsa-talks-continues-to-grow/103508
- � FLASHBACK ; NSA Rigging the Crypto Market ::
- http://cryptome.org/jya/nsa-sun.htm
- _______________________________________
- � Did British Telecom Provides Backdoors
- for NSA and GCHQ (?) ::
- In a paper titled �The Internet Dark Age�
- the researchers say that BT is shipping
- hardware with backdoors that allow secret
- government access in order to make network
- compromise easier. �BT are directly responsible
- for covertly embedding secret spy equipment
- in millions of homes and businesses within
- the UK,� the paper states.
- Recently on Cryptome (the better leaks
- than wikileaks site), a paper appeared
- pointing out that BT (British Telecom)
- assigns all their modems an extra address
- in the 30.x.x.x address space, and then
- attaches SSH and SNMP to that address.
- This looks like what many ISPs do, assigning
- a second IP address for management, except
- for one thing: the 30.0.0.0/8 block is
- assigned to the United States Department
- of Defense. This has caused a fevered round
- of speculation that this is actually a
- secret backdoor for the NSA/GCHQ, so that
- they can secretly monitor and control
- peoples� home networks.
- Maybe, but it�s probably not the case.
- The better explanation is that BT simply
- chose this address space because it�s
- non-routable. While it�s assigned public
- address, it�s only used inside the private
- DoD military network. Try tracerouting to
- that address space, you�ll see that your
- packets go nowhere.
- http://cryptome.org/2013/12/Full-Disclosure.pdf
- http://www.csoonline.com/article/744697/report-accuses-bt-of-supplying-backdoors-for-gchq-and-nsa
- http://blog.erratasec.com/2013/12/dod-address-space-its-not-conspiracy.html
- � Bruce Schneier Leaves British Telecom ::
- �Yes, it�s true. And contrary to rumors,
- this has nothing to do with the NSA or GCHQ.
- No, BT wasn�t always happy with my writings
- on the topic, but it knew that I am an
- independent thinker and didn�t try to
- muzzle me in any way. I�m just ready to
- leave. I spent seven years at BT, and
- seven years at Counterpane Internet
- Security, Inc., before BT bought us.
- It�s past time for something new.�
- http://www.schneier.com/blog/archives/2013/12/yes_im_leaving.html
- http://arstechnica.com/information-technology/2013/12/nsa-surveillance-critic-bruce-schneier-to-leave-post-at-bt/
- http://www.computing.co.uk/ctg/news/2319296/bruce-schneier-leaves-bt-after-eight-years-as-security-futurologist
- ---------------------------------------
- � NSA Infected Around 50,000 Networks Worldwide ::
- The American intelligence service - NSA -
- infected more than 50,000 computer networks
- worldwide with malicious software designed
- to steal sensitive information. Documents
- provided by former NSA-employee Edward Snowden
- and seen by this newspaper, prove this.
- A management presentation dating from 2012
- explains how the NSA collects information
- worldwide. In addition, the presentation
- shows that the intelligence service uses
- �Computer Network Exploitation� (CNE) in
- more than 50,000 locations. CNE is the
- secret infiltration of computer systems
- achieved by installing malware, malicious
- software.
- One example of this type of hacking was
- discovered in September 2013 at the Belgium
- telecom provider Belgacom. For a number of
- years the British intelligence service - GCHQ �
- has been installing this malicious software
- in the Belgacom network in order to tap
- their customers� telephone and data traffic.
- The Belgacom network was infiltrated by GCHQ
- through a process of luring employees to a
- false Linkedin page.
- http://www.nrc.nl/wp-content/uploads/2013/11/nsa568.jpg
- http://cryptome.org/2013/11/nsa-sigint-cryptologic-platform.pdf
- http://www.nrc.nl/nieuws/2013/11/23/nsa-infected-50000-computer-networks-with-malicious-software/
- http://hothardware.com/News/Dutch-News-Agency-Reports-NSA-Infected-50000-Networks-With-Malware/
- � NSA Power to Generate Profits and Pay ::
- The NSA SIGINT Strategy 2012-2016 pretty
- well covers all the comsec and crypto
- initiatives to covertly exploit people,
- cryptographers, anonymizers, informants,
- planted spies, security firms, networks,
- governments, nations, friends, lovers
- and citizens.
- Not sure leaks, lawsuits and protests
- will deter this bounty of profits for
- the comsec industry, unless the public
- is aroused to demand the 3 branches grasp
- the nettle, and all those making money
- from this deception operation decide to
- give up their profits, perks and prestige.
- I mean those on the comsec and crypto
- lists, those participating in standards
- committees, those enjoying contracts and
- grants in think tanks and universities,
- those in law firms and public interest
- orgs, those in the media and academia,
- those in non-spy gov agencies, pretending
- to be in opposition as they scramble to
- rejigger their products and sales pitches,
- to exploit what is being fabricated to
- diminish Snowden�s revelations with new
- forms of secrecy, technology, law,
- regulations, bribery, lobbying, grants,
- contracts, list lurking, online and
- offline spying, break-ins, the usual
- kaboodle, to assure the NSA goals are
- fulfilled.
- http://cryptome.org/2013/11/nsa-power-profit-pay.htm
- http://cryptome.org/2013/11/nsa-sigint-cryptologic-platform.pdf
- � NSA�s Global Interception Network ::
- http://electrospaces.blogspot.fr/2013/12/nsas-global-interception-network.html
- ���������������������������������������
- � GCHQ Accused of Spying European, German
- and Israeli Politicians (No Documentation) ::
- http://www.spiegel.de/international/world/snowden-documents-show-gchq-targeted-european-and-german-politicians-a-940135.html
- http://www.theguardian.com/uk-news/2013/dec/20/gchq-targeted-aid-agencies-german-government-eu-commissioner
- http://www.nytimes.com/2013/12/21/world/nsa-dragnet-included-allies-aid-groups-and-business-elite.html?_r=0
- _______________________________________
- � CBS 60min ; Inside the NSA (Part One) ::
- http://www.youtube.com/watch?v=WgPNyAYOr04
- � CBS 60min ; The Snowden Affair (Part Two) ::
- http://www.youtube.com/watch?v=5AaREKHQI8E
- � NSA Interviewed by CBS - Transcript ::
- http://cryptome.org/2013/12/nsa-60mins/nsa-60mins.htm
- _______________________________________
- � Proposal for Distribution of Snowden Cache ::
- http://cryptome.org/2013/12/snowden-cache-dist.htm
- _______________________________________
- � EU Data Retention Directive �Unlawful�
- and �Incompatible� with Charter of Rights ::
- http://www.scribd.com/doc/191078925/Data-Retention-Challenge-Press-Release
- http://www.computing.co.uk/ctg/news/2318838/eu-data-retention-directive-unlawful-and-incompatible-with-charter-of-rights
- _______________________________________
- � GOOGLE CENSORING NSA SEARCH RESULTS (?) ::
- http://www.washingtonpost.com/blogs/the-switch/wp/2013/12/17/edward-snowden-doesnt-show-up-once-in-googles-list-of-top-2013-searches/
- _______________________________________
- � Clapper, Feinstein, Obama Total Disregard
- of Public Concerns ::
- http://cryptome.org/2013/12/spies-reign-obama.htm
- � Merkel Throws a Pissy Fit ::
- http://www.theguardian.com/world/2013/dec/17/merkel-compares-nsa-stasi-obama
- _______________________________________
- � GCHQ�s Use of FLYING PIG to Spy ::
- �FLYING PIG is a program that allows
- analysts to query GCHQ�s vast repository
- of metadata about the world�s secure
- communications over TLS/SSL. It�s
- certainly not a program through which
- the GCHQ, or NSA for that matter, performs
- man-in-the-middle attacks against internet
- services like Google, as reported by others,
- including Bruce Schneier. The reports that
- claim the NSA performed MITM attacks against
- Google are based on a small piece of a
- document that describes a FLYING PIG
- (which is a not an NSA program, as you may
- have noticed) use case (presumably, an
- investigation into the DigiNotar CA breach).
- That�s not to say the GCHQ doesn�t perform
- MITM attacks, but there�s no evidence to
- be found in this document. Though, FLYING PIG
- may be used to prepare MITM attacks, e.g.
- by providing information about a target.�
- http://koen.io/2013/12/flying-pig-gchq-tls-ssl-knowledge-base/
- � NSA Use of FLYING PIG to Spy ::
- https://www.documentcloud.org/documents/785152-166819124-mitm-google.html
- http://www.techdirt.com/articles/20130910/10470024468/flying-pig-nsa-is-running-man-middle-attacks-imitating-googles-servers.shtml
- http://news.cnet.com/8301-13578_3-57602701-38/nsa-disguised-itself-as-google-to-spy-say-reports/
- ���������������������������������������
- � John Young Breaks Down the NSA Leaks ::
- http://www.corbettreport.com/mp3/2013-12-17%20John%20Young.mp3
- http://www.corbettreport.com/interview-793-john-young-breaks-down-the-snowdennsa-saga/
- _______________________________________
- � FASCIA Database of Device-Location Records ::
- http://cryptome.org/2013/12/nsa-fascia.pdf
- ---------------------------------------
- � hdfs:// Cloud Holds FASCIA Database ::
- http://cryptome.org/2013/12/nsa-ghost-machine.pdf
- HDFS stands for �Hadoop Distributed File
- System� which was inspired by Google Inc,
- and later managed by big data corporations
- such as IBM, Yahoo, Facebook, et al.
- HDFS is designed to reliably store very
- large files across machines in a large
- cluster.
- � Hadoop Emerging Technology ::
- �Hadoop is a data processing system that
- follows the MapReduce paradigm for scalable
- data analysis.� ... �Largest install is at
- Yahoo, a major contributor.�
- HDFS is a scalable file system with two
- major components, a central metadata server
- and file servers from data.
- http://www.upload-box.com/index.php/files/get/uTqMG-LMlY/hadoop-emerging-technology.pdf
- � Yahoo - Managing a Hadoop Cluster ::
- This was taken from the Yahoo website,
- posted on public domain.
- http://msfire.tk/files/get/SIut69QW7Q/yahoo-hadoop.zip
- � Apache Hadoop FileSystem and its Usage
- in Facebook (This File Is Mirrored) ::
- http://4lodzik.de/xu2/files/get/U-eeftxCDJ/facebook-hadhoop.zip
- http://www.uploadmini.com/index.php/files/get/rnvpDpXfZu/facebook-hadhoop.zip
- http://cloudseminar.berkeley.edu/data/hdfs.pdf
- � hadoop_install.zip (Mirrored) ::
- http://fileb.ag/nukq1uicayye
- http://f.ishoo.ru/files/get/vfym4eZHvY/hadoop-install.zip
- http://cloud.elearning.uq.edu.au/download/hadoop_install.zip
- ---------------------------------------
- � CO-TRAVELER Cellphone Tracking ; FASCIA
- Database Available With Ghostmachine ::
- �Proxies can make IP resolution challenging.�
- http://cryptome.org/2013/12/nsa-cotraveler.pdf
- � CHALKFUN Location Tool Highly Censored ::
- http://cryptome.org/2013/12/nsa-chalkfun.pdf
- � NSA Targets Device Location Verification ::
- http://cryptome.org/2013/12/nsa-target-location.pdf
- � NSA�s Global Interception Network ::
- http://electrospaces.blogspot.com/2013/12/nsas-global-interception-network.html
- � NSA Tracking Cellphone Locations ::
- In unveiling new Edward Snowden revelations
- about NSA spying, the Washington Post has
- once again whitewashed the fact that the
- content of all our communications have
- been stored and analyzed under the Echelon
- program since the 1990s.
- The new details concern how, �The National
- Security Agency is gathering nearly 5
- billion records a day on the whereabouts
- of cellphones around the world.�
- However, the report reveals itself to
- be little more than an exercise in soft-
- peddling when it claims that, �The NSA
- does not target Americans� location data
- by design, but the agency acquires a
- substantial amount of information on
- the whereabouts of domestic cellphones
- �incidentally.�
- This notion that the NSA just accidentally
- happens to record the locations of Americans
- using data from their cellphones, and is
- not deliberately engaging in domestic
- surveillance, is yet another example of
- damage control by the establishment.
- http://www.infowars.com/new-nsa-revelations-another-limited-hangout-whitewash/
- http://www.washingtonpost.com/wp-srv/special/_ie-fallbacks/NSA_Co-traveler_g.jpg
- http://apps.washingtonpost.com/g/page/world/fascia-the-nsas-huge-trove-of-location-records/637/
- http://apps.washingtonpost.com/g/page/world/how-to-tell-if-a-target-is-foreign/635/
- http://www.washingtonpost.com/world/national-security/nsa-tracking-cellphone-locations-worldwide-snowden-documents-show/2013/12/04/5492873a-5cf2-11e3-bc56-c6ca94801fac_print.html
- http://www.theguardian.com/world/2013/dec/04/nsa-storing-cell-phone-records-daily-snowden
- ---------------------------------------
- � NSA Uses Google Cookies and GSM Geohashes
- to Pinpoint Targets ::
- The National Security Agency is �secretly�
- piggybacking on the tools that enable
- Internet advertisers to track consumers,
- using cookies and location data to pinpoint
- targets for government hacking and to
- bolster surveillance.
- http://cryptome.org/2013/12/nsa-sigint-successes.pdf
- http://cryptome.org/2013/12/nsa-gsm-tracking.pdf
- http://apps.washingtonpost.com/g/page/national/nsa-signal-surveillance-success-stories/647/
- http://www.washingtonpost.com/blogs/the-switch/wp/2013/12/10/nsa-uses-google-cookies-to-pinpoint-targets-for-hacking/
- http://boingboing.net/2013/12/10/nsa-uses-googles-tracking-co.html
- http://www.theverge.com/2013/12/10/5198592/nsa-reportedly-piggybacking-on-google-advertising-cookies
- https://www.wsws.org/en/articles/2013/12/14/snow-d14.html
- ---------------------------------------
- � FLASHBACK ; Anonymizing Google�s Cookie ::
- http://www.imilly.com/google-cookie.htm
- ---------------------------------------
- � How Marketers Will Find and Track You
- In a World Without Cookies ::
- http://blog.thefetch.com/2013/11/18/cookie-monsters-how-marketers-will-find-and-track-you-in-a-world-without-cookies/
- _______________________________________
- � How the NSA Targets Italy ::
- http://espresso.repubblica.it/foto/2013/12/05/galleria/nsa-intercettazioni-1.144400
- http://espresso.repubblica.it/inchieste/2013/12/05/news/revealed-how-the-nsa-targets-italy-1.144428
- http://www.pcworld.com/article/2070480/nsa-spies-on-italians-from-roof-of-us-embassy-in-rome-magazine-reports.html
- � SCS_Italy_Spying.zip | 371KB ::
- http://ge.tt/api/1/files/2Bbc4C81/0/blob?download
- http://megaswf.com/f/2625421
- http://msfire.tk/files/get/srIJUWgvYg/scs-italy-spying.zip
- _______________________________________
- � Swedish Intelligence Agency (FRA) Spied
- on Russian Leaders for NSA ::
- http://cryptome.org/2013/12/nsa-se-spied-ru.htm
- http://cryptome.org/2013/12/nsa-se-fra-ru-baltic.pdf
- http://www.youtube.com/watch?v=0yP7n8qZrz0
- http://rt.com/news/sweden-spied-russia-nsa-759/
- http://www.infowars.com/nsa-leaks-sweden-spied-on-russian-leaders-for-us/
- http://www.thelocal.se/20131211/sweden-aided-in-nsa-hacking-operations-report
- � NSA & FRA Quantum Hacking Programme ::
- http://www.svt.se/ug/fra-part-of-top-secret-hacker-project
- � NSA & FRA Relationship Was �Top Secret� ::
- http://cryptome.org/2013/12/nsa-se-spies.pdf
- http://s3.documentcloud.org/documents/889126/nsa-intelligence-relationship-with-sweden.pdf
- � NSA & FRA Relationship �Actively Engaged� ::
- http://cryptome.org/2013/12/nsa-se-fra-relationship.pdf
- http://s3.documentcloud.org/documents/894384/nsa-internal-pm-on-fra-and-sweden-relations.pdf
- � NSA & FRA Joint Quantum Spy Agenda ::
- http://cryptome.org/2013/12/nsa-se-fra-spying-agenda.pdf
- � NSA/GCHQ/FRA Quantum Spying Accomplishments ::
- http://cryptome.org/2013/12/nsa-gchq-fra-quantum.pdf
- http://cryptome.org/2013/12/nsa-se-fra-quantum-2.pdf
- http://cryptome.org/2013/12/gchq-se-fra-quantum-3.pdf
- � NSA/GCHQ/FRA Communication Intelligence ::
- http://cryptome.org/2013/12/nsa-gchq-se-fra-comint.pdf
- ---------------------------------------
- PAST XKEYSCORE REPORTS/DOCUMENTS REFER HERE ;
- http://paste.cdtag.de/view.php?id=16647
- ---------------------------------------
- � NSA/FRA XKeyscore Targets Website Viewers ::
- http://cryptome.org/2013/12/nsa-se-fra-xkeyscore-slide.pdf
- � NSA/FRA XKeyscore Targets Tor, etc. ::
- http://cryptome.org/2013/12/nsa-xkeyscore-tor-slides.pdf
- � NSA/FRA XKeyscore Exploit Sources ::
- http://cryptome.org/2013/12/nsa-xkeyscore-sources.pdf
- � NSA/FRA XKeyscore Data Hoarding Plans ::
- http://cryptome.org/2013/12/nsa-se-fra-xkeyscore.pdf
- _______________________________________
- �Earlier, a map showing SCS locations
- worldwide was published by the German
- magazine Der Spiegel. Initially an unredacted
- map was put online by accident, but before
- it was replaced, it was already copied onto
- several websites. This map showed 74 staffed
- SCS locations, 14 unmanned remote controlled
- locations and 8 other locations as of August
- 2010. Except for the SCS locations in Europe,
- the names of all other cities were blurred
- by Der Spiegel.�
- - electrospaces.blogspot.fr
- REDACTED MAP (CENSORED)
- https://lh3.ggpht.com/-ymi_oEW0XcI/UpzfqqqPRsI/AAAAAAAABCs/WU4lKnfs52w/s320/scs-global-map-redacted.jpg
- UNREDACTED MAP (DEFAULT)
- http://postimg.org/image/6kzpypy1l/
- BOTH REDACTED AND UNREDACTED (ZIP | 223KB)
- http://f.lui.li/get_1065_f4ab.html
- ---------------------------------------
- � Decensoring SCS Locations ::
- http://cryptome.org/2013/12/decensoring-scs-slides.htm
- The NSA spies under diplomatic cover.
- _______________________________________
- � Five Eyes ::
- http://cryptome.org/2013/12/nsa-5-eyes-partners.pdf
- _______________________________________
- � A Conspiracy So Vast ::
- http://www.lewrockwell.com/2013/12/andrew-p-napolitano/a-conspiracy-so-vast%E2%80%A8/
- _______________________________________
- � PayPal Corporation Said To Be Implicated
- in Withheld NSA Documents ::
- http://www.youtube.com/watch?v=tTivPZZorWY
- http://www.boilingfrogspost.com/2013/12/11/bfp-breaking-news-omidyars-paypal-corporation-said-to-be-implicated-in-withheld-nsa-documents/
- _______________________________________
- � NSA GCHQ Spies on Video Game Geeks ::
- Say hello to undercover NSA orcs.
- http://cryptome.org/2013/12/nsa-gchq-spy-games.pdf
- http://cryptome.org/2013/12/nsa-spy-games.pdf
- http://arstechnica.com/tech-policy/2013/12/world-of-spycraft-nsa-gchq-hacked-wow-and-xbox-live-other-games/
- http://www.theguardian.com/world/2013/dec/09/nsa-spies-online-games-world-warcraft-second-life
- http://www.breitbart.com/Big-Government/2013/12/09/Report--NSA-spying-on-virtual-worlds--online-games
- http://www.businessinsider.com/spy-agencies-infiltrated-video-games-nsa-gchq-world-of-warcraft-2013-12
- _______________________________________
- � Rollingstone Describes NSA�s Influx of Money ::
- September 11th, which also happened to
- be Drake�s first day at Fort Meade, changed
- the equation. Drake explains the shift in
- two ways: The first was a massive expansion
- of US spying capabilities as the agency
- �unchained itself from the Constitution,�
- and began to spy on Americans and foreign
- citizens, at home and abroad. The other
- change, felt across the entire intelligence
- community, was a rapid expansion of the NSA
- itself.
- �Massive amounts of money were pumped
- into the NSA after 9/11, and Congress was
- saying, �How big do you want the check?��
- says Drake. With virtually every agency
- involved in tracking terrorists clamoring
- for its SIGINT, or signals intelligence,
- the NSA expanded its outposts in Texas,
- Georgia, Hawaii, Colorado and Utah, as
- well as listening posts abroad, and also
- went on a building spree at Fort Meade,
- where the NSA�s sprawling 5,000-acre
- campus is now almost 10 times the size
- of the Pentagon. By 2013, according to
- The Washington Post, the NSA had expanded
- its workforce by one-third, to about
- 33,000. The number of private companies
- it depended upon more than tripled during
- that time.
- Soon, thanks to this influx of money
- and the increasing reliance on the private
- sector to handle even sensitive jobs,
- the very heart of America�s intelligence
- infrastructure was being outsourced to
- contractors. �Essentially, 9/11 was a
- massive jobs program, in which the ticket
- you needed for the party was your clearance,�
- says Drake. �And tons of people were
- getting those clearances. So you had
- this huge apparatus being built, and
- the government was just managing it.
- And in some cases, they weren�t even
- doing that.� ... ...
- By the time Snowden joined the agency�s
- workforce, the surveillance he would
- later expose was becoming not just
- institutionalized but very big business.
- �It was around 2009, 2010 that you saw
- the full flower of that massive, massive
- bubble of money,� says Drake. �And people
- were taking it for a ride as far as it
- could go.� ... ...
- Prior to 2009, Snowden had considered
- leaking government secrets when he was
- at the CIA, but held off, he later said,
- not wanting to harm agents in the field,
- and hoping that Obama would reform the
- system. His optimism didn�t last long.
- �I watched as Obama advanced the very
- policies that I thought would be reined
- in,� he later said. As a result, he added,
- �I got hardened.� The more Snowden saw of
- the NSA�s actual business � and, particularly,
- the more he read �true information,�
- including a 2009 Inspector General�s report
- detailing the Bush era�s warrantless-
- surveillance program � the more he realized
- that there were actually two governments:
- the one that was elected, and the other,
- secret regime, governing in the dark.
- �If the highest officials in government
- can break the law without fearing punishment
- or even any repercussions at all, secret
- powers become tremendously dangerous.�
- http://www.rollingstone.com/politics/news/snowden-and-greenwald-the-men-who-leaked-the-secrets-20131204
- _______________________________________
- � Rajiv Pant Describes Snowden Files Transfer ::
- http://cryptome.org/2013/12/nyt-snowden-transfer.htm
- _______________________________________
- � Is British Intelligence in Damage Control? ::
- http://www.globalresearch.ca/british-intelligence-operation-to-kidnap-snowden-number-one-mi-6-officer-working-undercover-in-moscow-embassy/5358555
- _______________________________________
- � Snowden Leaks �Greatest Intelligence
- Failure Since World War 2� Exaggerated ::
- The Director of NSA claims Snowden stole
- 200,000 documents. Allegations in Australian
- press claim he stole �up to 20,000.� British
- authorities accuse Snowden of stealing 58,000.
- Claims are bruited in the 5 Eyes that this
- is the �greatest intelligence failure since
- World War 2.� High officials and ex-spies
- accuse Snowden and related media of engaging
- in terrorism.
- This suggests a counter-espionage campaign
- to exaggerate Snowden�s damage, of betrayal
- to his country, of aiding the enemy, of
- threatening national security. It is
- successfully restricting release of the
- Snowden material and will likely become
- more forceful as releases continue to the
- extent of legislation (open or secret)
- to criminalize release as a national
- security threat.
- http://cryptome.org/2013/12/snowden-civil-war.htm
- _______________________________________
- � KILLCEN ; Eyeballing_Snowden_Info.7z ::
- Includes most reports, slides and
- documents all related to the recent
- Snowden leaks so far up to December
- 4th of 2013. I�m still collecting
- any information that comes out and
- will provide updated archives from
- time to time. Grab this while you can.
- After decompression - the folder is
- titled �Eyeballing_Snowden_Info� and
- holds a total of 371MB decompressed.
- Eyeballing_Snowden_Info.7z
- (783 files | 7zip | 286MB)
- http://fileb.ag/iv8x797lqzdw
- http://uploadhero.co/dl/aBBhCePf
- http://bitshare.com/files/fuxhd3ry/Eyeballing_Snowden_Info.7z.html
- http://www.upload-box.com/index.php/files/get/0VPCtiKFxf/eyeballing-snowden-info.7z
- http://f.ishoo.ru/files/get/3GfGXXqGSH/eyeballing-snowden-info.7z
- http://davvas.com/frrbbi2975xe
- http://BillionUploads.com/hpww20r554x4
- http://bayfiles.net/file/119rR/Y6ax0Z/Eyeballing_Snowden_Info.7z
- _______________________________________
- � indonesia-spying-slides.zip (mirrored) ::
- http://up.sef.ps/xu/files/get/Aen2UBNeep/indonesia-spying-slides.zip
- http://document-space.com/index.php/files/get/yWGp5DplsK/indonesia-spying-slides.zip
- http://www.quickupdown.com/files/get/BEqtDnYz8M/indonesia-spying-slides.zip
- � Australian Intelligence Agency (ASD)
- Swaps Bulk Metadata With the NSA ::
- Australia�s intelligence apparatus mines
- the telecommunications data of ordinary
- Australians, and hands over the material
- to the US and its closest allies, according
- to the latest leaked document from Edward
- Snowden, partly published by the Guardian
- Australia web site.
- The document obtained by the former US
- National Security Agency (NSA) contractor
- confirms that the electronic surveillance
- agency, the Australian Signals Directorate
- (ASD), monitors the domestic population,
- as well as the people and governments of
- many Asian countries.
- Despite Australian legislation supposedly
- restricting the ASD�s internal spying,
- the agency hands over to the NSA and its
- global partners so-called metadata of
- the phone calls, texts, emails, on-line
- address books and social media posts of
- millions of people.
- This exposure of mass surveillance follows
- the recent revelations, also from documents
- leaked by Snowden, that the ASD, then known
- as the Defence Signals Directorate (DSD),
- tapped the phone calls of Indonesian
- prez Susilo Bambang Yudhoyono, and that
- Australian embassies throughout Asia
- operate as electronic listening posts
- for the US-led spying network.
- http://www.abc.net.au/news/2013-11-18/australia-spied-on-indonesian-president-leaked-docu
- http://www.abc.net.au/news/2013-11-18/canberra-jakarta-and-the-digital-great-game/5100502
- http://www.theguardian.com/world/2013/nov/18/australia-tried-to-monitor-indonesian-presidents-phone
- http://www.wsws.org/en/articles/2013/12/03/data-d03.html
- http://www.scmp.com/news/asia/article/1359356/indonesian-ambassador-australia-recalled-over-spying-claims
- http://www.voanews.com/content/indonesia-to-review-cooperation-with-australia-due-to-spying-claims/1792523.html
- � Australian Media Denounces Exposure of
- Indonesia Spying Operations ::
- The Australian Broadcasting Corporation�s
- (ABC) recent joint reporting of Australian
- espionage operations targeting Indonesian
- political figures has been furiously
- denounced by other media outlets for
- breaching �national security� and the
- �national interest.� The reaction
- underscores the extent to which the
- media establishment has been integrated
- into the state-intelligence apparatus.
- On November 18, after being approached
- by the Guardian with documents leaked
- by former National Security Agency (NSA)
- contractor Edward Snowden, the ABC
- co-released the story, revealing Australian
- phone tapping of Indonesian Prez Susilo
- Bambang Yudhoyono, his wife and eight
- senior political figures. The report
- triggered a still-unresolved diplomatic
- crisis for the Australian government, with
- the Indonesian president suspending military
- and intelligence cooperation.
- http://www.wsws.org/en/articles/2013/12/03/medi-d03.html
- _______________________________________
- � NSA G8 - G20 Summit SIGINT Directive ::
- Top secret documents retrieved by US
- whistleblower Edward Snowden show that
- Prime Minister Stephen Harper�s dictatorship
- allowed the largest American spy agency
- to conduct widespread surveillance in
- Canada during the 2010 G8 and G20 summits.
- The documents are being reported exclusively
- by CBC News.
- The briefing notes, stamped �Top Secret,�
- show the US turned its Ottawa embassy into
- a security command post during a six-day
- spying operation by the National Security
- Agency while US Prez Barack Obama and 25
- other foreign heads of government were on
- Canadian soil in June of 2010.
- The covert US operation was no secret to
- Canadian authorities. ... ...
- The world was still struggling to climb
- out of the great recession of 2008. Leaders
- were debating a wide array of possible
- measures including a global tax on banks,
- an idea strongly opposed by both the US
- and Canadian governments. That notion was
- eventually scotched.
- http://cryptome.org/2013/12/nsa-g8-g20-spying.pdf
- http://www.cbc.ca/news/politics/read-snowden-nsa-document-on-g8-g20-summit-surveillance-1.2447387
- http://www.cbc.ca/news/politics/new-snowden-docs-show-u-s-spied-during-g20-in-toronto-1.2442448
- http://www.wsws.org/en/articles/2013/12/03/cana-d03.html
- https://www.wsws.org/en/articles/2013/12/14/cses-d14.html
- � Canada�s CSEC Slides Expose Espionage
- Against Brazilian Ministry ::
- http://cryptome.org/2013/10/cse-br/cse-br.htm
- UPDATE ; 18 CSEC slides posted on PDF @
- cryptome.org, November 30, 2013.
- http://cryptome.org/2013/11/csec-br-spy.pdf
- � Interpreting the CSEC Presentation ::
- http://theoreti.ca/?p=5057
- � Minist�rio de Minas e Energia est� na
- mira de espi�es americanos e canadenses ::
- http://m.g1.globo.com/fantastico/noticia/2013/10/ministerio-das-minas-e-energia-esta-na-mira-de-espioes-americanos-e-canadenses.html
- TRANSLATED @ slexy.org
- http://slexy.org/view/s2tDGSktog
- � American and Canadian Spies Target Brazilian
- Energy and Mining Ministry (English) ::
- http://g1.globo.com/fantastico/noticia/2013/10/american-and-canadian-spies-target-brazilian-energy-and-mining-ministry.html
- � Canada�s CSEC Provides Data to NSA ::
- The politicians and corporate media
- would have Canadians believe that they
- have only �moved on� from discussing
- CSEC�s activities because there is
- nothing for Canadians to worry about.
- In reality, the CSEC is a vital tool
- of the Canadian ruling class that plays
- an important role in the pursuit of its
- imperialist foreign policy and in the
- surveillance and suppression of opposition
- at home. The size of CSEC�s staff�it
- employs almost 2,000 people and a further
- thousand military personnel assist its
- work�give an inkling of the scale of
- its activities.
- These include everything from supporting
- the overseas operations of the Canadian
- military, to spying on governments that
- are reputed allies of Canada and assisting
- CSIS and the RCMP in conducting a vast
- program of domestic surveillance. Of
- especial importance is the CSEC�s
- partnership with the NSA. According to
- former NSA technical director William
- Binney, the two organizations �have
- integrated personnel� i.e. swap personnel
- to improve seamless collaboration. They
- also share Internet surveillance programs.
- As a further element of its collaboration
- with the Five Eyes alliance, CSEC was
- relied on in the project of spying on
- diplomats and officials during the 2009
- London G20 meeting according to a report
- in the British newspaper The Guardian,
- which was based on documents supplied
- by Snowden. The highly sensitive operation
- involved the penetration of delegates�
- smartphones to monitor their email
- messages and calls.
- http://www.wsws.org/en/articles/2013/09/28/csec-s28.html
- http://www.scribd.com/doc/188094600/CSEC-Presentation
- � NSA CSEC Partnership ::
- http://cryptome.org/2013/12/nsa-csec-partners.pdf
- _______________________________________
- � EU Nations Address Mass Spying ::
- http://cryptome.org/2013/11/eu-mass-spying.pdf
- � EU Hearings On NSA ::
- http://www.europarl.europa.eu/committees/en/libe/events.html?id=hearings
- http://euobserver.com/justice/121979
- http://blog.cyberwar.nl/2013/11/viviane-reding-nsa-needs-counterweight.html
- � EU/US Data Protection Hoot ::
- http://cryptome.org/2013/11/eu-us-data-protect-13-1127.pdf
- � EU to Run Yet Another Ineffectual Probe ::
- http://www.theguardian.com/world/2013/dec/02/edward-snowden-un-investigation-surveillance
- _______________________________________
- Draft state-level legislation called the
- Fourth Amendment Protection Act would �
- in theory � forbid local governments from
- providing services to federal agencies
- that collect electronic data from Americans
- without a personalized warrant.
- No Utah lawmaker has came forward to
- introduce the suggested legislation yet,
- but at least one legislator has committed
- to doing so, according to Mike Maharrey
- of the Tenth Amendment Center. He declined
- to identify the lawmaker before the bill
- is introduced.
- �We are still very early in the campaign,
- and this is in fact a multi-step, multi-year
- long-term strategy,� says Maharrey, whose
- group is part of the OffNow coalition along
- with the Bill of Rights Defense Committee
- and a handful of other groups.
- The campaign is looking beyond Utah,
- Maharrey adds.
- http://www.usnews.com/news/articles/2013/12/03/some-nsa-opponents-want-to-nullify-surveillance-with-state-law
- _______________________________________
- � Guardian�s Reporters Face Threats and
- Intimidation From British Dictatorship ::
- In the months since, the Guardian has
- continued to make officials here exceedingly
- nervous by exposing the joint operations of
- US and British intelligence � particularly
- their cooperation in data collection and
- snooping programs involving British citizens
- and close allies on the European continent.
- In response, the Guardian is being called
- to account by British authorities for
- jeopardizing national security. The
- Guardian�s top editor, Alan Rusbridger,
- is being forced to appear before a
- parliamentary committee Tuesday to explain
- the news outlet�s actions.
- http://www.washingtonpost.com/world/europe/britain-targets-guardian-newspaper-over-intelligence-leaks-related-to-edward-snowden/2013/11/29/1ec3d9c0-581e-11e3-bdbf-097ab2a3dc2b_story.html
- http://www.infowars.com/uk-police-threaten-guardian-editor-with-terrorism-charges-over-snowden-leaks/
- http://www.wsws.org/en/articles/2013/10/18/guar-o18.html
- � Alan Rusbridger Interviewed ::
- http://www.washingtonpost.com/world/q-and-a-with-alan-rusbridger-editor-of-the-guardian/2013/11/29/11b36798-5821-11e3-bdbf-097ab2a3dc2b_story.html
- � US Dictatorship Fuels the Same Threats
- as the British Dictatorship ::
- Glenn Greenwald, the Guardian reporter who
- published Edward Snowden�s leaks, was
- recently suggested to be a criminal for
- shining light on the NSA�s abuse of power.
- This is a key identifiable step when societies
- close down; it is a point of no return. It
- seems the United States is reaching the event
- horizon to a police state.
- http://falkvinge.net/2013/06/30/with-journalism-persecuted-the-united-states-is-now-at-event-horizon-to-a-police-state/
- Cryptome noted
- �There have been no reports of leakage
- from the insurance stashes, the publication
- outlets or the various reported transmissions
- among them (except for the Miranda snatch by
- UKG), although there could be some which have
- not been disclosed, not known, were sold or
- bartered, or were stolen for future use.
- It is likely that intelligence and law
- enforcement agencies have made stringent
- efforts to access the documents by customarily
- secret burglary, bribery, barter, purchase,
- deception, co-optation.
- Those multiple persons and outlets who have
- had access, or suspected of access, are
- certain to have been targeted, some perhaps
- successfully persuaded to cooperate with
- promises of confidentiality, backed by
- threats if cooperation is refused -- a
- standard coercive means of authorities.
- While Edward Snowden is knowledgeable
- about counter-espionage and likely advised
- his initial correspondents, who in turn
- advised successive cooperators, usually
- these counter-operations are not revealed,
- but hints of them are leaked to discourage
- participation.
- Beyond that, it is customary to foment
- disputes and disagreements among competing
- publications, reporters, opinionators,
- experts, the spying industry and consumers,
- along with threats against families, friends
- and employers, as now occurring, to rattle
- and pressure targets to consider cooperating
- with authorities, including use of rewards
- -- monetary and career -- for informants.�
- http://cryptome.org/2013/11/snowden-related-targets.htm
- _______________________________________
- � NSA Describes Dutch SIGINT Spying ::
- http://cryptome.org/2013/11/nsa-dutch-sigint.pdf
- _______________________________________
- � Mass Surveillance Is Big Business ;
- Corporations Are as Good at Spying as
- Governments ::
- http://motherboard.vice.com/blog/mass-surveillance-is-big-business-corporations-are-as-good-at-spying-as-governments
- _______________________________________
- � NSA Spies on Pornography Viewing to
- Discredit Targeted Enemies ::
- http://cryptome.org/2013/11/nsa-muslim-porn.pdf
- http://www.techdirt.com/articles/20131127/00243625384/nsa-spied-porn-habits-radicalizers-planned-to-use-details-to-embarrass-them.shtml
- http://www.huffingtonpost.com/2013/11/26/nsa-porn-muslims_n_4346128.html
- http://www.dailykos.com/story/2013/11/26/1258660/-NSA-spied-on-radicalizers-to-discredit-them
- _______________________________________
- � NSA WINDSTOP, MUSCULAR, INCENSER Slides ::
- http://cryptome.org/2013/10/nsa-windstop-muscular-incenser.pdf
- � What Else Do We Know About MUSCULAR? ::
- http://cryptome.org/2013/10/nsa-muscular.htm
- � NSA WINDSTOP Month of Mass Spying ::
- http://cryptome.org/2013/11/nsa-windstop.pdf
- � NSA Collection Optimization Overview ::
- http://cryptome.org/2013/10/nsa-sso-overview.pdf
- � NSA Content Acquisition Optimization ::
- http://cryptome.org/2013/10/nsa-sso-content.pdf
- � NSA Collection Optimization Slides ::
- http://cryptome.org/2013/10/nsa-sso-slides.pdf
- � NSA SSO Cryptologic Provider ::
- http://cryptome.org/2013/11/nsa-sso-crypto.pdf
- � NSA SSO Yahoo, Google Exploitation ::
- http://cryptome.org/2013/11/nsa-sso-yahoo-google.pdf
- � NSA and GCHQ Breaks 3rd Party SSL to
- Steal Email Metadata ::
- Even though they cooperate with the US
- spy agency on court-ordered surveillance,
- firms like Google and Yahoo are subject to
- additional surveillance they never agreed to.
- Web companies host copies of your data on
- servers around the world, reducing the
- chance of losing your information should
- one fail. When you log in to an account
- with these firms, the data sent between
- you and their servers is encrypted, making
- it difficult to snoop � but the internal
- transfers between data centres are unencrypted.
- And because many of the transfers take place
- outside the US, approval from a FISA court
- isn�t required to tap the information.
- The National Security Agency has secretly
- broken into the main communications links
- that connect Yahoo and Google data centers
- around the world, according to documents
- obtained from former NSA contractor Edward
- Snowden and interviews with knowledgeable
- officials.
- By tapping those links, the agency has
- positioned itself to collect at will from
- hundreds of millions of user accounts,
- many of them belonging to Americans. The
- NSA does not keep everything it collects,
- but it keeps a lot.
- The NSA�s principal tool to exploit the
- data links is a project called MUSCULAR,
- operated jointly with the agency�s British
- counterpart, the Government Communications
- Headquarters. From undisclosed interception
- points, the NSA and the GCHQ are copying
- entire data flows across fiber-optic cables
- that carry information among the data
- centers of the Silicon Valley giants.
- http://www.washingtonpost.com/world/national-security/nsa-infiltrates-links-to-yahoo-google-data-centers-worldwide-snowden-documents-say/2013/10/30/e51d661e-4166-11e3-8b74-d89d714ca4dd_story.html
- http://articles.economictimes.indiatimes.com/2013-10-31/news/43528723_1_data-centers-google-claire-cain-miller
- http://www.newscientist.com/article/dn24519-nsa-snoops-tech-companies-fibreoptic-networks.html
- http://www.theguardian.com/technology/2013/nov/04/eric-schmidt-nsa-spying-data-centres-outrageous
- http://article.wn.com/view/2013/10/30/NSA_Broke_Into_Yahoo_Google_Data_Centers_Report/
- � NSA Collects Bulk Email Address Books ::
- In June, President Obama said the NSA�s
- email collecting program �does not apply
- to US citizens.�
- The National Security Agency is harvesting
- hundreds of millions of contact lists from
- personal e-mail and instant messaging
- accounts around the world, many of them
- belonging to Americans, according to
- senior intelligence officials and top-secret
- documents provided by former NSA contractor
- Edward Snowden.
- The collection program, which has not
- been disclosed before, intercepts e-mail
- address books and �buddy lists� from
- instant messaging services as they move
- across global data links. Online services
- often transmit those contacts when a user
- logs on, composes a message, or synchronizes
- a computer or mobile device with information
- stored on remote servers.
- http://www.washingtonpost.com/world/national-security/nsa-collects-millions-of-e-mail-address-books-globally/2013/10/14/8e58b5be-34f9-11e3-80c6-7e6dd8d22d8f_story.html
- http://www.theblaze.com/stories/2013/10/14/report-nsa-collects-millions-of-contact-lists-from-personal-email-and-instant-messaging-accounts-globally/
- http://www.theatlanticwire.com/technology/2013/10/nsa-collects-email-address-books-contact-lists/70535/
- � Special Collection Services Wikis ::
- http://cryptome.org/2013/11/scs-fr-us.pdf
- � NSA Exploits Microsoft Vulnerabilities ::
- http://cryptome.org/2013/11/nsa-microsoft.pdf
- http://s3.documentcloud.org/documents/841655/microsoft-realms-redacted.pdf
- http://cryptome.org/2013/11/nsa-microsoft-cloud-exploit.pdf
- http://s3.documentcloud.org/documents/841654/microsoft-in-cloud-exploitation-redacted.pdf
- http://www.theguardian.com/world/2013/jul/11/microsoft-nsa-collaboration-user-data
- ���������������������������������������
- � NSA�s Boundless Informant ::
- http://cryptome.org/2013/10/nsa-boundless-informant.pdf
- � NSA�s Boundless Informant Collected
- 124+ Billion Phone Calls in One Month ::
- http://cryptome.org/2013/10/nsa-125b-calls.htm
- � NSA�s Boundless Informant Metadata ::
- http://electrospaces.blogspot.com/2013/10/boundlessinformant-only-shows-metadata.html
- � Guardian�s Boundless Informant Report ::
- http://www.theguardian.com/world/2013/jun/08/nsa-boundless-informant-global-datamining
- � Le Monde�s Boundless Informant Report ::
- http://www.lemonde.fr/technologies/article/2013/10/21/france-in-the-nsa-s-crosshair-phone-networks-under-surveillance_3499741_651865.html
- � Three Boundless Informant �Heatmaps� ::
- http://cryptome.org/2013/10/nsa-boundless-informant-images.htm
- � NSA Boundless Informant Spied Norway ::
- http://cryptome.org/2013/11/nsa-boundlessinformant-no-33m.pdf
- � US Says France, Spain Aided NSA Spying ::
- http://cryptome.org/2013/10/nsa-us-france-spain.htm
- ---------------------------------------
- NOBODY comments ?
- Le Monde�s Boundless Informant document
- differs from the Guardians.
- Le Monde�s Boundless Informant Graph ...
- http://s3.documentcloud.org/documents/807033/boundless-monde.pdf
- Guardians� Boundless Informant Graph ...
- http://static.guim.co.uk/sys-images/Guardian/Pix/pictures/2013/6/8/1370716131074/boundless-heatmap-008.jpg
- Le Monde shows 3,095,533,478 intercepts
- in the US compared to the Guardian showing
- 2,392,343,446 US intercepts.
- Le Monde�s Boundless Informant graph
- shows the �aggregate� estimate, both
- digital networks (DNI) and telephony (DNR)
- interception ; while the Guardian�s graph
- only shows the digital �DNI� estimate.
- ---------------------------------------
- � DRTBOX and the DRT Surveillance Systems ::
- http://electrospaces.blogspot.com/2013/11/drtbox-and-drt-surveillance-systems.html
- � BOUNDLESS INFORMANT Explicated ::
- This was written from a person who purports
- to actually use the Boundless Informant tool.
- http://cryptome.org/2013/11/nsa-boundless-informant-explicated.htm
- � RE-BOUNDLESS INFORMANT Explicated ::
- http://cryptome.org/2013/11/nsa-boundless-informant-gm-place.htm
- � BOUNDLESS INFORMANT Screenshots Can Be
- Misleading ::
- http://electrospaces.blogspot.com/2013/11/screenshots-from-boundlessinformant-can.html
- � DNI Masterspy Says Le Monde Misleads
- on NSA Spying ::
- http://cryptome.org/2013/10/dni-13-1022.pdf
- �Recent articles published in the
- French newspaper Le Monde contain
- inaccurate and misleading information
- regarding US foreign intelligence
- activities. The allegation that the
- National Security Agency collected more
- than 70 million �recordings of French
- citizens� telephone data� is false.
- While we are not going to discuss the
- details of our activities, we have
- repeatedly made it clear that the
- United States gathers intelligence of
- the type gathered by all nations. The
- US collects intelligence to protect the
- nation, its interests, and its allies
- from, among other things, threats such
- as terrorism and the proliferation of
- weapons of mass destruction.
- The United States values our longstanding
- friendship and alliance with France and
- we will continue to cooperate on security
- and intelligence matters going forward.�
- James R. Clapper
- Director of National Intelligence
- ---------------------------------------
- � Snowden Responds to Feinstein�s Stupidity ::
- http://thehill.com/blogs/hillicon-valley/technology/330497-snowden-fires-back-at-feinstein-over-surveillance-claim
- �Today, no telephone in America makes
- a call without leaving a record with the
- NSA. Today, no Internet transaction enters
- or leaves America without passing through
- the NSA�s hands,� Snowden said in a
- statement Thursday.
- �Our representatives in Congress tell us
- this is not surveillance. They�re wrong.�
- _______________________________________
- � US and UK Governments Still Worry Over
- Cache of Encrypted Documents by Snowden ::
- US and British intelligence officials
- say they are concerned about a �doomsday�
- collection of highly classified, heavily
- encrypted materials they believe former
- National Security Agency contractor
- Edward Snowden may have stored away.
- One source saw the cache of documents
- as an �insurance policy� for Snowden
- should he feel threatened by arrest or
- other harm. ... ...
- Adding merit to the suspicion that the
- well-secured cache may be an insurance
- policy of sorts, Greenwald said in June
- that �if anything happens at all to
- Edward Snowden, he has arranged for them
- to get access to the full archives.�
- http://www.infowars.com/us-uk-officials-worry-snowden-still-has-doomsday-collection-of-classified-material/
- _______________________________________
- � (Go Figure) Obama�s �Overhaul� of Spy
- Programs Cloaked in More Secrecy ::
- Obama has been gradually tweaking vast
- government surveillance policies. But he
- is not disclosing those changes to the
- public. Has he stopped spying on friendly
- world leaders? He won�t say. Has he stopped
- eavesdropping on the United Nations, the
- World Bank and the International Monetary
- Fund? He won�t say.
- Even the report by the group Obama created
- to review and recommend changes to his
- surveillance programs has been kept secret.
- http://www.mcclatchydc.com/2013/11/25/209465/obamas-overhaul-of-spy-programs.html
- _______________________________________
- � NSA Report Outlined Goals for More Power ::
- Officials at the National Security Agency,
- intent on maintaining its dominance in
- intelligence collection, pledged last year
- to push to expand its surveillance powers,
- according to a top-secret strategy document.
- Written as an agency mission statement with
- broad goals, the five-page document said
- that existing American laws were not adequate
- to meet the needs of the NSA to conduct broad
- surveillance in what it cited as �the golden
- age of Sigint,� or signals intelligence.
- �The interpretation and guidelines for
- applying our authorities, and in some cases
- the authorities themselves, have not kept
- pace with the complexity of the technology
- and target environments, or the operational
- expectations levied on NSA�s mission,� the
- document concluded.
- http://cryptome.org/2013/11/nsa-sigint-strategy-2012-2016.pdf
- http://cryptome.org/2013/11/nsa-power-goals.htm
- http://www.nytimes.com/2013/11/23/us/politics/nsa-report-outlined-goals-for-more-power.html
- http://rt.com/usa/snowden-leak-expand-surveillance-goal-185/
- http://www.dailydot.com/politics/snowden-leak-nsa-power/
- � NSA TreasureMap Description ::
- The NY Times today cites an NSA tool
- called Treasure Map and describes its
- capabilities but does not publish visual
- examples. Also cited is Packaged Goods,
- an associated tool. If publicly available,
- Cryptome asked for pointers to the two.
- http://cryptome.org/2013/11/nsa-treasuremap.htm
- _______________________________________
- � Documents Show Tony Blair Let US Spy Britons ::
- http://www.channel4.com/news/nsa-edward-snowden-america-britain-tony-blair
- _______________________________________
- � GCHQ ROYAL CONCIERGE Diplomatic Hotel Spy ::
- http://cryptome.org/2013/11/gchq-royal-concierge-de.pdf
- http://cryptome.org/2013/11/gchq-royal-concierge.jpg
- � GCHQ Monitors Diplomats Hotel Bookings ::
- Britain�s GCHQ intelligence service monitors
- diplomats� travels using a sophisticated
- automated system that tracks hotel bookings.
- Once a room has been identified, it opens
- the door to a variety of spying options.
- http://www.spiegel.de/international/europe/gchq-monitors-hotel-reservations-to-track-diplomats-a-933914.html
- _______________________________________
- � Supreme Court Blocks Challenge to Spying ::
- �We ask the NSA to immediately suspend
- collection of solely domestic communications
- pending the competition of a public rulemaking
- as required by law. We intend to renew our
- request each week until we receive your
- response,� EPIC said.
- Five months later, though, the Supreme Court
- said this week that it would not be hearing
- EPIC�s plea. A document began circulating
- early Monday in which the high court listed
- the petition filed by the privacy advocates
- as denied.
- http://rt.com/usa/supreme-court-nsa-spying-906/
- http://www.infowars.com/supreme-court-blocks-challenge-to-nsa-phone-tracking/
- _______________________________________
- � NSA Deputy Director John Inglis Speaks ::
- http://www.youtube.com/watch?v=6ydkw4xgZ-Y
- � Intelligence Community Lawyers Argue
- Over Metadata Hoarding ::
- http://www.techdirt.com/articles/20131105/08030825135/dni-lawyer-argues-that-curbing-metadata-collections-will-damage-americans-privacy.shtml
- http://www.dailybinarynews.com/intelligence-community-lawyers-argue-that-curbing-metadata-collections-will/
- � Bill Clinton Warns We Have No Security,
- No Privacy ::
- http://www.infowars.com/bill-clinton-on-nsa-spying-we-are-on-the-verge-of-having-the-worst-of-all-worlds-well-have-no-security-and-no-privacy/
- � Obama Regime Pledges to Continue Illegal
- Spying Programs ::
- http://www.wsws.org/en/articles/2013/11/06/spyi-n06.html
- � John McCain Interview by Der Spiegel ::
- http://cryptome.org/2013/11/mccain-nsa-affair.pdf
- http://www.spiegel.de/international/world/interview-with-john-mccain-on-nsa-spying-on-angela-merkel-a-932721.html
- _______________________________________
- � NSA & GCHQ �Bullrun� Decryption Brief ::
- http://cryptome.org/2013/09/nsa-bullrun-brief-propublica-13-0905.pdf
- http://s3.documentcloud.org/documents/784284/bullrun-briefing-sheet-from-gchq.pdf
- � NSA & GCHQ �Bullrun� Decryption Guide ::
- http://cryptome.org/2013/09/nsa-bullrun-2-16-guardian-13-0905.pdf
- http://s3.documentcloud.org/documents/784047/bullrun-guide-final.pdf
- � NSA ; Cryptanalysis & Exploitation ::
- �TOP SECRET//COMINT at a minimum�
- �(TS//SI) The fact that NSA/CSS makes
- cryptographic modifications to commercial
- or indigenous cryptographic information
- security devices or systems in order to
- make them exploitable.�
- �TOP SECRET//COMINT at a minimum�
- �(U//FOUO) The fact that NSA/CSS
- successfully exploits cryptographic
- components of commercial information
- security devices or systems when the
- device or system specified.�
- http://cryptome.org/2013/09/nsa-cryptanalysis-2-12-guardian-13-0905.pdf
- http://s3.documentcloud.org/documents/784048/crypt-guide2.pdf
- � NSA & GCHQ Breaks Other SIGINT Crypto ::
- http://cryptome.org/2013/09/nsa-sigint-enabling-guardian-13-0905.pdf
- http://cryptome.org/2013/09/nsa-sigint-enabling-propublica-13-0905.pdf
- http://cryptome.org/2013/09/nsa-sigint-enabling-redacts.jpg
- � NSA and GCHQ Defeats Encryption ::
- US and British intelligence agencies
- have successfully cracked much of the
- online encryption relied upon by hundreds
- of millions of people to protect the
- privacy of their personal data, online
- transactions and emails, according to
- top-secret documents revealed by former
- contractor Edward Snowden. ...
- Those methods include covert measures
- to ensure NSA control over setting of
- international encryption standards, the
- use of supercomputers to break encryption
- with �brute force�, and � the most closely
- guarded secret of all � collaboration with
- technology companies and internet service
- providers themselves.
- Through these covert partnerships, the
- agencies have inserted secret vulnerabilities
- � known as backdoors or trapdoors � into
- commercial encryption software. ... ...
- Independent security experts have long
- suspected that the NSA has been introducing
- weaknesses into security standards, a fact
- confirmed for the first time by another
- secret document. It shows the agency
- worked covertly to get its own version
- of a draft security standard issued by
- the US National Institute of Standards
- and Technology approved for worldwide
- use in 2006.
- http://www.theguardian.com/world/2013/sep/05/nsa-gchq-encryption-codes-security
- � Full Guardian Report Mirrored ::
- http://cryptome.org/2013/09/nsa-decrypt-guardian-13-0905.pdf
- � Full New York Times Report Mirrored ::
- http://cryptome.org/2013/09/nsa-decrypt-nyt-13-0905.pdf
- � Full ProPublica Report Mirrored ::
- http://cryptome.org/2013/09/nsa-decrypt-propublica-13-0905.pdf
- � Bruce Schneier - NSA Cracks Crypto ::
- http://cryptome.org/2013/09/nsa-decrypt-schneier-13-0905-01.pdf
- http://cryptome.org/2013/09/nsa-decrypt-schneier-13-0905-02.pdf
- http://cryptome.org/2013/09/nsa-decrypt-schneier-13-0905-03.pdf
- � Matthew Green - NSA Cracks Crypto ::
- http://cryptome.org/2013/09/nsa-decrypt-matthew-green-13-0905.pdf
- http://cryptome.org/2013/09/nsa-decrypt-matthew-green-13-0910.pdf
- � DNI Response to NSA Cracks Crypto ::
- http://cryptome.org/2013/09/nsa-decrypt-masterspy-13-0906.htm
- � Cryptography List Members Face Ulcers ::
- http://cryptome.org/2013/09/nsa-decrypt-cryptography-13-0905.htm
- � Documents Confirm �Back Doors� Inserted
- Into Web and Software to Exploit Crypto ::
- http://rt.com/usa/nsa-gchq-encryption-snowden-478/
- http://www.infowars.com/documents-confirm-nsa-inserts-back-doors-into-web-software/
- A range of US hardware and software
- companies are in danger of being dragged
- into the widening scandal over internet
- surveillance, following the latest leaks
- from Edward Snowden, the former National
- Security Agency contractor.
- The leaked documents include NSA claims
- that it has collaborated with technology
- companies to plant �back doors� into
- their systems � or ways for the agency
- secretly to penetrate systems without
- the users� knowledge.
- http://www.ft.com/cms/s/0/0054adb2-1709-11e3-9ec2-00144feabdc0.html
- � You Are the Enemy of the Police State ::
- http://anewdomain.net/2013/09/06/john-c-dvorak-nsa-spying-americans-now-enemy/
- _______________________________________
- � SSL Inspector ::
- http://www.wikileaks.org/spyfiles/docs/NETRONOME-2011-SSLInsp-en.pdf
- � Examining SSL-Encrypted Communications ::
- http://www.wikileaks.org/spyfiles/docs/METRONOME-2011-ExamSSL-Comm-en.pdf
- _______________________________________
- � Bobby R. Inman Suggests NSA Declassify
- All Suspected Leaks From Snowden ASAP ::
- http://www.nytimes.com/2013/11/03/world/no-morsel-too-minuscule-for-all-consuming-nsa.html?_r=0
- � Around 42 Years to Publish All Leaks ::
- http://cryptome.org/2013/11/snowden-tally.htm
- � US SIGINT Strategic Mission 2007 ::
- http://cryptome.org/2013/11/nsa-sigint-strategic-mission-2007.pdf
- � US SIGINT Strategic Mission 2013 ::
- http://cryptome.org/2013/11/nsa-sigint-strategic-mission-2013.pdf
- � A Weeks Worth of Eavesdropping ::
- http://cryptome.org/2013/11/nsa-week-spy-2009.pdf
- ���������������������������������������
- � Greenwald�s Partner, David Miranda
- Accused of Terrorism in the UK ::
- http://www.reuters.com/article/2013/11/01/us-uk-nsa-idUSBRE9A013O20131101
- ���������������������������������������
- � Meet the Spies Doing the NSA�s Dirty Work ::
- The heart of the FBI�s signals intelligence
- activities is an obscure organization called
- the Data Intercept Technology Unit, or DITU
- (pronounced DEE-too). The handful of news
- articles that mentioned it prior to revelations
- of NSA surveillance this summer did so mostly
- in passing. It has barely been discussed in
- congressional testimony. An NSA PowerPoint
- presentation given to journalists by former
- NSA contractor Edward Snowden hints at DITU�s
- pivotal role in the NSA�s Prism system --
- it appears as a nondescript box on a flowchart
- showing how the NSA task[s] information to
- be collected, which is then gathered and
- delivered by the DITU.
- The DITU is located in a sprawling compound
- at Marine Corps Base Quantico in Virginia,
- home of the FBI�s training academy and the
- bureau�s Operational Technology Division,
- which runs all the FBI�s technical intelligence
- collection, processing, and reporting.
- http://www.foreignpolicy.com/articles/2013/11/21/the_obscure_fbi_team_that_does_the_nsa_dirty_work
- � More PRISM Slides Published ::
- http://cryptome.org/2013/10/nsa-prism-13-1021.pdf
- https://s3.amazonaws.com/s3.documentcloud.org/documents/807036/prism-entier.pdf
- http://www.lemonde.fr/technologies/article/2013/10/21/espionnage-de-la-nsa-tous-les-documents-publies-par-le-monde_3499986_651865.html
- � PRISM ; FAA Passive Spying ::
- http://cryptome.org/2013/10/nsa-wanadoo-alcatel.pdf
- http://s3.documentcloud.org/documents/807031/wanadoo-alcatel.pdf
- http://www.lemonde.fr/technologies/article/2013/10/21/espionnage-de-la-nsa-tous-les-documents-publies-par-le-monde_3499986_651865.html
- � Compare PRISM Slide Publication ::
- http://cryptome.org/2013-info/10/le-monde-prism/le-monde-prism.htm
- � NSA PRISM Slides From Guardian ::
- http://cryptome.org/2013/11/nsa-prism-guardian-13-1101.pdf
- � Le Monde�s PRISM Report (TRANSLATED) ::
- http://www.lemonde.fr/technologies/article/2013/10/21/l-ampleur-de-l-espionnage-mondial-par-la-nsa_3499756_651865.html
- The magnitude of the global espionage
- by the NSA.
- During the summer, the documents provided
- to the Guardian and the Washington Post by
- former NSA employee Edward Snowden helped
- unveil the extent of surveillance and
- espionage carried out by the NSA and its
- allies. Le Monde also now has access to
- some of these documents.
- Before the summer, the NSA was the most
- secretive intelligence agencies of the
- United States. Then came Edward Snowden,
- who was granted an asylum for a year in
- Russia. Wanting to denounce "the largest
- program of arbitrary monitoring of human
- history," the American working for a
- subcontractor of the NSA has obtained
- several thousands of highly confidential
- documents.
- In early June, the first secrets of the
- National Security Agency in these parts
- start to filter. The Guardian reveals
- that the telephone operator Verizon
- provides NSA phone data of several
- million Americans, according to a court
- order secret. Then it was the turn of
- the Prism program to be unveiled. It
- allows the US Secret Service, and first
- and foremost to the NSA, to access a
- privileged manner, since December 2007,
- data from nine major Internet companies,
- including Google, Facebook and Microsoft.
- MONITORING OF SUBMARINE CABLE
- A document providing internal training
- on Prism, which Le Monde has also had
- access, how the NSA analysts can query
- the databases of Web giants, research
- documents, emails or instant discussions.
- All within a legal framework that
- overcomes the request of an individual
- mandate. The companies named in the
- documents have denied that the NSA
- had a direct and unilateral access to
- their servers.
- In addition to this targeted surveillance,
- Snowden records reveal another method of
- massive collection of the NSA called
- Upstream. This system can collect data
- from the submarine cable and Internet
- infrastructures. A logical strategy,
- when we know that 99% of global
- communications now pass through diving.
- To learn more about the context of the
- revelations of the World, the editorial
- read : "Fight Big Brother"
- The British equivalent of the NSA, the
- Government Communications Headquarters
- (GCHQ), plays a major role in this system,
- because of the historical proximity of
- Great Britain and the United States,
- confidentiality agreements and a financial
- dependence of those services from London
- to Washington. There are also technical
- reasons : a significant portion of
- submarine cables linking Europe to
- America through Britain. With Edward
- Snowden, the Tempora program , which
- aims to "control the Internet" by
- monitoring these cables, has been
- revealed. "You're in an enviable
- position, says a document presenting
- Tempora, presented by the Guardian,
- have fun and pull in the best." Turning
- a page of the document presenting the
- Prism program, we discover Upstream
- relies on four programs (Blarney, Fairview,
- and oakstar Stormbrew ) which we know to
- date, the outline. Fairview, for example,
- would largely on intercepted telephone
- conversations via the major US carriers.
- DATA ANALYSIS TOOLS
- Many tools are needed to sort the mass
- of intercepted data. One of them is called
- XKeyscore, and its operation has been
- detailed in the columns of the Guardian.
- The extreme precision of the data are
- clear. With XKeyscore, analysts can access
- the content of e-mails to a list of
- websites visited by their target or the
- keywords entered by the latter in the
- search engines.
- The framework for this research is not
- binding, as the Guardian explained, and
- many Americans are data made available to
- agents. According to the presentation
- materials, to promote the capabilities
- of the tool, three hundred terrorists
- have been arrested since 2008 thanks to
- XKeyscore.
- NSA and GCHQ not only devote their
- considerable resources monitoring the
- fight against terrorism, but also to
- spy allies. At the G20 summit in London
- in 2009, computers of diplomats and heads
- of state were monitored by GCHQ, as well
- as some of their phone calls. NSA, she
- focused on the European Union (EU), as
- revealed by Der Spiegel, always on the
- basis of documents Snowden. NSA has
- installed cookies on the premises of
- the EU representation in Washington.
- The EU delegation to the UN in New York,
- and the building of the Council of the
- European Union in Brussels were also
- scrutinized by the US agency. Brazil
- is also one of the countries affected
- by this intelligence. According to
- Brazilian media group O Globo, its
- political leaders as some companies
- have been targeted.
- The Snowden documents have informed
- the considerable efforts made by the
- United States to start listening to
- Internet, in a sometimes unclear legal
- framework and often away from real
- democratic debate. Interviewed by
- Le Monde, the US authorities have
- assured that the Prism program was
- the subject of a parliamentary debate
- in the United States and was working
- in a strictly regulated legal framework.
- Asked on September 12 revelations
- Snowden, James Clapper, the US Director
- of National Intelligence, said: "What
- happened - and that is harmful -
- sparked conversation and debate that
- it probably was necessary."
- _______________________________________
- � UN Resolution Against US Spying ::
- http://cryptome.org/2013/10/un-v-us-spying.htm
- � 21 Nations Line Up Behind UN Effort ::
- http://thecable.foreignpolicy.com/posts/2013/10/25/exclusive_21_nations_line_up_behind_un_effort_to_restrain_nsa
- � Government May Stop Spying On So-called
- �World Leaders�, But Not You ::
- http://www.infowars.com/government-may-stop-spying-on-world-leaders-but-not-you/
- NOBODY comments
- 100% expected. They will continue to
- spy on 99.9% of the world, no doubt.
- Any secret data-hoardering agency will.
- We must adjust to it by learning how
- to counter their surveillance.
- � UPDATE ; Inside America�s Plan to Kill
- Online Privacy Rights Everywhere ::
- The United States and its key intelligence
- allies are quietly working behind the scenes
- to kneecap a mounting movement in the United
- Nations to promote a universal human right
- to online privacy, according to diplomatic
- sources and an internal American government
- document obtained by The Cable.
- The diplomatic battle is playing out in an
- obscure UN General Assembly committee that
- is considering a proposal by Brazil and
- Germany to place constraints on unchecked
- internet surveillance by the National
- Security Agency and other foreign intelligence
- services. American representatives have made
- it clear that they won�t tolerate such
- checks on their global surveillance network.
- The stakes are high, particularly in
- Washington -- which is seeking to contain
- an international backlash against NSA
- spying -- and in Brasilia, where Brazilian
- President Dilma Roussef is personally
- involved in monitoring the UN negotiations.
- http://cryptome.org/2013/11/us-kill-privacy.htm
- http://thecable.foreignpolicy.com/posts/2013/11/20/exclusive_inside_americas_plan_to_kill_online_privacy_rights_everywhere
- _______________________________________
- � Keith Alexander Promotes NSA / Scorns
- Public News Coverage ::
- http://www.youtube.com/watch?v=6Kc5Xvr24Aw
- http://www.politico.com/blogs/under-the-radar/2013/10/nsa-chief-stop-reporters-selling-spy-documents-175896.html
- http://www.theguardian.com/commentisfree/2013/oct/25/europe-erupts-nsa-spying-chief-government
- _______________________________________
- � Leaked Memos Reveal GCHQ Efforts to
- Keep Mass Surveillance Secret ::
- http://www.theguardian.com/uk-news/2013/oct/25/leaked-memos-gchq-mass-surveillance-secret-snowden
- _______________________________________
- � US Dictatorship Spied Mexican Dictator ::
- The National Security Agency (NSA) has
- a division for particularly difficult
- missions. Called �Tailored Access Operations�
- (TAO), this department devises special
- methods for special targets.
- That category includes surveillance of
- neighboring Mexico, and in May 2010,
- the division reported its mission
- accomplished. A report classified as
- �top secret� said: �TAO successfully
- exploited a key mail server in the
- Mexican Presidencia domain within the
- Mexican Presidential network to gain
- first-ever access to President Felipe
- Calderon�s public email account.�
- http://www.spiegel.de/international/world/nsa-hacked-email-account-of-mexican-president-a-928817.html
- http://cryptome.org/2013/10/nsa-leak-mx-2.htm
- Cryptome comments ?
- This spying was apparently done from
- the NSA�s Medina Regional SIGINT Operations
- Center (MRSOC), Lackland Air Force Base
- Annex, San Antonio, TX (formerly Medina
- Regional SIGINT Operations Center):
- http://cryptome.org/2012-info/nsa-mrsoc-2012/nsa-mrsoc-2012.htm
- http://cryptome.org/mrsoc.pdf
- _______________________________________
- � More NSA Targets Revealed ::
- http://cryptome.org/2013/10/nsa-selected-coverage.htm
- � NSA Spies on French Government ::
- http://cryptome.org/2013/10/nsa-close-access-sigads.pdf
- � NSA Spies on Indian Government ::
- http://cryptome.org/2013/10/india-close-access-sigads.pdf
- � NSA Spies on Everyone ::
- http://www.theguardian.com/world/2013/oct/24/nsa-surveillance-world-leaders-calls
- � EU Rules New Policy to Curb NSA Spying ::
- http://www.theguardian.com/world/2013/oct/17/eu-rules-data-us-edward-snowden
- � Other Governments �Envious� of NSA ::
- http://theweek.com/article/index/251628/why-the-nsa-spies-on-france-and-germany
- David Addington, Cheney�s chief of staff,
- thought that the NSA should use its
- technology to intercept emails and
- telephone calls sent from one domestic
- terminal to another, and was upset to
- learn that Hayden thought differently.
- That was a line he would only cross,
- deliberately, with court and congressional
- approval. Addington dropped the idea,
- but as we now know, the agency added
- to its portfolio a mandate to monitor
- suspicious communications that transited
- the border of the United States, and
- later began to collect reams of metadata
- in order to analyze it.
- Hayden wasn�t being cautious just for
- the record: NSA�s job was to collect
- foreign intelligence � to steal stuff,
- or purloin letters, real and digital,
- in order to provide policymakers with a
- decision advantage. The advantage the
- NSA provided was accurate information
- about what people who interacted with
- the United States said in private about
- their intentions; that gap between saying
- and doing, and the ability to predict
- action from it, allows the president of
- the United States to stay a step ahead.
- It�s one thing to say that the United
- States� actions don�t always match up
- with the values we espouse, and that�s
- true. When our hypocrisy is exposed,
- our moral authority wanes and our
- ability to maneuver is reduced.
- It�s quite another to assume that other
- countries are any purer. They never have
- been and probably won�t be. Many are much
- purer than others, so the amount of
- resources the intelligence community
- devotes to harder strategic targets ought
- to correspond with how honest our allies
- are, or how little they deceive us. The
- egg comes before the chicken: How the hell
- can we figure out which allies are more
- reliable if we don�t figure out the
- correspondence between public and private
- words and actions.
- Of course, Brazil, France, Germany, and
- Mexico do exactly the same thing. They
- want their leaders to gain a decision
- advantage in the give and take between
- countries. They want to know what US
- policymakers will do before the Americans
- do it. And in the case of Brazil and
- France, they aggressively spy on the
- United States, on US citizens and
- politicians, in order to collect that
- information. The difference lies in the
- scale of intelligence collection: The
- US has the most effective, most distributed,
- most sophisticated intelligence community
- in the West. It is Goliath. And other
- countries, rightly in their mind, are
- envious.
- _______________________________________
- � NSA Involvement in Drone Kill Operations ::
- http://www.washingtonpost.com/world/national-security/documents-reveal-nsas-extensive-involvement-in-targeted-killing-program/2013/10/16/29775278-3674-11e3-8a0e-4e2cf80831fc_story.html
- _______________________________________
- � 58 Things Learned About NSA Spying ::
- http://www.tedgioia.com/nsa_facts.html
- ���������������������������������������
- � Brazil Prepares to Counter NSA�s PRISM
- with �Secure Email� Plan ::
- http://www.theregister.co.uk/2013/10/14/brazil_waxes_lyrical_on_security/
- _______________________________________
- � Dutch Cabinet Response to Parliamentary
- Questions About NSA Wiretapping ::
- http://blog.cyberwar.nl/2013/10/dutch-govt-response-to-parliamentary.html
- _______________________________________
- This week Edward Snowden received the
- Integrity Award from the Sam Adams Associates
- for Integrity in Intelligence. These videos
- from the award ceremony are the first of
- Mr Snowden after being granted asylum in
- Russia.
- http://wikileaks.org/Video-Edward-Snowden-wins-Sam.html
- ���������������������������������������
- ? GCHQ Freaks Out Over Recent Leaks ::
- Andrew Parker, the director general
- of the Security Service, said the
- exposing of intelligence techniques,
- by the Guardian newspaper, had given
- fanatics the ability to evade the spy
- agencies.
- http://www.telegraph.co.uk/news/uknews/terrorism-in-the-uk/10365026/GCHQ-leaks-have-gifted-terrorists-ability-to-attack-at-will-warns-spy-chief.html
- � NSA & GCHQ Counter-Tor Slides ::
- �Use cookies to identify Tor users when
- they are not using Tor.�
- �Investigate Evercookie persistence.�
- http://cryptome.org/2013/10/nsa-tor-stinks.pdf
- ---------------------------------------
- Here is evercookie.sol found from an
- old bleach log.
- C:\Documents and Settings\Owner\Application Data\
- Macromedia\Flash Player\#SharedObjects\ED5YHQQU\
- bbcdn-bbnaut.ibillboard.com\server-static-files\
- bbnaut.swf\evercookie.sol
- bbnaut.swf holding evercookie.sol
- �SWF is an Adobe Flash file format used
- for multimedia, vector graphics and
- ActionScript. Originating with FutureWave
- Software, then transferred to Macromedia,
- and then coming under the control of Adobe,
- SWF files can contain animations or applets
- of varying degrees of interactivity and
- function.
- There are also various third party
- programs that can produce files in
- this format, such as Multimedia Fusion,
- Captivate and SWiSH Max.�
- �.sol files are created by Adobe Flash
- Player to hold Local Shared Objects,
- data stored on the system running the
- Flash player.�
- ---------------------------------------
- ? NOBODY comments on Evercookie
- Evercookie is an .sol format, created
- as a macromedia (or flashplayer) cache.
- It can be found within Windows systems
- and can be wiped out here ;
- C:\Documents and Settings\User\
- Application Data\Macromedia\
- and may also be cloned here ;
- C:\WINDOWS\system32\Macromed\Flash\
- I recommend users ALWAYS bleach their
- cache, cookies, logs, TEMP.
- The %TEMP% directory can be found here ;
- C:\Documents and Settings\User\
- Local Settings\Temp\
- ---------------------------------------
- � Adobe Flash Player Registry �
- http://code.str0.be/view/1d23ed24
- http://ae7.st/p/6ci (mirror)
- � swflash.ocx Raw Data Dump �
- http://code.str0.be/view/41185b11
- http://ae7.st/p/1ve (mirror)
- � Evercookie Cache Format Registry �
- http://pb.stoleyour.com/view/1d527692
- http://ae7.st/p/35m (mirror)
- � Adobe �Asset Cache� Format Registry �
- http://pb.stoleyour.com/view/722ea22f
- http://ae7.st/p/4rq (mirror)
- � Macromedia - a Third-party Cacher �
- http://p.pomf.se/1252
- http://ae7.st/p/5dk (mirror)
- ---------------------------------------
- http://en.wikipedia.org/wiki/Evercookie
- Evercookie is a JavaScript-based
- application created by Samy Kamkar
- which produces zombie cookies in a
- web browser that are intentionally
- difficult to delete. ... ...
- An Evercookie is not merely difficult
- to delete. It actively resists deletion
- by copying itself in different forms on
- the user�s machine and resurrecting
- itself if it notices that some of the
- copies are missing or expired.
- Specifically, when creating a new cookie,
- Evercookie uses the following storage
- mechanisms when available:
- � Standard HTTP cookies
- � Local Shared Objects (Flash cookies)
- � Silverlight Isolated Storage
- � Storing cookies in RGB values of
- auto-generated, force-cached PNGs
- using HTML5 Canvas tag to read pixels
- (cookies) back out
- � Storing cookies in Web history
- � Storing cookies in HTTP ETags
- � Storing cookies in Web cache
- � window.name caching
- � Internet Explorer userData storage
- � HTML5 Session Storage
- � HTML5 Local Storage
- � HTML5 Global Storage
- � HTML5 Database Storage via SQLite
- ---------------------------------------
- � Cookies Threaten Tor User Anonymity ::
- �Just because you�re using Tor doesn�t
- mean that your browser isn't storing
- cookies,� said Jeremiah Grossman, a
- colleague of Hansen�s who also specializes
- in browser vulnerabilities.
- As Grossman described the procedure to
- CNET, the NSA is aware of Tor�s entry
- and exit nodes because of its Internet
- wide surveillance.
- �The very feature that makes Tor a
- powerful anonymity service, and the
- fact that all Tor users look alike on
- the Internet, makes it easy to
- differentiate Tor users from other
- Web users,� he wrote.
- �The NSA then cookies that ad, so that
- every time you go to a site, the cookie
- identifies you. Even though your IP
- address changed [because of Tor], the
- cookies gave you away,� he said.
- http://news.cnet.com/8301-1009_3-57606178-83/nsa-tracks-google-ads-to-find-tor-users/
- ---------------------------------------
- � GCHQ ; MULLENIZE Operation to Tag and
- Identify Packet Traffic From Machines ::
- �Working together, CT and CNE have
- devised a method to carry out large-scale
- �staining� as a means to identify
- individual machines linked to that
- IP address. ... ...
- User Agent Staining is a technique that
- involves writing a unique marker (or stain)
- onto a target machine. Each stain is
- visible in passively collected SIGINT
- and is stamped into every packet, which
- enables all the events from that stained
- machine to be brought back together to
- recreate a browsing session.�
- http://cryptome.org/2013/10/gchq-mullenize.pdf
- http://s3.documentcloud.org/documents/801762/mullenize-28redacted-29.pdf
- � Packet Staining ::
- http://prezi.com/p5et9yawg2c6/ip-packet-staining/
- http://tools.ietf.org/html/draft-macaulay-6man-packet-stain-00
- http://tools.ietf.org/html/draft-macaulay-6man-packet-stain-01
- http://cryptome.org/2013/10/packet-stain/packet-staining.htm
- � NSA Peeling Back the Layers of Tor ::
- http://cryptome.org/2013/10/nsa-egotisticalgiraffe.pdf
- http://www.theguardian.com/world/interactive/2013/oct/04/egotistical-giraffe-nsa-tor-document
- http://www.theguardian.com/world/2013/oct/04/tor-attacks-nsa-users-online-anonymity
- http://www.theguardian.com/world/2013/oct/04/nsa-gchq-attack-tor-network-encryption
- � NSA ; Tor Source Code Vulnerabilities ::
- �We have seen several targets using Tor.
- Our goal was to analyze Tor source code
- and determine any vulnerabilities in
- the system. We set up an internal Tor
- network to analyze Tor traffic, in the
- hopes of discovering ways to passively
- identify it. We also worked to create
- a custom Tor client which allows the
- user finer control.� ... ...
- �This accomplishes several things.
- Most basically, the Tor servers, many
- of which are listed on publicly advertised
- directory servers, are chosen to act as
- a series of proxies. This may seem to
- be excessively complex, as a single
- proxy server can be used to hide one�s
- location, but a single-hop proxy is
- vulnerable in two ways. First, by
- analyzing the pattern of the traffic
- going to and from the proxy server,
- it is possible to deduce which clients
- are making which requests. Second, if
- an attacker owns the proxy server, then
- it certainly knows who is asking for what,
- and anonymization is ruined. By using
- multiple hops, Tor is much more resistant
- to both of these attacks. Traffic analysis
- becomes extraordinarily difficult, as it
- must be coordinated across several machines,
- and an attacker must own all the hops
- along the circuit in order to trace
- requests back to the originating client.�
- ... ...
- �In our time in the lab, we found that
- running an nmap on a node that is offering
- a hidden service will turn up the port
- that the hidden service is using to deal
- with incoming connections. It can then be
- directly connected to, outside of Tor.�
- ... ...
- �We would have to try to connect to
- each of the ports we see open on a
- machine to determine if there is a
- hidden service being run. We would not
- even know which protocol the hidden
- service is running. It may be an HTTP
- server, an FTP server, an SMTP server,
- etc. The only thing we know is that
- the protocol must run over TCP. It is
- not enough to attempt to connect once
- to each port, using an HTTP GET request.
- Several protocols must be tried.�
- ... ...
- �It may also be useful to study Tor
- directory servers in more detail. Our
- work focused solely on the client, but
- many attacks would be much easier with
- access to more Tor servers. The directory
- servers ultimately control which Tor
- servers are used by clients. We have found
- that a server can put itself on a directory
- server multiple times; all it takes is the
- server running several Tor processes, each
- having a different nickname, open port,
- fingerprint, and LOG FILE. This only
- requires different configuration files
- for the different processes, which are
- easy to set up. That machine will handle
- a disproportionate amount of traffic,
- since it is listed several times. This
- increases the density of friendly servers
- in the cloud without increasing the number
- of servers we have set up. Unfortunately,
- each listing has the same IP address,
- which would be very noticeable to anyone
- who inspecting the directories.�
- http://cryptome.org/2013/10/nsa-tor.pdf
- http://s3.documentcloud.org/documents/802061/ces-summer-2006-tor-paper-28redacted-29-1.pdf
- http://www.washingtonpost.com/world/national-security/secret-nsa-documents-show-campaign-against-tor-encrypted-network/2013/10/04/610f08b6-2d05-11e3-8ade-a1f23cda135e_story.html
- � NSA ; Types of IAT ::
- http://cryptome.org/2013/10/nsa-iat-tor.pdf
- � NSA Link Removed by Guardian ::
- http://cryptome.org/2013/10/nsa-link-removed.htm
- � Tor Media Reports Disinformative (?) ::
- �This document doesn�t give much insight
- into capabilities the IC has developed
- against Tor. It�s apparently quite common
- to run multiple research teams (either
- known or unknown to each other) against
- a single target, and a few summer students
- with a dozen lab machines is a pretty
- small investment. I�d expect there are
- other programs with more sophisticated
- attacks, especially now 7 years later.�
- http://cryptome.org/2013/10/nsa-tor-disinfo.htm
- _______________________________________
- � Greenwald and Gibson Q&A @ Reddit ::
- http://cryptome.org/2013/10/greenwald-gibson-reddit.pdf
- _______________________________________
- � Mike Rogers Says He�d Like To See
- Snowden On a Hit List ::
- http://www.infowars.com/former-nsa-head-says-hed-like-to-see-snowden-on-us-kill-list/
- �I must admit, in my darker moment over
- the past several months, I�d also thought
- of nominating Mr. Snowden, but it was
- for a different list,� Hayden said during
- a panel discussion, according to Brendan
- Sasso of The Hill.
- Sasso notes that the audience laughed,
- and Rep. Mike Rogers (R-Mich), chairman
- of the House Intelligence Committee who
- was also on the panel, responded, �I can
- help you with that.�
- http://thehill.com/blogs/hillicon-valley/technology/326315-former-nsa-chief-jokes-about-putting-snowden-on-kill-list
- The conversation then turned specifically
- to the government�s use of targeted
- killings, with Hayden noting �Yes, we
- do targeted killings, and I certainly
- hope they make full use of the capacities
- of the National Security Agency when we
- do that.�
- Hayden was responding to a question
- about a new project announced by journalists
- Glenn Greenwald and Jeremy Scahill,
- delving into the NSA�s alleged role in
- assassinations.
- http://rt.com/usa/nsa-assassination-leaks-greenwald-514/
- _______________________________________
- � NSA Police Guard Threatens Reporters ::
- Infowars crew arrive at Utah Data Center.
- http://www.infowars.com/nsa-goons-confiscate-cameras-from-reporters/
- http://www.sltrib.com/sltrib/politics/56958862-90/data-center-utah-amp.html.csp
- _______________________________________
- � Cost and Responsibility for Snowden�s
- Breaches ::
- http://cryptome.org/2013/10/snowden-cost.htm
- � Questioning Snowden Truth ::
- http://cryptome.org/2013/10/questioning-snowden-truth.htm
- _______________________________________
- � NSA Gathers Data on Social Networks
- of US Citizens ::
- The new disclosures add to the growing
- body of knowledge in recent months about
- the NSA�s access to and use of private
- information concerning Americans, prompting
- lawmakers in Washington to call for reining
- in the agency and President Obama to order
- an examination of its surveillance policies.
- Almost everything about the agency�s
- operations is hidden, and the decision
- to revise the limits concerning Americans
- was made in secret, without review by the
- nation�s intelligence court or any public
- debate. As far back as 2006, a Justice
- Department memo warned of the potential
- for the �misuse� of such information
- without adequate safeguards.
- http://cryptome.org/2013/09/nsa-syanpse.htm
- http://cryptome.org/2013/09/nsa-syanpse-large.jpg
- http://www.nytimes.com/2013/09/29/us/nsa-examines-social-networks-of-us-citizens.html?_r=0
- � NSA Director Admits NSA Collects Data
- From American Social Networks ::
- http://hosted.ap.org/dynamic/stories/U/US_NSA_SURVEILLANCE_SOCIAL_NETWORKS?SITE=AP
- _______________________________________
- � GCHQ Faces Legal Challenge in European
- Court Over Online Privacy ::
- http://www.theguardian.com/uk-news/2013/oct/03/gchq-legal-challenge-europe-privacy-surveillance
- _______________________________________
- UNITED STATES ONLY COUNTRY TO VOTE �NO�
- TO A NEW TREATY FOR DIGITAL PRIVACY ::
- Led by the German government, a loose
- coalition of privacy chiefs from countries
- across the world is pushing to update an
- influential international human rights
- treaty that enshrines the right to privacy.
- ... ...
- The annual conference was attended by a
- diverse selection of privacy and data
- protection officials from across the
- world, with representatives attending
- from countries including Japan, New Zealand,
- France, Slovenia, Uruguay, Belgium, Ireland,
- Finland, Spain, Australia, Germany, Burkina
- Faso, Canada, the United States, and the
- United Kingdom.
- During a closed session at the conference
- open only to the privacy chiefs, a
- resolution was put forward for a vote
- on the proposal to update Article 17.
- They voted overwhelmingly in favor of
- the idea, recognizing a need to �create
- globally applicable standards for data
- protection and the protection of privacy
- in accordance with the rule of law.�
- Notably, only one country did not approve
- of the resolution ... the United States.
- At this point, the proposed Article 17
- protocol is still a long way off. It will
- eventually need to be put forward at the
- United Nations and voted on by member
- states, and that could take time. But
- the growing appetite to amend the
- international treaty in light of the
- Snowden revelations is highly symbolic
- if nothing else, reflecting widespread
- concerns about the power of mass surveillance
- technology in the digital age to trample
- over basic universal privacy rights.
- https://privacyconference2013.org/web/pageFiles/kcfinder/files/5.%20International%20law%20resolution%20EN%281%29.pdf
- http://www.slate.com/blogs/future_tense/2013/09/26/article_17_surveillance_update_countries_want_digital_privacy_in_the_iccpr.html
- NOBODY comments
- �The problem is not just the NSA, but
- all secret agencies around the world,
- in general. All secret agencies and
- their third-party vendors or allies
- break (or bypass) crypto and manufacture
- backdoors in electronic communication
- devices by stealth. Not just the NSA.
- Not just the GCHQ. Not just the GFO.
- Not just the ISNU, et al. The major
- problem is trust. If you desire privacy,
- you must kill any trust in security.
- Security does not exist on the web.
- Digital privacy is a hoax. It�s null.
- It�s a wet dream. It�s justice FUBAR.�
- _______________________________________
- � Deutsche Telekom Defies NSA Spying ::
- http://online.wsj.com/article/SB10001424052702303983904579096082938662594.html
- � Deutsche DSL Phone Switch Data Dump ::
- http://cryptome.org/2013/09/dtag-dsl-switches.txt
- _______________________________________
- � Senate FISA Hearings, September 2013 ::
- http://cryptome.org/2013/09/edgar-13-0926.pdf
- http://cryptome.org/2013/09/wittes-13-0926.pdf
- http://cryptome.org/2013/09/dni-nsa-doj-13-0926.pdf
- http://cryptome.org/2013/09/dni-13-0926.pdf
- http://cryptome.org/2013/09/nsa-13-0926.pdf
- � Dianne Feinstein Accidentally Confirms
- NSA Tapped the Internet Backbone ::
- http://www.techdirt.com/articles/20130927/13562624678/dianne-feinstein-accidentally-confirms-that-nsa-tapped-internet-backbone.shtml
- http://www.infowars.com/dianne-feinstein-accidentally-confirms-that-nsa-tapped-the-internet-backbone/
- http://www.c-spanvideo.org/clip/4466341
- In short, �upstream� capabilities are
- tapping the backbone itself, via the
- willing assistance of the telcos (who
- still have remained mostly silent on
- all of this) as opposed to �downstream�
- collection, which requires going to the
- internet companies directly.
- � Senators Blame Public News Covering Leaks ::
- http://www.huffingtonpost.com/2013/09/26/senators-nsa-media_n_3998229.html
- ? Lawmakers Who Upheld NSA Phone Spying ::
- (1) http://c.nopaste.dk/p56175
- (2) http://c.nopaste.dk/p56176
- (3) http://c.nopaste.dk/p56177
- (4) http://c.nopaste.dk/p56178
- (5) http://c.nopaste.dk/p56179
- _______________________________________
- � Declassified Documents Reveal the NSA
- Wiretapped Martin Luther King, Muhammad
- Ali and Two US Senators ::
- http://www.theguardian.com/world/2013/sep/26/nsa-surveillance-anti-vietnam-muhammad-ali-mlk
- _______________________________________
- � NSA Hacked Indian Politicos, Scientists ::
- According to a top secret document
- disclosed by NSA whistleblower Edward
- Snowden and obtained by The Hindu, the
- PRISM programme was deployed by the
- American agency to gather key information
- from India by tapping directly into the
- servers of tech giants which provide
- services such as email, video sharing,
- voice-over-IPs, online chats, file
- transfer and social networking services.
- And, according to the PRISM document
- seen by The Hindu, much of the communication
- targeted by the NSA is unrelated to terrorism,
- contrary to claims of Indian and American
- officials.
- Instead, much of the surveillance was
- focused on India�s domestic politics and
- the country�s strategic and commercial
- interests.
- http://www.thehindu.com/news/national/nsa-targets-indian-politics-space-nprogrammes/article5161299.ece
- According to the 2010 COMINT (communication
- intelligence) document about �Close Access
- SIGADs�, the offices of Indian diplomats
- and high-ranking military officials stationed
- at these important posts were targets of
- four different kinds of electronic snooping
- devices:
- Lifesaver, which facilitates imaging of
- the hard drive of computers.
- Highlands, which makes digital collection
- from implants.
- Vagrant, which collects data of open
- computer screens.
- Magnetic, which is a collection of
- digital signals.
- http://www.thehindu.com/news/international/world/nsa-planted-bugs-at-indian-missions-in-dc-un/article5164944.ece
- _______________________________________
- � Secret Bunkers, a Challenge for US
- Intelligence ::
- Accessing archived government documents,
- the National Security Archive, an
- anti-secrecy group, has revealed a
- decades-long effort by the US to detect,
- monitor, and in some cases plan the
- destruction of, �more than 10,000 such
- facilities worldwide, many of them in
- hostile territory, and many presumably
- intended to hide or protect lethal military
- equipment and activities, including
- weapons of mass destruction, that could
- threaten US or allied interests.�
- http://www.thehindu.com/news/international/world/secret-bunkers-a-challenge-for-us-intelligence/article5164833.ece
- _______________________________________
- � More Unreported, Unredacted NSA Slides ::
- http://leaksource.wordpress.com/2013/09/09/unreportedunredacted-nsa-slidesprogram-names-revealed-on-brazil-news/
- _______________________________________
- � Guardian�s Alan Rusbridger on the
- Inside Story of NSA Leaks ::
- http://leaksource.wordpress.com/2013/09/24/guardians-alan-rusbridger-on-the-inside-story-of-snowden-nsa-leaks/
- _______________________________________
- � PRISM Part of the BLARNEY Program ::
- http://electrospaces.blogspot.nl/2013/09/prism-as-part-of-blarney-program.html
- _______________________________________
- � New Separate Internet Being Built by
- Countries Targeted by NSA and GCHQ ::
- http://www.bricscable.com/wp-content/uploads/2013/03/U564-Imphandze-BRICS-Leaflet.pdf
- http://www.bricscable.com/wp-content/uploads/2013/04/2013-submarine-cable-market-industry-report.pdf
- http://www.bricscable.com/wp-content/uploads/2013/04/BRICS-BUSINESS-FORUM-JOINT-COMMUNIQUE-26-March-2013.pdf
- � New Separate Internet Will Not be
- Under United States Control ::
- The President of Brazil, Dilma Rousseff
- announces publicly the creation of a
- world internet system INDEPENDENT from
- US and Britain or �US-centric internet.�
- Not many understand that, while the
- immediate trigger for the decision
- (coupled with the cancellation of a
- summit with the US president) was the
- revelations on NSA spying, the reason
- why Rousseff can take such a historic
- step is that the alternative infrastructure:
- The BRICS cable from Vladivostock,
- Russia to Shantou, China to Chennai,
- India to Cape Town, South Africa to
- Fortaleza, Brazil, is being built and
- it�s, actually, in its final phase of
- implementation.
- �The global backlash is only beginning
- and will get far more severe in coming
- months,� said Sascha Meinrath, director
- of the Open Technology Institute at the
- Washington-based New America Foundation
- think-tank. �This notion of national
- privacy sovereignty is going to be an
- increasingly salient issue around the
- globe.�
- http://proxy.rickmartensen.nl/www.globalresearch.ca/the-brics-independent-internet-in-defiance-of-the-us-centric-internet/5350272
- http://www.thehindu.com/news/international/world/brazil-plans-to-go-offline-from-uscentric-internet/article5137689.ece
- http://www.excitingrio.com/brazil-looks-break-us-centric-internet/
- http://indrus.in/economics/2013/03/01/brics_cable_connecting_continents_brick_by_brick_22617.html
- � The BRICS Fiber-optic Cable ::
- A 34,000 km, 2 fibre pair, 12.8 Tbit/s
- capacity, fibre optic cable system.
- http://www.bricscable.com/
- https://www.youtube.com/watch?v=OkQI4bJcDGw
- _______________________________________
- � No Phone Company Ever Challenged NSA
- Metadata Collection Orders ::
- A newly declassified opinion from the
- Foreign Intelligence Surveillance Court
- from this summer shows the court�s
- interpretation of the controversial
- Section 215 of the USA PATRIOT Act
- that�s used to justify the National
- Security Agency�s bulk telephone
- metadata collections, and reveals
- that none of the companies that have
- been served with such orders has ever
- challenged one.
- http://proxy.rickmartensen.nl/threatpost.com/fisc-no-phone-company-ever-challenged-metadata-collection-orders/102334
- _______________________________________
- � Experts Worry About Long-Term Blowback
- of NSA Revelations ::
- With all of the disturbing revelations
- that have come to light in the last few
- weeks regarding the NSA�s collection
- methods and its efforts to weaken
- cryptographic protocols and security
- products, experts say that perhaps the
- most worrisome result of all of this
- is that no one knows who or what they
- can trust anymore.
- The fallout from the most-recent NSA
- leaks, which revealed the agency�s
- ability to subvert some cryptographic
- standards and its �partnerships� with
- software and hardware vendors to insert
- backdoors into various unnamed products,
- has continued to accumulate over the
- course of the last couple of weeks.
- Cryptographers and security researchers
- have been eager to determine which
- products and protocols are suspect,
- and the discussion has veered in a
- lot of different directions. But one
- thing that�s become clear is that when
- the government lost the so-called
- Crypto Wars in the 1990s, the NSA
- didn�t just go back to Fort Meade
- and tend to its knitting.
- http://proxy.rickmartensen.nl/threatpost.com/experts-worry-about-long-term-implications-of-nsa-revelations/102355
- � The Sky is Not Falling � It�s Fallen ::
- The security community didn�t invent
- the concept of fear, uncertainty and
- doubt, but it has perfected it and raised
- it to the level of religion. It�s the
- way that security products are marketed
- and sold, but it�s also the way that
- the intelligence community justifies
- its extra-legal and, in some cases,
- unconstitutional, data-gathering
- practices. Just as vendors use the
- specter of catastrophic hacks, data
- loss and public embarrassment to push
- their wares, the NSA and its allies
- have used the dark shadow of 9/11 and
- global terrorism to justify their
- increasingly aggressive practices,
- some of which have now been shown to
- have deliberately weakened some of the
- fundamental building blocks of security.
- The most damning bit of string in this
- ball is the news that the NSA likely
- inserted a back door into a key
- cryptographic algorithm known as
- DUAL EC DRBG. That�s bad. What�s worse
- is that RSA on Thursday sent a warning
- to its developer customers warning them
- to immediately stop using the company�s
- BSAFE library because it uses the
- compromised random number generator.
- That means that untold numbers of products
- that include the BSAFE crypto libraries
- are compromised.
- http://proxy.rickmartensen.nl/threatpost.com/the-sky-is-not-falling-its-fallen/102372
- _______________________________________
- � President Surveillance Program Review ::
- �The program was reauthorized by the
- President approximately every 45 days,
- with certain modifications. Collectively,
- the activities carried out under these
- Authorizations are referred to as the
- �President�s Surveillance Program� or
- �PSP.� One of the activities authorized
- as part of the PSP was the interception of
- the content of communications into and out
- of the United States where there was a
- reasonable basis to conclude that one
- party to the communication was a member
- of al-Qa�ida or related terrorist organizations.
- This aspect of the PSP was publicly
- acknowledged and described by the President,
- the Attorney General, and other Administration
- officials beginning in December 2005 following
- a series of articles published in The New York
- Times. The Attorney General subsequently
- publicly acknowledged the fact that other
- intelligence activities were also authorized
- under the same Presidential Authorization,
- but the details of those activities remain
- classified.� ... ...
- �Prior to September 11,2001, the Foreign
- Intelligence Surveillance Act of 1978 and
- Executive Order 12333 were generally viewed
- as the principal governing authorities for
- conducting electronic surveillance for
- national security purposes. The Foreign
- Intelligence Surveillance Act, 50 U.S.C.
- � 1801, et seq., was enacted in 1978 to
- "provide legislative authorization and
- regulation for all electronic surveillance
- conducted within the United States for
- foreign intelligence purposes."�
- http://cryptome.org/2013/09/psp-09-0710.pdf
- � NSA ; PSP Analysis Loophole to Snoop
- Domestic Contacts Along with Metadata ::
- http://cryptome.org/2013/08/nsa-ig-09-0324.pdf
- NOBODY comments (nsa-ig-09-0324.pdf)
- The President�s Surveillance Program (PSP)
- should be of high interest. As mentioned
- on page 17, the PSP did not - �did not� -
- require special approval. Therefore, just
- another gap. Also take in consideration
- other abuse against FISA laws, court order
- to stifle FAA 702 upstream analysis, EO 12333,
- and of-course NSA�s now admitted abuse -
- deliberately ignoring restrictions against
- domestic communications (a risk to comsec).
- _______________________________________
- � Britain�s GCHQ Hacked Belgian Telecom
- Firm ::
- Documents from the archive of whistleblower
- Edward Snowden indicate that Britain�s
- GCHQ intelligence service was behind a
- cyber attack against Belgacom, a partly
- state-owned Belgian telecoms company.
- A �top secret� Government Communications
- Headquarters (GCHQ) presentation seen by
- SPIEGEL indicate that the goal of project,
- conducted under the codename �Operation
- Socialist,� was �to enable better
- exploitation of Belgacom� and to
- improve understanding of the provider�s
- infrastructure. ... ...
- According to the slides in the GCHQ
- presentation, the attack was directed
- at several Belgacom employees and
- involved the planting of a highly
- developed attack technology referred
- to as a �Quantum Insert� (�QI�). It
- appears to be a method with which the
- person being targeted, without their
- knowledge, is redirected to websites
- that then plant malware on their
- computers that can then manipulate
- them. Some of the employees whose
- computers were infiltrated had �good
- access� to important parts of Belgacom�s
- infrastructure, and this seemed to
- please the British spies, according
- to the slides.
- http://www.spiegel.de/international/europe/british-spy-agency-gchq-hacked-belgian-telecoms-firm-a-923406.html
- http://www.infowars.com/latest-snowden-leaks-show-gchq-gleefully-hacking-belgian-telco/
- https://www.techdirt.com/articles/20130920/16112724595/latest-snowden-leaks-show-gchq-gleefully-hacking-belgian-telco.shtml
- http://cryptome.org/2013/09/belgacom-hack-en.htm
- http://cryptome.org/2013/09/belgacom.htm
- _______________________________________
- � European Parliament Brief on NSA ::
- http://cryptome.org/2013/09/europarl-nsa.pdf
- http://www.europarl.europa.eu/meetdocs/2009_2014/documents/libe/dv/briefingnote_/briefingnote_en.pdf
- _______________________________________
- � NSA Buys Vupen Exploits ::
- http://cryptome.org/2013/09/nsa-vupen.pdf
- http://news.softpedia.com/news/Security-Firm-VUPEN-Confirms-the-NSA-Bought-Exploits-Service-Subscription-383597.shtml
- http://proxy.rickmartensen.nl/threatpost.com/nsa-bought-exploit-service-from-vupen-contract-shows
- _______________________________________
- � US Government Foreign Telecommunications
- Providers Network Security Agreements ::
- http://publicintelligence.net/us-nsas/
- http://info.publicintelligence.net/US-NSAs.zip
- http://www.washingtonpost.com/business/technology/agreements-with-private-companies-protect-us-access-to-cables-data-for-surveillance/2013/07/06/aa5d017a-df77-11e2-b2d4-ea6d8f477a01_story.html
- _______________________________________
- � FISA Court Releases FBI Spy Documents ::
- http://cryptome.org/2013/09/fisc-13-0917-4.pdf
- ���������������������������������������
- ? FISC Orders All Spy Data Disclosure
- Allocated to One Release ::
- http://cryptome.org/2013/09/fisc-five-13-0918.pdf
- � Linkedin Moves to Disclose Spy Data ::
- http://cryptome.org/2013/09/fisc-linkedin-13-0917.pdf
- � FISC Schedule for Microsoft, Google,
- Yahoo and Facebook Spy Data Release ::
- http://cryptome.org/2013/09/fisc-ms-google-yahoo-fb-13-0913.pdf
- � Microsoft, Google Spy Data Briefing
- Schedule ::
- http://cryptome.org/2013/09/ms-goog-fisc-13-0909.pdf
- � Google Moves to Disclose User Spy Data ::
- http://cryptome.org/2013/09/google-fisc-13-0909.pdf
- � Yahoo Moves to Disclose User Spy Data ::
- http://cryptome.org/2013/09/yahoo-fisc-13-0909.pdf
- � Facebook Moves to Disclose User Spy Data ::
- http://cryptome.org/2013/09/facebook-fisc-13-0909.pdf
- ���������������������������������������
- � DoJ Stonewalls USA Today ::
- In response to a FOIA request from
- USA TODAY, the Justice Department said
- its ethics office never looked into
- complaints from two federal judges
- that they had been misled about NSA
- surveillance.
- http://cryptome.org/2013/09/usa-today-doj.pdf
- http://cryptome.org/2013/09/usa-today-doj-shots.jpg
- http://www.usatoday.com/story/news/nation/2013/09/19/nsa-surveillance-justice-opr-investigation/2805867/
- ���������������������������������������
- Perry Metzger: Matthew Green tweeted
- earlier today that Johns Hopkins will
- be hosting a roundtable at 10am EDT
- tomorrow (Wednesday, September 18th)
- to discuss the NSA crypto revelations.
- Livestream will be at:
- https://connect.johnshopkins.edu/jhuisicrypto/
- _______________________________________
- � NSA Spying Documents to be Released as
- Result of EFF Lawsuit Against NSA ::
- https://www.eff.org/deeplinks/2013/09/hundreds-pages-nsa-spying-documents-be-released-result-eff-lawsuit
- � Government Releases NSA Surveillance
- Docs and Previously Secret FISA Court
- Opinions In Response to EFF Lawsuit ::
- https://www.eff.org/deeplinks/2013/09/government-releases-nsa-surveillance-docs-and-previously-secret-fisa-court
- The Director of National Intelligence
- (DNI) just today released hundreds of
- pages of documents related to the
- government�s secret interpretation of
- Patriot Act Section 215 and the NSA�s
- (mis)use of its massive database of
- every American�s phone records. The
- documents were released as a result
- of EFF�s ongoing Freedom of Information
- Act lawsuit.
- We�ve posted links to each document
- below. While the government also posted
- many of the documents here ...
- http://icontherecord.tumblr.com/
- ... our copies are completely searchable.
- Links to the documents ;
- � May 24, 2006 � Order from the Foreign
- Intelligence Surveillance Court
- https://www.eff.org/sites/default/files/filenode/docket_06-05_1dec201_redacted.ex_-_ocr_0.pdf
- � December 12, 2008 � Supplemental Opinion
- from the Foreign Intelligence Surveillance
- Court
- https://www.eff.org/sites/default/files/filenode/4_february_2011_production_br10-82_final_redacted.ex_-_ocr_1.pdf
- � January 28, 2009 � Order Regarding Preliminary
- Notice of Compliance Incident Dated January 15,
- 2009 from the Foreign Intelligence Surveillance
- Court
- https://www.eff.org/sites/default/files/filenode/br_08-13_alert_list_order_1-28-09_final_redacted1.ex_-_ocr_0.pdf
- � January 28, 2009 � Order Regarding Preliminary
- Notice of Compliance Incident Dated January 15,
- 2009 from the Foreign Intelligence Surveillance
- Court - With Cover Letter and Attached Declarations
- https://www.eff.org/sites/default/files/filenode/5_march_09_production-final_redacted.ex_-_ocr_1.pdf
- � February 26, 2009 � Notice of Compliance
- Incident
- https://www.eff.org/sites/default/files/filenode/br_08-13_doj_notice_with_supp_decl_as_filed_26_feb_09_final_redacted.ex_-_ocr_1.pdf
- � March 2, 2009 � Order from the Foreign
- Intelligence Court
- https://www.eff.org/sites/default/files/filenode/br_08-13_order_3-2-09_final_redacted.ex_-_ocr_1.pdf
- � June 22, 2009 � Order from the Foreign
- Intelligence Court
- https://www.eff.org/sites/default/files/filenode/br_09-06_order_and_supplemental_order_6-22-09_final_redacted.ex_-_ocr_0.pdf
- � June 25, 2009 � Implementation of the Foreign
- Intelligence Surveillance Court Authorized
- Business Records FISA
- https://www.eff.org/sites/default/files/filenode/nsa_business_records_fisa_redacted.ex_-_ocr_0.pdf
- � August 19, 2009 � Report of the United
- States with Attachments and Cover Letter
- https://www.eff.org/sites/default/files/filenode/4_september_09_production_final_redacted.ex_-_ocr_1.pdf
- � September 3, 2009 � Primary Order from the
- Foreign Intelligence Surveillance Court
- https://www.eff.org/sites/default/files/filenode/br_09-13_orders_signed_3_sept_09_final_redacted.ex_-_ocr_0.pdf
- � September 25, 2009 � Order Regarding Further
- Compliance Incidence from the Foreign Intelligence
- Surveillance Court
- https://www.eff.org/sites/default/files/filenode/br_09-13_-_september_25_order_regarding_further_compliance_incidents_final_redacted.ex_-_ocr_0.pdf
- � November 5, 2009 � Supplemental Opinion
- and Order from the Foreign Intelligence
- Surveillance Court
- https://www.eff.org/sites/default/files/filenode/br_09-15_supplemental_order_and_opinion_11-5-09_final_redacted.ex_-_ocr_0.pdf
- � Gems Mined from the NSA Documents and
- FISA Court Opinions Released Today ::
- https://www.eff.org/deeplinks/2013/09/gems-mined-nsa-docs-released-today
- � NSA FISA Business Records Offer a Lot
- to Learn (NSA Networks Not Encrypted) ::
- http://cryptome.org/2013/09/nsa-fisa-business-records.htm
- _______________________________________
- � NSA Spy Community Architecture 2011 ::
- http://cryptome.org/2013/09/nsa-spy-architecture.pdf
- � DNI Spy Community Architecture 2009 ::
- http://cryptome.org/2013/09/dni-spy-architecture.pdf
- ���������������������������������������
- � Keith�s Information Dominance Center ::
- http://cryptome.org/2013/09/info-dominance.pdf
- http://www.foreignpolicy.com/articles/2013/09/08/the_cowboy_of_the_nsa_keith_alexander?print=yes
- http://www.zerohedge.com/news/2013-09-15/man-charge-nsa-modeled-his-office-bridge-starship-enterprise
- _______________________________________
- � Germany�s Domestic Spy Agency Hands
- Over Data to the NSA ::
- Germany�s Federal Office for the
- Protection of the Constitution regularly
- hands over classified data to the NSA,
- media report. The revelation comes as
- Edward Snowden�s leaks show that
- Germany�s foreign spy agencies share
- troves of data with the US and UK.
- Citing secret government documents,
- Suddeutsche Zeitung reported that
- Germany�s Federal Office for the
- Protection of the Constitution, charged
- with domestic security, works closely
- with the US and regularly sends them
- information.
- The security service gathers intelligence
- on internal security threats. The documents
- obtained by Sueddeutsche Zeitung recorded
- 864 data packages sent to the NSA, as
- well as regular meetings between officers
- of the German Federal Office and the NSA.
- http://rt.com/news/germany-shares-data-nsa-spying-858/
- _______________________________________
- � Dutch Government Response to Snowden�s
- Revelations ::
- This is an unofficial translation.
- http://blog.cyberwar.nl/2013/09/dutch-govt-response-to-revelations-by.html
- On September 13th 2013, the Dutch
- government responded (.pdf, in Dutch)
- to the revelations by Edward Snowded.
- http://www.rijksoverheid.nl/bestanden/documenten-en-publicaties/kamerstukken/2013/09/14/kabinetsreactie-op-onthullingen-edward-snowden/nederlandse-kabinetsreactie-edward-snowden-13-sept-2013-1.pdf
- https://www.aivd.nl/publish/pages/2533/nederlandse_kabinetsreactie_edward_snowden_13_sept_2013.pdf
- _______________________________________
- � NSA Spied Credit Card Transactions ::
- http://cryptome.org/2013/09/nsa-finance-spy-de.pdf
- http://cryptome.org/2013/09/nsa-finance-spy-slides.jpg
- http://www.spiegel.de/international/world/spiegel-exclusive-nsa-spies-on-international-bank-transactions-a-922276.html
- http://www.politico.com/story/2013/06/report-nsa-credit-card-transactions-92390.html
- http://weaselzippers.us/2013/06/06/wsj-report-nsa-tracking-credit-card-transactions-also-has-access-to-phone-records-from-att-and-sprint-along-with-verizon/
- _______________________________________
- � NSA Brazil Spy Slides Decensored ::
- http://cryptome.org/2013-info/09/nsa-br-mx-3/nsa-br-mx-3.htm
- � All SATC Slides, Brazil Spying Reports ::
- NSA_SATC_Slides.zip
- (54 files | ZIP | 3.37MB)
- http://filebeam.com/dacf6706b520431f2c4052484abd5b36
- Why does the NSA spy on Brazil?
- (1) The US wants to maintain global
- economic power, (2) the US wants to
- maintain control over major natural
- resources and (3) the US is afraid the
- new economic powers (within the BRICS)
- may destabilize their economic power
- and control over natural resources.
- _______________________________________
- � A Font to Discourage NSA Snooping ::
- The ZXX font is designed to be difficult
- for machines to read.
- http://dl.dropbox.com/u/20517415/ZXX.zip
- http://reason.com/blog/2013/06/21/dont-want-the-nsa-to-read-your-email-use
- http://reason.com/archives/2013/09/14/a-font-to-discourage-nsa-snooping
- _______________________________________
- � IETF Draft to Prevent NSA Intercepts ::
- http://cryptome.org/2013/09/prism-proof.htm
- http://www.ietf.org/id/draft-hallambaker-prismproof-req-00.txt
- _______________________________________
- � NSA Targeted Israel for Surveillance,
- Also Sharing Data With Israeli SIGINT
- National Unit ::
- A copy of a top-secret deal inked
- in 2009 between the NSA and the
- Israeli Signals-intelligence National
- Unit (ISNU) was provided by NSA
- leaker Edward J. Snowden to the
- Guardian newspaper, which posted
- it Wednesday.
- It reveals that the NSA �routinely�
- passed to its Israeli counterpart
- raw signals intelligence, referred
- to as �SIGINT,� including the vast
- swathes of digital data traffic that
- the agency gathers under secret court
- authority from US Internet providers.
- So sensitive is this data that even
- before being disseminated to other US
- agencies, the NSA has to subject it
- to a court-mandated process called
- minimization, under which the names
- of any Americans are removed unless
- they are essential for foreign
- intelligence interest.
- But the US-Israeli agreement states
- that the data shared with Israel
- �includes, but is not limited to,
- unevaluated and unminimized transcripts,
- gists, facsimiles, telex, voice and
- Digital Network Intelligence metadata
- and content.�
- �NSA routinely sends ISNU minimized
- and unminimized raw collection associated
- with selectors from multiple Target office
- Primary Interest (TOPI) offices in Analysis
- and Production, S2 as part of SIGINT
- relationship between the two organizations.�
- http://cryptome.org/2013/09/nsa-israel-spy-share.pdf
- http://s3.documentcloud.org/documents/785495/doc1.pdf
- http://www.theguardian.com/world/2013/sep/11/nsa-americans-personal-data-israel-documents
- http://www.washingtontimes.com/news/2013/sep/11/nsa-shares-raw-data-americans-israeli-spy-agency/
- http://www.washingtonpost.com/blogs/the-switch/wp/2013/09/11/the-nsa-is-sharing-data-with-israel-before-filtering-out-americans-information/
- http://killerapps.foreignpolicy.com/posts/2013/09/11/irony_alert_nsa_targets_israel_and_still_gives_your_data_to_its_spies
- Other documents leaked by Mr. Snowden
- reveal that Israel was one of the nations
- that spy most aggressively against the
- United States.
- �To further safeguard our classified
- networks, we continue to strengthen
- insider threat detection capabilities
- across the Community. In addition, we
- are investing in target surveillance
- and offensive CI against key targets,
- such as China, Russia, Iran, Israel,
- Pakistan, and Cuba.� - Page 3
- http://cryptome.org/2013/08/spy-budget-fy13.pdf
- http://s3.documentcloud.org/documents/781537/cbjb-fy13-v1-extract.pdf
- http://thehill.com/blogs/global-affairs/middle-east-north-africa/319513-leaked-documents-reveal-us-sees-israel-as-a-major-spying-threat
- NOBODY comments
- Ironic NSA considers Israel an �insider
- threat� - meanwhile we provide them with
- plenty of inside information.
- However the NSA used cryptanalysis and
- exploitation against Brazil leadership
- and Brazil was never a �key target.�
- This reminds of a quote ;
- �What if all secret agencies were of one
- accord spiritually, like in the paintings
- of dogs playing poker, just using humanity
- to play out one big game of destruction
- and domination with humans as the visible
- and spiritual puppets?�
- _______________________________________
- � DNI Releases Phone Metadata Spying Docs ::
- http://cryptome.org/2013/09/dni-13-0910.pdf
- _______________________________________
- � Smartphones Are Gold Mines to NSA ::
- (EN)
- http://cryptome.org/2013/09/nsa-smartphones-en.pdf
- (DE)
- http://cryptome.org/2013/09/nsa-smartphones.pdf
- � NSA Presentation You Won�t Believe ::
- Referring to customers as �zombies� is
- the sort of thing you�d expect from
- neckbearded hipsters and other self-
- proclaimed individualists who tend to
- take a dim view of any popular activity.
- It�s rather jarring to hear the lingo
- deployed in a government intelligence
- agency presentation.
- http://cryptome.org/2013/09/nsa-smartphones-en.pdf
- https://www.techdirt.com/articles/20130909/08582024452/steve-jobs-is-big-brother-smartphone-users-are-zombies-according-to-nsa-cell-phone-tapping-presentation.shtml
- http://www.infowars.com/steve-jobs-is-big-brother-and-smartphone-users-are-zombies-according-to-nsa-cell-phone-tapping-presentation/
- ���������������������������������������
- � DNI and NSA Blame Obama to Cover Up
- Violations Against a 2011 Court Order ::
- The Obama regime secretly won permission
- from a surveillance court in 2011 to
- reverse restrictions on the National
- Security Agency�s use of intercepted
- phone calls and e-mails, permitting
- the agency to search deliberately for
- Americans� communications in its massive
- databases, ACCORDING TO INTERVIEWS WITH
- GOVERNMENT OFFICIALS and recently
- �declassified material� - (which, by
- the way, had NO classification, NO date,
- NO stamp, NO names, NO identification
- of which agency it came from and most
- shocking of all NO blackouts, odd.)
- http://www.dni.gov/files/documents/DNI%20Clapper%20Section%20702%20Declassification%20Cover%20Letter.pdf
- In addition, the court extended the
- length of time that the NSA is allowed
- to retain intercepted US communications
- from five years to six years � and more
- under special circumstances, according
- to the documents, which include a
- recently released 2011 opinion by US
- District Judge John D. Bates, then
- chief judge of the Foreign Intelligence
- Surveillance Court.
- http://www.washingtonpost.com/world/national-security/obama-administration-had-restrictions-on-nsa-reversed-in-2011/2013/09/07/c26ef658-0fe5-11e3-85b6-d27422650fd5_story.html
- NOBODY comments
- The document which was declassified by
- US intelligence officials explains the
- chief judge of the Foreign Intelligence
- Surveillance Court ruled the FAA 702
- upstream collection unconstitutional.
- http://cryptome.org/2013/08/fisa-shut-nsa-phone-records.pdf
- http://apps.washingtonpost.com/g/page/national/fisa-court-documents-on-illegal-nsa-e-mail-collection-program/409/
- http://www.washingtonpost.com/world/national-security/nsa-gathered-thousands-of-americans-e-mails-before-court-struck-down-program/2013/08/21/146ba4b6-0a90-11e3-b87c-476db8ac34cd_story.html
- National Security Agency analysts
- deliberately ignored restrictions on
- their authority to spy on Americans.
- http://www.bloomberg.com/news/2013-08-23/nsa-analysts-intentionally-abused-spying-powers-multiple-times.html
- NSA analysts admitted to abuse after
- the 2012 FISA Court audit was released.
- http://cryptome.org/2013/08/nsa-fisa-audit.pdf
- http://apps.washingtonpost.com/g/page/national/nsa-report-on-privacy-violations-in-the-first-quarter-of-2012/395/
- And this is not the first attempt to
- try to cover up their FISA violations.
- http://cryptome.org/2013/08/nsa-fisa-audit-note.pdf
- http://apps.washingtonpost.com/g/page/national/what-to-say-and-not-to-say-to-our-overseers/390/
- The new Washington Post report has
- linked to disinformation from a DNI
- (press) release exposing yet another
- attempt to dodge any criminal charges
- or take responsibility for the abuses
- exposed from the FISA Court audit.
- http://www.washingtonpost.com/world/national-security/obama-administration-had-restrictions-on-nsa-reversed-in-2011/2013/09/07/c26ef658-0fe5-11e3-85b6-d27422650fd5_story.html
- I suspect another attempt by the DNI
- and NSA to cover up FISA violations.
- Just blame the puppet-in-charge, Obama,
- to use as a scapegoat - go figure.
- All of this information is backed up
- and will be mirrored soon. Meanwhile,
- here is the leaked 2012 audit exposing
- 2,776 violations one year after the
- FISA Court order.
- http://cryptome.org/2013/08/nsa-fisa-audit.pdf
- As for Congress they will lay down like
- a bunch of leashed dogs who are getting
- kickbacks for doing nothing to prevent
- this abuse nor fix any problems. I will not
- link to their PR circus stunts anymore and
- I encourage voters to throw a majority of
- them out of office come next election.
- _______________________________________
- � Snowden, NSA, and Counterintelligence ::
- �Ever since the remarkable case of Edward
- Snowden broke into the limelight at the
- beginning of the summer that�s now
- winding down, I�ve had a great deal to
- say about it here, on Twitter, and on
- radio and television. As one of the
- very few former NSA officers who�s
- in the public eye and willing to talk
- about Snowden, I�ve had an audience.
- As a former NSA counterintelligence
- officer with experience dealing with
- the Russians, I�ve been pretty much
- a solo act.
- From nearly the outset I�ve stated
- that Snowden is very likely an agent
- of Russian intelligence; this was met
- with howls of indignation which have
- died down in recent weeks as it�s
- become apparent that Ed�s staying in
- Russia for some time, along with
- whatever classified materials he
- had on his person. (Since Glenn
- Greenwald�s partner when stopped by
- British authorities at Heathrow had
- 58,000 highly classified documents
- on him, thanks to Ed, one can only
- wonder how big the initial haul
- actually was.) That Snowden was in
- contact with the Russian consulate
- in Hong Kong during his pre-Moscow
- visit there, including spending his
- 30th birthday with his new friends,
- is now admitted. Even President
- Vladimir Putin has conceded that
- Ed�s contacts with Russian officials
- did not commence when he landed at
- Sheremtyevo airport, rather before.�
- http://20committee.com/2013/09/04/snowden-nsa-and-counterintelligence/
- _______________________________________
- � NSA SATC Slide [Images] Leak ::
- http://www.youtube.com/watch?v=XlkHBB3-DhY
- Screen shots of Brazilian Fanstastico
- TV show on NSA spying Brazil and Mexico
- presidents, aired 1 September 2013. ?
- http://cryptome.org/2013-info/09/nsa-br-mx/nsa-br-mx.htm
- � NSA Spying Brazil, Mexico Presidents ::
- Translation by Google, tidied by Cryptome.
- http://cryptome.org/2013/09/nsa-spying-brazil.htm
- � NSA SATC Eavesdropping Case Study ::
- http://electrospaces.blogspot.com/2013/09/an-nsa-eavesdropping-case-study.html
- ? All 14 SATC Slides Released (Mirrored) ::
- http://up.inet.ge/download.php?file=eb9465849119fa5efe4256304d2c5630
- http://filebeam.com/eb9465849119fa5efe4256304d2c5630
- http://tishare.com/y7ldwxx397kl.htm
- http://f.lui.li/get_822_b946.html
- � Brazil Senate Committee to Probe Espionage ::
- Brazil�s senate has formed an Investigative
- Parliamentary Commission to follow up on
- reports that the US National Security Agency
- (NSA) spied on Brazilian Prez Dilma Rousseff.
- �We intend to protect national sovereignty,�
- Xinhua quoted Senator Vanessa Graziotin of
- the Communist Party of Brazil as saying
- Tuesday.
- The committee, comprising 11 main members
- and seven substitutes, initially has 180
- days to investigate claims that the NSA
- monitored emails between Rousseff and
- several of her top aides, and tapped
- her phone.
- http://news.yahoo.com/brazil-senate-committee-probe-us-spying-032012289.html
- � BLOWBACK ; US/Brazil Bilateral Relation
- Impacted ::
- Revelations of a US spy program that
- allegedly allows digital surveillance
- of the presidents of Brazil and Mexico
- have drawn cries of indignation and anger
- in both nations, but the fallout may be
- strongest for US-Brazil relations.
- At stake is whether Brazilian Prez Dilma
- Rousseff will cancel a planned state
- visit to Washington in October, the
- first offered by Prez Barack Obama this
- year, or will take action on digital
- security that may affect US companies
- such as Google, Facebook and Yahoo.
- Rousseff is reported to be considering
- a proposal that would suspend operations
- of companies that cooperate with the
- NSA or US intelligence agencies.
- http://www.mcclatchydc.com/2013/09/03/201125/nsa-leak-might-lead-to-cancellation.html
- _______________________________________
- � ACLU Sues the NSA Update 02 ::
- http://thehill.com/blogs/hillicon-valley/technology/320357-nra-claims-nsa-illegally-created-a-gun-database
- � ACLU Sues the NSA Update 01 ::
- http://www.theguardian.com/world/2013/aug/27/nsa-surveillance-program-illegal-aclu-lawsuit
- ���������������������������������������
- � Top Secret US Spy Budget FY 2013 Vol 1 ::
- �We are bolstering our support for
- clandestine SIGINT capabilities to
- collect against high priority targets,
- including foreign leadership targets.
- Also, we are investing in groundbreaking
- cryptanalytic capabilities to defeat
- adversarial cryptography and exploit
- internet traffic.�
- http://cryptome.org/2013/08/spy-budget-fy13.pdf
- http://s3.documentcloud.org/documents/781537/cbjb-fy13-v1-extract.pdf
- ? Snapshots of Budget Exhibit ::
- http://cryptome.org/2013/08/spy-budget-fy13-exhibit-13.pdf
- http://cryptome.org/2013/08/spy-tidbits.pdf
- ? US Spy Budget FY 2013 - Spoon Fed ::
- �The Post is withholding some information
- after consultation with US officials who
- expressed concerns about the risk to
- intelligence sources and methods.
- Sensitive details are so pervasive in
- the documents that The Post is publishing
- only summary tables and charts online.�
- http://www.washingtonpost.com/world/national-security/black-budget-summary-details-us-spy-networks-successes-failures-and-objectives/2013/08/29/7e57bb78-10ab-11e3-8cdd-bcdc09410972_story.html
- ? Declassified, Censored US Spy Budget
- FY 2013 Vol 4 ::
- http://cryptome.org/2013/08/spy-budget-fy13-v4.pdf
- http://www.fas.org/irp/nro/fy2013cbjb.pdf
- ? Declassified, Censored US Spy Budget
- FY 2013 Vol 12 ::
- http://cryptome.org/2013/08/spy-budget-fy13-v12.pdf
- http://www.fas.org/irp/dni/cbjb-2013.pdf
- � Intelligence vs Intelligence ::
- The Obama regime views Israel as one
- of the top spying threats facing it�s
- intelligence services, leaked documents
- reveal.
- �Israel should be assumed to continue
- to have an aggressive intelligence
- collection operations against the
- United States,� Pillar said. While
- much information is collected through
- traditional political contacts, �I
- would personally have no doubt that
- that is supplemented by whatever means
- they can use to find out as much as
- they can about what we�re doing,
- thinking, deciding on anything of
- interest to Israel, which would include
- just about any Middle Eastern topic.�
- http://thehill.com/blogs/global-affairs/middle-east-north-africa/319513-leaked-documents-reveal-us-sees-israel-as-a-major-spying-threat
- From US Spy Budget FY 2013 Vol 1 ...
- �To further safeguard our classified
- networks, we continue to strengthen
- insider threat detection capabilities
- across the Community. In addition, we
- are investing in target surveillance
- and offensive CI against key targets,
- such as China, Russia, Iran, Israel,
- Pakistan, and Cuba.�
- _______________________________________
- � NSA Exploit Isn�t Crypto, It�s SMTP ::
- �The crypto is the easy part. The hard
- part is the traffic analysis, of which
- the worst part is the Received headers.
- Everyone should look at their own headers
- -- especially people on this list and
- at least comprehend that your email
- geotracks you forever, as it�s all in
- the Mailman archive.
- There are plenty of other leaks like
- Message-ID, Mime-Version, X-Mailer,
- the actual separators in MIME part
- breaks, and so on.
- It�s absolutely correct that some
- combination of VPNs, Tor, remailers of
- whatever stripe, and so on can help
- with this, but we�re all lazy and we
- don�t do it all the time.
- What we�re learning from Snowden is
- that they�re doing traffic analysis --
- analyzing movements, social graphs,
- and so on and so forth. The irony here
- is that this tells us that the crypto
- works. That�s where I�ve been thinking
- for quite some time.
- Imagine that you�re a SIGINT group trying
- to deal with the inevitability of crypto
- that works being deployed everywhere.
- What do you do? You just be patient and
- start filling in scatter plots of traffic
- analysis.
- The problem isn�t the crypto, it�s SMTP.�
- http://cryptome.org/2013/08/callas-nsa-smtp.htm
- � NSA Trying to Break Encryption ::
- Among the NSA�s annual budget of $52.6
- billion are requests to bankroll ground-
- breaking cryptanalytic capabilities that
- can beat cryptography and mine regular
- Internet traffic, new documents leaked
- by Edward Snowden to the Washington Post
- reveal.
- http://news.cnet.com/8301-13578_3-57600647-38/nsa-seeks-groundbreaking-spying-powers-new-leak-reveals/
- �We are bolstering our support for
- clandestine SIGINT capabilities to
- collect against high priority targets,
- including foreign leadership targets.
- Also, we are investing in groundbreaking
- cryptanalytic capabilities to defeat
- adversarial cryptography and exploit
- internet traffic.� ... ...
- Processing & Exploitation 15% of budget.
- Cryptanalysis & Exploitation Services ;
- Analysis of Target Systems, Cryptanalytic
- IT Systems, Cyber Cryptanalysis, Exploitation
- Solutions, Microelectronics, PEO Program,
- PEO Program B, PEO Program C, Target Pursuit,
- Target Reconnaissance & Survey.
- SIGINT Stations ; Cryptologic Centers,
- Field Sites, OCMC, SIGINT Ground Operations.
- http://cryptome.org/2013/08/spy-budget-fy13.pdf
- http://s3.documentcloud.org/documents/781537/cbjb-fy13-v1-extract.pdf
- � NSA Rigging the Crypto Market Repost ::
- http://cryptome.org/jya/nsa-sun.htm
- ? NSA May Have SSL Encryption Keys ::
- The US government has attempted to
- obtain the master encryption keys that
- Internet companies use to shield millions
- of users� private web communications
- from eavesdropping.
- These demands for master encryption keys,
- which have not been disclosed previously,
- represent a technological escalation in
- the clandestine methods that the FBI and
- the National Security Agency employ when
- conducting electronic surveillance against
- Internet users. ... ...
- Leaked NSA surveillance procedures,
- authorized by Attorney General Eric
- Holder, suggest that intercepted domestic
- communications are typically destroyed
- -- unless they�re encrypted. If that�s
- the case, the procedures say, �retention
- of all communications that are enciphered�
- is permissible.
- http://news.cnet.com/8301-13578_3-57595202-38/feds-put-heat-on-web-firms-for-master-encryption-keys/
- _______________________________________
- � NSA Arrangements with Foreign Internet
- Providers and Foreign Intelligence ::
- �The NSA started setting up Internet
- intercepts well before 2001, former
- intelligence officials say. Run by NSA�s
- secretive Special Services Office,
- these types of programs were at first
- designed to intercept communications
- overseas through arrangements with
- foreign Internet providers, the former
- officials say. NSA still has such
- arrangements in many countries,
- particularly in the Middle East and
- Europe, the former officials say.�
- http://electrospaces.blogspot.com/2013/08/nsa-has-also-arrangements-with-foreign.html
- � NSA�s Global Surveillance ::
- http://online.wsj.com/public/resources/documents/WSJ-NSAB08202013.jpg
- http://www.presstv.ir/detail/2013/08/21/319731/nsa-surveillance-new-detail/
- http://www.dailypaul.com/296515/wsj-new-details-show-broader-nsa-surveillance-reach-programs-cover-seventy-five-of-nations-traffic
- ���������������������������������������
- � Another Loophole Around FISA Laws for
- the NSA - Postpone Timestamp Process ::
- A common hacking technique can be used
- to make emails look as if they came from
- outside the United States.
- http://paste.servut.us/wsiq
- _______________________________________
- � Google and the NSA ; Who�s Holding the
- Shit-Bag Now? ::
- http://cryptome.org/2013/08/assange-google-nsa.htm
- http://thestringer.com.au/google-and-the-nsa-whos-holding-the-shit-bag-now
- ? Related ; Surveillance Industry Profit ::
- http://rt.com/usa/nsa-payed-internet-companies-911/
- http://www.infowars.com/leaked-document-reveals-government-paid-millions-to-prism-participants/
- http://www.theguardian.com/world/2013/aug/23/nsa-prism-costs-tech-companies-paid
- http://www.informationweek.com/security/government/nsa-paid-tech-companies-millions-for-pri/240160383
- ���������������������������������������
- � Judge Walton FISA Letter to Senator
- Patrick Leahy ::
- http://cryptome.org/2013/08/walton-leahy-13-0729.pdf
- � USA to Provide Declassified FISA Documents ::
- http://cryptome.org/2013/08/usa-fisa-13-0729.pdf
- _______________________________________
- � NSA Analysts Admit Deliberate Abuse ::
- Some National Security Agency analysts
- deliberately ignored restrictions on
- their authority to spy on Americans
- multiple times in the past decade,
- contradicting Obama regime officials�
- and lawmakers� statements that no
- willful violations occurred. ...
- Legal opinions declassified on Aug. 21
- revealed that the NSA intercepted as
- many as 56,000 electronic communications
- a year of Americans who weren�t suspected
- of having links to terrorism, before a
- secret court that oversees surveillance
- found the operation unconstitutional
- in 2011.
- http://www.bloomberg.com/news/2013-08-23/nsa-analysts-intentionally-abused-spying-powers-multiple-times.html
- � FISA Court Shut Down NSA�s Authority to
- Collect Domestic Calls (FAA 702 Upstream)
- in 2011 but the NSA Kept Collecting ::
- The 86-page document, which was declassified
- by US intelligence officials Wednesday,
- explains why the chief judge of the Foreign
- Intelligence Surveillance Court ruled the
- collection method unconstitutional. ...
- The documents were released in response
- to a Freedom of Information Act lawsuit
- filed by the Electronic Frontier Foundation.
- �It�s unfortunate it took a year of
- litigation and the most significant leak
- in American history to finally get them
- to release this opinion,� EFF staff
- attorney Mark Rumold said Wednesday,
- �but I�m happy that the administration
- is beginning to take this debate seriously.�
- http://cryptome.org/2013/08/fisa-shut-nsa-phone-records.pdf
- http://apps.washingtonpost.com/g/page/national/fisa-court-documents-on-illegal-nsa-e-mail-collection-program/409/
- http://www.washingtonpost.com/world/national-security/nsa-gathered-thousands-of-americans-e-mails-before-court-struck-down-program/2013/08/21/146ba4b6-0a90-11e3-b87c-476db8ac34cd_story.html
- � NSA Audit of 2,776 FISA Violations ::
- http://cryptome.org/2013/08/nsa-fisa-audit.pdf
- http://apps.washingtonpost.com/g/page/national/nsa-report-on-privacy-violations-in-the-first-quarter-of-2012/395/
- � NSA Fudging FISA Violations ::
- http://cryptome.org/2013/08/nsa-fisa-audit-note.pdf
- http://apps.washingtonpost.com/g/page/national/what-to-say-and-not-to-say-to-our-overseers/390/
- � Leaked NSA Audit Found Agency Broke
- Privacy Rules Thousands of Times ::
- http://apps.washingtonpost.com/g/page/national/nsa-report-on-privacy-violations-in-the-first-quarter-of-2012/395/
- http://www.washingtonpost.com/world/national-security/nsa-broke-privacy-rules-thousands-of-times-per-year-audit-finds/2013/08/15/3310e554-05ca-11e3-a07f-49ddc7417125_story_1.html
- http://www.dailybinarynews.com/leaked-nsa-audit-found-agency-broke-privacy-rules-thousands-of-times/
- http://www.dailybinarynews.com/wapo-nsa-broke-privacy-rules-thousands-of-times-harms-uncertain/
- http://www.infowars.com/uncontrolled-by-fisa-court-nsa-commits-thousands-of-privacy-violations-per-year/
- http://www.theguardian.com/world/2013/aug/16/nsa-violated-privacy-rules-audit
- The account is based on top-secret
- documents and a May 2012 internal NSA
- audit that found 2,776 infractions �
- including unauthorized collection,
- storage, access to or distribution of
- legally protected communications � in
- the preceding 12 months alone. The audit,
- originally only meant to be seen by top
- NSA leaders, only accounted for violations
- at NSA headquarters at Fort Meade, Virginia,
- and other locations in the Washington DC
- region.
- ? NSA Claims to Have Zero Tolerance Policy ::
- �I do think in a lot of the headlines
- and other things, there�s people talking
- about privacy violations or abuses or
- willful or violations, right, it is
- important for people to understand,
- NSA has a zero tolerance policy for
- willful misconduct. Zero. That�s our
- tolerance, it�s very simple.
- Right, we do realize mistakes do occur.
- We detect them, as early as we can.
- We correct them, right. None of the
- mistakes, the incidents that were in
- the document released were willful.
- Right, it doesn�t mean that we have
- any desire to have any mistakes; it
- doesn�t mean we think a mistake is okay.�
- http://cryptome.org/2013/08/nsa-13-0816.pdf
- � NSA Reveals That It Does 20,000,000
- Database Queries Per Month ::
- http://www.techdirt.com/articles/20130819/02153624228/nsa-reveals-that-it-does-20-million-database-queries-per-month.shtml
- � Breaking Down Mass NSA Spying & Lies ::
- http://www.infowars.com/you-wont-believe-whats-going-on-with-government-spying-on-americans/
- _______________________________________
- � UK GCHQ Bude and NSA Exchange Data ::
- Britain runs a secret internet-monitoring
- station in the Middle East to intercept
- and process vast quantities of emails,
- telephone calls and web traffic on behalf
- of Western intelligence agencies, The
- Independent has learnt. ... ...
- The information is then processed for
- intelligence and passed to GCHQ in
- Cheltenham and shared with the National
- Security Agency (NSA) in the United States.
- The Government claims the station is a
- key element in the West�s �war on terror�
- and provides a vital �early warning�
- system for potential attacks around
- the world.
- The Independent is not revealing the
- precise location of the station but
- information on its activities was
- contained in the leaked documents
- obtained from the NSA by Edward Snowden.
- The Guardian newspaper�s reporting on
- these documents in recent months has
- sparked a dispute with the Government,
- with GCHQ security experts overseeing
- the destruction of hard drives containing
- the data. ... ...
- The data-gathering operation is part of
- a �1,000,000,000 internet project still
- being assembled by GCHQ. It is part of
- the surveillance and monitoring system,
- code-named �Tempora�, whose wider aim is
- the global interception of digital
- communications, such as emails and text
- messages.
- Across three sites, communications �
- including telephone calls � are tracked
- both by satellite dishes and by tapping
- into underwater fibre-optic cables.
- http://www.independent.co.uk/news/uk/politics/exclusive-uks-secret-mideast-internet-surveillance-base-is-revealed-in-edward-snowden-leaks-8781082.html
- ���������������������������������������
- � Backbone Wiretaps to Backdoor Microcode ::
- http://cryptome.org/2013/08/callas-snowden.htm
- _______________________________________
- � FISA Reauthorization to John Boehner,
- Harry Reid, Nancy Pelosi, Mitch McConnell,
- Mike Rodgers, Dutch Ruppersberger, Lamar
- Smith, John Conyers Jr, Dianne Feinstein,
- Sexby Chambliss, Patrick J Leahy, Charles
- E Grassley ::
- http://cryptome.org/2013/08/fisa-dni-12-0326.pdf
- http://cryptome.org/2013/08/fisa-dni-ag-12-0208.pdf
- � FISA 2008 Heavy Censorship March 2009 ::
- http://cryptome.org/2013/08/fisa-march-2009.pdf
- � FISA 2008 Heavy Censorship May 2010 ::
- http://cryptome.org/2013/08/fisa-may-2010.pdf
- � FISA 2008 Heavy Censorship December 2009 ::
- http://cryptome.org/2013/08/fisa-december-2009.pdf
- � FISA Horse Droppings ::
- http://cryptome.org/2013/08/fisa-droppings.htm
- � FISA Documents Withheld From Most of
- Congress ::
- �I can now confirm that the House
- Permanent Select Committee on Intelligence
- did NOT, in fact, make the 2011 document
- available to Representatives in Congress,
- meaning that the large class of Representatives
- elected in 2010 did not receive either of
- the now declassified documents detailing
- these programs.� - Justin Amash
- http://www.theguardian.com/world/2013/aug/12/intelligence-committee-nsa-vote-justin-amash
- http://www.infowars.com/amash-nsa-docs-were-withheld-from-congress-by-higher-ups/
- ?
- http://www.youtube.com/watch?v=4Sg4AtcW0LU
- Youtube video ; 27:18 �So on this program,
- 100% audibility on every query that we make.
- And that is overseen by our Inspector General,
- our General Council. In 2009 in our
- discussions with the president when he
- first came on board we talked to him about
- these programs and the issue was how do
- we know the compliance is there and what
- more could we do? We stood up working with
- the COMMITTEES IN CONGRESS a directorate
- of compliance. This directorate of
- compliance is headed by legal professionals
- and information specialists that can look
- at everything that we do in these programs
- and ensure they (comply ?) with the court
- orders but we also have oversight from
- the Director of National Intelligence,
- General Council and IEG, from the Defense
- Department, from the Department of Justice,
- from the White House, FROM CONGRESS, the
- Intel(ligence) committees and from the
- courts.� - Keith Alexander
- _______________________________________
- � EU Privacy Watchdogs Seek PRISM Slides ::
- Only 9 out of 41 slides have become
- public so far.
- http://cnsnews.com/news/article/eu-privacy-watchdogs-seek-details-nsa-spying
- _______________________________________
- � NEVER LET SURVEILLANCE SHUT YOU UP ::
- http://online.wsj.com/article/SB10001424127887323639704579015101857760922.html
- _______________________________________
- � NSA Funds New �Top Secret� $60,000,000
- Data Lab ::
- http://www.infowars.com/nsa-funds-new-top-secret-60-million-dollar-data-lab/
- http://www.newsobserver.com/2013/08/15/3109412/nc-state-teams-up-with-nsa-on.html
- _______________________________________
- � What the NSA�s Massive Org Chart
- (Probably) Looks Like ::
- http://www.defenseone.com/ideas/2013/08/what-nsas-massive-org-chart-probably-looks/68642/
- http://www.mindmeister.com/308518551/the-national-security-agency-operates-more-than-500-separate-signals-intelligence-platforms-employs-roughly-30-000-civilians-and-military-budget-10-billion
- http://cdn.govexec.com/media/gbc/docs/pdfs_edit/d1nsaorgmapimg.jpg
- _______________________________________
- � NSA Spying Under Fire in Latin America ::
- The massive NSA snooping revelations
- have cast a shadow over John Kerry�s
- trip to Latin America � his first visit
- there since he assumed the position
- of Secretary of State. He has already
- received a chilly reception in Colombia
- � where officials demanded an explanation
- to reports that Washington had collected
- vast amounts of internet data there.
- The next stop on his trip is Brazil �
- which allegedly was the top regional
- target of the surveillance program.
- http://www.youtube.com/watch?v=fpRPnc6Ucy8
- http://sgtreport.com/2013/08/kerry-on-damage-control-nsa-spying-under-fire-in-latin-america/
- � Brazil Demands Clarifications on NSA
- Surveillance ::
- http://www.youtube.com/watch?v=txCcJ0wqdFc
- http://www.youtube.com/watch?v=cv1WjVI3lQA
- http://news.yahoo.com/brazil-demands-clarifications-nsa-surveillance-200545031.html
- _______________________________________
- � Ten Operational Directorates of NSA ::
- http://williamaarkin.wordpress.com/2013/08/13/nsa-a-little-help-with-transparency/
- ���������������������������������������
- � NSA Strategy and Core Values ::
- http://www.nsa.gov/about/_files/nsacss_strategy.pdf
- http://cryptome.org/2013/08/nsa-strategy-values.htm
- � NSA Deputy Director on NSA Core Values ::
- http://www.nsa.gov/about/values/core_values.shtml
- http://cryptome.org/2013/08/nsa-core-values-inglis.htm
- _______________________________________
- � Edward Snowden Speaks to Peter Maass ::
- http://www.nytimes.com/2013/08/18/magazine/snowden-maass-transcript.html
- http://cryptome.org/2013/08/snowden-maass.htm
- _______________________________________
- � Detail Into FAA Section 702 ::
- http://www.theguardian.com/world/2013/aug/09/nsa-loophole-warrantless-searches-email-calls
- �While the FAA 702 minimization procedures
- approved on 3 October 2011 now allow for
- use of certain United States person names
- and identifiers as query terms when reviewing
- collected FAA 702 data, analysts may NOT/NOT
- implement any USP queries until an effective
- oversight process has been developed by NSA
- and agreed to by DOJ/ODNI. Until further
- notice, collected FAA 702 data (702 data is
- contained in MARINA, MAINWAY, NUCLEON, PINWALE
- (Sweet* and Sour* partitions) and other
- databases).�
- http://static.guim.co.uk/sys-images/Guardian/Pix/pictures/2013/8/9/1376060880108/FAA-document-001.jpg
- NOBODY comments
- Refer to this leaked FISA document.
- http://cryptome.org/2013/06/nsa-fisa-minimization.pdf
- Under the FISA minimization, section 3
- (b) (2) �Monitoring, Recording, and
- Processing (U)� the NSA can hold domestic
- communications not related to foreign
- information or foreign activity for up
- to five years.
- Found in section 3 (1) �Such inadvertently
- acquired communications of or concerning a
- United States person may be retained no
- longer than five years in any event.�
- Under the FISA minimization, section 5
- �Domestic Communications (U)� there is
- more than one loophole the NSA can use to
- be granted authorization to snoop domestic
- communications that have been stored.
- Look into section 5, sub-sections (2) and
- (3). ? (2) refers to criminal activity and
- *suspected* criminal activity. (3) refers
- to �communications security vulnerability�
- both being used as excuses to snoop.
- _______________________________________
- � NSA ; Adobe Reader Very Vulnerable ::
- http://cryptome.org/2013/08/nsa-adobe-reader-XI.pdf
- _______________________________________
- � NSA ; Mobility Capability Package ::
- http://cryptome.org/2013/08/nsa-mobility-capability.pdf
- _______________________________________
- � Obama Meets With Third-Party Corporate
- Executives Behind Closed Doors ::
- As the steady stream of revelations
- continues, the White House has choosen
- to meet quietly with tech executives and
- consumer groups behind closed doors.
- http://www.politico.com/story/2013/08/tim-cook-barack-obama-technology-95362.html
- _______________________________________
- � Obama Press Conference on NSA Spying ::
- http://cryptome.org/2013/08/obama-nsa-13-0809.htm
- � Luke Rudkowski Talks About Obama�s NSA
- Spying Press Conference ::
- Luke Rudkowski breaks down today�s
- Presidential press conference in which the
- focus was predominantly on the NSA spying
- program. Luke points out many of the lies
- that Obama told today about the program
- by citing multiple articles with information
- that completely contradict what Obama said.
- http://www.youtube.com/watch?v=adZyfrcvtgg
- ���������������������������������������
- � NSA Missions, Authorities, Oversight,
- Partners ::
- http://cryptome.org/2013/08/nsa-13-0809.pdf
- ���������������������������������������
- � DoJ ; NSA Bulk Collection of Telephony
- Metadata ::
- http://cryptome.org/2013/08/doj-13-0809.pdf
- ���������������������������������������
- � National Security Run Amok ::
- http://www.washingtontimes.com/news/2013/aug/9/paul-national-security-run-amok/
- _______________________________________
- The Western Center for Journalism released
- a video briefing over Russel Tice former
- NSA whistleblower and his story about
- blackmailing former senator Barack Obama.
- http://www.youtube.com/watch?v=K31xCh6f_VY
- Abby Martin talks to Russell Tice, former
- intelligence analyst and original NSA
- whistleblower, about how the recent NSA
- scandal is only scratches the surface of
- a massive surveillance apparatus, citing
- specific targets the he saw spying orders
- for including former senators Hillary
- Clinton and Barack Obama.
- http://www.youtube.com/watch?v=d6m1XbWOfVk
- � Boiling Frogs Post Podcast Show of NSA
- whistleblower Russell Tice ::
- http://www.youtube.com/watch?v=2DmN80yi5mo
- http://www.boilingfrogspost.com/podpress_trac/web/20927/0/BF.0112.Tice_20130617.mp3
- � Corbett Report ; NSA Wiretapped Obama,
- Petraeus, Alito, and Others ::
- http://www.youtube.com/watch?v=H1ZAzu_0YZU
- Ron Paul talks about NSA spying and
- why they want to sweep it under the rug.
- http://www.youtube.com/watch?v=0h4yOr-27mA
- ���������������������������������������
- � NSA and Spying Nicknames and Codewords ::
- http://electrospaces.blogspot.com/p/nicknames-and-codewords.html
- � NSA�s Code Names Revealed (2012) ::
- http://williamaarkin.wordpress.com/2012/03/13/nsa-code-names-revealed/
- NOBODY comments
- RAGTIME is the codename for Stellar Wind.
- This operation was debated years ago, yet
- the document was still classified. It was
- leaked to cryptome.org last month. ?
- http://cryptome.org/2013/06/nsa-stellar-wind.pdf
- OCELOT and STORMBREW are both managed
- by Stu Bathurst - both telephony data
- grabbing operations. RAGTIME sponsored
- many of these operations being leaked.
- _______________________________________
- � Uncensored NSA FAIRVIEW Slides Air
- on Brazilian Television ::
- http://www.youtube.com/watch?v=kOAv7zbJkCk
- http://www.dailydot.com/news/nsa-fairview-slides-brazil-spying/
- http://cryptome.org/2013/08/nsa-codenames.htm
- NOBODY comments
- Upstream collection via FAA 702 includes
- FAIRVIEW, STORMBREW, BLARNEY and OAKSTAR.
- Original leaks of FAIRVIEW slides censored
- program managers - for FAIRVIEW �Craig Hicks�
- and for STORMBREW �Stu Bathurst.� ?
- http://postimg.org/image/9viuxblpd/
- ���������������������������������������
- � Transfers From Germany Aid US Surveillance,
- English Report ::
- German intelligence sends massive amounts
- of intercepted data to the NSA, according
- to documents from whistleblower Edward
- Snowden, which SPIEGEL has seen. The
- trans-Atlantic cooperation on technical
- matters is also much closer than first
- thought. ... ...
- Day after day and month after month,
- the BND passes on to the NSA massive
- amounts of connection data relating
- to the communications it had placed
- under surveillance. The so-called
- metadata -- telephone numbers, email
- addresses, IP connections -- then flow
- into the Americans� giant databases.
- http://www.spiegel.de/international/world/german-intelligence-sends-massive-amounts-of-data-to-the-nsa-a-914821.html
- � Transfers from Germany Aid US Surveillance,
- Deutsch Report ::
- http://cryptome.org/2013/08/der-spiegel-13-0804.pdf
- � Germany Nixes Spy Pact With US, UK (?) ::
- http://bigstory.ap.org/article/germany-nixes-surveillance-pact-us-britain
- ���������������������������������������
- � NSA XKEYSCORE Slides, 2008 ::
- http://cryptome.org/2013/07/nsa-xkeyscore.pdf
- http://www.slideshare.net/xkeyscore/xkeyscore-nsa-program-presentation
- http://www.documentcloud.org/documents/743244-xkeyscore-slidedeck.html
- � XKEYSCORE God-terminal Into Internet ::
- http://www.dw.de/xkeyscore-a-god-terminal-into-internet/a-16994780
- � Fed-up Congress Dumps �Em ::
- The latest revelations will add to
- the intense public and congressional
- debate around the extent of NSA
- surveillance programs. They come
- as senior intelligence officials
- testify to the Senate judiciary
- committee on Wednesday, releasing
- classified documents in response to
- the Guardian�s earlier stories on
- bulk collection of phone records
- and FISA surveillance court oversight.
- XKeyscore, the documents boast, is
- the NSA�s �widest reaching� system
- developing intelligence from computer
- networks � what the agency calls
- Digital Network Intelligence (DNI).
- One presentation claims the program
- covers �nearly everything a typical
- user does on the internet�, including
- the content of emails, websites
- visited and searches, as well as
- their metadata.
- http://www.theguardian.com/world/interactive/2013/jul/31/nsa-xkeyscore-program-full-presentation
- http://www.theguardian.com/world/2013/jul/31/nsa-top-secret-program-online-data
- http://www.reuters.com/article/2013/07/31/us-usa-security-intelligence-idUSBRE96U03320130731
- http://www.washingtontimes.com/news/2013/jul/31/declassified-documents-show-nsa-snooping-had-compl/
- � NSA XKeyscore Produced by SAIC ::
- http://cryptome.org/2013/08/nsa-xkeyscore-saic.htm
- � NSA Press Statement on XKEYSCORE ::
- http://cryptome.org/2013/07/nsa-xkeystore.htm
- http://www.nsa.gov/public_info/press_room/2013/30_July_2013.shtml
- � NSA X-KEYSCORE Server Locations ::
- http://cryptome.org/2013/08/nsa-x-keyscore-servers.htm
- � NSA X-KEYSCORE Global Cyber-espionage ::
- http://cryptome.org/2013/08/nsa-x-keyscore-family.htm
- � Instrument of Mass Surveillance ::
- http://www.infowars.com/xkeyscore-instrument-of-mass-surveillance/
- � NSA�s X-Keyscore One of Many More ::
- http://www.infowars.com/nsas-x-keyscore-one-of-many-surveillance-programs-used-on-americans/
- � RAGTIME and X-KEYSCORE @ Fort Meade ::
- �At Fort Meade, a program called
- XKEYSCORE processes all signals before
- they are shunted off to various �production
- lines� that deal with specific issues.
- PINWALE is the main NSA database for
- recorded signals intercepts. It is
- compartmentalized by keywords (the NSA
- calls them �selectors�). Metadata is
- stored in a database called MARINA and
- is generally retained for five years.
- ... ...
- �Congress repeatedly resisted the
- entreaties of the Bush Administration
- to change the surveillance laws once the
- RAGTIME program had been institutionalized.
- This was for a simple reason: they did
- not want to be responsible for a program
- that was not legal.�
- https://www.law.upenn.edu/live/files/1718-ambinder10-things.pdf
- NOBODY comments
- Under the FISA minimization, section 3
- (b) (2) �Monitoring, Recording, and
- Processing (U)� the NSA can hold domestic
- communications not related to foreign
- information or foreign activity for up
- to five years.
- This confirms an XKeyscore presentation
- posted by the Guardian regarding the
- metadata aggregation to PINWALE databank
- seen in the DNI discovery options.
- ���������������������������������������
- � NSA Pays �100,000,000 in Secret Funding
- for GCHQ Bude ::
- http://www.theguardian.com/uk-news/2013/aug/01/nsa-paid-gchq-spying-edward-snowden
- _______________________________________
- � Other Agencies Clamor for Data NSA
- Compiles but Claim Rejections ::
- Agencies working to curb drug trafficking,
- cyberattacks, money laundering,
- counterfeiting and even copyright
- infringement complain that their
- attempts to exploit the security
- agency�s vast resources have often
- been turned down because their own
- investigations are not considered a
- high enough priority, current and
- former government officials say.
- Intelligence officials say they have
- been careful to limit the use of the
- security agency�s troves of data and
- eavesdropping spyware for fear they
- could be misused in ways that violate
- Americans� privacy rights. ...
- �It�s a very common complaint about
- NSA,� said Timothy H. Edgar, a former
- senior intelligence official at the
- White House and at the office of the
- director of national intelligence.
- �They collect all this information,
- but it�s difficult for the other
- agencies to get access to what
- they want.�
- http://www.nytimes.com/2013/08/04/us/other-agencies-clamor-for-data-nsa-compiles.html?hp&_r=0
- _______________________________________
- � NSA�s Keith Alexander Remarks at Aspen
- Security Forum ::
- http://cryptome.org/2013/07/nsa-aspen.pdf
- � NSA�s Keith Alexander Remarks at AFCEA
- Conference ::
- http://cryptome.org/2013/07/nsa-afcea.pdf
- � NSA�s Keith Alexander Remarks at Blackhat
- Conference ::
- http://www.youtube.com/watch?v=4Sg4AtcW0LU
- https://soundcloud.com/larrymagid/nsa-director-general-keith
- http://cryptome.org/2013/08/nsa-13-0731.pdf
- Youtube video ; 27:18 �So on this program,
- 100% audibility on every query that we make.
- And that is overseen by our Inspector General,
- our General Council. In 2009 in our
- discussions with the president when he
- first came on board we talked to him about
- these programs and the issue was how do
- we know the compliance is there and what
- more could we do? We stood up working with
- the committees in Congress a directorate
- of compliance. This directorate of
- compliance is headed by legal professionals
- and information specialists that can look
- at everything that we do in these programs
- and ensure they (comply ?) with the court
- orders but we also have oversight from
- the Director of National Intelligence,
- General Council and IEG, from the Defense
- Department, from the Department of Justice,
- from the White House, from Congress, the
- Intel(ligence) committees and from the
- courts.� - Keith Alexander
- ? NSA�s Keith Alexander Angers a Few at
- Blackhat Conference ::
- �Read the constitution� someone shouts.
- �I did, you should too� replied Keith.
- http://www.infowars.com/security-consultant-heckles-nsa-head-shouts-freedom-read-the-constitution/
- http://www.forbes.com/sites/andygreenberg/2013/07/31/nsa-director-heckled-at-conference-as-he-asks-for-security-communitys-understanding/
- � NSA�s Keith Alexander Remarks to Workforce ::
- http://cryptome.org/2013/07/nsa-workforce.htm
- http://www.nsa.gov/public_info/speeches_testimonies/25jun13_dir.shtml
- _______________________________________
- � Obama Releases Three Patriot Act Docs ::
- http://cryptome.org/2013/07/obama-releases-13-0731.pdf
- � US Outlines NSA Culling of Data for
- All Domestic Calls ::
- On Wednesday, the Obama regime released
- three documents related to the National
- Security Agency�s collection of phone
- records, including briefings to Congress
- as the relevant provision of the Patriot
- Act was up for renewal, and a ruling
- from the Foreign Intelligence Surveillance
- Court that outlines rules that must be
- followed when accessing data provided by
- a Verizon subsidiary.
- http://www.nytimes.com/interactive/2013/08/01/us/01nsa-docs.html
- Before Mr. Snowden�s leaks made clear
- what the government was doing with the
- Patriot Act program, several senators
- on the Intelligence Committee had made
- cryptic warnings that it was interpreting
- the law in a twisted way to do something
- alarming and made reference to the 2011
- briefing paper. The New York Times filed
- a lawsuit under the Freedom of Information
- Act to obtain that document.
- https://www.documentcloud.org/documents/743215-2011-coverletters-report-collection.html
- _______________________________________
- � Senate FISA Spying Hearing Statements ::
- http://cryptome.org/2013/07/fisa-hearing-13-0731.pdf
- http://cryptome.org/2013/07/fisa-hearing-13-0731-2.pdf
- _______________________________________
- � Monitoring Emails Purely �Accidental� ::
- Saxby Chambliss ; �no emails are monitored
- now� ... �they used to be but that stopped
- two or three years ago.�
- http://abcnews.go.com/blogs/politics/2013/07/glenn-greenwald-low-level-nsa-analysts-have-powerful-and-invasive-search-tool/
- _______________________________________
- ? Lawmakers Who Upheld NSA Phone Spying
- Received Dox ::
- (1) http://c.nopaste.dk/p56175
- (2) http://c.nopaste.dk/p56176
- (3) http://c.nopaste.dk/p56177
- (4) http://c.nopaste.dk/p56178
- (5) http://c.nopaste.dk/p56179
- ? Lawmakers Who Sold Out ::
- http://pastebin.com/6fhaDJMp
- � Lawmakers Who Upheld NSA Phone Spying
- Received Double Defense Campaign Funds ::
- The numbers tell the story � in votes
- and dollars. On Wednesday, the house
- voted 217 to 205 not to rein in the
- NSA�s phone-spying dragnet. It turns
- out that those 217 �no� voters received
- twice as much campaign financing from
- the defense and intelligence industry
- as the 205 �yes� voters.
- http://www.wired.com/threatlevel/2013/07/money-nsa-vote/
- � These Are The 217 People Who Voted
- To Preserve NSA Surveillance ::
- http://www.infowars.com/these-are-the-217-people-who-voted-to-preserve-nsa-surveillance/
- http://clerk.house.gov/evs/2013/roll412.xml
- http://www.zerohedge.com/sites/default/files/images/user5/imageroot/2013/07/NOES_0.jpg
- ? US Congress Doxed, July 2013 ::
- http://slexy.org/view/s2fZ764IzB
- � Justin Amash�s Amendment to Defund
- the NSA Will Get a Vote [Failed] ::
- http://www.youtube.com/watch?v=IUy3IT0A8hM
- http://washingtonexaminer.com/defund-nsa-amendment-will-get-a-vote/article/2533380
- http://www.mcclatchydc.com/2013/07/23/197485/sen-wyden-says-he-tried-to-warn.html
- http://www.infowars.com/house-fight-brews-over-nsa-stasi-state/
- � White House Responds to Amash�s
- Amendment [Before It Failed] ::
- �In light of the recent unauthorized
- disclosures, the President has said
- that he welcomes a debate about how
- best to simultaneously safeguard both
- our national security and the privacy
- of our citizens. The Administration
- has taken various proactive steps to
- advance this debate including the
- President�s meeting with the Privacy
- and Civil Liberties Oversight Board,
- his public statements on the disclosed
- programs, the Office of the Director
- of National Intelligence�s release of
- its own public statements, ODNI General
- Counsel Bob Litt�s speech at Brookings,
- and ODNI�s decision to declassify and
- disclose publicly that the Administration
- filed an application with the Foreign
- Intelligence Surveillance Court. We
- look forward to continuing to discuss
- these critical issues with the American
- people and the Congress.
- However, we oppose the current effort
- in the House to hastily dismantle one
- of our Intelligence Community�s
- counterterrorism tools. This blunt
- approach is not the product of an
- informed, open, or deliberative process.
- We urge the House to reject the Amash
- Amendment, and instead move forward
- with an approach that appropriately
- takes into account the need for a
- reasoned review of what tools can
- best secure the nation.� - WH Press
- http://www.whitehouse.gov/the-press-office/2013/07/23/statement-press-secretary-amash-amendment
- http://washingtonexaminer.com/white-house-scrambles-to-defeat-bill-to-defund-nsa-program/article/2533418
- ? RELATED ; Privacy and Civil Liberties
- Board Meets Behind Closed Doors ::
- http://cryptome.org/2013/06/pclob-13-0617.htm
- � NSA Director Calls Emergency Meeting to
- Lobby Against Justin Amash�s Amendment
- to Defund NSA ::
- http://washingtonexaminer.com/nsa-director-calls-emergency-meeting-to-lobby-against-rep.-justin-amashs-nsa-amendment/article/2533407
- _______________________________________
- Yesterday, German media wrote about an
- official letter from the NSA, which was
- sent to the German government to clarify
- some misconceptions about PRISM. This
- because German media and politics were
- heavily confused after it became clear
- that there�s more than one program named
- PRISM.
- The NSA letter explains what the PRISM
- data collection program is about and
- then confirms that this program is
- different from a more common military
- web tool called "Planning tool for
- Resource Integration, Synchronization
- and Management" (PRISM).
- Surprisingly, the NSA also reveals that
- there�s even a third program called
- PRISM. In this case the name stands
- for �Portal for Real-time Information
- Sharing and Management� and it�s
- apparently an internal NSA information
- sharing program. It was unknown until
- now, probably because it�s used in the
- NSA�s highly sensitive Information
- Assurance Directorate (IAD). ... ...
- Here�s a short summary of all three
- different PRISM programs:
- 1. PRISM
- This is a codeword for an NSA project
- of collecting information about foreign
- targets from data of nine major US
- internet companies. This program started
- in 2007 and was unveiled by Edward Snowden
- in June 2013.
- 2. Planning tool for Resource Integration,
- Synchronization and Management (PRISM)
- This is a web tool used by US military
- intelligence to send tasking instructions
- to data collection platforms deployed to
- military operations. This program is
- not very secret and was first mentioned
- in 2002.
- 3. Portal for Real-time Information
- Sharing and Management (PRISM)
- This is an internal NSA program for
- real-time sharing of information,
- apparently in the NSA�s Information
- Assurance Directorate. Its existance
- was revealed by the NSA in July 2013.
- http://electrospaces.blogspot.com/2013/07/nsa-says-there-are-three-different.html
- � Three Different PRISM Programs? German
- Parliament Seeks Clarity in NSA Scandal ::
- A Thursday meeting in German parliament
- was supposed to shed light on NSA
- surveillance activities in Germany.
- It only added to the mystery. A US
- response to a Berlin inquiry claims
- that there are actually three unrelated
- Prism programs. ... ...
- In addition to testimony from Schindler
- and Maassen, officials also read a
- written statement from the NSA in
- response to a query from the German
- government. According to the statement,
- there are three separate Prism programs,
- all of them unconnected to each other.
- Meeting participants say the NSA response
- said that one of the Prism programs was
- only used internally. That program had
- thus far remained secret. Another of
- the programs was used by the Pentagon
- in Afghanistan. Yet another NSA tool
- -- vaguely described in the statement
- and allegedly �totally unrelated to the
- first� -- carries the name PRISM and
- �tracks and queries requests pertaining
- to our Information Assurance Directorate.�
- http://www.spiegel.de/international/germany/merkel-chief-of-staff-testifies-before-parliament-on-nsa-spying-a-913268.html
- NOBODY comments
- The snapshot of the PRISM input tool
- posted on electrospaces blogspot must
- have been from the Pentagon�s PRISM.
- _______________________________________
- � UPDATE ; NSA Utah Data Center Probe ::
- http://cryptome.org/2013/07/nsa-utah-probe/nsa-utah-probe.htm
- � NSA Utah Data Center Construction ::
- http://cryptome.org/2013-info/07/nsa-utah-dc/nsa-utah-dc.htm
- Description and drawings by US Army
- Corps of Engineers.
- http://cryptome.org/nsa-utah-data.zip
- http://cryptome.org/dodi/nsa-utah-award.pdf
- http://cryptome.org/dodi/nsa-utah-data-02.pdf
- _______________________________________
- � Eyeballing the UK�s GCHQ Spy Policy ::
- http://cryptome.org/2013/07/uk-spy-commish-2012.pdf
- � Eyeballing the UK�s RIPA Spy Policy ::
- http://cryptome.org/2013/07/uk-cop-spy-2012-13.pdf
- ���������������������������������������
- � NSA Organizational Chart 1950 ::
- http://cryptome.org/2013/07/nsa-org-chart-1950.pdf
- � NSA Headquarters Plans/Drawings 1953 ::
- http://cryptome.org/2013/07/nsa-hq-plans-1953.pdf
- � NSA Employee Conduct Guide 1955 ::
- http://cryptome.org/2013/07/nsa-conduct-guide-1955.pdf
- _______________________________________
- � DoJ Responds to Snowden Russia Asylum ::
- �First, the United States would not seek
- death penalty for Mr. Snowden should he
- return to the United States. The charges
- he faces do not carry that possibility,
- and the United States would not seek the
- death penalty even if Mr. Snowden were
- charged with additional, death penalty-
- eligible crimes.�
- �Second, Mr. Snowden will not be tortured.�
- http://cryptome.org/2013/07/usdoj-rumoj-snowden.pdf
- _______________________________________
- � Edward Snowden Nominated for Nobel
- Peace Prize ::
- Edward Snowden, the National Security
- Agency whistleblower who revealed the
- agency�s data collection program, has
- been nominated for a Nobel Peace Prize.
- �Edward Snowden has � in a heroic effort
- at great personal cost � revealed the
- existence and extent of the surveillance,
- the US government devotes electronic
- communications worldwide,� read the
- nomination. �By putting light on this
- monitoring program � conducted in
- contravention of national laws and
- international agreements � Edward Snowden
- has helped to make the world a little
- bit better and safer.� ...
- �The decision to award the 2013 prize
- to Edward Snowden would � in addition
- to being well justified in itself �
- also help to save the Nobel Peace Prize
- from the disrepute that incurred by the
- hasty and ill-conceived decision to
- award [war criminal] Barack Obama the 2009
- award,� Svallfors wrote to the committee.
- http://washingtonexaminer.com/edward-snowden-nominated-for-nobel-peace-prize/article/2533071
- _______________________________________
- � Glenn Greenwald Interviewed Moskovsky
- Komsomolets News ::
- http://cryptome.org/2013/07/gg-snowden-leak-halt.htm
- ���������������������������������������
- � Minute Details of How the NSA Installs
- Their Surveillance Equipment ::
- Pete Ashdown, the CEO of XMission, detailed
- his experience when he received a Foreign
- Intelligence Surveillance Act (FISA) warrant
- in 2010 which forced him to allow the
- federal government to monitor a customer
- of his.
- Of course, like all FISA orders, it also
- contained a broad gag order, which still
- prevents him from telling all the details.
- �The FISA request was a tricky one, because
- it was a warrant through the FISA court �
- whether you believe that is legitimate or
- not,� Ashdown wrote.
- He had to help the agents �set up a
- duplicate port to tap in to monitor that
- customer�s traffic. It was a 2U (two-unit)
- PC that we ran a mirrored ethernet port to.�
- Ashdown eventually had a box in his
- facility that was capturing all of the
- traffic sent to his customer. He did not
- remember if it was connected to the internet,
- but wrote that it was likely capturing
- all data to a hard drive for later analysis.
- http://endthelie.com/2013/07/21/owner-of-small-utah-isp-describes-how-the-nsa-attempted-to-get-him-to-install-surveillance-equipment/
- _______________________________________
- � NSA Briefs a New Administration, 2004 ::
- http://tinyurl.com/kqmpf4w
- _______________________________________
- � New Slides About NSA Collection Programs ::
- http://electrospaces.blogspot.com/2013/07/new-slides-about-nsa-collection-programs.html
- ���������������������������������������
- � NSA Admits They Snoop Targets� Contacts�
- Contacts� Contacts (3 Hops) ::
- As an aside during testimony on Capitol
- Hill today, a National Security Agency
- representative rather casually indicated
- that the government looks at data from
- a universe of far, far more people than
- previously indicated.
- Chris Inglis, the agency�s deputy director,
- was one of several government representatives
- �including from the FBI and the office of
- the Director of National Intelligence�
- testifying before the House Judiciary
- Committee this morning. Most of the testimony
- largely echoed previous testimony by the
- agencies on the topic of the government�s
- surveillance, including a retread of the
- same offered examples for how the Patriot
- Act and Foreign Intelligence Surveillance
- Act had stopped terror events.
- But Inglis� statement was new. Analysts
- look �two or three hops� from terror
- suspects when evaluating terror activity,
- Inglis revealed. Previously, the limit of
- how surveillance was extended had been
- described as two hops. This meant that
- if the NSA were following a phone metadata
- or web trail from a terror suspect, it
- could also look at the calls from the
- people that suspect has spoken with one
- hop. And then, the calls that second person
- had also spoken with two hops. Terror suspect
- to person two to person three. Two hops.
- And now: A third hop. ... ...
- So all of your friends, that�s one hop.
- Your friends� friends, whether you know
- them or not - two hops.
- Your friends� friends� friends, whoever
- they happen to be, are that third hop.
- http://www.theatlanticwire.com/politics/2013/07/nsa-admits-it-analyzes-more-peoples-data-previously-revealed/67287/
- ���������������������������������������
- � The Private Global Information Grid ::
- It is a good thing that people are
- becoming aware of the fact that they
- are being monitored - it is not only
- speculation anymore. We have seen PRISM,
- FinSpy and ECHELON. These programs are
- made to collect information and to store
- them in a database. Now just imagine the
- resources that PRISM used and how it
- could combine these resources to multiple
- databases. This is where GiG comes in.
- http://cyberwarzone.com/government-spying-database-global-information-grid
- _______________________________________
- � Edward Snowden Application for Asylum ::
- http://cryptome.org/2013/07/snowden-ru-asylum.htm
- ���������������������������������������
- � NSA Leaks Nothing Compared to Further
- Leaks Not-Yet-Released-to-Public ::
- Fugitive NSA leaker Edward Snowden today
- applied for asylum in Russia and, as a
- condition, agreed to stop �harming� the
- US, according to a Russian lawyer who
- is advising him, but that doesn�t
- necessarily mean headline-grabbing
- stories about the US government�s vast
- foreign and domestic spying programs
- will stop. ... ...
- Putin has said that Snowden can stay
- in Russia, but only if he stops �harming�
- the United States by releasing more
- intelligence secrets. ... ...
- But while Snowden agreed to stop leaking
- secrets, it could prove a technicality
- since he has already said that he gave
- all of his classified information --
- thousands of documents -- to several
- journalists. The most prominent of which,
- The Guardian columnist Glenn Greenwald,
- told ABC News Friday that he�s not even
- half done with the stories he plans to
- write based on the secret information.
- http://abcnews.go.com/Blotter/edward-snowden-legal-apply-russian-asylum/story?id=19678502
- ���������������������������������������
- � Mirror of Removed NSA Recruitment Drive ::
- http://cypherpoet.com/nsa/
- _______________________________________
- � Snowden NSA Revelations Mirrored ::
- http://cryptome.org/2013/07/cryptogram-13-0715.htm
- ���������������������������������������
- � When You�re Online, You�re Hacked ::
- In Russia, Prez Putin�s office just
- stopped using PC�s and switched to
- typewriters. What do they know that
- we don�t?
- http://steveblank.com/2013/07/15/your-computer-may-already-be-hacked-nsa-inside/
- ���������������������������������������
- � MITRE Corporation Outlined Collection
- Management for PRISM and Other Spying ::
- Planning Tool for Resource Integration,
- Synchronization, and Management aka PRISM
- has existed since at least 2002. The
- following document refers to it directly.
- This demonstrates PRISM not only existed
- in July 2002, but it had been undergoing
- usage for some time, enough time to recognize
- limitation of it and similar projects.
- http://pastebin.com/h5a1c1Pd
- http://www.mitre.org/work/tech_papers/tech_papers_02/kane_isrplatforms/isrinformationservices.pdf
- _______________________________________
- � Brasil � alvo da Maci�a Opera��o de
- Espionagem da NSA (TRANSLATED) ::
- http://code.str0.be/view/raw/540c2ebf
- � Brazil is the Most Monitored Country
- in Latin America ::
- http://cryptome.org/2013/07/nsa-tracking/nsa-tracking.htm
- http://oglobo.globo.com/infograficos/volume-rastreamento-governo-americano/
- http://www.washingtonpost.com/world/the_americas/paper-reveals-nsa-ops-in-latin-america/2013/07/09/eff0cc7e-e8e3-11e2-818e-aa29e855f3ab_print.html
- _______________________________________
- � US Dictatorship in Damage Control,
- Hyper-paranoia Over Snowden�s Leaks ::
- http://cryptome.org/2013/07/snowden-us-threat.htm
- http://in.reuters.com/article/2013/07/13/usa-security-snowden-greenwald-idINDEE96C05520130713
- � Future PRISM Leaks May Be Used As An
- Excuse for Global Internet Censorship ::
- http://in.reuters.com/article/2013/07/15/usa-security-cybertruce-idINDEE96E0DQ20130715
- _______________________________________
- � Intel in Bed with NSA ::
- http://cryptome.org/2013/07/intel-bed-nsa.htm
- _______________________________________
- � News Media Censoring or Editing PRISM
- Slides / Slides Differ ::
- http://cryptome.org/2013/07/nsa-upstream-differ.htm
- http://cryptome.org/2013/07/nsa-upstream-differ.jpg
- http://www.washingtonpost.com/business/economy/the-nsa-slide-you-havent-seen/2013/07/10/32801426-e8e6-11e2-aa9f-c03a72e2d342_story.html
- ���������������������������������������
- � NSA Policy on IP Encryptor ::
- http://cryptome.org/2013/07/CNSSP-19.pdf
- � NSA Policy on Information Assurance ::
- http://cryptome.org/2013/07/CNSSP-11.pdf
- _______________________________________
- � PRISM Method of Storing and Transferring
- Metadata ::
- http://electrospaces.blogspot.com/2013/07/new-insights-into-prism-program.html
- _______________________________________
- � NSA Rejecting Every FOIA Request Made
- by US Citizens ::
- http://www.dailykos.com/story/2013/07/06/1221694/-NSA-Rejecting-Every-FOIA-Request-Made-by-U-S-Citizens
- ���������������������������������������
- � National Security Agency DNS Tunnels ::
- http://pastebin.com/TpGTHDSy
- �This may look like a small release, but
- it's actually huge. See, we hacked the
- NSA yet again because we just love doing
- that. These are DNS tunnels that are
- sending encrypted data to and from the
- PRISM databases. We have the IP's of
- those servers. If you crash these servers
- with DDoS, you literally render PRISM
- "broken". We are also planning to release
- some of that data (which we have access
- to) if we can decrypt it.�
- ���������������������������������������
- � BEFORE PRISM ; Presidents Surveillance
- Program 2001 - 2006 ::
- Contractors include Booze Allen Hamilton,
- Snowden�s employer.
- http://cryptome.org/2013/07/Presidents-Spy-Program-Sept14-2001.htm
- � History Behind Fiber-optic Wiretapping ::
- http://pastebin.com/VzqpaF8y
- _______________________________________
- � France Has Own PRISM Spy System ::
- http://www.megapastebin.com.ar/DU5BPIIK
- _______________________________________
- � Edward Snowden�s WikiLeaks Statement ::
- �One week ago I left Hong Kong after
- it became clear that my freedom and
- safety were under threat for revealing
- the truth. My continued liberty has been
- owed to the efforts of friends new and
- old, family, and others who I have never
- met and probably never will. I trusted
- them with my life and they returned that
- trust with a faith in me for which I will
- always be thankful.
- On Thursday, President Obama declared
- before the world that he would not permit
- any diplomatic �wheeling and dealing� over
- my case. Yet now it is being reported that
- after promising not to do so, the President
- ordered his Vice President to pressure the
- leaders of nations from which I have
- requested protection to deny my asylum
- petitions.
- This kind of deception from a world leader
- is not justice, and neither is the extralegal
- penalty of exile. These are the old, bad
- tools of political aggression. Their purpose
- is to frighten, not me, but those who would
- come after me.
- For decades the United States of America
- have been one of the strongest defenders
- of the human right to seek asylum. Sadly,
- this right, laid out and voted for by the
- US in Article 14 of the Universal Declaration
- of Human Rights, is now being rejected by
- the current government of my country. The
- Obama administration has now adopted the
- strategy of using citizenship as a weapon.
- Although I am convicted of nothing, it has
- unilaterally revoked my passport, leaving
- me a stateless person. Without any judicial
- order, the administration now seeks to stop
- me exercising a basic right. A right that
- belongs to everybody. The right to seek
- asylum.
- In the end the Obama administration is
- not afraid of whistleblowers like me,
- Bradley Manning or Thomas Drake. We are
- stateless, imprisoned, or powerless. No,
- the Obama administration is afraid of you.
- It is afraid of an informed, angry public
- demanding the constitutional government
- it was promised � and it should be.
- I am unbowed in my convictions and
- impressed at the efforts taken by so
- many.�
- http://www.telegraph.co.uk/news/worldnews/europe/russia/10154064/Edward-Snowdens-WikiLeaks-statement-in-full.html
- ���������������������������������������
- � The Internet Counter-culture ::
- http://media.risky.biz/RB284.mp3
- � Surveillance Scandals and Thought Crimes ::
- http://media.risky.biz/RB283.mp3
- _______________________________________
- � Cyber Command Suffers Second Defeat ::
- http://cryptome.org/2013/07/uscybercom-dump.htm
- ���������������������������������������
- � Washington Post Publishes More PRISM ::
- http://www.washingtonpost.com/wp-srv/special/politics/prism-collection-documents/
- http://www.guardian.co.uk/world/2013/jun/30/washington-post-new-slides-prism
- http://cryptome.org/2013-info/06/wapo-13-0629/prism-wapo-13-0629.htm
- _______________________________________
- � US Army Blocked Access to The Guardian ::
- http://www.infowars.com/u-s-army-now-censoring-the-guardian/
- http://www.montereyherald.com/local/ci_23554739/restricted-web-access-guardian-is-army-wide-officials
- http://endthelie.com/2013/06/28/u-s-army-restricting-access-to-the-guardian-across-all-of-their-networks-over-security-concerns/
- _______________________________________
- � Mirror of Deleted Article by Guardian ::
- http://pastebin.com/NTJvUZdJ
- Revealed: secret European deals to hand
- over private data to America.
- Germany among countries offering intelligence
- according to new claims by former US defence
- analyst.
- At least six European Union countries in
- addition to Britain have been colluding
- with the US over the mass harvesting of
- personal communications data, according
- to a former contractor to America�s
- National Security Agency, who said the
- public should not be �kept in the dark.�
- Wayne Madsen, a former US navy lieutenant
- who first worked for the NSA in 1985
- and over the next 12 years held several
- sensitive positions within the agency,
- names Denmark, the Netherlands, France,
- Germany, Spain and Italy as having secret
- deals with the US.
- Madsen said the countries had �formal
- second and third party status� under
- signal intelligence (sigint) agreements
- that compels them to hand over data,
- including mobile phone and internet
- information to the NSA if requested.
- Under international intelligence agreements,
- confirmed by declassified documents,
- nations are categorised by the US according
- to their trust level. The US is first party
- while the UK, Canada, Australia and New
- Zealand enjoy second party relationships.
- Germany and France have third party
- relationships.
- In an interview published last night
- on the PrivacySurgeon.org blog, Madsen,
- who has been attacked for holding
- controversial views on espionage issues,
- said he had decided to speak out after
- becoming concerned about the �half story�
- told by EU politicians regarding the
- extent of the NSA�s activities in Europe.
- He said that under the agreements,
- which were drawn up after the second
- world war, the �NSA gets the lion�s
- share� of the sigint �take.� In return,
- the third parties to the NSA agreements
- received �highly sanitised intelligence.�
- Madsen said he was alarmed at the
- �sanctimonious outcry� of political
- leaders who were �feigning shock�
- about the spying operations while staying
- silent about their own arrangements
- with the US, and was particularly
- concerned that senior German politicians
- had accused the UK of spying when their
- country had a similar third-party deal
- with the NSA.
- Although the level of co-operation provided
- by other European countries to the NSA is
- not on the same scale as that provided by
- the UK, the allegations are potentially
- embarrassing.
- �I can�t understand how Angela Merkel can
- keep a straight face, demanding assurances
- from [Barack] Obama and the UK while Germany
- has entered into those exact relationships,�
- Madsen said.
- The Liberal Democrat MEP Baroness Ludford,
- a senior member of the European parliament�s
- civil liberties, justice and home affairs
- committee, said Madsen�s allegations
- confirmed that the entire system for
- monitoring data interception was a mess,
- because the EU was unable to intervene
- in intelligence matters, which remained
- the exclusive concern of national
- governments.
- �The intelligence agencies are exploiting
- these contradictions and no one is really
- holding them to account,� Ludford said.
- �It�s terribly undermining to liberal
- democracy.�
- Madsen�s disclosures have prompted calls
- for European governments to come clean
- on their arrangements with the NSA.
- �There needs to be transparency as to
- whether or not it is legal for the US
- or any other security service to
- interrogate private material,� said
- John Cooper QC, a leading international
- human rights lawyer. �The problem here
- is that none of these arrangements has
- been debated in any democratic arena.
- I agree with William Hague that sometimes
- things have to be done in secret, but you
- don�t break the law in secret.�
- Madsen said all seven European countries
- and the US have access to the Tat 14
- fibre-optic cable network running between
- Denmark and Germany, the Netherlands,
- France, the UK and the US, allowing them
- to intercept vast amounts of data,
- including phone calls, emails and records
- of users� access to websites.
- He said the public needed to be made
- aware of the full scale of the communication
- -sharing arrangements between European
- countries and the US, which predate the
- internet and became of strategic importance
- during the cold war.
- The covert relationship between the
- countries was first outlined in a 2001
- report by the European parliament, but
- their explicit connection with the NSA
- was not publicised until Madsen decided
- to speak out.
- The European parliament�s report followed
- revelations that the NSA was conducting a
- global intelligence-gathering operation,
- known as Echelon, which appears to have
- established the framework for European
- member states to collaborate with the US.
- �A lot of this information isn�t secret,
- nor is it new,� Madsen said. �It�s just
- that governments have chosen to keep the
- public in the dark about it. The days
- when they could get away with a conspiracy
- of silence are over.�
- This month another former NSA contractor,
- Edward Snowden, revealed to the Guardian
- previously undisclosed US programmes to
- monitor telephone and internet traffic.
- The NSA is alleged to have shared some of
- its data, gathered using a specialist tool
- called Prism, with Britain�s GCHQ.
- ���������������������������������������
- � Wayne Madsen, Former Contractor for NSA,
- Talks About Global SIGINT Interception ::
- A former contractor to the US National
- Security Agency (NSA) has told the
- Privacy Surgeon that communications
- intelligence arrangements between the
- US and Europe are much more �complex,
- murky and far reaching� than the public
- has been led to believe. ...
- He was particularly concerned about the
- �sanctimonious outcry� of political leaders
- who were �feigning shock� about recently
- disclosed spying operations such as PRISM
- while staying silent about their own role
- in global interception arrangements with
- the United States. ...
- Madsen also expressed anger over the
- NSA�s hypocrisy over Edward Snowden.
- �Snowden is being roundly condemned by
- many who say he had no authority or right
- to provide the public with details of
- NSA snooping. But what right or authority
- did NSA director, General Keith Alexander,
- have to provide information on NSA
- surveillance at five meetings of the
- global Bilderberg Conference � two in
- Virginia and one meeting each in Greece,
- Spain and Switzerland?�
- �Alexander claims he is protecting the
- American people from a constantly changing
- number of terrorist attacks. In fact, he
- is providing information to elites on
- the methods NSA uses to spy on labor,
- student, religious and progressive
- organizations.�
- �When Alexander leaks to the elites,
- he�s thanked. When Snowden does it,
- he�s called a traitor and a coward.�
- http://www.privacysurgeon.org/blog/incision/former-nsa-contractor-warns-of-murky-interception-arrangements/
- _______________________________________
- � NSA Spying Pisses Off European Union ::
- http://www.rawstory.com/rs/2013/06/30/new-nsa-leak-documents-show-how-the-us-is-bugging-its-european-allies/
- http://www.cbsnews.com/8301-202_162-57591678/european-officials-lash-out-at-new-nsa-spying-report/
- http://www.guardian.co.uk/world/2013/jun/30/nsa-spying-europe-claims-us-eu-trade
- http://www.infowars.com/report-nsa-joint-wiretapping-operations-with-foreign-nations/
- http://www.waynemadsenreport.com/articles/20130630
- http://www.spiegel.de/international/world/secret-documents-nsa-targeted-germany-and-eu-buildings-a-908609.html
- http://www.telegraph.co.uk/news/worldnews/northamerica/usa/10152478/Francois-Hollande-tells-the-US-to-stop-eavesdropping-on-Europe-if-it-wants-progress-on-trade-deal.html
- � FLASHBACK ; Why We Spy on Our Allies ::
- http://cryptome.org/echelon-cia2.htm
- ���������������������������������������
- � FLASHBACK ; Pentagon Wanted Searchable
- Database of People�s Lives in 2003 ::
- http://dailycaller.com/2013/07/01/pentagon-wanted-searchable-database-of-peoples-lives-in-2003/?print=1
- ??????????????????????????????????????
- ????????????????????????????????????
- ??????????????????????????????????????
- � Two NSA IG Reports Differ �
- http://cryptome.org/2013/06/nsa-reports-differ.htm
- � NSA Stellar Wind Email Internet Data
- Collection �
- http://cryptome.org/2013/06/nsa-stellar-wind.pdf
- � DoJ Memo on NSA Data Collection on
- Americans �
- http://cryptome.org/2013/06/doj-nsa-memo.pdf
- � List of Retreats for Whistleblowers ;
- Countries With No US Extradition Treaty �
- http://news.goldseek.com/GoldSeek/1372346844.php
- � Snowden Was Smart ; NSA Leaks Were
- Given to Untold Others, Encrypted �
- http://www.thedailybeast.com/articles/2013/06/25/greenwald-snowden-s-files-are-out-there-if-anything-happens-to-him.html
- � Congress Insisted They Be Kept in
- the Dark on NSA Spying �
- http://www.infowars.com/congress-insisted-they-be-kept-in-the-dark-on-nsa-spying/
- � Is PRISM a Not-So-Secret GUI and is
- There More Than One PRISM Tool? �
- http://electrospaces.blogspot.com/2013/06/is-prism-just-not-so-secret-web-tool.html
- � Screenshot of the PRISM Input Tool �
- http://1.bp.blogspot.com/-aKIwdHzpBxM/UbkjPyyl9pI/AAAAAAAAAWQ/hJWQkBFWDic/s1600/PRISM+input+tool.jpg
- � NSA Also Spying on the �Deep Web� �
- http://www.bloomberg.com/news/2013-06-23/u-s-surveillance-is-not-aimed-at-terrorists.html
- � Obama Regime Irate as Snowden Flees
- Hong Kong to Undisclosed Location �
- http://www.reuters.com/article/2013/06/23/us-usa-security-flight-idUSBRE95M02H20130623
- http://hosted.ap.org/dynamic/stories/A/AS_NSA_SURVEILLANCE_HONG_KONG?SITE=AP
- http://www.guardian.co.uk/world/2013/jun/23/edward-snowden-us-politicians-react
- � Wikileaks Comments on Helping Edward
- Snowden Flee to Undisclosed Location �
- http://wikileaks.org/WikiLeaks-Statement-On-Edward.html
- � Obama Regime Charges Edward Snowden
- With Espionage �
- http://www.washingtonpost.com/world/national-security/us-charges-snowden-with-espionage/2013/06/21/507497d8-dab1-11e2-a016-92547bf094cc_print.html
- � USA vs. Edward Snowden Complaint �
- http://cryptome.org/2013/06/snowden-complaint.pdf
- � Pre-Crime in FISA Leak Detailed �
- http://p.iain.it/view/raw/1296961
- � NSA FISA Surveillance Leaks �
- http://cryptome.org/2013/06/nsa-fisa-targeting.pdf
- http://cryptome.org/2013/06/nsa-fisa-minimization.pdf
- http://cryptome.org/2013/06/nsa-fisa-certification.pdf
- � Illegal Warrantless Mass Spying of
- All Telecommunication by NSA via FISA �
- http://cryptome.org/2014/01/nsa-prism-dk.pdf
- http://www.washingtonpost.com/wp-srv/special/politics/prism-collection-documents/
- http://apps.washingtonpost.com/g/page/national/inner-workings-of-a-top-secret-spy-program/282/
- http://www.guardian.co.uk/world/2013/jun/20/fisa-court-nsa-without-warrant
- http://techcrunch.com/2013/06/21/new-nsa-warrantless-tactics-reveal-little-room-for-presumption-of-innocence/
- http://www.informationweek.com/global-cio/interviews/nsa-dragnet-debacle-what-it-means-to-it/240156243
- http://www.independent.co.uk/news/world/americas/inside-the-nsa-peeling-back-the-curtain-on-americas-intelligence-agency-8658016.html
- http://www.washingtonsblog.com/2013/06/nsa-whistleblower-nsa-spying-on-and-blackmailing-high-level-government-officials-and-military-officers.html
- http://boilingfrogspost.com/wp-content/uploads/BF.0112.Tice_20130617.mp3
- http://boilingfrogspost.com/wp-content/uploads/BF.0111.Young_20130613.mp3
- http://www.bloomberg.com/news/2013-06-14/u-s-agencies-said-to-swap-data-with-thousands-of-firms.html
- http://cryptome.org/2013/06/nsa-arch-spy.htm
- http://www.usnews.com/news/newsgram/articles/2013/06/12/prism-class-action-lawsuit-filed-20b-injunction-sought-against-complicit-companies-and-officials
- http://www.usnews.com/news/newsgram/articles/2013/06/11/nine-companies-tied-to-prism-obama-will-be-smacked-with-class-action-lawsuit-wednesday
- http://www.washingtonpost.com/blogs/federal-eye/wp/2013/06/13/former-justice-prosecutor-seeks-23-billion-in-damages-for-nsa-surveillance-programs/
- http://www.washingtonpost.com/blogs/post-politics/wp/2013/06/09/rand-paul-planning-class-action-lawsuit-against-surveillance-programs/
- http://www.chicagotribune.com/news/chi-nsa-prism-scandal-20130609,0,432240.story
- http://cryptome.org/2013/06/snowden-censored.htm
- http://www.cbsnews.com/8301-250_162-57588385/nsa-seeks-criminal-probe-of-program-leaker/
- http://theweek.com/article/index/245311/sources-nsa-sucks-in-data-from-50-companies
- http://theweek.com/article/index/245360/solving-the-mystery-of-prism
- http://www.nationaljournal.com/politics/welcome-to-the-bush-obama-white-house-they-re-spying-on-us-20130606
- http://www.guardian.co.uk/world/2013/jun/06/us-tech-giants-nsa-data
- http://www.washingtonpost.com/investigations/us-intelligence-mining-data-from-nine-us-internet-companies-in-broad-secret-program/2013/06/06/3a0c0da8-cebf-11e2-8845-d970ccb04497_print.html
- http://cryptome.org/2013/06/obama-prism.pdf
- http://cryptome.org/2013/06/tpm-palantir-prism.pdf
- http://cryptome.org/2013/06/prism-spy-tools.htm
- http://openchannel.nbcnews.com/_news/2013/06/07/18831985-officials-nsa-mistakenly-intercepted-emails-phone-calls-of-innocent-americans
- http://rt.com/usa/nsa-payed-internet-companies-911/
- http://www.infowars.com/leaked-document-reveals-government-paid-millions-to-prism-participants/
- http://threatpost.com/fisc-no-phone-company-ever-challenged-metadata-collection-orders/102334
- http://www.foreignpolicy.com/articles/2013/11/21/the_obscure_fbi_team_that_does_the_nsa_dirty_work
- http://www.infowars.com/new-nsa-revelations-another-limited-hangout-whitewash/
- http://electrospaces.blogspot.com/2013/12/nsas-global-interception-network.html
- http://www.washingtonpost.com/world/national-security/nsa-tracking-cellphone-locations-worldwide-snowden-documents-show/2013/12/04/5492873a-5cf2-11e3-bc56-c6ca94801fac_print.html
- http://www.theguardian.com/world/2013/dec/04/nsa-storing-cell-phone-records-daily-snowden
- � FLASHBACK ; NSA Undersea Fiber Cable
- Tapping 1 & 2 (Repost) �
- http://cryptome.org/nsa-fibertap.htm
- http://cryptome.org/telecomm-weak.htm
- � FLASHBACK ; NSA Undersea Fiber Optic
- Tapping (Repost) �
- http://cryptome.org/nsa-seatap.htm
- � RELATED ; All Online Spy Guides 7zip �
- http://cryptome.org/isp-spy/online-spying.htm
- http://cryptome.org/online-spying-11-1206.7z
- {[????????????????????????????????????]}
- {[????????????????????????????????????]}
Copyright © 2007-2011, n3t-t3z Team
Posted by Eyeballing the N on May Tue 6th 8:22 PM - Never Expires
download | new post
Submit a correction or amendment below. (click here to make a fresh posting)
After submitting an amendment, you'll be able to view the differences between the old and new posts easily.