|
||||||||||||||
Privacy,
Domestic Surveillance
|
Wikileaks Vault 7 Press Release
Unit 8200 ... Israel's Spy /Blackmail op.Five Eyes and Color Revolutions Warrantless Surveillance of American Journalists, authorized by Bush ... FIRSTFRUITS Electronic Frontier Foundation "As part of its case, the EFF said it obtained documents from a former AT&T technician showing that the NSA is capable of monitoring all communications on AT&T's network ..." more
What is Amdocs / Narus connection to Hayden / Bush / NSA phone records database? WMR: Dec 2012, Senate delivers fatal end-of-term blow to Constitution ... Texas Republican Representative Lamar Smith's House Resolution 5949, the FISA Amendments Reauthorization Act of 2012. below |
9/11 Truth, JFK assassination & Holocaust interactive spreadsheet ... below & Nazi era timeline
FBI Facial Recognition and Identification Initiative Facebook, Twitter
US Senate report,
Fusion Centers, DHS incompetence
William Binney, NSA Whistleblower H.R. 3200/Division C/Title V/Subtitle C Implantable Device NSA requested warrantless wiretapping in Feb 2001
|
Darpa Wants You to Transcribe, and Instantly Recall, All of Your Conversations |
|||||||||||
|
Wikileaks Vault 7 |
Today, Tuesday 7 March 2017, WikiLeaks begins its new series of leaks on the U.S. Central Intelligence Agency. Code-named "Vault 7" by WikiLeaks, it is the largest ever publication of confidential documents on the agency. The first full part of the series, "Year Zero", comprises 8,761 documents and files from an isolated, high-security network situated inside the CIA's Center for Cyber Intelligence in Langley, Virgina. It follows an introductory disclosure last month of CIA targeting French political parties and candidates in the lead up to the 2012 presidential election. Recently, the CIA lost control of the majority of its hacking arsenal including malware, viruses, trojans, weaponized "zero day" exploits, malware remote control systems and associated documentation. This extraordinary collection, which amounts to more than several hundred million lines of code, gives its possessor the entire hacking capacity of the CIA. The archive appears to have been circulated among former U.S. government hackers and contractors in an unauthorized manner, one of whom has provided WikiLeaks with portions of the archive. "Year Zero" introduces the scope and direction of the CIA's global covert hacking program, its malware arsenal and dozens of "zero day" weaponized exploits against a wide range of U.S. and European company products, include Apple's iPhone, Google's Android and Microsoft's Windows and even Samsung TVs, which are turned into covert microphones. Since 2001 the CIA has gained political and budgetary preeminence over the U.S. National Security Agency (NSA). The CIA found itself building not just its now infamous drone fleet, but a very different type of covert, globe-spanning force — its own substantial fleet of hackers. The agency's hacking division freed it from having to disclose its often controversial operations to the NSA (its primary bureaucratic rival) in order to draw on the NSA's hacking capacities. By the end of 2016, the CIA's hacking division, which formally falls under the agency's Center for Cyber Intelligence (CCI), had over 5000 registered users and had produced more than a thousand hacking systems, trojans, viruses, and other "weaponized" malware. Such is the scale of the CIA's undertaking that by 2016, its hackers had utilized more code than that used to run Facebook. The CIA had created, in effect, its "own NSA" with even less accountability and without publicly answering the question as to whether such a massive budgetary spend on duplicating the capacities of a rival agency could be justified. In a statement to WikiLeaks the source details policy questions that they say urgently need to be debated in public, including whether the CIA's hacking capabilities exceed its mandated powers and the problem of public oversight of the agency. The source wishes to initiate a public debate about the security, creation, use, proliferation and democratic control of cyberweapons. Once a single cyber 'weapon' is 'loose' it can spread around the world in seconds, to be used by rival states, cyber mafia and teenage hackers alike. Julian Assange, WikiLeaks editor stated that "There is an extreme proliferation risk in the development of cyber 'weapons'. Comparisons can be drawn between the uncontrolled proliferation of such 'weapons', which results from the inability to contain them combined with their high market value, and the global arms trade. But the significance of "Year Zero" goes well beyond the choice between cyberwar and cyberpeace. The disclosure is also exceptional from a political, legal and forensic perspective." Wikileaks has carefully reviewed the "Year Zero" disclosure and published substantive CIA documentation while avoiding the distribution of 'armed' cyberweapons until a consensus emerges on the technical and political nature of the CIA's program and how such 'weapons' should analyzed, disarmed and published. Wikileaks has also decided to redact and anonymise some identifying information in "Year Zero" for in depth analysis. These redactions include ten of thousands of CIA targets and attack machines throughout Latin America, Europe and the United States. While we are aware of the imperfect results of any approach chosen, we remain committed to our publishing model and note that the quantity of published pages in "Vault 7" part one (“Year Zero”) already eclipses the total number of pages published over the first three years of the Edward Snowden NSA leaks. Analysis
CIA malware targets iPhone, Android, smart TVsCIA malware and hacking tools are built by EDG (Engineering Development Group), a software development group within CCI (Center for Cyber Intelligence), a department belonging to the CIA's DDI (Directorate for Digital Innovation). The DDI is one of the five major directorates of the CIA (see this organizational chart of the CIA for more details). The EDG is responsible for the development, testing and operational support of all backdoors, exploits, malicious payloads, trojans, viruses and any other kind of malware used by the CIA in its covert operations world-wide. The increasing sophistication of surveillance techniques has drawn comparisons with George Orwell's 1984, but "Weeping Angel", developed by the CIA's Embedded Devices Branch (EDB), which infests smart TVs, transforming them into covert microphones, is surely its most emblematic realization. The attack against Samsung smart TVs was developed in cooperation with the United Kingdom's MI5/BTSS. After infestation, Weeping Angel places the target TV in a 'Fake-Off' mode, so that the owner falsely believes the TV is off when it is on. In 'Fake-Off' mode the TV operates as a bug, recording conversations in the room and sending them over the Internet to a covert CIA server. As of October 2014 the CIA was also looking at infecting the vehicle control systems used by modern cars and trucks. The purpose of such control is not specified, but it would permit the CIA to engage in nearly undetectable assassinations. The CIA's Mobile Devices Branch (MDB) developed numerous attacks to remotely hack and control popular smart phones. Infected phones can be instructed to send the CIA the user's geolocation, audio and text communications as well as covertly activate the phone's camera and microphone. Despite iPhone's minority share (14.5%) of the global smart phone market in 2016, a specialized unit in the CIA's Mobile Development Branch produces malware to infest, control and exfiltrate data from iPhones and other Apple products running iOS, such as iPads. CIA's arsenal includesnumerous local and remote "zero days" developed by CIA or obtained from GCHQ, NSA, FBI or purchased from cyber arms contractors such as Baitshop. The disproportionate focus on iOS may be explained by the popularity of the iPhone among social, political, diplomatic and business elites. A similar unit targets Google's Android which is used to run the majority of the world's smart phones (~85%) including Samsung, HTC and Sony. 1.15 billion Android powered phones were sold last year. "Year Zero" shows that as of 2016 the CIA had 24 "weaponized" Android "zero days" which it has developed itself and obtained from GCHQ, NSA and cyber arms contractors. These techniques permit the CIA to bypass the encryption of WhatsApp, Signal, Telegram, Wiebo, Confide and Cloackman by hacking the "smart" phones that they run on and collecting audio and message traffic before encryption is applied.
CIA malware targets Windows, OSx, Linux, routersThe CIA also runs a very substantial effort to infect and control Microsoft Windows users with its malware. This includes multiple local and remote weaponized "zero days", air gap jumping viruses such as "Hammer Drill" which infects software distributed on CD/DVDs, infectors for removable media such as USBs, systems to hide data in images or in covert disk areas ( "Brutal Kangaroo") and to keep its malware infestations going. Many of these infection efforts are pulled together by the CIA's Automated Implant Branch (AIB), which has developed several attack systems for automated infestation and control of CIA malware, such as "Assassin" and "Medusa". Attacks against Internet infrastructure and webservers are developed by the CIA's Network Devices Branch (NDB). The CIA has developed automated multi-platform malware attack and control systems covering Windows, Mac OS X, Solaris, Linux and more, such as EDB's "HIVE" and the related "Cutthroat" and "Swindle" tools, which are described in the examples section below.
CIA 'hoarded' vulnerabilities ("zero days")In the wake of Edward Snowden's leaks about the NSA, the U.S. technology industry secured a commitment from the Obama administration that the executive would disclose on an ongoing basis — rather than hoard — serious vulnerabilities, exploits, bugs or "zero days" to Apple, Google, Microsoft, and other US-based manufacturers. Serious vulnerabilities not disclosed to the manufacturers places huge swathes of the population and critical infrastructure at risk to foreign intelligence or cyber criminals who independently discover or hear rumors of the vulnerability. If the CIA can discover such vulnerabilities so can others. The U.S. government's commitment to the Vulnerabilities Equities Process came after significant lobbying by US technology companies, who risk losing their share of the global market over real and perceived hidden vulnerabilities. The government stated that it would disclose all pervasive vulnerabilities discovered after 2010 on an ongoing basis. "Year Zero" documents show that the CIA breached the Obama administration's commitments. Many of the vulnerabilities used in the CIA's cyber arsenal are pervasive and some may already have been found by rival intelligence agencies or cyber criminals. As an example, specific CIA malware revealed in "Year Zero" is able to penetrate, infest and control both the Android phone and iPhone software that runs or has run presidential Twitter accounts. The CIA attacks this software by using undisclosed security vulnerabilities ("zero days") possessed by the CIA but if the CIA can hack these phones then so can everyone else who has obtained or discovered the vulnerability. As long as the CIA keeps these vulnerabilities concealed from Apple and Google (who make the phones) they will not be fixed, and the phones will remain hackable. The same vulnerabilities exist for the population at large, including the U.S. Cabinet, Congress, top CEOs, system administrators, security officers and engineers. By hiding these security flaws from manufacturers like Apple and Google the CIA ensures that it can hack everyone &mdsh; at the expense of leaving everyone hackable.
'Cyberwar' programs are a serious proliferation riskCyber 'weapons' are not possible to keep under effective control. While nuclear proliferation has been restrained by the enormous costs and visible infrastructure involved in assembling enough fissile material to produce a critical nuclear mass, cyber 'weapons', once developed, are very hard to retain. Cyber 'weapons' are in fact just computer programs which can be pirated like any other. Since they are entirely comprised of information they can be copied quickly with no marginal cost. Securing such 'weapons' is particularly difficult since the same people who develop and use them have the skills to exfiltrate copies without leaving traces — sometimes by using the very same 'weapons' against the organizations that contain them. There are substantial price incentives for government hackers and consultants to obtain copies since there is a global "vulnerability market" that will pay hundreds of thousands to millions of dollars for copies of such 'weapons'. Similarly, contractors and companies who obtain such 'weapons' sometimes use them for their own purposes, obtaining advantage over their competitors in selling 'hacking' services. Over the last three years the United States intelligence sector, which consists of government agencies such as the CIA and NSA and their contractors, such as Booze Allan Hamilton, has been subject to unprecedented series of data exfiltrations by its own workers. A number of intelligence community members not yet publicly named have been arrested or subject to federal criminal investigations in separate incidents. Most visibly, on February 8, 2017 a U.S. federal grand jury indicted Harold T. Martin III with 20 counts of mishandling classified information. The Department of Justice alleged that it seized some 50,000 gigabytes of information from Harold T. Martin III that he had obtained from classified programs at NSA and CIA, including the source code for numerous hacking tools. Once a single cyber 'weapon' is 'loose' it can spread around the world in seconds, to be used by peer states, cyber mafia and teenage hackers alike.
U.S. Consulate in Frankfurt is a covert CIA hacker baseIn addition to its operations in Langley, Virginia the CIA also uses the U.S. consulate in Frankfurt as a covert base for its hackers covering Europe, the Middle East and Africa. CIA hackers operating out of the Frankfurt consulate ( "Center for Cyber Intelligence Europe" or CCIE) are given diplomatic ("black") passports and State Department cover. The instructions for incoming CIA hackers make Germany's counter-intelligence efforts appear inconsequential: "Breeze through German Customs because you have your cover-for-action story down pat, and all they did was stamp your passport" Your Cover Story (for this trip) Q: Why are you here? A: Supporting technical consultations at the Consulate. Two earlier WikiLeaks publications give further detail on CIA approaches to customs and secondary screening procedures. Once in Frankfurt CIA hackers can travel without further border checks to the 25 European countries that are part of the Shengen open border area — including France, Italy and Switzerland. A number of the CIA's electronic attack methods are designed for physical proximity. These attack methods are able to penetrate high security networks that are disconnected from the internet, such as police record database. In these cases, a CIA officer, agent or allied intelligence officer acting under instructions, physically infiltrates the targeted workplace. The attacker is provided with a USB containing malware developed for the CIA for this purpose, which is inserted into the targeted computer. The attacker then infects and exfiltrates data to removable media. For example, the CIA attack system Fine Dining, provides 24 decoy applications for CIA spies to use. To witnesses, the spy appears to be running a program showing videos (e.g VLC), presenting slides (Prezi), playing a computer game (Breakout2, 2048) or even running a fake virus scanner (Kaspersky, McAfee, Sophos). But while the decoy application is on the screen, the underlaying system is automatically infected and ransacked.
How the CIA dramatically increased proliferation risksIn what is surely one of the most astounding intelligence own goals in living memory, the CIA structured its classification regime such that for the most market valuable part of "Vault 7" — the CIA's weaponized malware (implants + zero days), Listening Posts (LP), and Command and Control (C2) systems — the agency has little legal recourse. The CIA made these systems unclassified. Why the CIA chose to make its cyberarsenal unclassified reveals how concepts developed for military use do not easily crossover to the 'battlefield' of cyber 'war'. To attack its targets, the CIA usually requires that its implants communicate with their control programs over the internet. If CIA implants, Command & Control and Listening Post software were classified, then CIA officers could be prosecuted or dismissed for violating rules that prohibit placing classified information onto the Internet. Consequently the CIA has secretly made most of its cyber spying/war code unclassified. The U.S. government is not able to assert copyright either, due to restrictions in the U.S. Constitution. This means that cyber 'arms' manufactures and computer hackers can freely "pirate" these 'weapons' if they are obtained. The CIA has primarily had to rely on obfuscation to protect its malware secrets. Conventional weapons such as missiles may be fired at the enemy (i.e into an unsecured area). Proximity to or impact with the target detonates the ordnance including its classified parts. Hence military personnel do not violate classification rules by firing ordnance with classified parts. Ordnance will likely explode. If it does not, that is not the operator's intent. Over the last decade U.S. hacking operations have been increasingly dressed up in military jargon to tap into Department of Defense funding streams. For instance, attempted "malware injections" (commercial jargon) or "implant drops" (NSA jargon) are being called "fires" as if a weapon was being fired. However the analogy is questionable. Unlike bullets, bombs or missiles, most CIA malware is designed to live for days or even years after it has reached its 'target'. CIA malware does not "explode on impact" but rather permanently infests its target. In order to infect target's device, copies of the malware must be placed on the target's devices, giving physical possession of the malware to the target. To exfiltrate data back to the CIA or to await further instructions the malware must communicate with CIA Command & Control (C2) systems placed on internet connected servers. But such servers are typically not approved to hold classified information, so CIA command and control systems are also made unclassified. A successful 'attack' on a target's computer system is more like a series of complex stock maneuvers in a hostile take-over bid or the careful planting of rumors in order to gain control over an organization's leadership rather than the firing of a weapons system. If there is a military analogy to be made, the infestation of a target is perhaps akin to the execution of a whole series of military maneuvers against the target's territory including observation, infiltration, occupation and exploitation.
Evading forensics and anti-virusA series of standards lay out CIA malware infestation patterns which are likely to assist forensic crime scene investigators as well as Apple, Microsoft, Google, Samsung, Nokia, Blackberry, Siemens and anti-virus companies attribute and defend against attacks. "Tradecraft DO's and DON'Ts" contains CIA rules on how its malware should be written to avoid fingerprints implicating the "CIA, US government, or its witting partner companies" in "forensic review". Similar secret standards cover the use of encryption to hide CIA hacker and malware communication (pdf), describing targets & exfiltrated data (pdf) as well as executing payloads (pdf) and persisting (pdf) in the target's machines over time.CIA hackers developed successful attacks against most well known anti-virus programs. These are documented in AV defeats, Personal Security Products, Detecting and defeating PSPs andPSP/Debugger/RE Avoidance. For example, Comodo was defeated by CIA malware placing itself in the Window's "Recycle Bin". While Comodo 6.x has a "Gaping Hole of DOOM". CIA hackers discussed what the NSA's "Equation Group" hackers did wrong and how the CIA's malware makers could avoid similar exposure.
Examples
The CIA's Engineering Development Group (EDG) management system contains around 500 different projects (only some of which are documented by "Year Zero") each with their own sub-projects, malware and hacker tools. The majority of these projects relate to tools that are used for penetration, infestation ("implanting"), control, and exfiltration. Another branch of development focuses on the development and operation of Listening Posts (LP) and Command and Control (C2) systems used to communicate with and control CIA implants; special projects are used to target specific hardware from routers to smart TVs. Some example projects are described below, but see the table of contents for the full list of projects described by WikiLeaks' "Year Zero".
UMBRAGEThe CIA's hand crafted hacking techniques pose a problem for the agency. Each technique it has created forms a "fingerprint" that can be used by forensic investigators to attribute multiple different attacks to the same entity. This is analogous to finding the same distinctive knife wound on multiple separate murder victims. The unique wounding style creates suspicion that a single murderer is responsible. As soon one murder in the set is solved then the other murders also find likely attribution. The CIA's Remote Devices Branch's UMBRAGE group collects and maintains a substantial library of attack techniques 'stolen' from malware produced in other states including the Russian Federation. With UMBRAGE and related projects the CIA cannot only increase its total number of attack types but also misdirect attribution by leaving behind the "fingerprints" of the groups that the attack techniques were stolen from. UMBRAGE components cover keyloggers, password collection, webcam capture, data destruction, persistence, privilege escalation, stealth, anti-virus (PSP) avoidance and survey techniques.
Fine DiningFine Dining comes with a standardized questionnaire i.e menu that CIA case officers fill out. The questionnaire is used by the agency's OSB (Operational Support Branch) to transform the requests of case officers into technical requirements for hacking attacks (typically "exfiltrating" information from computer systems) for specific operations. The questionnaire allows the OSB to identify how to adapt existing tools for the operation, and communicate this to CIA malware configuration staff. The OSB functions as the interface between CIA operational staff and the relevant technical support staff. Among the list of possible targets of the collection are 'Asset', 'Liason Asset', 'System Administrator', 'Foreign Information Operations', 'Foreign Intelligence Agencies' and 'Foreign Government Entities'. Notably absent is any reference to extremists or transnational criminals. The 'Case Officer' is also asked to specify the environment of the target like the type of computer, operating system used, Internet connectivity and installed anti-virus utilities (PSPs) as well as a list of file types to be exfiltrated like Office documents, audio, video, images or custom file types. The 'menu' also asks for information if recurring access to the target is possible and how long unobserved access to the computer can be maintained. This information is used by the CIA's 'JQJIMPROVISE' software (see below) to configure a set of CIA malware suited to the specific needs of an operation.
Improvise (JQJIMPROVISE)'Improvise' is a toolset for configuration, post-processing, payload setup and execution vector selection for survey/exfiltration tools supporting all major operating systems like Windows (Bartender), MacOS (JukeBox) and Linux (DanceFloor). Its configuration utilities like Margarita allows the NOC (Network Operation Center) to customize tools based on requirements from 'Fine Dining' questionairies.
HIVEHIVE is a multi-platform CIA malware suite and its associated control software. The project provides customizable implants for Windows, Solaris, MikroTik (used in internet routers) and Linux platforms and a Listening Post (LP)/Command and Control (C2) infrastructure to communicate with these implants. The implants are configured to communicate via HTTPS with the webserver of a cover domain; each operation utilizing these implants has a separate cover domain and the infrastructure can handle any number of cover domains. Each cover domain resolves to an IP address that is located at a commercial VPS (Virtual Private Server) provider. The public-facing server forwards all incoming traffic via a VPN to a 'Blot' server that handles actual connection requests from clients. It is setup for optional SSL client authentication: if a client sends a valid client certificate (only implants can do that), the connection is forwarded to the 'Honeycomb' toolserver that communicates with the implant; if a valid certificate is missing (which is the case if someone tries to open the cover domain website by accident), the traffic is forwarded to a cover server that delivers an unsuspicious looking website. The Honeycomb toolserver receives exfiltrated information from the implant; an operator can also task the implant to execute jobs on the target computer, so the toolserver acts as a C2 (command and control) server for the implant. Similar functionality (though limited to Windows) is provided by the RickBobby project. See the classified user and developer guides for HIVE.
Frequently Asked Questions
Why now?WikiLeaks published as soon as its verification and analysis were ready. In Febuary the Trump administration has issued an Executive Order calling for a "Cyberwar" review to be prepared within 30 days. While the review increases the timeliness and relevance of the publication it did not play a role in setting the publication date.
RedactionsNames, email addresses and external IP addresses have been redacted in the released pages (70,875 redactions in total) until further analysis is complete.
Organizational ChartThe organizational chart corresponds to the material published by WikiLeaks so far. Since the organizational structure of the CIA below the level of Directorates is not public, the placement of the EDG and its branches within the org chart of the agency is reconstructed from information contained in the documents released so far. It is intended to be used as a rough outline of the internal organization; please be aware that the reconstructed org chart is incomplete and that internal reorganizations occur frequently.
Wiki pages"Year Zero" contains 7818 web pages with 943 attachments from the internal development groupware. The software used for this purpose is called Confluence, a proprietary software from Atlassian. Webpages in this system (like in Wikipedia) have a version history that can provide interesting insights on how a document evolved over time; the 7818 documents include these page histories for 1136 latest versions. The order of named pages within each level is determined by date (oldest first). Page content is not present if it was originally dynamically created by the Confluence software (as indicated on the re-constructed page).
What time period is covered?The years 2013 to 2016. The sort order of the pages within each level is determined by date (oldest first). WikiLeaks has obtained the CIA's creation/last modification date for each page but these do not yet appear for technical reasons. Usually the date can be discerned or approximated from the content and the page order. If it is critical to know the exact time/date contact WikiLeaks.
What is "Vault 7""Vault 7" is a substantial collection of material about CIA activities obtained by WikiLeaks.
When was each part of "Vault 7" obtained?Part one was obtained recently and covers through 2016. Details on the other parts will be available at the time of publication.
Is each part of "Vault 7" from a different source?Details on the other parts will be available at the time of publication.
What is the total size of "Vault 7"?The series is the largest intelligence publication in history.
How did WikiLeaks obtain each part of "Vault 7"?Sources trust WikiLeaks to not reveal information that might help identify them.
Isn't WikiLeaks worried that the CIA will act against its staff to stop the series?No. That would be certainly counter-productive.
Has WikiLeaks already 'mined' all the best stories?No. WikiLeaks has intentionally not written up hundreds of impactful stories to encourage others to find them and so create expertise in the area for subsequent parts in the series. They're there. Look. Those who demonstrate journalistic excellence may be considered for early access to future parts.
Won't other journalists find all the best stories before me?Unlikely. There are very considerably more stories than there are journalists or academics who are in a position to write them |
|
PROGRESSIVE | REFERENCE | CONSERVATIVE 1%* |
|
|
|
|
Domestic Spying News top | ||
PROGRESSIVE | REFERENCE | CONSERVATIVE 1%* |
|
|
|
ARPA, IARPA, Advanced Research and Development Activity Office top | ||||||||||||||||||||||||||||||
PROGRESSIVE | REFERENCE | CONSERVATIVE 1%* | ||||||||||||||||||||||||||||
|
|
|
||||||||||||||||||||||||||||
|
||||||||||||||||||||||||||||||
Appliance Surveillance top | ||||||||||||||||||||||||||||||
PROGRESSIVE | REFERENCE | CONSERVATIVE 1%* | ||||||||||||||||||||||||||||
|
|
|
||||||||||||||||||||||||||||
|
||||||||||||||||||||||||||||||
|
||||||||||||||||||||||||||||||
Auto Black Box top | ||||||||||||||||||||||||||||||
PROGRESSIVE | REFERENCE | CONSERVATIVE 1%* | ||||||||||||||||||||||||||||
|
|
|
||||||||||||||||||||||||||||
|
||||||||||||||||||||||||||||||
Automatic License Plate Recognition top MORE | ||||||||||||||||||||||||||||||
PROGRESSIVE | REFERENCE | CONSERVATIVE 1%* | ||||||||||||||||||||||||||||
|
|
|
||||||||||||||||||||||||||||
|
||||||||||||||||||||||||||||||
|
||||||||||||||||||||||||||||||
Biosurveillance, Biowatch top | ||||||||||||||||||||||||||||||
PROGRESSIVE | REFERENCE | CONSERVATIVE 1%* | ||||||||||||||||||||||||||||
|
|
|
||||||||||||||||||||||||||||
CALEA Communications Assistance for Law Enforcement Act top | ||||||||||||||||||||||||||||||
PROGRESSIVE | REFERENCE | CONSERVATIVE 1%* | ||||||||||||||||||||||||||||
|
|
|
||||||||||||||||||||||||||||
CAPPS, CAPPS II, Secure Flight airline no-fly list top | ||||||||||||||||||||||||||||||
PROGRESSIVE | REFERENCE | CONSERVATIVE 1%* | ||||||||||||||||||||||||||||
|
|
|||||||||||||||||||||||||||||
|
||||||||||||||||||||||||||||||
Carnivore, DCS 1000, EtherPeek top | ||||||||||||||||||||||||||||||
PROGRESSIVE | REFERENCE | CONSERVATIVE 1%* | ||||||||||||||||||||||||||||
|
|
|
||||||||||||||||||||||||||||
Cell Site Tracking top | ||||||||||||||||||||||||||||||
PROGRESSIVE | REFERENCE | CONSERVATIVE 1%* | ||||||||||||||||||||||||||||
|
|
|
||||||||||||||||||||||||||||
|
||||||||||||||||||||||||||||||
Census Bureau top | ||||||||||||||||||||||||||||||
PROGRESSIVE | REFERENCE | CONSERVATIVE 1%* | ||||||||||||||||||||||||||||
|
|
|
||||||||||||||||||||||||||||
|
||||||||||||||||||||||||||||||
CODIS Collect DNA from every arrest top | ||||||||||||||||||||||||||||||
PROGRESSIVE | REFERENCE | CONSERVATIVE 1%* | ||||||||||||||||||||||||||||
|
|
|
||||||||||||||||||||||||||||
|
||||||||||||||||||||||||||||||
COFEE Computer Online Forensic Evidence Extractor top | ||||||||||||||||||||||||||||||
PROGRESSIVE | REFERENCE | CONSERVATIVE 1%* | ||||||||||||||||||||||||||||
|
|
|
||||||||||||||||||||||||||||
|
||||||||||||||||||||||||||||||
Controlled Drug Users top | ||||||||||||||||||||||||||||||
PROGRESSIVE | REFERENCE | CONSERVATIVE 1%* | ||||||||||||||||||||||||||||
|
|
|
||||||||||||||||||||||||||||
DARPA, ARPA, IARPA, IPTO top | ||||||||||||||||||||||||||||||
PROGRESSIVE | REFERENCE | CONSERVATIVE 1%* | ||||||||||||||||||||||||||||
|
|
|
||||||||||||||||||||||||||||
|
||||||||||||||||||||||||||||||
|
||||||||||||||||||||||||||||||
Data Mining for profit, Acxiom and Epsilon top | ||||||||||||||||||||||||||||||
PROGRESSIVE | REFERENCE | CONSERVATIVE 1%* | ||||||||||||||||||||||||||||
|
|
|
||||||||||||||||||||||||||||
|
||||||||||||||||||||||||||||||
DHS top | ||||||||||||||||||||||||||||||
PROGRESSIVE | REFERENCE | CONSERVATIVE 1%* | ||||||||||||||||||||||||||||
|
|
|
||||||||||||||||||||||||||||
|
||||||||||||||||||||||||||||||
|
||||||||||||||||||||||||||||||
Digital TV top | ||||||||||||||||||||||||||||||
PROGRESSIVE | REFERENCE | CONSERVATIVE 1%* | ||||||||||||||||||||||||||||
|
|
|
||||||||||||||||||||||||||||
There is a connection between NSA phone records database , Amdocs and 9/11. | ||||||||||||||||||||||||||||||
![]() |
|
|||||||||||||||||||||||||||||
DNA databases top | ||
PROGRESSIVE | REFERENCE | CONSERVATIVE 1%* |
|
|
|
Drones & Balloons, HART / HURT top | ||
PROGRESSIVE | REFERENCE | CONSERVATIVE 1%* |
|
|
|
|
||
and also see Totse Suspicious Activities Involving Israeli Art Students at DEA Facilities by DEA |
![]() |
![]() What are connections between Amdocs, Narus (Semantic Traffic Analysis) and NSA phone records database? Tony Snow, Carl Cameron, FoxNews report on Israeli art students removed? Why? |
Drug Testing top | ||
PROGRESSIVE | REFERENCE | CONSERVATIVE 1%* |
|
|
|
DSL Internet Service top | ||
PROGRESSIVE | REFERENCE | CONSERVATIVE 1%* |
|
|
|
Echelon top | ||
PROGRESSIVE | REFERENCE | CONSERVATIVE 1%* |
|
|
|
Einstein, Network Infrastructure, Deep Packet Inspection | ||
PROGRESSIVE | REFERENCE | CONSERVATIVE 1%* |
|
|
|
|
Electronic Passport, top | ||
PROGRESSIVE | REFERENCE | CONSERVATIVE 1%* |
|
|
|
Email Surveillance, top | ||
PROGRESSIVE | REFERENCE | CONSERVATIVE 1%* |
|
|
|
Entersect top | ||
PROGRESSIVE | REFERENCE | CONSERVATIVE 1%* |
|
|
|
|
EZPass top | ||
PROGRESSIVE | REFERENCE | CONSERVATIVE 1%* |
|
|
|
|
Facial Recognition, NGI top | ||
PROGRESSIVE | REFERENCE | CONSERVATIVE 1%* |
|
|
|
FBI Tracking Devices top | |||
PROGRESSIVE | REFERENCE | CONSERVATIVE 1%* | |
|
|
|
|
|
|||
FBI, CIA Surveillance top | |||
PROGRESSIVE | REFERENCE | CONSERVATIVE 1%* | |
|
|
|
|
FDIC Bank Transaction Surveillance top | |||
PROGRESSIVE | REFERENCE | CONSERVATIVE 1%* | |
|
|
||
|
|||
FEMA secret databases, Main Core, Pinwale top | |||
PROGRESSIVE | REFERENCE | CONSERVATIVE 1%* | |
|
|
|
|
|
|||
FirstFruits, Warrantless Surveillance of American Journalists ![]() |
|||
PROGRESSIVE | REFERENCE | CONSERVATIVE 1%* | |
|
|
|
|
|
Garden Plot, Blog Tracking, Database Theft top | ||||||||||||||||||||||||||||||||||||||||||||||||||||||
PROGRESSIVE | REFERENCE | CONSERVATIVE 1%* | ||||||||||||||||||||||||||||||||||||||||||||||||||||
|
|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||
Geographic Information Systems GIS, top | ||||||||||||||||||||||||||||||||||||||||||||||||||||||
PROGRESSIVE | REFERENCE | CONSERVATIVE 1%* | ||||||||||||||||||||||||||||||||||||||||||||||||||||
|
|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||
GPS Location Technology top | ||||||||||||||||||||||||||||||||||||||||||||||||||||||
PROGRESSIVE | REFERENCE | CONSERVATIVE 1%* | ||||||||||||||||||||||||||||||||||||||||||||||||||||
|
|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||
Health Information Systems top | ||||||||||||||||||||||||||||||||||||||||||||||||||||||
PROGRESSIVE | REFERENCE | CONSERVATIVE 1%* | ||||||||||||||||||||||||||||||||||||||||||||||||||||
|
|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||
Infragard top | ||||||||||||||||||||||||||||||||||||||||||||||||||||||
PROGRESSIVE | REFERENCE | CONSERVATIVE 1%* | ||||||||||||||||||||||||||||||||||||||||||||||||||||
|
|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||
Inslaw, PROMIS top | ||||||||||||||||||||||||||||||||||||||||||||||||||||||
PROGRESSIVE | REFERENCE | CONSERVATIVE 1%* | ||||||||||||||||||||||||||||||||||||||||||||||||||||
|
|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||
Insurance Inspection, satellite top | ||||||||||||||||||||||||||||||||||||||||||||||||||||||
PROGRESSIVE | REFERENCE | CONSERVATIVE 1%* | ||||||||||||||||||||||||||||||||||||||||||||||||||||
|
|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||
Israel / Mossad top | ||||||||||||||||||||||||||||||||||||||||||||||||||||||
PROGRESSIVE | REFERENCE | CONSERVATIVE 1%* | ||||||||||||||||||||||||||||||||||||||||||||||||||||
|
|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||
Liberty Alliance Project top | ||||||||||||||||||||||||||||||||||||||||||||||||||||||
PROGRESSIVE | REFERENCE | CONSERVATIVE 1%* | ||||||||||||||||||||||||||||||||||||||||||||||||||||
|
|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||
MATRIX Multi-State Anti-Terrorism Information Database, NCTC top | ||||||||||||||||||||||||||||||||||||||||||||||||||||||
PROGRESSIVE | REFERENCE | CONSERVATIVE 1%* | ||||||||||||||||||||||||||||||||||||||||||||||||||||
|
|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||
Microsoft Explorer top | ||||||||||||||||||||||||||||||||||||||||||||||||||||||
PROGRESSIVE | REFERENCE | CONSERVATIVE 1%* | ||||||||||||||||||||||||||||||||||||||||||||||||||||
|
|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||
Open BSD FBI Backdoor top | ||||||||||||||||||||||||||||||||||||||||||||||||||||||
PROGRESSIVE | REFERENCE | CONSERVATIVE 1%* | ||||||||||||||||||||||||||||||||||||||||||||||||||||
|
|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||
Patriot Act top | ||||||||||||||||||||||||||||||||||||||||||||||||||||||
PROGRESSIVE | REFERENCE | CONSERVATIVE 1%* | ||||||||||||||||||||||||||||||||||||||||||||||||||||
|
|
|
|
|||||||||||||||
Police Departments tracking protesters, Pre-crime Surveillance, Mobile Backscatter Vans, Sneek & Peek Search Warrants top | |||||||||||||||
PROGRESSIVE | REFERENCE | CONSERVATIVE 1%* | |||||||||||||
|
|
|
|||||||||||||
RFID Technology top | |||||||||||||||
PROGRESSIVE | REFERENCE | CONSERVATIVE 1%* | |||||||||||||
|
|
|
|||||||||||||
Restroom taping top | |||||||||||||||
PROGRESSIVE | REFERENCE | CONSERVATIVE 1%* | |||||||||||||
|
|
|
|||||||||||||
Road Sensors, Red Light Cameras, Speed Traps top | |||||||||||||||
PROGRESSIVE | REFERENCE | CONSERVATIVE 1%* | |||||||||||||
|
|
|
|||||||||||||
Satellites top | |||||||||||||||
PROGRESSIVE | REFERENCE | CONSERVATIVE 1%* | |||||||||||||
|
|
|
|||||||||||||
Search engines top | |||||||||||||||
PROGRESSIVE | REFERENCE | CONSERVATIVE 1%* | |||||||||||||
|
|
|
|||||||||||||
Stoplight Cameras top | |||||||||||||||
PROGRESSIVE | REFERENCE | CONSERVATIVE 1%* | |||||||||||||
|
|
||||||||||||||
Synchronization, Knowledge Management and Intelligence Fusion top | |||||||||||||||
PROGRESSIVE | REFERENCE | CONSERVATIVE 1%* | |||||||||||||
|
|
|
|||||||||||||
SWIFT, Society for Worldwide Interbank Financial Telecommunication top | |||||||||||||||
PROGRESSIVE | REFERENCE | CONSERVATIVE 1%* | |||||||||||||
|
|
|
|||||||||||||
TALON, Threat and Local Observation Notice top | |||||||||||||||
PROGRESSIVE | REFERENCE | CONSERVATIVE 1%* | |||||||||||||
|
|
|
|||||||||||||
|
|||||||||||||||
|
|||||||||||||||
Terahertz Spectroscopy top | |||||||||||||||
PROGRESSIVE | REFERENCE | CONSERVATIVE 1%* | |||||||||||||
|
|
|
|||||||||||||
|
|||||||||||||||
Traffic Stop, drug sniffing dogs top | |||||||||||||||
PROGRESSIVE | REFERENCE | CONSERVATIVE 1%* | |||||||||||||
|
|
||||||||||||||
TRAPWIRE top | |||||||||||||||
PROGRESSIVE | REFERENCE | CONSERVATIVE 1%* | |||||||||||||
|
|
||||||||||||||
US-VISIT, FISC, FISA top | |||||||||||||||
PROGRESSIVE | REFERENCE | CONSERVATIVE 1%* | |||||||||||||
|
|
|
|||||||||||||
Utilities monitoring top | |||||||||||||||
PROGRESSIVE | REFERENCE | CONSERVATIVE 1%* | |||||||||||||
|
|
||||||||||||||
|
|||||||||||||||
White House, 'web tracking bug', Executive Order 12333 top | |||||||||||||||
PROGRESSIVE | REFERENCE | CONSERVATIVE 1%* | |||||||||||||
|
|
|
|||||||||||||
|
Smile - You're on Candid Cable
Surveillance Camera! http://www.tbrnews.org/Archives/a2734.htm
The Voice of the White House Washington, D.C., August 10, 2007: “How
do they watch you? Let me count the ways. With the new surveillance law
being voted in by a weak-kneed Congress, the useless AG, Gonzales can now
listen to any conversation or read any email without a court order. I have
several additional comments to be made on this subject. Let’ s consider
a means by which you can be spied on without a warrant. The first is by
using
your very own television set to listen to you.
Sounds fantastic? Another nutty blog idea? Think again. Here I am quoting
from an in-house memorandum: ‘The methodology of using a commercial
television set connected to a cable network system being used as a
transmitter as well as a receive, allowing other parties to hear
conversations conducted in the vicinity of the set utilizes the medium of
a digital oscillator installed in television sets. This use is only for a
set itself connected to a cable system. The additional use of a cable box
connected to the television set is the only means by which the set can be
used to listen to nearby conversations because these boxes are designed to
feed back information through the cable system. This feedback makes it
possible for a subscriber to cable to use his telephone to call the cable
company for the inclusion of a special program to the subscriber’s
system. The cable company is automatically able to ascertain the telephone
number from the call and using that information, send the desired program
to the television set via their network and the box. The subscriber code
of the subscriber matches the data on the subscriber’s box. This makes
the use of the box as an instrument of clandestine surveillance possible..
It is then possible for such information to be fed into other channels,
including investigative ones. The use by private parties of the cable
system to obtain clandestine information in this manner would be difficult
if not impossible but the NSA and FBI techniques in other electronic
surveillance matters are more than sufficient to ensure electronic
eavesdropping. ••••••••••••
|
||
|
||
anonymous |
This administration likes to write memos to itself,
justifying the most horrendous acts. Wars of aggression, torture,
assassination, the destruction of 800 years of our common law heritage
(habeas corpus), and 250 years of American law in the body of our
Constitution.
Some of these are public. Two more have recently come partially into the light. The first is an awareness of some kind of communication surveillance. Currently some groups believe that this is limited to the data mining of so called pen register information. But, pen register data does not require a warrant for access. This data is composed of basic information about individual calls like date, time, length, and number called. There is no need for the NSA to collect this data either. All most all billing of American phone calls is done by an Israeli company called Amdocs. This data would be most cheaply and conveniently purchased directly from Amdocs. NSA also has the legal "right" to collect basic email data without a warrant as well. This includes the information in the email header including but not limited to sender, recipients, data, time, length, attachment names, etc. The legal precedent for the NSAs gathering of basic email data without a warrant was actually based on its existing "right" to pen register data. So this current debacle is over something more than pen register data. For around two decades, academic publication of much optical computing theory and technology has been suppressed by our government. The suppression of academic information is nothing new. I specifically recall that during the 1970's our government prevented the publication of biomedical research because the research referred to unapproved uses of FDA cleared drugs. Specialized optical units and array processors will massively increase the parallel processing capacities of the real time capacity required to effectively provide voice recognition capabilities on a large scale. The NSA has been rumored to have these capacities for some time. It is much more likely that the contents of the phone calls themselves are being monitored and data mined. Otherwise, there would be no furor over this whole issue. The other significant Constitutional attack that is presently coming into the light is about a program of warrant-less sneak and peek searches of Muslim owned homes, businesses and property. These illicit searches are reputed to center around searches for radioactive material. At first 100 such searches were said to have taken place, but more recent reports have upped that number to over 500. It is clear that this tyrant president will not accept any limitations on his power. Even though the law is clear, his minions tout the line that his war powers are unlimited. Our entire legal and societal heritage as well as our way of life is under viscious attack from our own leaders.
|
Wired
Appeals Court Allows Classified Evidence in Spy Case By David Kravets
February 27, 2009 | 3:49:39 PMCategories: Surveillance A federal appeals
court dealt a blow to the Obama administration Friday when it refused to
block a judge from admitting top secret evidence in a lawsuit weighing
whether a U.S. president may bypass Congress, as President George W. Bush
did, and establish a program of eavesdropping on Americans without
warrants.
The legal brouhaha concerns U.S. District Judge Vaughn Walker's decision in January to admit as evidence a classified document allegedly showing that two American lawyers for a now-defunct Saudi charity were electronically eavesdropped on without warrants by the Bush administration in 2004. The lawyers — Wendell Belew and Asim Ghafoor — sued the Bush administration after the U.S. Treasury Department accidentally released the top secret memo to them. The courts had ordered the document, which has never been made public, returned and removed from the case after the Bush administration declared it a state secret. The document's admission to the case is central for the two former lawyers of the Al-Haramain Islamic Foundation charity to acquire legal standing so they may challenge the constitutionality of the warrantless-eavesdropping program Bush publicly acknowledged in 2005. Absent intervention from the U.S. Supreme Court, the one-line decision (.pdf) by the 9th U.S. Circuit Court of Appeals means the lawyers' case is the only lawsuit likely to litigate the merits of a challenge to Bush's secret eavesdropping program adopted in the aftermath of the Sept. 11 terror attacks. "We're trying to establish a legal precedent: A rule that the president must comply with legislation passed by Congress," said Jon Eisenberg, the attorney for the two lawyers. "The president is not above the law. This case is important to establish a legal precedent." The lawyers' suit looked all but dead in July when they were initially blocked from using the document to prove they were spied on. They were forced to return it to the government after it was declared a state secret. But last month, Walker said the document could be used in the case because there was sufficient, anecdotal evidence unrelated to the document that suggests the lawyers for the Al-Haramain charity were spied upon. Without the document, the lawyers didn't have a case. The Bush and the Obama administration's said the document's use in the trial was a threat to national security. The document at issue isn't likely to ever become public. Walker's Jan. 5 order only allows lawyers in the case to view it, and they are forbidden to publicly discuss its contents. Bush acknowledged the existence of the so-called Terror Surveillance Program in 2005. It authorized the NSA to intercept, without warrants, international communications to or from the United States that the government reasonably believed involved a member or agent of al-Qaeda, or affiliated terrorist organization. Congress authorized such spying activity in July. The Electronic Frontier Foundation claims the TSP went further, and accuses the nations' telecommunication companies of funneling all electronic communications to the National Security Agency without warrants. However, as part of the spy bill approved in July, the government immunized the telcos from lawsuits accusing them of being complicit with the Bush administration. The Obama administration on Thursday urged Judge Walker, the same judge in the Al-Haramain case, to dismiss the EFF's challenge to the immunity legislation. Walker's decision is pending. The U.S. government had designated Al-Haramain a terror organization. The Justice Department declined comment.
|
Warrantless searches by FBI |
WASHINGTON - The FBI secretly sought information last
year on 3,501 U.S. citizens and legal residents from their banks and
credit card, telephone and Internet companies without a court's approval,
the Justice Department said Friday.
It was the first time the Bush administration has publicly disclosed how often it uses the administrative subpoena known as a National Security Letter, which allows the executive branch of government to obtain records about people in terrorism and espionage investigations without a judge's approval or a grand jury subpoena. Friday's disclosure was mandated as part of the renewal of the Patriot Act, the administration's sweeping anti-terror law. The FBI delivered a total of 9,254 NSLs relating to 3,501 people in 2005, according to a report submitted late Friday to Democratic and Republican leaders in the House and Senate. In some cases, the bureau demanded information about one person from several companies. The numbers from previous years remain classified, officials said. The department also reported it received a secret court's approval for 155 warrants to examine business records last year under a Patriot Act provision that includes library records. However, Attorney General Alberto Gonzales has said the department has never used the provision to ask for library records. The number was a significant jump over past use of the warrant for business records. A year ago, Gonzales told Congress there had been 35 warrants approved between November 2003 and April 2005. The spike is expected to be temporary, however, because the Patriot Act renewal that President Bush signed in March made it easier for authorities to obtain subscriber information on telephone numbers captured through certain wiretaps. The Foreign Intelligence Surveillance Court, the same panel that signs off on applications for business records warrants, also approved 2,072 special warrants last year for secret wiretaps and searches of suspected terrorists and spies. The record number is more than twice as many as were issued in 2000, the last full year before the terrorist attacks of Sept. 11, 2001. The FBI security letters have been the subject of legal battles in two federal courts because, until the Patriot Act changes, recipients were barred from telling anyone about them. Ann Beeson, the associate legal counsel for the American Civil Liberties Union, said the report to Congress "confirms our fear all along that National Security Letters are being used to get the records of thousands of innocent Americans without court approval." The number disclosed Friday excludes requests for subscriber information, an exception written into the law. It was unclear how many FBI letters were not counted for that reason. |
Inside Account of U.S. Eavesdropping on Americans U.S. Officers' "Phone Sex" Intercepted |
Exclusive: Inside Account of U.S. Eavesdropping on Americans U.S. Officers' "Phone Sex" Intercepted; Senate Demanding Answers By BRIAN ROSS, VIC WALTER, and ANNA SCHECTER Oct. 9, 2008— Despite pledges by President George W. Bush and American intelligence officials to the contrary, hundreds of US citizens overseas have been eavesdropped on as they called friends and family back home, according to two former military intercept operators who worked at the giant National Security Agency (NSA) center in Fort Gordon, Georgia. The chairman of the Senate Intelligence Committee, Jay Rockefeller (D-WV), called the allegations "extremely disturbing" and said the committee has begun its own examination. "We have requested all relevant information from the Bush Administration," Rockefeller said Thursday. "The Committee will take whatever action is necessary." "These were just really everyday, average, ordinary Americans who happened to be in the Middle East, in our area of intercept and happened to be making these phone calls on satellite phones," said Adrienne Kinne, a 31-year old US Army Reserves Arab linguist assigned to a special military program at the NSA's Back Hall at Fort Gordon from November 2001 to 2003. Kinne described the contents of the calls as "personal, private things with Americans who are not in any way, shape or form associated with anything to do with terrorism." WATCH Kinne discuss why it was 'awkward' listening to her fellow Americans. She said US military officers, American journalists and American aid workers were routinely intercepted and "collected on" as they called their offices or homes in the United States. Watch "World News Tonight with Charles Gibson" and "Nightline" for more of Brian Ross' exclusive report. Another intercept operator, former Navy Arab linguist, David Murfee Faulk, 39, said he and his fellow intercept operators listened into hundreds of Americans picked up using phones in Baghdad's Green Zone from late 2003 to November 2007. "Calling home to the United States, talking to their spouses, sometimes their girlfriends, sometimes one phone call following another," said Faulk. WATCH Faulk discuss what a day on the job was like listening to Americans. The accounts of the two former intercept operators, who have never met and did not know of the other's allegations, provide the first inside look at the day to day operations of the huge and controversial US terrorist surveillance program. "There is a constant check to make sure that our civil liberties of our citizens are treated with respect," said President Bush at a news conference this past February. But the accounts of the two whistleblowers, which could not be independently corroborated, raise serious questions about how much respect is accorded those Americans whose conversations are intercepted in the name of fighting terrorism. US Soldier's 'Phone Sex' Intercepted, Shared Faulk says he and others in his section of the NSA facility at Fort Gordon routinely shared salacious or tantalizing phone calls that had been intercepted, alerting office mates to certain time codes of "cuts" that were available on each operator's computer. "Hey, check this out," Faulk says he would be told, "there's good phone sex or there's some pillow talk, pull up this call, it's really funny, go check it out. It would be some colonel making pillow talk and we would say, 'Wow, this was crazy'," Faulk told ABC News. Faulk said he joined in to listen, and talk about it during breaks in Back Hall's "smoke pit," but ended up feeling badly about his actions. "I feel that it was something that the people should not have done. Including me," he said. In testimony before Congress, then-NSA director Gen. Michael Hayden, now director of the CIA, said private conversations of Americans are not intercepted. "It's not for the heck of it. We are narrowly focused and drilled on protecting the nation against al Qaeda and those organizations who are affiliated with it," Gen. Hayden testified. He was asked by Senator Orrin Hatch (R-UT), "Are you just doing this because you just want to pry into people's lives?" "No, sir," General Hayden replied. Asked for comment about the ABC News report and accounts of intimate and private phone calls of military officers being passed around, a US intelligence official said "all employees of the US government" should expect that their telephone conversations could be monitored as part of an effort to safeguard security and "information assurance." "They certainly didn't consent to having interceptions of their telephone sex conversations being passed around like some type of fraternity game," said Jonathon Turley, a constitutional law professor at George Washington University who has testified before Congress on the country's warrantless surveillance program. "This story is to surveillance law what Abu Ghraib was to prison law," Turley said. Listening to Aid Workers NSA awarded Adrienne Kinne a NSA Joint Service Achievement Medal in 2003 at the same time she says she was listening to hundreds of private conversations between Americans, including many from the International Red Cross and Doctors without Borders. "We knew they were working for these aid organizations," Kinne told ABC News. "They were identified in our systems as 'belongs to the International Red Cross' and all these other organizations. And yet, instead of blocking these phone numbers we continued to collect on them," she told ABC News. WATCH Kinne describe how listening to aid workers was part of the job. A spokesman for Doctors Without Borders, Michael Goldfarb, said: "The abuse of humanitarian action through intelligence gathering for military or political objectives, threatens the ability to assist populations and undermines the safety of humanitarian aid workers." Both Kinne and Faulk said their military commanders rebuffed questions about listening in to the private conversations of Americans talking to Americans. "It was just always, that , you know, your job is not to question. Your job is to collect and pass on the information," Kinne said. Some times, Kinne and Faulk said, the intercepts helped identify possible terror planning in Iraq and saved American lives. "IED's were disarmed before they exploded, that people who were intending to harm US forces were captured ahead of time," Faulk said. NSA job evaluation forms show he regularly received high marks for job performance. Faulk left his job as a newspaper reporter in Pittsburgh to join the Navy after 9/11. Kinne says the success stories underscored for her the waste of time spent listening to innocent Americans, instead of looking for the terrorist needle in the haystack. "By casting the net so wide and continuing to collect on Americans and aid organizations, it's almost like they're making the haystack bigger and it's harder to find that piece of information that might actually be useful to somebody," she said. "You're actually hurting our ability to effectively protect our national security." The NSA: "The Shadow Factory" Both former intercept operators came forward at first to speak with investigative journalist Jim Bamford for a book on the NSA, "The Shadow Factory," to be published next week. "It's extremely rare," said Bamford, who has written two previous books on the NSA, including the landmark "Puzzle Palace" which first revealed the existence of the super secret spy agency. "Both of them felt that what they were doing was illegal and improper, and immoral, and it shouldn't be done, and that's what forces whistleblowers." WATCH Bamford describe how the NSA missed signals leading up to 9/11. A spokesman for General Hayden, Mark Mansfield, said: "At NSA, the law was followed assiduously. The notion that General Hayden sanctioned or tolerated illegalities of any sort is ridiculous on its face." |
NSA setting up secret 'Perfect Citizen' spy system 'This is Big Brother', says corporate insider |
The Register NSA setting up secret 'Perfect Citizen' spy system 'This is Big Brother', says corporate insider .... By Lewis Page • , 8th July 2010 09:20 GMT ... The US National Security Agency (NSA) is embarking on a secret domestic surveillance project dubbed "Perfect Citizen", intended to monitor and protect important national infrastructure such as power grids and transport systems. ... The Wall Street Journal, citing unnamed government and industry sources, says that the NSA has awarded a "black" (classified) $100m contract to defence contractor Raytheon which will see secret monitoring equipment installed within US networks deemed to be of national importance. ... According to the WSJ, Perfect Citizen has caused some disquiet among those in the know. It could be seen as the NSA - a military combat support agency whose focus is supposed to be on external threats - carrying out massive automated surveillance of American companies and citizens. The paper quotes an internal Raytheon email as saying that "Perfect Citizen is Big Brother". ... The stated purpose of the project is to get a clear idea of the level of threat facing American infrastructure IT. Many older systems, designed in the pre-network world, have since been hooked up to the internet for ease of use and maintenance. It is feared by some in the US intelligence / defence community that unfriendly powers and organizations are already engaged in probing these systems with a view to learning how to attack them. ... The NSA's Perfect Citizen equipment would be designed to flag up unusual network events indicating an impending cyber attack, according to the WSJ's sources. ... "You've got to instrument the network to know what's going on, so you have situational awareness to take action," an unnamed military source told the paper. ... Many of the networks that the NSA would wish to place Perfect Citizen equipment on are privately owned, however, and some could also potentially carry information offering scope for "mission creep" outside an infrastructure-security context. For instance, full access to power company systems might allow the NSA to work out whether anyone was at home at a given address. Transport and telecoms information would also make for a potential bonanza for intrusive monitoring. ... The full scope of the project remains to be determined, according to the WSJ report, with no certainty as yet on which companies or types of companies would be asked to cooperate - or how much information the NSA would get access to. ... The NSA - whose boss has now also been confirmed as head of the Pentagon's uniformed Cyber Command - apparently got the job by default, as it is considered the only US agency with enough network and cyber savvy to take the task on. ... The Reg has contacted Raytheon and the NSA for comment on Perfect Citizen, but thus far has not received any reply. ® |
Electronic Frontier Foundation |
AP
SAN FRANCISCO - The Justice Department said Friday it was
moving to dismiss a federal lawsuit challenging the Bush administration's
secretive domestic wiretapping program. The lawsuit, brought
by the Internet privacy group, Electronic Frontier Foundation, does not
include the government. Instead, it names AT&T, which the San
Francisco-based group accuses of colluding with the National Security
Agency to make communications on AT&T networks available to the spy
agency without warrants.
The government, in a filing here late Friday, said the lawsuit threatens to expose government and military secrets and therefore should be tossed. The administration added that its bid to intervene in the case should not be viewed as a concession that the allegations are true. As part of its case, the EFF said it obtained documents from a former AT&T technician showing that the NSA is capable of monitoring all communications on AT&T's network, and those documents are under seal. The former technician said the documents detail secret NSA spying rooms and electronic surveillance equipment in AT&T facilities. Next month, U.S. District Judge Vaughn Walker will hold a hearing on whether they should be divulged publicly. President Bush confirmed in December that the NSA has been conducting the surveillance when calls and e-mails, in which at least one party is outside the United States, are thought to involve al-Qaida terrorists. In congressional hearings earlier this month, Attorney General Alberto Gonzales suggested the president could order the NSA to listen in on purely domestic calls without first obtaining a warrant from a secret court established nearly 30 years ago to consider such issues. Gonzales said the administration, assuming the conversation related to al-Qaida, would have to determine if the surveillance were crucial to the nation's fight against terrorism, as authorized by Congress following the Sept. 11 attacks. The EFF lawsuit, alleging AT&T violated U.S. law and its customers' privacy, seeks to stop the surveillance program. The San Antonio-based telecommunications giant said it follows all applicable laws.
|
60 Minutes on NSA corruption and incompetence. Report follows WMR report by six years May 24, 2011 -- WayneMadsenReport |
CBS "60 Minutes" reported on May 22 on former
National Security Agency (NSA) official Thomas Drake's charges of
high-level corruption and incompetence within the eavesdropping agency.
WMR is re-publishing our report on NSA, which includes a reference to "Thinthread," the first ever report in the media on this system. There is an Israeli espionage angle to the story about Drake, NSA mathematician Bill Binney, NSA analyst J. Kirk Wiebe, NSA computer scientist Ed Loomis, House Intelligence Committee staffer Diane Roark, Justice Department prosecutor Thomas Tamm and NSA espionage against U.S. citizens. "The New Yorker" article by Jane Mayer fails to mention this important element, which may be the real reason for the prosecution of Drake and the prosecution, recently aborted, of Tamm. Because when it comes to Israeli espionage in the United States, it's "see no evil, hear no evil, say no evil." NSA and selling the nation's prized secrets to contractors June 1, 2005 On August 1, 2001, just five and a half weeks before the 911 attacks, NSA awarded Computer Sciences Corporation (CSC) a more than $2 billion, ten-year contract known as GROUNDBREAKER. The contract was never popular with NSA's career professionals. Although GROUNDBREAKER was limited to outsourcing NSA's administrative support functions such as telephones, data networks, distributed computing, and enterprise architecture design, the contract soon expanded into the operational areas -- a sphere that had always been carefully restricted to contractors. NSA was once worried about buying commercial-off-the-shelf computer components such as semiconductors because they might contain foreign bugs. NSA manufactured its own computer chips at its own semiconductor factory at Fort Meade. Currently, NSA personnel are concerned that outsourcing mania at Fort Meade will soon involve foreign help desk technical maintenance provided from off-shore locations like India. CSC had originally gained access to NSA through a "buy in" project called BREAKTHROUGH, a mere $20 million contract awarded in 1998 that permitted CSC to operate and maintain NSA computer systems. When General Michael V. Hayden took over as NSA Director in 1999, the floodgates for outside contractors were opened and a resulting deluge saw most of NSA's support personnel being converted to contractors working for GROUNDBREAKER's Eagle Alliance (nicknamed the "Evil Alliance" by NSA government personnel), a consortium led by CSC. NSA personnel rosters of support personnel, considered protected information, were turned over to Eagle, which then made offers of employment to the affected NSA workers. The Eagle Alliance consists of CSC, Northrop Grumman, General Dynamics, CACI, Omen, Inc., Keane Federal Systems, ACS Defense, BTG, Compaq, Fiber Plus, Superior Communications, TRW (Raytheon), Verizon, and Windemere. In October 2002, Hayden, who has now been promoted by Bush to be Deputy Director of National Intelligence under John Negroponte, opened NSA up further to contractors. A Digital Network Enterprise (DNE) team led by SAIC won a $280 million, 26 month contract called TRAILBLAZER to develop a demonstration test bed for a new signals intelligence processing and analysis system. SAIC's team members included Booz Allen Hamilton, Boeing, Northrop Grumman, and Eagle Alliance team leader CSC. TRAILBLAZER, according to Hayden's own testimony before the Senate Select Committee on Intelligence, is now behind schedule and over budget to the tune of over $600 million. But that is not the only consequence of these two mega-contracts for NSA's ability to monitor global communications for the next 911, which could be a terrorist nuclear strike on the United States. NSA insiders report that both contract teams have melded into one and that NSA's operations are being adversely impacted. From simple tasks like phones being fixed to computers being updated with new software, the Eagle Alliance has been a disaster. The Eagle Alliance and DNE team members are rife with former NSA top officials who are reaping handsome bonuses from the contracts -- and that has many NSA career employees crying conflict of interest and contract fraud. CACI, called "Colonels and Captains, Inc." by critics who cite the revolving door from the Pentagon to its corporate office suites, counts former NSA Deputy Director Barbara McNamara as a member of its board of directors. CACI alumni include Thomas McDermott, a former NSA Deputy Director for Information Systems Security. Former NSA Director Adm. Mike McConnell is a Senior Vice President of Booz Allen. Former NSA Director General Ken Minihan is President of the Security Affairs Support Association (SASA), an intelligence business development association that includes Boeing, Booz Allen, CACI, CSC, the Eagle Alliance, General Dynamics, Northrop Grumman, Raytheon, SAIC, and Windemere, all GROUNDBREAKER and TRAILBLAZER contractors, among its membership. SASA's board of directors (surprise, surprise) includes CACI's Barbara McNamara. One of SASA's distinguished advisers is none other than General Hayden. Although contractors are required to have the same high level security clearances as government personnel at NSA, there are close connections between some NSA contractors and countries with hostile intelligence services. For example, CACI's president and CEO visited Israel in early 2004 and received the Albert Einstein Technology Award at ceremony in Jerusalem attended by Likud Party Defense Minister Shaul Mofaz. The special ceremony honoring CACI's president was sponsored by the Aish HaTorah Yeshiva Fund. The ultra-Orthodox United Torah Judaism Party's Jerusalem Mayor, Uri Lupolianski, was also in attendance. According to Lebanon's Daily Star, CACI's president also met with notorious racist Israeli retired General Effie Eitam who advocates expelling Palestinians from their lands. The U.S. delegation also included a number of homeland security officials, politicians, and businessmen. CACI has also received research grants from U.S.-Israeli bi-national foundations. A few months after the award ceremony for CACI's president, the Taguba Report cited two CACI employees as being involved in the prison torture at Abu Ghraib prison in Iraq. The U.S. military commander for the Iraqi prisons, General Janis Karpinski, reported that she witnessed Israeli interrogators working alongside those from CACI and another contractor, Titan. When the Taguba Report was leaked, the office of Deputy Defense Secretary for Policy Douglas Feith issued an order to Pentagon employees not to download the report from the Internet. Feith is a well-known hard line supporter of Israel's Likud Party and, according to U.S. government insiders, his name has come up in FBI wiretaps of individuals involved in the proliferation of nuclear weapons material to Israel via Turkish (including Turkish Jewish) intermediaries. These wiretaps are the subject of a Federal probe of who compromised a sensitive CIA counter-proliferation global operation that used a carve out company called Brewster Jennings & Associates to penetrate nuclear weapons smuggling networks with tentacles extending from Secaucus, New Jersey to South Africa and Pakistan and Turkey to Israel. According to the Jewish Telegraph Agency, some six months before the Abu Ghraib torture scandal was first uncovered, one of Feith's assistants, Larry Franklin, met with two officials of the American Israel Public Affairs Committee (AIPAC) at the Tivoli Restaurant in Arlington, Virginia. According to FBI surveillance tapes, Franklin relayed top secret information to Steve Rosen, AIPAC's then policy director, and Keith Weissman, a senior Iran analyst with AIPAC. Franklin has been indicted for passing classified information to AIPAC. In addition, three Israeli citizens have been identified as possible participants in the spy scandal. They are Naor Gilon, the political officer at the Israeli embassy in Washington; Uzi Arad, an analyst with the Institute for Policy and Strategy in Herzliya (the northern Tel Aviv suburb where the headquarters of Mossad is located); and Eran Lerman, a former Mossad official who is now with the American Jewish Committee. What has some NSA officials worried is that with pro-Israeli neocons now engrained within the CIA, Defense Intelligence Agency (DIA), State Department, and National Security Council, NSA is ripe for penetration by Israeli intelligence. NSA has a troubled past with Israel. In 1967, Israeli warplanes launched a premeditated attack on the NSA surveillance ship, the USS Liberty, killing and wounding a number of U.S. sailors and NSA civilian personnel. Convicted Israeli spy Jonathan Pollard compromised a number of NSA sensitive sources and methods when he provided a garage full of classified documents to Israel. But NSA is also aware of an incident where Israelis used a contractor, RCA, to gain access to yet additional NSA sources and methods. In the 1980s, against the wishes of NSA, the Reagan administration forced NSA to permit RCA, one of its major contractors, to develop a tethered aerostat (balloon) signals intelligence and direction finding system for the Israeli Defense Force. According to NSA officials, the Israeli-NSA joint project, codenamed DINDI, was established at a separate facility in Mount Laurel, New Jersey and apart from the main NSA developmental center at RCA's facility in Camden, New Jersey. Although NSA and RCA set up a strict firewall between the contractor's national intelligence contract work and the separate DINDI contract, Israeli engineers, who were working for Mossad, soon broke down the security firewall with the assistance of a few American Jewish engineers assigned to the DINDI project. The security breach resulted in a number of national intelligence developmental systems being compromised to the Israelis, including those code named PIEREX, MAROON ARCHER, and MAROON SHIELD. DINDI was quickly cancelled but due to the sensitivity surrounding the American Jewish engineers, the Reagan Justice Department avoided bringing espionage charges. There were some forced retirements and transfers, but little more. But for NSA, the duplicity of the Israelis added to the enmity between Fort Meade and Israeli intelligence. With outside contractors now permeating NSA and a major Israeli espionage operation being discovered inside the Pentagon, once again there is a fear within NSA that foreign intelligence services such as the Mossad could make another attempt to penetrate America's virtual "Fort Knox" of intelligence treasures and secrets. Thanks to some very patriotic and loyal Americans inside NSA, this author is now in possession of an internal NSA contract document from November 2002 that shows how GROUNDBREAKER and TRAILBLAZER have allowed the Eagle Alliance and other contractors to gain access to and even virtual control over some of the most sensitive systems within the U.S. intelligence community. One suspect in this unchecked outsourcing is the person Hayden hired from the outside to act as Special Adviser to his Executive Leadership Team, Beverly Wright, who had been the Chief Financial Officer for Legg Mason Wood Walker in Baltimore. Before that, Wright had been the Chief Financial Officer for Alex Brown, the investment firm at which George W. Bush's grandfather, Prescott Bush, once served as a board member. As one senior NSA official sarcastically put it, "She's highly qualified to work in intelligence!" According to the document, the future of some 10,000 Windows NT and UNIX workstations and servers that handle some of NSA's most sensitive signals intelligence (SIGINT) (the Signals Intelligence Directorate workstation upgrade is code named BEANSTALK) and electronics intelligence (ELINT) applications, including databases that contain communications intercepts, are now firmly in the grasp of the Eagle Alliance. Operational workstations are being migrated to a less-than-reliable Windows/Intel or "WINTEL" environment. The document boldly calls for the Eagle Alliance to establish a SIGINT Service Applications Office (SASO) to "provide and maintain Information Technology services, tools, and capabilities for all [emphasis added] SIGINT mission applications at the NSA." This is a far cry from the non-operational administrative support functions originally specified in the GROUNDBREAKER contract. The document also calls for NSA to provide extremely sensitive information on SIGINT users to the contractors: "Identification of target sets of users in order to successfully coordinate with the Eagle Alliance modernization program." The Eagle Alliance is involved in a number of systems that impact on other members of the U.S. intelligence community, foreign SIGINT partners, and national command authorities. These systems include INTELINK, Common Remoted Systems, National SIGINT Requirements Process, Overhead Tasking Distribution, RSOC (Regional SIGINT Operations Center) Monitoring Tool, RSOC Modeling Tool, Speech Activity Detection, Network Analysis Tools, Network Reconstruction Tools, Advanced Speech Processing Services, Automatic Message Handling System, CRITIC Alert, Cross Agency Multimedia Database Querying, Message Format Converter, Central Strategic Processing and Reporting, Collection Knowledge Base, Language Knowledge Base and Capabilities, K2000 Advanced ELINT Signals, Speech Content Services, Speech Information Extraction, Dominant Facsimile Processing System and DEFSMAC Support, Data Delivery (TINMAN), High Frequency Direction Finding (HFDF) Database, Satellite database, Protocol Analysis Terminal, Global Numbering Database, Intercept Tasking Databases, DEFSMAC Space Systems Utilities, Message Server, Extended Tether Program, Language Knowledge Services, Trend Analysis in Data Streams, Signal Related Database, SANDKEY Support (SIGINT Analysis and Reporting), and the SIGINT interception database ANCHORY and the ELINT database WRANGLER. In fact, the document states that the contractors' plans foresee the inclusion of NSA's intelligence community partners (foreign and domestic) in the contractors' revamping of NSA's operational systems. The servers include those that support mission-critical National Time Sensitive Systems (NTSS). These National Time Sensitive System servers have been assigned various cover terms: CANUCKS DOLLAR EASTCAKE HEALYCUFF MUDDYSWELT NEEDYWHAT RIMTITLE RISKDIME ROWLOAD SEAWATER CURACAO HALF HEALYMINK LEARNGILT LINEFURL MOBLOOSE SPELLBEAK THOSEHOT. A number of SIGINT applications are also impacted by the outsourcing mania. They are also assigned cover terms: ADVERSARY ADVERSARY GOLD CHECKMATE FANBELT FANBELT II FIREBLAZE GALE-LITE (the primary owner of which is DIA) GALLEYMAN GALLEYPROOF JAGUAR KAFFS MAGNIFORM MAINCHANCE OILSTOCK PATHSETTER PINSETTER SIGDASYS FILE II, III, and KL TEXTA SPOT In fact, the document indicates that literally hundreds of NSA intelligence applications are now subject to the whims of outside contractors. These systems include ABEYANCE, ACROPOLIS, ADROIT, ADVANTAGE, AGILITY, AIRLINE, AIRMAIL, ALERT, ALCHEMIST, ANTARES, APPLEWOOD II, ARCHIVER, ARCVIEW GIS, ARROWGATE, ARROWWOOD, ARTFUL, ASPEN, ASSOCIATION, ATOMICRAFT, ATTRACTION, AUTOPILOT, AUTOSTAR, AXIOMATIC BABBLEQUEST, BACKSAW, BANYAN, BARAD, BASERUNNER, BEAMER, BEIKAO, BELLVIEW, BIRDSNEST, BISON, BLACKBIRD, BLACKBOOK, BLACKFIN, BLACKHAWK, BLACKNIGHT/SHIPMASTER, BLACKMAGIC, BLACKONYX, BLACKOPAL, BLACKSEA, BLACKSHACK, BLACKSHIRT, BLACKSMYTH, BLACKSNAKE, BLACKSPIDER, BLACKSTAR, BLACKSTORM, BLACKSTRIKE, BLACKWATCH PULL, BLOODHUNTER, BLACKSWORD, BLOSSOM, BLUEBERRY, BLUESKY, BLUESTREAM, BOTTOM, BOTTOMLINE, BOWHUNT, BRAILLEWRITER, BRICKLOCK, BRIGHTENER, BROADWAY, BRIO INSIGHT, BUCKFEVER, BUILDINGCODE, BULK, BUMPER CADENCE, CAINOTOPHOBIA, CALLIOPE, CALVIN, CANDID, CANDELIGHTER, CANDLESTICK, CAPRICORN, CARNIVAL, CARRAGEEN, CARTOGRAPHER, CAT, CATCOVE, CELLBLOCK, CELTIC II, CELTIC CROSS, CENTERBOARD, CENTERCOIL, CENTERPOINT, CENTRALIST, CERCIS, CHAGRIN, CHAMELEON, CHAMITE, CHAPELVIEW, CHARIOT, CHARMANDER, CHARTS, CHATEAU, CHECKMATE, CHECKWEAVE, CHERRYLAMBIC, CHEWSTICK, CHICKENOFF, CHILLFLAME, CHIMERA, CHIPBOARD, CHUJING, CIVORG, CHUCKLE, CLEANSLATE, CLIPS, CLOSEREEF I, CLOUDBURST, CLOUDCOVER, CLOUDCOVER II, CLUBMAN, COASTLINE, COASTLINE COMPASSPOINT, CLIENT, CODEFINDER, COMMONVIEW, CONCERTO, CONDENSOR, CONESTOGA, CONFRONT, CONTRIVER, CONUNDRUM, CONVEYANCE, COPPERHEAD, CORESPACE, CORTEZ, COUNTERSINK, COUNTERSPY, CRAZYTRAIN, CRISSCROSS, CRUISESHIP, CRYSTALLIZE, CYBERENGINE, CYGNUS DAFIF, DANCEHALL, DARKSHROUD, DATATANK, DAYPUL, DAZZLER, DEATHRAY, DECOMA, DELTAWING, DEPTHGAUGE, DESERTFOX, DESOTO, DESPERADO, DIALOG, DIAMONDCHIP, DIFFRACTION, DISPLAYLINE, DITCHDIGGER, DITTO/UNDITTO, DIVINATION, DOITREE, DOLLARFISH, DOUBLEVISION, DRAGONMAKER, DUALIST EAGERNESS, EAGLESTONE, EASYRIDER, ECTOPLASM, ELATION, ELECTRIFY, ELTON, ELEVATOR, EMPERORFISH, ENCAPSULATE, ENGRAFT, ETCHINGNEEDLE, EXPATRIATE, EXPERTPLAYER, EXTENDER, EXTRACTOR, EUREKA, EYELET FAIRHILL, FAIRVIEW, FALCONRY, FALLOWHAUNT, FANATIC, FANCINESS, FASCIA II, FATFREE, FENESTRA, FIESTA, FINECOMB, FIREBOLT, FINETUNE, FIREBRAND II, FIRELAKE, FIRERUNG, FIRETOWER, FIRSTVIEW, FISHERMAN, FISHINGBOAT, FISHWAY, FLAGHOIST (OCS), FLASHFORWARD, FLEXAGON, FLEXMUX, FLEXSTART, FLIP, FLOTSAM, FOLKART, FORESITE, FORTITUDE, FOURSCORE, FOXFUR, FPGA GSM ATTACK, FIRSTPOINT, FARMHOUSE, FLODAR, FLOVIEW, FOSSIK, FROZENTUNDRA, FREESTONE, FRENZY/GRANULE, FUSEDPULL GALAXYDUST, GARDENVIEW, GATCHWORK, GATOR, GAUNTLET, GAYFEATHER, GAZELLE, GEMTRAIL, GENED, GHOSTVIEW, GHOSTWIRE, GIGACOPE, GIGASCOPE B, GISTER, GIVE, GLIDEPLANE, GOLDVEIN, GOLDPOINT, GNATCATCHER-GRADUS, GOKART, GOLDENEYE, GOLDENFLAX, GOLDENPERCH, GOLDMINE, GOMBROON, GOTHAM, GRADIENT, GRANDMASTER, GRAPEANGLE, GRAPEVINE, GRAPHWORK, GREATHALL, GREENHOUSE, GREMLIN, GUARDDOG, GUIDETOWER HACKER, HABANERO, HAMBURGER, HAMMER, HARPSTRING, HARVESTER, HARVESTTIME, HEARTLAND II, HEARTLAND III, HEDGEHOG, HELMET II, HELMET III, HERONPOND, HIGHPOWER, HIGHTIDE, HILLBILLY BRIDE, HIPPIE, HOBBIN, HOKUSAI, HOMBRE, HOMEBASE, HOODEDVIPER, HOODQUERY, HOPPER, HOST, HORIZON, HOTSPOT, HOTZONE, HOUSELEEK/SPAREROOF, HYPERLITE, HYPERWIDE ICARUS, ICICLE, IMAGERY, INFOCOMPASS, INNOVATOR, INQUISITOR, INROAD, INSPIRATION, INTEGRA, INTERIM, INTERNIST, INTERSTATE, INTRAHELP, IOWA, ISLANDER, IVORY ROSE, IVORY SNOW JABSUM, JACAMAR, JADEFALCON, JARGON, JARKMAN, JASPERRED, JAZZ, JEALOUSFLASH, JEWELHEIST, JOVIAL, JOBBER INCOMING, JOSY, JUMBLEDPET, JUPITER KAHALA, KAINITE, KEBBIE, KEELSON, KEEPTOWER, KEYCARD, KEYMASTER, KEYS, KEYSTONE WEB, KINGCRAFT, KINGLESS, KINSFOLK, KLASHES, KLOPPER, KNOSSOS, KRYPTONITE LADYSHIP, LAKESIDE, LAKEVIEW, LAMPSHADE, LAMPWICK, LARGO, LASERDOME, LASERSHIP, LASTEFFORT, LATENTHEART, LATENTHEAT, LEGAL REPTILE, LETHALPAN, LIBERTY WALK, LIGHTNING, LIGHTSWITCH, LINKAGE, LIONFEED, LIONHEART, LIONROAR, LIONWATCH, LOAD, LOCKSTOCK, LOGBOOK, LONGROOT, LUMINARY MACEMAN, MACHISMO, MADONNA, MAESTRO, MAGENTA II, MAGIC BELT, MAGICSKY, MAGISTRAND, MAGYK, MAKAH, MAINWAY, MARINER II, MARKETSQUARE, MARLIN, MARSUPIAL, MARTES, MASTERCLASS, MASTERSHIP, MASTERSHIP II, MASTING, MATCHLITE, MAUI, MAVERICK, MECA, MEDIASTORM, MEDIATOR, MEDIEVAL, MEGAMOUSE, MEGASCOPE, MEGASTAR, MERSHIP (CARILLON), MESSIAH, MICOM, MIGHTYMAIL, MILLANG, MONITOR, MONOCLE, MOONDANCE, MOONFOX, MOORHAWK, MORETOWN, MOSTWANTED, MOVIETONE III, MUSICHALL, MUSTANG, MYTHOLOGY NABOBS, NATIONHOOD, NAUTILUS, NDAKLEDIT, NEMESIS, NERVETRUNK, NETGRAPH, NEWSBREAK, NEWSHOUND, NEXUS, NIGHTFALL 16, NIGHTFALL 32, NIGHTWATCH, NOBLEQUEST, NOBLESPIRIT, NOBLEVISION, NSOC SHIFTER, NUCLEON, NUMERIC OAKSMITH, OBLIGATOR, OCEANARIUM, OCEANFRONT, OCTAGON, OCTAVE, OFFSHOOT, OLYMPIAD, ONEROOF, ONEROOF-WORD 2000 TRANSCRIPTION, OPALSCORE, OPENSEARCH, OPERA, ORCHID, ORIANA, OUTERBANKS, OUTFLASH, OUTREACH PADDOCK, PACESETTER, PALINDROME, PAPERHANGER II, PARTHENON, PARTHENON II, PASSBACK, PASTURE, PATCHING, PATHFINDER, PATRIARCH, PAYMASTER, PAYTON, PEDDLER, PEARLWARE, PERFECTO, PERSEUS, PERSEVERE, PICKET, PINWALE, PIEREX, PILEHAMMER, PINNACLE, PINSTRIPE, PITONS, PIXIEDUST, PIZARRO, PLATINUM PLUS, PLATINUMRING, PLUMMER, PLUS, PLUTO, POLARFRONT, POLYSTYRENE, POPPYBASE, POPTOP, PORCELAIN, PORTCULLIS, POSTCARD, POWDERKEG, POWERPLANT, PRAIRIE DOG, PRANKSTER, PREDATOR, PRELUDE, PROSCAN, PROSPERITY, PRIZEWINNER, PROPELLER, PROTOVIEW, PUFFERFISH, PYTHON II QUARTERBACK, QUASAR, QUEST, QUICKER, QUICKSILVER RAGBOLT, RAINGAUGE, RAINMAN, RAKERTOOTH, RAMJET, RAP, RAPPEL, RAUCOVER, REACTANT, RECEPTOR, RECOGNITION, RED ARMY, RED BACK, RED BELLY, RED DAWN, RED DEMON, RED ROOSTER, RED ROVER, REDALERT, REDCAP, REDCENT, REDCOATS, REDMENACE, REDSEA, REDSTORM, REDZONE, RELAYER, RENEGADE, RENOIR, RIGEL LIBRARY, RIKER, RIMA, ROADBED, ROADTURN, ROCKDOVE, ROOFTOP, ROOTBEER, ROSEVINE, RUTLEY SAGACITY, SANDSAILOR, SASPLOT, SATINWOOD, SATURN, SAYA, SCANNER, SEALION, SEAPLUM, SCISSORS, SCREENWORK, SEABEACH II, SEARCHLIGHT, SELLERS, SEMITONE, SENIOR GLASS, SENTINEL, SHADOWBOXER, SHADOWCHASER, SHANTY, SHARK, SHARKBITE, SHARKKNIFE, SHARPSHOOTER, SHILLET, SHILOH, SHIPMASTER, SHORTSWING, SIDEMIRROR, SIGHTREADY, SIGNATURE, SILKRUG, SILVERFISH, SILVERHOOK, SILVERLINER, SILVERVINE, SINGLEPOINT, SINGLESHOT, SITA, SKEPTIC, SKILLFUL, SKYBOARD, SKYCAST, SKYGAZER, SKYLINE, SKYLOFT, SKYWRITER, SLAMDANCE, SLATEWRITER, SLIDESHOW, SMOKEPPIT, SNAKEBOOT, SNAKECHARMER, SNAKEDANCE II, SNAKERANCH II, SNORKEL, SNOWMAN, SOAPOPERA, SOAPSHELL, SOFTBOUND, SOFTRING, SORCERY, SPANISH MOSS, SPARKVOYAGE, SPEARHEAD, SPECOL, SPECTAR, SPIROGRAPH, SPLINTER, SPLITTER, SPORADIC, SPOTBEAM, SPRINGRAY, SPUDLITE, STAIRWAY, STAR SAPPHIRE, STARCICLE, STARGLORY, STARLOG, STARQUAKE, STARSWORD, STATIONMASTER, STEAKHOUSE, STELLAH, STONEGATE, STORMCHASER, STORMPEAK, STOWAWAY, STRONGHOLD, SUBSHELL, SUNDIAL, SUPERCODING, SURREY, SWEETDREAM, SWEETTALK, SWEEPINGCHANGE, SWITCHPOINT TABLELAMP, TALION, TANGOR, TAROTCARD, TARP, TARSIS, TART, TAXIDRIVER, TEAS, TECBIRD, TEL, TELE, TELESTO, TELLTALE, TELLURITE, TEMAR, TERMINAL VELOCITY, THINKCHEW, THINTHREAD, THUNDERWEB, TIDYTIPS III, TIEBREAKER, TIGER, TIMELINE, TIMEPIECE, TIMETRAVELER, TINKERTOY, TINSEL, TIPPIE, TOPSHELF, TOPSPIN II, TOPVIEW, TRACECHAIN, TRAILBLAZER, TRBUSTER, TREASURE, TREASURE TROVE, TRED, TRIFECTA, TRINFO, TRINIAN, TROLLEYTRACK, TROLLEYMASTER, TRUNK MOBILE, TRYSTER, TSUNAMI, TWILIGHT, TWOBIT UMORPH, UNLIMITED VIEWEXCHANGE, VEILED DATABASE, VEILED FORTHCOMING, VENTURER II, VICTORY DAEMON, VINTAGE HARVEST, VIOLATION, VISIONARY, VISIONQUEST, VOICECAST, VOICESAIL, VOIP SEED WARGODDESS, WARSTOCK, WATCHOUT, WAXFLOWER, WAYLAND, WEALTHYCLUSTER, WEBSPINNER, WEBSPINNER -- ACCESS TO DBS, WESTRICK, WHARFMAN II, WHITE SEA, WHIRLPOOL, WHITE SHARK, WHITE SWORD, WHITESAIL, WHITEWASH, WILDFIRE, WINDSHIELD, WINTERFEED, WIREDART, WIREWEED, WORLDWIDE, WIZARDRY, WOLFPACK, WRAPUP XVTUBA YELLOWSTONE, YETLING ZENTOOLS, ZIGZAG, and ZIRCON
|
Terahertz Spectroscopy |
Wikipedia Typically, the terahertz pulses are generated by an ultrashort pulsed laser and last only a few picoseconds. A single pulse can contain frequency components covering the whole terahertz range from 0.05 to 4 THz. For detection, the electrical field of the terahertz pulse is sampled and digitized, conceptually similar to the way an audio card transforms electrical voltage levels in an audio signal into numbers that describe the audio waveform. In THz-TDS, the electrical field of the THz pulse interacts in the detector with a much-shorter laser pulse (e.g. 0.1 picoseconds) in a way that produces an electrical signal that is proportional to the electric field of the THz pulse at the time the laser pulse gates the detector on. By repeating this procedure and varying the timing of the gating laser pulse, it is possible to scan the THz pulse and construct its electric field as a function of time. Subsequently, a Fourier transform is used to extract the frequency spectrum from the time-domain data. [edit]Advantages of THz radiation THz radiation has several distinct advantages over other forms of spectroscopy: many materials are transparent to THz, THz radiation is safe for biological tissues because it is non-ionizing (unlike for example X-rays), and images formed with terahertz radiation can have relatively good resolution (less than 1 mm). Also, many interesting materials have unique spectral fingerprints in the terahertz range, which means that terahertz radiation can be used to identify them. Examples which have been demonstrated include several different types of explosives, polymorphic forms of many compounds used as Active Pharmaceutical Ingredients (API) in commercial medications as well as several illegal narcotic substances. Since many materials are transparent to THz radiation, these items of interest can be observed through visually opaque intervening layers, such as packaging and clothing. Though not strictly a spectroscopic technique, the ultrashort width of the THz radiation pulses allows for measurements (e.g., thickness, density, defect location) on difficult to probe materials (e.g., foam). The measurement capability shares many similarities to that observed with pulsed ultrasonic systems. Reflections from buried interfaces and defects can be found and precisely imaged. THz measurements are non-contact however. |
Prodigal |
Cherie Anderson runs a travel company in southern California, and
she’s convinced the federal government is reading her emails. But she’s
all right with that. “I assume it's part of the Patriot Act and I really
don't mind,” she says. “I figure I'm probably boring them to death.”
It's likely Anderson is not alone in her concerns that the government
may be monitoring what Americans say, write, and read. And now there may
be even more to worry about: a newly revealed security research project
called PRODIGAL -- the Proactive Discovery of Insider Threats Using
Graph Analysis and Learning -- which has been built to scan IMs, texts
and emails . . . and can read approximately a quarter billion of them a
day.
“Every time someone logs on or off, sends an email or text, touches a file or plugs in a USB key, these records are collected within the organization,” David Bader, a professor at the Georgia Tech School of Computational Science and Engineering and a principal investigator on the project, told FoxNews.com. PRODIGAL scans those records for behavior -- emails to unusual recipients, certain words cropping up, files transferred from unexpected servers -- that changes over time as an employee "goes rogue." The system was developed at Georgia Tech in conjunction with the Defense Advanced Research Projects Agency (DARPA), the Army's secretive research arm that works on everything from flying cars to robotic exoskeletons. Initially, PRODIGAL will scan only the communications of military volunteers and people who work in federal agencies. But the very existence of such a project is sure to unnerve citizens like Anderson. Is the government reading my emails? Are they already monitoring me? "Some people say it's one step further toward a police state," said Anthony Howard, a book author and security expert who has consulted for the Department of Homeland Security. But Bader and other experts are quick to dismiss the idea that PRODIGAL could be used to monitor everyone in America. The scans work only on internal systems, they say -- not across the entire Internet. And the experts say such a project is long overdue: by monitoring for "anomalies" and predicting extreme behavior, catastrophes can be prevented, such as a soldier in good mental health becoming homicidal or a government employee sharing key classified information. “Today, an analyst may receive tens of thousands of 'anomalies' per day, where an anomaly is an unexplained event,” Bader said. The new system is designed to aid analysts in processing those anomalies. And it's not alone. Bader equated the PRODIGAL system to Raytheon SureView, an internal scanning system that looks for suspicious activity and alerts federal agencies about possible threats. Another system is the Einstein project, which was developed after 9/11 and scans government employees for key words and links suspicious activity to National Security Agency databases. But PRODIGAL scans vastly more data than those systems: as much as a terabyte or more per day, what Georgia Tech described as "massive data sets." PRODIGAL is part of an existing DARPA security project called Anomaly Detection at Multiple Scales (ADAMS), which was announced earlier this year. Details about how ADAMS works are not widely known; Georgia Tech's recent announcement is one of the first reports to explain how these detection engines work. According to Bader, PRODIGAL uses complex "graph-processing" algorithms to analyze threats and piece together a jigsaw puzzle of communications. The system then ranks the unusual activity before feeding the most suspicious threats to agents. Cyber-security expert Joseph Steinberg, CEO of Green Armor Solutions, said ADAMS is unique in that it scans through a massive stream of data. He says the new project, which will take about two years to develop and will cost $9 million, will be more effective at analyzing threats and determining if they are valid. But the issue is not the scanning technology itself; it’s how the information is interpreted -- and whether it ultimately helps at all, Howard told FoxNews.com. "Since there is no real data publicly available to substantiate that any of this technology is preventing terrorist attacks or strengthening our borders from within, [we can't] really say definitively that this technology is doing any good," he said. The challenge, he said, is that criminals and terrorists often use multiple channels of communication, some encrypted -- and know how to avoid existing detection systems. Nevertheless, PRODIGAL’s ability to scan reams of data is clearly the next step in tracking unusual activity, and it’s guaranteed to raise a red flag for Anderson and others. "Since people tend to be imperfect, the data captured can easily be mishandled. Where does it end?" Howard said. Read more: http://www.foxnews.com/scitech/2011/12/03/could-us-government-start-reading-your-emails/#ixzz1fUgqaOeA
|
WMR NSA spying operation targeting journalists focused but massive |
April 20-22, 2012 -- NSA spying operation targeting journalists
focused but massive National Security Agency (NSA) sources have
reported the following to WMR: The NSA has conducted a targeted but
massive surveillance operation against certain journalists who have
routinely exposed NSA's illegal domestic communication surveillance
program, code named STELLAR WIND. ... NSA
has, for some time, kept tabs on journalists who wrote about the
communication spying agency. In its embryonic stage, the journalist
surveillance system, originally code-named FIRSTFRUITS, was basically a
clipping service that provided NSA and CIA analysts with copies of
newspaper, magazine, and Internet articles that mentioned one or both of
the two agencies. ... Shortly after the
September 11, 2001 attacks, Vice President Dick Cheney's legal counsel,
David Addington, visited NSA headquarters at Fort Meade, Maryland with a
list of individuals he wanted NSA to spy on and provide Cheney's office
with transcripts of phone calls and e-mails. From that visit, STELLAR
WIND was developed as an illegal surveillance system targeting
journalists, members of Congress, and other "persons of interest" for
the White House. ... In March 2004,
Attorney General John Ashcroft ruled STELLAR WIND illegal but the next
day he became critically ill with pancreatitis. When White House chief
of staff Andrew Card and White House counsel Alberto Gonzales visited
Ashcroft in his hospital room to demand he sign off on the program,
Ashcroft deferred to his deputy James Comey and FBI director Robert
Mueller who both refused to authorize the program. George W. Bush
overruled Ashcroft, Comey, and Mueller and continued to authorize
STELLAR WIND. President Obama has continued to authorize STELLAR WIND,
according to NSA sources. ... Although
STELLAR WIND continues to generally target journalists who write about
intelligence and national security matters, NSA has concentrated its
efforts on three journalists, in particular. They are New York Times'
reporter and author of State of War James Risen, journalist and author
of The Puzzle Palace and Body of Secrets James Bamford, and WMR editor
Wayne Madsen. Risen continues to fight a grand jury subpoena to testify
about his sources on Operation Merlin, a CIA program to deliver flawed
nuclear design technology to Iran. Former CIA officer Jeffrey Sterling
has been indicted and charged under the Espionage Act for revealing
details of the program. Risen's subpoena was quashed by Judge Louise
Brinkema of the U.S. District Court for the Eastern District of
Virginia, but the Obama administration has appealed the decision to the
U.S. Appeals Court for the Fourth Circuit in Richmond, Virginia and oral
arguments in the case are scheduled for next month.
... NSA sources report: Wayne Madsen's e-mails and phone
conversations back to 2002 are in the possession of the NSA. The phone
calls range from those with his mother to those with government sources.
All passwords to social networking websites, banks, phone companies,
credit card companies, and his website, WayneMadsenReport, are held by
the NSA. The data includes the list of his subscribers to
WayneMadsenReport, as well. ... The same
level of detailed data is maintained on Risen and Bamford.
... Personal observation: It is very clear that a number of
individuals who contacted this editor over the past several years to
pass on information were stymied at the last minute from maintaining
contact. These individuals were willing to provide information on: the
movement and temporary "loss" of nuclear weapons from Minot Air Force
Base in North Dakota to Barksdale Air Force Base in Louisiana in 2007
coupled with the murder of Air Force special operation Captain John
Frueh in Washington state; documents proving Canadian military
involvement in torture of detainees in Afghanistan; information on the
2000 attack on the USS Cole in Aden harbor being a "false flag" attack;
evidence that there were no human remains found at the crash site of
United flight 93 in Shanksville, Pennsylvania; and evidence showing that
Harvard virologist Dr. Don Wiley, who was investigating the initial
anthrax attacks, was murdered in Memphis in November 2001.
... In all these cases, individuals who contacted this
editor and were willing to provide information ceased contact after
their initial phone calls, letters, and email. ...
NSA also maintains mail covers on addresses of certain individuals in
the event that contact is made via the U.S. Postal Service or private
companies such as FedEx or DHL. ...
FIRSTFRUITS, which is now known by a different cover name, contains, in
addition to articles, complete transcripts of phone calls, e-mails,
faxes, and letters, in addition to the numbers and names of all
individuals who have been in contact with targeted journalists. In
addition to the three high priority targets -- Risen, Bamford, and
Madsen -- other journalists who are a subject of the NSA warrantless
surveillance include Bill Gertz of The Washington Times, Eric Lichtblau
and Scott Shane of The New York Times, Siobhan Gorman, formerly of The
Baltimore Sun and now with The Wall Street Journal, and Seymour Hersh
with The New Yorker. .. So far, the Obama
administration has brought Espionage Act charges against six individuals
for contact with the media. They are charged with providing classified
information to journalists and "aiding the enemy." ...
However, the Justice Department may take an even more draconian turn.
This editor has heard from NSA insiders that there is a willingness by
some quarters to charge two of the three key targeted journalists under
the Espionage Act. Since Bamford and Madsen both once worked at NSA and
both signed non-disclosure agreements -- Bamford in the 1960s and Madsen
in the mid-1980s -- there has been talk of indicting them also for
violations of the Espionage Act, along with their sources in the
intelligence community.
|
RT Stratfor emails reveal secret, widespread TrapWire surveillance system |
Former senior intelligence officials have created a detailed surveillance system more accurate than modern facial recognition technology — and have installed it across the US under the radar of most Americans, according to emails hacked by Anonymous. Every few seconds, data picked up at surveillance points in major cities and landmarks across the United States are recorded digitally on the spot, then encrypted and instantaneously delivered to a fortified central database center at an undisclosed location to be aggregated with other intelligence. It’s part of a program called TrapWire and it's the brainchild of the Abraxas, a Northern Virginia company staffed with elite from America’s intelligence community. The employee roster at Arbaxas reads like a who’s who of agents once with the Pentagon, CIA and other government entities according to their public LinkedIn profiles, and the corporation's ties are assumed to go deeper than even documented. The details on Abraxas and, to an even greater extent TrapWire, are scarce, however, and not without reason. For a program touted as a tool to thwart terrorism and monitor activity meant to be under wraps, its understandable that Abraxas would want the program’s public presence to be relatively limited. But thanks to last year’s hack of the Strategic Forecasting intelligence agency, or Stratfor, all of that is quickly changing. Hacktivists aligned with the loose-knit Anonymous collective took credit for hacking Stratfor on Christmas Eve, 2011, in turn collecting what they claimed to be more than five million emails from within the company. WikiLeaks began releasing those emails as the Global Intelligence Files (GIF) earlier this year and, of those, several discussing the implementing of TrapWire in public spaces across the country were circulated on the Web this week after security researcher Justin Ferguson brought attention to the matter. At the same time, however, WikiLeaks was relentlessly assaulted by a barrage of distributed denial-of-service (DDoS) attacks, crippling the whistleblower site and its mirrors, significantly cutting short the number of people who would otherwise have unfettered access to the emails. On Wednesday, an administrator for the WikiLeaks Twitter account wrote that the site suspected that the motivation for the attacks could be that particularly sensitive Stratfor emails were about to be exposed. A hacker group called AntiLeaks soon after took credit for the assaults on WikiLeaks and mirrors of their content, equating the offensive as a protest against editor Julian Assange, “the head of a new breed of terrorist.” As those Stratfor files on TrapWire make their rounds online, though, talk of terrorism is only just beginning. Mr. Ferguson and others have mirrored what are believed to be most recently-released Global Intelligence Files on external sites, but the original documents uploaded to WikiLeaks have been at times unavailable this week due to the continuing DDoS attacks. Late Thursday and early Friday this week, the GIF mirrors continues to go offline due to what is presumably more DDoS assaults. Australian activist Asher Wolf wrote on Twitter that the DDoS attacks flooding the WikiLeaks server were reported to be dropping upwards of 40 gigabytes of traffic per second on the site. According to a press release (pdf) dated June 6, 2012, TrapWire is “designed to provide a simple yet powerful means of collecting and recording suspicious activity reports.” A system of interconnected nodes spot anything considered suspect and then input it into the system to be "analyzed and compared with data entered from other areas within a network for the purpose of identifying patterns of behavior that are indicative of pre-attack planning.” In a 2009 email included in the Anonymous leak, Stratfor Vice President for Intelligence Fred Burton is alleged to write, “TrapWire is a technology solution predicated upon behavior patterns in red zones to identify surveillance. It helps you connect the dots over time and distance.” Burton formerly served with the US Diplomatic Security Service, and Abraxas’ staff includes other security experts with experience in and out of the Armed Forces. What is believed to be a partnering agreement included in the Stratfor files from August 13, 2009 indicates that they signed a contract with Abraxas to provide them with analysis and reports of their TrapWire system (pdf). “Suspicious activity reports from all facilities on the TrapWire network are aggregated in a central database and run through a rules engine that searches for patterns indicative of terrorist surveillance operations and other attack preparations,” Crime and Justice International magazine explains in a 2006 article on the program, one of the few publically circulated on the Abraxas product (pdf). “Any patterns detected – links among individuals, vehicles or activities – will be reported back to each affected facility. This information can also be shared with law enforcement organizations, enabling them to begin investigations into the suspected surveillance cell.” In a 2005 interview with The Entrepreneur Center, Abraxas founder Richard “Hollis” Helms said his signature product “can collect information about people and vehicles that is more accurate than facial recognition, draw patterns, and do threat assessments of areas that may be under observation from terrorists.” He calls it “a proprietary technology designed to protect critical national infrastructure from a terrorist attack by detecting the pre-attack activities of the terrorist and enabling law enforcement to investigate and engage the terrorist long before an attack is executed,” and that, “The beauty of it is that we can protect an infinite number of facilities just as efficiently as we can one and we push information out to local law authorities automatically.” An internal email from early 2011 included in the Global Intelligence Files has Stratfor’s Burton allegedly saying the program can be used to “[walk] back and track the suspects from the get go w/facial recognition software.” Since its inception, TrapWire has been implemented in most major American cities at selected high value targets (HVTs) and has appeared abroad as well. The iWatch monitoring system adopted by the Los Angeles Police Department (pdf) works in conjunction with TrapWire, as does the District of Columbia and the "See Something, Say Something" program conducted by law enforcement in New York City, which had 500 surveillance cameras linked to the system in 2010. Private properties including Las Vegas, Nevada casinos have subscribed to the system. The State of Texas reportedly spent half a million dollars with an additional annual licensing fee of $150,000 to employ TrapWire, and the Pentagon and other military facilities have allegedly signed on as well. In one email from 2010 leaked by Anonymous, Stratfor’s Fred Burton allegedly writes, “God Bless America. Now they have EVERY major HVT in CONUS, the UK, Canada, Vegas, Los Angeles, NYC as clients.” Files on USASpending.gov reveal that the US Department of Homeland Security and Department of Defense together awarded Abraxas and TrapWire more than one million dollars in only the eleven months. News of the widespread and largely secretive installation of TrapWire comes amidst a federal witch-hunt to crack down on leaks escaping Washington and at attempt to prosecute whistleblowers. Thomas Drake, a former agent with the NSA, has recently spoken openly about the government’s Trailblazer Project that was used to monitor private communication, and was charged under the Espionage Act for coming forth. Separately, former NSA tech director William Binney and others once with the agency have made claims in recent weeks that the feds have dossiers on every American, an allegation NSA Chief Keith Alexander dismissed during a speech at Def-Con last month in Vegas. |
FBI / BioMetric Facial Recognition and Identification Initiative.pdf text and RT |
Facial Recognition and Identification Initiatives Richard W. Vorder Bruegge Federal Bureau of Investigation 2 Image Technology in the Forefront • Unparalleled ease of capturing, storing, copying, and sharing images • Proliferation of surveillance cameras, expanding global media enterprises, and average citizens with mobile phone still and video camera capabilities • Unprecedented level of sharing images and videos via the internet and other advanced communication methods • Photographs and videos depicting victims, suspects, and eyewitnesses are becoming the subject of investigations Face: Forensic Discipline And Biometric 3 Biometrics Forensics • A measurable biological (anatomical and physiological) or behavioral characteristic used for identification – Facial Recognition (FR) - the automated searching of a facial image in a computer database, typically resulting in a group of facial images ranked by computer evaluated similarity computer- evaluated • Visible physical characteristics one can use for the purposes of measurements or comparisons that are collected after an event – Facial Identification (FI) - the manual examination of the differences and similarities between two facial images for the purpose of determining if they represent different persons or the same person Event 4 FI & FR Address Multiple Missions • Mission Areas: – Access control – Automated identity verification – Human identification – Screening – Surveillance – Law enforcement & national security investigations – Identity intelligence to understand intent 5 FBI Facial Use Cases • Identifying fugitives and missing persons in FR systems • Identifying unknown persons of interest from images (1:N) • Tracking subjects movements to/from critical events (e.g., 9/11) • Conducting automated surveillance at lookout locations (1:M, where 1<M<<N) • Identifying subjects in public datasets • Identifying subjects from images in seized systems • Verifying mug shots against National Criminal Information Center (NCIC) records (1:1) • Controlling access 6 Identifying Subjects from Images for 40 Years • The FBI’s Facial Recognition/Identification work is performed within the Forensic Audio, Video, and Image Analysis Unit (FAVIAU) • The FAVIAU is one of only a few accredited laboratories in the world that conducts examinations in the disciplines of video, image, and audio analysis The Biometric Center of Excellence (BCOE) is the Federal Bureau of Investigation’s (FBI) program for exploring and advancing the use of new and enhanced biometric technologies and capabilities for integration into operations 7 Driving New FBI Biometric Capabilities 8 Sponsoring Applied Research • Ongoing applied research, development, test & evaluation: – Universal Face & Iris Workstation – FBI Facial Collaboration-Facial Land marking/Facial Aging – Automated Face Detection and Recognition in Video – FI/FR of Twins (blemishes) – Obscuring Identity in Video – Repro Face (2D-3D-2D) – Facial Image and Camera Certification Process – Automated Retrieval of Scars, Marks, and Tattoos – Ear Recognition – Multiple Biometric Grand Challenge/Multiple Biometric Evaluation/ III Data Set Testing 9 Sponsoring Standards Development • Facial Identification Scientific Working Group (FISWG) • Sponsored by the BCOE and established in 2009 • Mission - “develop consensus standards, guidelines, and best practices for the discipline of image-based comparisons of human features” • Participants include federal, state, local, and international government agencies, as well as invited non-governmental organizations • Next meeting scheduled for November 15-18 in San Antonio, Texas • Visit www.FISWG.org Deepening FR Collaboration • Sponsored the International Face Collaboration Meeting – 5 foreign countries and 11 U.S. agencies participated • Participated in the FR workshop “From Bones to Bits” – 55 U.S. government and 47 contractor attendees • Sponsored the U.S. Government Facial Collaboration Meeting – 88 attendees representing numerous law enforcement, intelligence, and military agencies 10 Analyzing Legal And Privacy Concerns Tasks associated with this analysis include: • Identifying databases external to the FBI to which the FBI has legal access • Defining policy for both automated and human-tandem searching of databases and methods of how the images are used in searching and how they are destroyed or retained • Identifying privacy implications of applied research using images of human subjects 11 Developing Training Curriculum 12 Preparing for FR incorporation into Next Generation Identification (NGI) • The NGI system: – Incremental replacement of the current IAFIS – Improving current functionality and providing new functionality – Developing multimodal collection and search identification services An upgrade to IAFIS – The FBI is developing an automated, interoperable multimodal biometric system 13 Enhanced ten print services 2011 Palmprints and latents 2012 Photos/Facial, scars, marks, and tattoos 2013 Iris 2014 13 Value Of the FBI-DMV Pilot Operational Results FR System Testing Identification of Follow-On Projects The BCOE-sponsored FR pilot program with NC DMV led to more than 700 leads including: • One federal fugitive apprehension • Six state fugitive apprehensions • One missing person resolution FACEMASK has also served as an opportunity for FBI analysts to operationally test a FR system and determine its strengths and weaknesses. This aids the FBI as it develops its own FR capability Due to this success, the FBI took advantage of an ongoing survey of U.S. DMVs and used it as an opportunity to identify other prospective state DMVs for follow-on projects Purpose Of The DMV Survey Initial Purpose • Collect DMV FR POC Information • Identify DMVs that have implemented FR systems Expanded Purpose • Gather data about FR vendors, state laws, and search protocol to help the FBI identify a DMV for a potential follow-on project • Technical systems information • Receptiveness to collaborating with the FBI • Various concerns and suggestions voiced by the DMVs and trends were recorded The FBI wanted to identify key FR POC in order to direct inquiring investigators and agencies. The original DMV survey focuses around contact information; however, with the success of the original pilot the purpose and scope of the data gathering effort changed. Potential FBI-DMV FR Pilot Expansion Active FR System NO FR System Unknown/No Response Key Takeaway: More than half of all state DMVs have FR systems. Their main goal is to detect and combat fraud Responses current as of (05/28/2010) 16 * * * * * * * * * * * * * * * * * * Permit Law Enforcement Access to Data * DMV Survey High Level Findings Specific Findings The vast majority of states that have FR Systems use L1 Technologies Technology Vendors Legal Requirements Funding Knowledge Many DMV image databases are maintained and searched by their vendors. This presents privacy issues that should be explored Across the nation, there are widely varying legal requirements. To initiate searches, some DMVs require Memorandums of Understanding (MOU) while some just require the requesting agency to buy their vendor’s software Due to a lack of funding, some states who had planned to develop FR systems had to delay or cancel their plans due to budgetary constraints Many DMV POCs lacked technical knowledge about their systems and the legal issues involved in their use. Since most POCs were unable or unwilling to nominate alternative POCs, more in-depth research may be required before FBI collaboration can be considered (i.e., researching state laws that apply to the DMV’s FR system or interviewing a DMV’s vendor for more specific systems information) Questions / Comments Contact Information: Richard Vorder Bruegge Email: Richard.VorderBruegge@ic.fbi.gov Additional Resources: www.BiometricCoE.gov Email: BiometricCoE@leo.gov |
WMR GROUNDBREAKER NSA and selling the nation's prized secrets to contractors |
June 1, 2005
On August 1, 2001, just five and a half weeks before the 911 attacks, NSA awarded Computer Sciences Corporation (CSC) a more than $2 billion, ten-year contract known as GROUNDBREAKER. The contract was never popular with NSA's career professionals. Although GROUNDBREAKER was limited to outsourcing NSA's administrative support functions such as telephones, data networks, distributed computing, and enterprise architecture design, the contract soon expanded into the operational areas -- a sphere that had always been carefully restricted to contractors. NSA was once worried about buying commercial-off-the-shelf computer components such as semiconductors because they might contain foreign bugs. NSA manufactured its own computer chips at its own semiconductor factory at Fort Meade. Currently, NSA personnel are concerned that outsourcing mania at Fort Meade will soon involve foreign help desk technical maintenance provided from off-shore locations like India. CSC had originally gained access to NSA through a "buy in" project called BREAKTHROUGH, a mere $20 million contract awarded in 1998 that permitted CSC to operate and maintain NSA computer systems. When General Michael V. Hayden took over as NSA Director in 1999, the floodgates for outside contractors were opened and a resulting deluge saw most of NSA's support personnel being converted to contractors working for GROUNDBREAKER's Eagle Alliance (nicknamed the "Evil Alliance" by NSA government personnel), a consortium led by CSC. NSA personnel rosters of support personnel, considered protected information, were turned over to Eagle, which then made offers of employment to the affected NSA workers. The Eagle Alliance consists of CSC, Northrop Grumman, General Dynamics, CACI, Omen, Inc., Keane Federal Systems, ACS Defense, BTG, Compaq, Fiber Plus, Superior Communications, TRW (Raytheon), Verizon, and Windemere. In October 2002, Hayden, who has now been promoted by Bush to be Deputy Director of National Intelligence under John Negroponte, opened NSA up further to contractors. A Digital Network Enterprise (DNE) team led by SAIC won a $280 million, 26 month contract called TRAILBLAZER to develop a demonstration test bed for a new signals intelligence processing and analysis system. SAIC's team members included Booz Allen Hamilton, Boeing, Northrop Grumman, and Eagle Alliance team leader CSC. TRAILBLAZER, according to Hayden's own testimony before the Senate Select Committee on Intelligence, is now behind schedule and over budget to the tune of over $600 million. But that is not the only consequence of these two mega-contracts for NSA's ability to monitor global communications for the next 911, which could be a terrorist nuclear strike on the United States. NSA insiders report that both contract teams have melded into one and that NSA's operations are being adversely impacted. From simple tasks like phones being fixed to computers being updated with new software, the Eagle Alliance has been a disaster. The Eagle Alliance and DNE team members are rife with former NSA top officials who are reaping handsome bonuses from the contracts -- and that has many NSA career employees crying conflict of interest and contract fraud. CACI, called "Colonels and Captains, Inc." by critics who cite the revolving door from the Pentagon to its corporate office suites, counts former NSA Deputy Director Barbara McNamara as a member of its board of directors. CACI alumni include Thomas McDermott, a former NSA Deputy Director for Information Systems Security. Former NSA Director Adm. Mike McConnell is a Senior Vice President of Booz Allen. Former NSA Director General Ken Minihan is President of the Security Affairs Support Association (SASA), an intelligence business development association that includes Boeing, Booz Allen, CACI, CSC, the Eagle Alliance, General Dynamics, Northrop Grumman, Raytheon, SAIC, and Windemere, all GROUNDBREAKER and TRAILBLAZER contractors, among its membership. SASA's board of directors (surprise, surprise) includes CACI's Barbara McNamara. One of SASA's distinguished advisers is none other than General Hayden. Although contractors are required to have the same high level security clearances as government personnel at NSA, there are close connections between some NSA contractors and countries with hostile intelligence services. For example, CACI's president and CEO visited Israel in early 2004 and received the Albert Einstein Technology Award at ceremony in Jerusalem attended by Likud Party Defense Minister Shaul Mofaz. The special ceremony honoring CACI's president was sponsored by the Aish HaTorah Yeshiva Fund. The ultra-Orthodox United Torah Judaism Party's Jerusalem Mayor, Uri Lupolianski, was also in attendance. According to Lebanon's Daily Star, CACI's president also met with notorious racist Israeli retired General Effie Eitam who advocates expelling Palestinians from their lands. The U.S. delegation also included a number of homeland security officials, politicians, and businessmen. CACI has also received research grants from U.S.-Israeli bi-national foundations. A few months after the award ceremony for CACI's president, the Taguba Report cited two CACI employees as being involved in the prison torture at Abu Ghraib prison in Iraq. The U.S. military commander for the Iraqi prisons, General Janis Karpinski, reported that she witnessed Israeli interrogators working alongside those from CACI and another contractor, Titan. When the Taguba Report was leaked, the office of Deputy Defense Secretary for Policy Douglas Feith issued an order to Pentagon employees not to download the report from the Internet. Feith is a well-known hard line supporter of Israel's Likud Party and, according to U.S. government insiders, his name has come up in FBI wiretaps of individuals involved in the proliferation of nuclear weapons material to Israel via Turkish (including Turkish Jewish) intermediaries. These wiretaps are the subject of a Federal probe of who compromised a sensitive CIA counter-proliferation global operation that used a carve out company called Brewster Jennings & Associates to penetrate nuclear weapons smuggling networks with tentacles extending from Secaucus, New Jersey to South Africa and Pakistan and Turkey to Israel. According to the Jewish Telegraph Agency, some six months before the Abu Ghraib torture scandal was first uncovered, one of Feith's assistants, Larry Franklin, met with two officials of the American Israel Public Affairs Committee (AIPAC) at the Tivoli Restaurant in Arlington, Virginia. According to FBI surveillance tapes, Franklin relayed top secret information to Steve Rosen, AIPAC's then policy director, and Keith Weissman, a senior Iran analyst with AIPAC. Franklin has been indicted for passing classified information to AIPAC. In addition, three Israeli citizens have been identified as possible participants in the spy scandal. They are Naor Gilon, the political officer at the Israeli embassy in Washington; Uzi Arad, an analyst with the Institute for Policy and Strategy in Herzliya (the northern Tel Aviv suburb where the headquarters of Mossad is located); and Eran Lerman, a former Mossad official who is now with the American Jewish Committee. What has some NSA officials worried is that with pro-Israeli neocons now engrained within the CIA, Defense Intelligence Agency (DIA), State Department, and National Security Council, NSA is ripe for penetration by Israeli intelligence. NSA has a troubled past with Israel. In 1967, Israeli warplanes launched a premeditated attack on the NSA surveillance ship, the USS Liberty, killing and wounding a number of U.S. sailors and NSA civilian personnel. Convicted Israeli spy Jonathan Pollard compromised a number of NSA sensitive sources and methods when he provided a garage full of classified documents to Israel. But NSA is also aware of an incident where Israelis used a contractor, RCA, to gain access to yet additional NSA sources and methods. In the 1980s, against the wishes of NSA, the Reagan administration forced NSA to permit RCA, one of its major contractors, to develop a tethered aerostat (balloon) signals intelligence and direction finding system for the Israeli Defense Force. According to NSA officials, the Israeli-NSA joint project, codenamed DINDI, was established at a separate facility in Mount Laurel, New Jersey and apart from the main NSA developmental center at RCA's facility in Camden, New Jersey. Although NSA and RCA set up a strict firewall between the contractor's national intelligence contract work and the separate DINDI contract, Israeli engineers, who were working for Mossad, soon broke down the security firewall with the assistance of a few American Jewish engineers assigned to the DINDI project. The security breach resulted in a number of national intelligence developmental systems being compromised to the Israelis, including those code named PIEREX, MAROON ARCHER, and MAROON SHIELD. DINDI was quickly cancelled but due to the sensitivity surrounding the American Jewish engineers, the Reagan Justice Department avoided bringing espionage charges. There were some forced retirements and transfers, but little more. But for NSA, the duplicity of the Israelis added to the enmity between Fort Meade and Israeli intelligence. With outside contractors now permeating NSA and a major Israeli espionage operation being discovered inside the Pentagon, once again there is a fear within NSA that foreign intelligence services such as the Mossad could make another attempt to penetrate America's virtual "Fort Knox" of intelligence treasures and secrets. Thanks to some very patriotic and loyal Americans inside NSA, this author is now in possession of an internal NSA contract document from November 2002 that shows how GROUNDBREAKER and TRAILBLAZER have allowed the Eagle Alliance and other contractors to gain access to and even virtual control over some of the most sensitive systems within the U.S. intelligence community. One suspect in this unchecked outsourcing is the person Hayden hired from the outside to act as Special Adviser to his Executive Leadership Team, Beverly Wright, who had been the Chief Financial Officer for Legg Mason Wood Walker in Baltimore. Before that, Wright had been the Chief Financial Officer for Alex Brown, the investment firm at which George W. Bush's grandfather, Prescott Bush, once served as a board member. As one senior NSA official sarcastically put it, "She's highly qualified to work in intelligence!" According to the document, the future of some 10,000 Windows NT and UNIX workstations and servers that handle some of NSA's most sensitive signals intelligence (SIGINT) (the Signals Intelligence Directorate workstation upgrade is code named BEANSTALK) and electronics intelligence (ELINT) applications, including databases that contain communications intercepts, are now firmly in the grasp of the Eagle Alliance. Operational workstations are being migrated to a less-than-reliable Windows/Intel or "WINTEL" environment. The document boldly calls for the Eagle Alliance to establish a SIGINT Service Applications Office (SASO) to "provide and maintain Information Technology services, tools, and capabilities for all [emphasis added] SIGINT mission applications at the NSA." This is a far cry from the non-operational administrative support functions originally specified in the GROUNDBREAKER contract. The document also calls for NSA to provide extremely sensitive information on SIGINT users to the contractors: "Identification of target sets of users in order to successfully coordinate with the Eagle Alliance modernization program." The Eagle Alliance is involved in a number of systems that impact on other members of the U.S. intelligence community, foreign SIGINT partners, and national command authorities. These systems include INTELINK, Common Remoted Systems, National SIGINT Requirements Process, Overhead Tasking Distribution, RSOC (Regional SIGINT Operations Center) Monitoring Tool, RSOC Modeling Tool, Speech Activity Detection, Network Analysis Tools, Network Reconstruction Tools, Advanced Speech Processing Services, Automatic Message Handling System, CRITIC Alert, Cross Agency Multimedia Database Querying, Message Format Converter, Central Strategic Processing and Reporting, Collection Knowledge Base, Language Knowledge Base and Capabilities, K2000 Advanced ELINT Signals, Speech Content Services, Speech Information Extraction, Dominant Facsimile Processing System and DEFSMAC Support, Data Delivery (TINMAN), High Frequency Direction Finding (HFDF) Database, Satellite database, Protocol Analysis Terminal, Global Numbering Database, Intercept Tasking Databases, DEFSMAC Space Systems Utilities, Message Server, Extended Tether Program, Language Knowledge Services, Trend Analysis in Data Streams, Signal Related Database, SANDKEY Support (SIGINT Analysis and Reporting), and the SIGINT interception database ANCHORY and the ELINT database WRANGLER. In fact, the document states that the contractors' plans foresee the inclusion of NSA's intelligence community partners (foreign and domestic) in the contractors' revamping of NSA's operational systems. The servers include those that support mission-critical National Time Sensitive Systems (NTSS). These National Time Sensitive System servers have been assigned various cover terms: CANUCKS DOLLAR EASTCAKE HEALYCUFF MUDDYSWELT NEEDYWHAT RIMTITLE RISKDIME ROWLOAD SEAWATER CURACAO HALF HEALYMINK LEARNGILT LINEFURL MOBLOOSE SPELLBEAK THOSEHOT. A number of SIGINT applications are also impacted by the outsourcing mania. They are also assigned cover terms: ADVERSARY ADVERSARY GOLD CHECKMATE FANBELT FANBELT II FIREBLAZE GALE-LITE (the primary owner of which is DIA) GALLEYMAN GALLEYPROOF JAGUAR KAFFS MAGNIFORM MAINCHANCE OILSTOCK PATHSETTER PINSETTER SIGDASYS FILE II, III, and KL TEXTA SPOT In fact, the document indicates that literally hundreds of NSA intelligence applications are now subject to the whims of outside contractors. These systems include ABEYANCE, ACROPOLIS, ADROIT, ADVANTAGE, AGILITY, AIRLINE, AIRMAIL, ALERT, ALCHEMIST, ANTARES, APPLEWOOD II, ARCHIVER, ARCVIEW GIS, ARROWGATE, ARROWWOOD, ARTFUL, ASPEN, ASSOCIATION, ATOMICRAFT, ATTRACTION, AUTOPILOT, AUTOSTAR, AXIOMATIC BABBLEQUEST, BACKSAW, BANYAN, BARAD, BASERUNNER, BEAMER, BEIKAO, BELLVIEW, BIRDSNEST, BISON, BLACKBIRD, BLACKBOOK, BLACKFIN, BLACKHAWK, BLACKNIGHT/SHIPMASTER, BLACKMAGIC, BLACKONYX, BLACKOPAL, BLACKSEA, BLACKSHACK, BLACKSHIRT, BLACKSMYTH, BLACKSNAKE, BLACKSPIDER, BLACKSTAR, BLACKSTORM, BLACKSTRIKE, BLACKWATCH PULL, BLOODHUNTER, BLACKSWORD, BLOSSOM, BLUEBERRY, BLUESKY, BLUESTREAM, BOTTOM, BOTTOMLINE, BOWHUNT, BRAILLEWRITER, BRICKLOCK, BRIGHTENER, BROADWAY, BRIO INSIGHT, BUCKFEVER, BUILDINGCODE, BULK, BUMPER CADENCE, CAINOTOPHOBIA, CALLIOPE, CALVIN, CANDID, CANDELIGHTER, CANDLESTICK, CAPRICORN, CARNIVAL, CARRAGEEN, CARTOGRAPHER, CAT, CATCOVE, CELLBLOCK, CELTIC II, CELTIC CROSS, CENTERBOARD, CENTERCOIL, CENTERPOINT, CENTRALIST, CERCIS, CHAGRIN, CHAMELEON, CHAMITE, CHAPELVIEW, CHARIOT, CHARMANDER, CHARTS, CHATEAU, CHECKMATE, CHECKWEAVE, CHERRYLAMBIC, CHEWSTICK, CHICKENOFF, CHILLFLAME, CHIMERA, CHIPBOARD, CHUJING, CIVORG, CHUCKLE, CLEANSLATE, CLIPS, CLOSEREEF I, CLOUDBURST, CLOUDCOVER, CLOUDCOVER II, CLUBMAN, COASTLINE, COASTLINE COMPASSPOINT, CLIENT, CODEFINDER, COMMONVIEW, CONCERTO, CONDENSOR, CONESTOGA, CONFRONT, CONTRIVER, CONUNDRUM, CONVEYANCE, COPPERHEAD, CORESPACE, CORTEZ, COUNTERSINK, COUNTERSPY, CRAZYTRAIN, CRISSCROSS, CRUISESHIP, CRYSTALLIZE, CYBERENGINE, CYGNUS DAFIF, DANCEHALL, DARKSHROUD, DATATANK, DAYPUL, DAZZLER, DEATHRAY, DECOMA, DELTAWING, DEPTHGAUGE, DESERTFOX, DESOTO, DESPERADO, DIALOG, DIAMONDCHIP, DIFFRACTION, DISPLAYLINE, DITCHDIGGER, DITTO/UNDITTO, DIVINATION, DOITREE, DOLLARFISH, DOUBLEVISION, DRAGONMAKER, DUALIST EAGERNESS, EAGLESTONE, EASYRIDER, ECTOPLASM, ELATION, ELECTRIFY, ELTON, ELEVATOR, EMPERORFISH, ENCAPSULATE, ENGRAFT, ETCHINGNEEDLE, EXPATRIATE, EXPERTPLAYER, EXTENDER, EXTRACTOR, EUREKA, EYELET FAIRHILL, FAIRVIEW, FALCONRY, FALLOWHAUNT, FANATIC, FANCINESS, FASCIA II, FATFREE, FENESTRA, FIESTA, FINECOMB, FIREBOLT, FINETUNE, FIREBRAND II, FIRELAKE, FIRERUNG, FIRETOWER, FIRSTVIEW, FISHERMAN, FISHINGBOAT, FISHWAY, FLAGHOIST (OCS), FLASHFORWARD, FLEXAGON, FLEXMUX, FLEXSTART, FLIP, FLOTSAM, FOLKART, FORESITE, FORTITUDE, FOURSCORE, FOXFUR, FPGA GSM ATTACK, FIRSTPOINT, FARMHOUSE, FLODAR, FLOVIEW, FOSSIK, FROZENTUNDRA, FREESTONE, FRENZY/GRANULE, FUSEDPULL GALAXYDUST, GARDENVIEW, GATCHWORK, GATOR, GAUNTLET, GAYFEATHER, GAZELLE, GEMTRAIL, GENED, GHOSTVIEW, GHOSTWIRE, GIGACOPE, GIGASCOPE B, GISTER, GIVE, GLIDEPLANE, GOLDVEIN, GOLDPOINT, GNATCATCHER-GRADUS, GOKART, GOLDENEYE, GOLDENFLAX, GOLDENPERCH, GOLDMINE, GOMBROON, GOTHAM, GRADIENT, GRANDMASTER, GRAPEANGLE, GRAPEVINE, GRAPHWORK, GREATHALL, GREENHOUSE, GREMLIN, GUARDDOG, GUIDETOWER HACKER, HABANERO, HAMBURGER, HAMMER, HARPSTRING, HARVESTER, HARVESTTIME, HEARTLAND II, HEARTLAND III, HEDGEHOG, HELMET II, HELMET III, HERONPOND, HIGHPOWER, HIGHTIDE, HILLBILLY BRIDE, HIPPIE, HOBBIN, HOKUSAI, HOMBRE, HOMEBASE, HOODEDVIPER, HOODQUERY, HOPPER, HOST, HORIZON, HOTSPOT, HOTZONE, HOUSELEEK/SPAREROOF, HYPERLITE, HYPERWIDE ICARUS, ICICLE, IMAGERY, INFOCOMPASS, INNOVATOR, INQUISITOR, INROAD, INSPIRATION, INTEGRA, INTERIM, INTERNIST, INTERSTATE, INTRAHELP, IOWA, ISLANDER, IVORY ROSE, IVORY SNOW JABSUM, JACAMAR, JADEFALCON, JARGON, JARKMAN, JASPERRED, JAZZ, JEALOUSFLASH, JEWELHEIST, JOVIAL, JOBBER INCOMING, JOSY, JUMBLEDPET, JUPITER KAHALA, KAINITE, KEBBIE, KEELSON, KEEPTOWER, KEYCARD, KEYMASTER, KEYS, KEYSTONE WEB, KINGCRAFT, KINGLESS, KINSFOLK, KLASHES, KLOPPER, KNOSSOS, KRYPTONITE LADYSHIP, LAKESIDE, LAKEVIEW, LAMPSHADE, LAMPWICK, LARGO, LASERDOME, LASERSHIP, LASTEFFORT, LATENTHEART, LATENTHEAT, LEGAL REPTILE, LETHALPAN, LIBERTY WALK, LIGHTNING, LIGHTSWITCH, LINKAGE, LIONFEED, LIONHEART, LIONROAR, LIONWATCH, LOAD, LOCKSTOCK, LOGBOOK, LONGROOT, LUMINARY MACEMAN, MACHISMO, MADONNA, MAESTRO, MAGENTA II, MAGIC BELT, MAGICSKY, MAGISTRAND, MAGYK, MAKAH, MAINWAY, MARINER II, MARKETSQUARE, MARLIN, MARSUPIAL, MARTES, MASTERCLASS, MASTERSHIP, MASTERSHIP II, MASTING, MATCHLITE, MAUI, MAVERICK, MECA, MEDIASTORM, MEDIATOR, MEDIEVAL, MEGAMOUSE, MEGASCOPE, MEGASTAR, MERSHIP (CARILLON), MESSIAH, MICOM, MIGHTYMAIL, MILLANG, MONITOR, MONOCLE, MOONDANCE, MOONFOX, MOORHAWK, MORETOWN, MOSTWANTED, MOVIETONE III, MUSICHALL, MUSTANG, MYTHOLOGY NABOBS, NATIONHOOD, NAUTILUS, NDAKLEDIT, NEMESIS, NERVETRUNK, NETGRAPH, NEWSBREAK, NEWSHOUND, NEXUS, NIGHTFALL 16, NIGHTFALL 32, NIGHTWATCH, NOBLEQUEST, NOBLESPIRIT, NOBLEVISION, NSOC SHIFTER, NUCLEON, NUMERIC OAKSMITH, OBLIGATOR, OCEANARIUM, OCEANFRONT, OCTAGON, OCTAVE, OFFSHOOT, OLYMPIAD, ONEROOF, ONEROOF-WORD 2000 TRANSCRIPTION, OPALSCORE, OPENSEARCH, OPERA, ORCHID, ORIANA, OUTERBANKS, OUTFLASH, OUTREACH PADDOCK, PACESETTER, PALINDROME, PAPERHANGER II, PARTHENON, PARTHENON II, PASSBACK, PASTURE, PATCHING, PATHFINDER, PATRIARCH, PAYMASTER, PAYTON, PEDDLER, PEARLWARE, PERFECTO, PERSEUS, PERSEVERE, PICKET, PINWALE, PIEREX, PILEHAMMER, PINNACLE, PINSTRIPE, PITONS, PIXIEDUST, PIZARRO, PLATINUM PLUS, PLATINUMRING, PLUMMER, PLUS, PLUTO, POLARFRONT, POLYSTYRENE, POPPYBASE, POPTOP, PORCELAIN, PORTCULLIS, POSTCARD, POWDERKEG, POWERPLANT, PRAIRIE DOG, PRANKSTER, PREDATOR, PRELUDE, PROSCAN, PROSPERITY, PRIZEWINNER, PROPELLER, PROTOVIEW, PUFFERFISH, PYTHON II QUARTERBACK, QUASAR, QUEST, QUICKER, QUICKSILVER RAGBOLT, RAINGAUGE, RAINMAN, RAKERTOOTH, RAMJET, RAP, RAPPEL, RAUCOVER, REACTANT, RECEPTOR, RECOGNITION, RED ARMY, RED BACK, RED BELLY, RED DAWN, RED DEMON, RED ROOSTER, RED ROVER, REDALERT, REDCAP, REDCENT, REDCOATS, REDMENACE, REDSEA, REDSTORM, REDZONE, RELAYER, RENEGADE, RENOIR, RIGEL LIBRARY, RIKER, RIMA, ROADBED, ROADTURN, ROCKDOVE, ROOFTOP, ROOTBEER, ROSEVINE, RUTLEY SAGACITY, SANDSAILOR, SASPLOT, SATINWOOD, SATURN, SAYA, SCANNER, SEALION, SEAPLUM, SCISSORS, SCREENWORK, SEABEACH II, SEARCHLIGHT, SELLERS, SEMITONE, SENIOR GLASS, SENTINEL, SHADOWBOXER, SHADOWCHASER, SHANTY, SHARK, SHARKBITE, SHARKKNIFE, SHARPSHOOTER, SHILLET, SHILOH, SHIPMASTER, SHORTSWING, SIDEMIRROR, SIGHTREADY, SIGNATURE, SILKRUG, SILVERFISH, SILVERHOOK, SILVERLINER, SILVERVINE, SINGLEPOINT, SINGLESHOT, SITA, SKEPTIC, SKILLFUL, SKYBOARD, SKYCAST, SKYGAZER, SKYLINE, SKYLOFT, SKYWRITER, SLAMDANCE, SLATEWRITER, SLIDESHOW, SMOKEPPIT, SNAKEBOOT, SNAKECHARMER, SNAKEDANCE II, SNAKERANCH II, SNORKEL, SNOWMAN, SOAPOPERA, SOAPSHELL, SOFTBOUND, SOFTRING, SORCERY, SPANISH MOSS, SPARKVOYAGE, SPEARHEAD, SPECOL, SPECTAR, SPIROGRAPH, SPLINTER, SPLITTER, SPORADIC, SPOTBEAM, SPRINGRAY, SPUDLITE, STAIRWAY, STAR SAPPHIRE, STARCICLE, STARGLORY, STARLOG, STARQUAKE, STARSWORD, STATIONMASTER, STEAKHOUSE, STELLAH, STONEGATE, STORMCHASER, STORMPEAK, STOWAWAY, STRONGHOLD, SUBSHELL, SUNDIAL, SUPERCODING, SURREY, SWEETDREAM, SWEETTALK, SWEEPINGCHANGE, SWITCHPOINT TABLELAMP, TALION, TANGOR, TAROTCARD, TARP, TARSIS, TART, TAXIDRIVER, TEAS, TECBIRD, TEL, TELE, TELESTO, TELLTALE, TELLURITE, TEMAR, TERMINAL VELOCITY, THINKCHEW, THINTHREAD, THUNDERWEB, TIDYTIPS III, TIEBREAKER, TIGER, TIMELINE, TIMEPIECE, TIMETRAVELER, TINKERTOY, TINSEL, TIPPIE, TOPSHELF, TOPSPIN II, TOPVIEW, TRACECHAIN, TRAILBLAZER, TRBUSTER, TREASURE, TREASURE TROVE, TRED, TRIFECTA, TRINFO, TRINIAN, TROLLEYTRACK, TROLLEYMASTER, TRUNK MOBILE, TRYSTER, TSUNAMI, TWILIGHT, TWOBIT UMORPH, UNLIMITED VIEWEXCHANGE, VEILED DATABASE, VEILED FORTHCOMING, VENTURER II, VICTORY DAEMON, VINTAGE HARVEST, VIOLATION, VISIONARY, VISIONQUEST, VOICECAST, VOICESAIL, VOIP SEED WARGODDESS, WARSTOCK, WATCHOUT, WAXFLOWER, WAYLAND, WEALTHYCLUSTER, WEBSPINNER, WEBSPINNER -- ACCESS TO DBS, WESTRICK, WHARFMAN II, WHITE SEA, WHIRLPOOL, WHITE SHARK, WHITE SWORD, WHITESAIL, WHITEWASH, WILDFIRE, WINDSHIELD, WINTERFEED, WIREDART, WIREWEED, WORLDWIDE, WIZARDRY, WOLFPACK, WRAPUP XVTUBA YELLOWSTONE, YETLING ZENTOOLS, ZIGZAG, and ZIRCON
|
NSA establishing large Internet surveillance facility in Tennessee ... Multiprogram Research Facility April 2012 |
Sources in the U.S. intelligence community report that the National
Security Agency (NSA) is establishing a major Internet surveillance at
the Oak Ridge National Laboratory in Tennessee that is dedicated to
decrypting encoded communications, including file transfers, over the
Internet and within private private networks such as those used by
banks, foreign governments, and multinational corporations.
The new multi-structure NSA facility is called the Multiprogram Research Facility and will work in tandem with the massive NSA data center being built in Bluffdale, Utah on acreage that is part of the Camp Williams Utah National Guard base. The Utah center will store massive amounts of intercepted data and the Oak Ridge facility will rely on new generation supercomputers to decode encrypted data stored at the Bluffdale facility and that which is captured in real time from NSA's worldwide signals intelligence system. The Oak Ridge center will also complement the NSA's High Performance Computing Center at Fort Meade, currently under construction and scheduled for completion in 2015. It is rumored that the building at Fort Meade will contain the world's fastest computer, the speed of which will be measured in Exa-FLOPs. A FLOP means FLoating point OPerations per Second and exa means a 1 followed by 19 zeros. WMR was first alerted to the Oak Ridge facility when NSA began transferring personnel from its Fort Meade, Maryland headquarters to Oak Ridge. The NSA has, for the past decade, been spreading out its functions to facilities around the country, including at regional facilities at Fort Gordon, Georgia (NSA Georgia); San Antonio, Texas (NSA Texas); and Kunia, Hawaii (NSA Hawaii). The Utah and Tennessee facilities represent a further expansion of NSA's "Big Brother" surveillance network to additional regions of the United States. And with the new NSA facility at Oak Ridge comes the expansion of the Obama administration's already-massive counter-intelligence (anti-whistle blowing) operations into Tennessee. The FBI field office in Knoxville, working with NSA's Q Group, have been active in ensuring that NSA employees and contractors refrain from discussing the new Oak Ridge center with uncleared individuals, including members of the media.
|
WMR What's behind all the personal data thefts? |
June 17, 2006 (UPDATED) -- What's behind all the
personal data thefts? Populating the surveillance databases specified by
John Poindexter's Total Information Awareness (TIA) system? WMR has
learned that the thefts of personal data from corporations and
government agencies, most of which were accomplished by stealing
computer hard drive devices, is more than coincidental. Intelligence
sources report that many of the large scale thefts are part of a
well-planned covert intelligence operation to obtain data on hundreds of
millions of people in order to accomplish what former Defense Advanced
Research Projects Agency (DARPA) official John Poindexter was not able
to bring about through his defunct (but secretly restored) Total
Information Awareness (TIA) system -- the population of intelligence and
surveillance databases with files on the financial, medical, employment,
telecommunications, and other sensitive data of Americans and
foreigners. Much of the new TIA work is being conducted under the
umbrella of the National Security Agency and Department of Homeland
Security Advanced Research Projects Agency. ...
A number of computer security experts have said the recent rash of data
thefts is unprecedented in scope, method, and frequency. Some claim that
the thefts appear to be coordinated and targeted at specific data types.
... The physical theft of personal data is unprecedented in
the history of computer security in the United States. Intelligence
sources reveal massive data theft is part of a plan to populate U.S.
surveillance databases. The following is a compilation of
the recent reported data thefts (not all may be related to the data
gathering operation):
Date Number of persons affected Type of data Method Nebraska Treasurer's Office June 2006 300,000 SSNs, DOBs Hacking Minnesota Department of Revenue June 2006 2,400 taxpayers/48,000 businesses SSNs, other personal data Physical theft Allstate, Huntsville, AL June 2006 Unknown Insurance info Physical theft Department of the Navy June 2006 28,000 SSNs, DOBs Leak Department of Agriculture June 2006 26,000 SSNs, DOBs Hacking ING Bank June 2006 13,000 SSNs, financial data Physical theft University of Alabama - Birmingham June 2006 9,800 SSNs, medical data Physical theft VISA USA June 2006 possibly millions financial data Leak Federal Trade Commission June 2006 1,100 FTC employees SSNs, DOBs Physical theft Denver Election Commission June 2006 150,000 Voter's records Physical theft Oregon Dept. of Revenue June 2006 2,200 Tax records Trojan horse Union Pacific Railroad June 2006 30,000 SSNs, DOBs Physical theft KDDI Telco, Japan June 2006 4,000,000 Phone numbers, DOBs Leaked Minnesota State Auditor June 2006 493 state employees SSNs, DOBs Physical theft Humana Medicare Program June 2006 17,000 SSNs, DOBs,Medical info Poss. compromise Hanford Nuclear Reservation June 2006 4,000 SSNs, DOBs Physical theft Royal Ahold (Giant, Tops, Stop & Shop supermarkets) June 2006 Unknown number SSNs, DOBs Physical theft Buckeye Community Health Plan (Ohio) June 2006 72,000 SSNs, medical data Physical theft Internal Revenue Service June 2006 291 IRS employees SSNs, fingerprints, DOBs Physical theft YMCA Rhode Island May 2006 65,000 SSNs, DOBs Physical theft Equifax May 2006 2,500 SSNs, DOBs Physical theft University of Delaware May 2006 1,076 SSNs, DOBs Hacking Sacred Heart University May 2006 unknown SSNs, DOBs Hacking Mercantile Potomac Bank May 2006 48,000 SSNs, account data Physical theft Florida International University May 2006 thousands SSNs, DOBs Hacking American Red Cross, Texas May 2006 unknown DOBs, medical information Physical theft University of Kentucky May 2006 6,500 SSNs, DOBs Physical theft Miami University of Ohio May 2006 851 SSNs, DOBs Loss of hardware American Institute of CPAs May 2006 330,000 SSNs, DOBs Loss of hardware Texas Guaranteed Student Loan Corp. May 2006 1,300,000 SSNs, DOBs Loss of hardware University of Ohio Hudson Health Center May 2006 60,000 SSNs, medical data Hacking Humana Medicare Program May 2006 250 Medicare applicants Paper applications Physical theft Wells Fargo Bank May 2006 unknown SSNs, account data Physical theft Dept. of Veterans Affairs May 2006 28,700,000 SSNs, medical information Physical theft Columbus Bank & Trust May 2006 2,000 Credit card data Physical theft University of Ohio Apr 2006 137,000 SSNs, DOBs Hacking Purdue Engineering School Apr 2006 1,351 SSNs, DOBs Hacking Department of Defense Apr 2006 14,000 SSNs, DOBs Hacking Aetna Apr 2006 38,000 SSNs, other data Physical theft Morgan Stanley, Clydesdale Bank (UK), Master Card Apr 2006 2,000 Credit card data Hacking University of Texas McCombs Business School Apr 2006 197,000 SSNs, DOBs Hacking Fraser Health Authority, Br. Columbia Apr 2006 thousands SINs, DOBs Physical theft University of Alaska Fairbanks Apr 2006 38,941 SSNs, DOBs Hacking Ohio Secretary of State Apr 2006 7,700,000 voters SSNs "Leak" on CDs Iron Mountain, Inc. Apr 2006 17,000 Long Island Railroad employees and retirees, Bronx VA Hospital SSNs, other data Physical theft American Red Cross Mar 2006 8,000 SSNs, DOBs Physical theft American International Group (AIG) Mar 2006 930,000 SSNs, medical information Physical theft U.S. Marine Corps Mar 2006 207,000 SSNs, DOBs Physical theft Georgia Technology Authority Mar 2006 570,000 SSNs, DOBs Hacking Vermont State Colleges Mar 2006 14,000 SSNs, credit data Physical theft Verizon Mar 2006 significant number SSNs, other data Physical theft Hewlett-Packard/Fidelity Investments Mar 2006 196,000 SSNs, other data Physical theft Ernst & Young Mar 2006 thousands of records on IBM employees SSNs, DOBs Physical theft Medco Health Solutions Mar 2006 4600 SSNs, DOBs Physical theft Hotels.com Feb 2006 243,000 Credit card information Physical theft Choice Point Feb 2006 150,000 Subscriber data Leak Georgetown University Feb 2006 41,000 elderly DC residents SSNs, DOBs Hacking Metropolitan College (Denver) Feb 2006 93,000 SSNs, DOBs Physical theft Olympic Funding Chicago Feb. 2006 unknown SSNs, financial data Physical theft Ernst & Young Feb. 2006 unknown SSNs, financial data Physical theft Deloitte & Touche Feb. 2006 9,000 McAfee employees SSNs, financial data Physical theft PriceWaterhouseCoopers Feb. 2006 4,000 SSNs, health data Physical theft Mount St. Mary's Hospital (NY) Feb. 2006 unknown SSNs, health data Physical theft US Department of Agriculture Feb. 2006 350,000 SSNs, DOBs Leak Providence Home Services Jan. 2006 365,000 SSNs, medical data Physical theft State of Hawaii Jan. 2006 40,000 state employees plus family members SSNs, DOBs Physical theft Ameriprise Financial, Inc. Jan. 2006 226,000 SSNs, financial data Physical theft People's Bank Jan. 2006 90,000 SSNs, financial data Physical theft Atlantis Resorts (Bahamas) Jan. 2006 55,000 SSNs, credit data Physical theft California National Guard Jan. 2006 hundreds of Guardsmen SSNs, other data Physical theft University of Washington Medical Ctr. Jan. 2006 1,600 SSNs, medical data Physical theft Marriott Dec. 2005 206,000 SSNs, credit data Physical theft Ford Motors Dec. 2005 70,000 SSNs, DOBs Physical theft LaSalle Bank/ABN Amro Mortgage Dec.2005 2,000,000 SSNs, financial data Lost/recovered First Trust Bank Dec.2005 thousands SSNs, financial data Physical theft ING Bank Dec. 2005 8,500 SSNs, financial data Physical theft TransUnion Nov. 2005 3,623 credit data Physical theft Safeway Nov. 2005 1,400 SSNs, DOBs Physical theft Keck School of Medicine (USC) Nov. 2005 50,000 SSNs, DOBs Physical theft Univ. of Tennessee Medical Center Oct. 2005 3,800 SSNs, medical data Physical theft Wilcox Memorial Hospital Oct. 2005 130,000 SSNs, DOBs Physical theft National Nuclear Safety Administration Sep 2005 1,500 SSNs, DOBs Hacking Children's Health Council (Palo Alto) Sep. 2005 6,000 SSNs, medical data Physical theft North Fork Bank Sep. 2005 9,000 SSNs, financial data Physical theft Kent State University Sep. 2005 100,000 SSNs, DOBs Physical theft J. P Morgan Chase Aug.2005 unknown SSNs, financial data Physical theft Arizona Biodyne (Blue Cross/Blue Shield) Jul 2005 57,000 SSNs, medical data Physical theft City National Bank (LA) Jul 2005 unknown SSNs, financial data Physical theft Federal Deposit Insurance Corp. Jun 2005 6,000 SSNs, DOBs Physical theft American Red Cross, Texas Jun 2005 unknown DOBs, medical information Physical theft Motorola Jun 2005 unknown financial, call data Physical theft U.S. Department of Justice/Omega Travel Jun 2005 80,000 travel, credit data Physical theft Cleveland State University Jun 2005 44,000 SSNs, DOBs Physical theft California Dept. of Health Services May 2005 21,600 SSNs, medical data Physical theft Colorado State Health Department May 2005 1,600 families SSNs, medical data Physical theft Lexis-Nexis May 2005 310,000 Phone records Hacking Bank of America, Wachovia, Commerce Bancorp, PNC Bank NA May 2005 676,000 Bank account information Hacking Valdosta State May 2005 40,000 SSNs, DOBs Hacking MCI April 2005 16,500 SSNs, employment data Physical theft Georgia Southern Univ. April 2005 thousands SSNs, credit card Hacking San Jose Medical Group April 2005 185,000 SSNs, medical data Physical theft Iron Mountain, Inc. Mar 2005 600,000 Time Warner employees SSNs, financial data Physical theft University of California, Berkeley Mar 2005 100,000 SSNs, DOBs Physical theft Ameritrade Feb. 2005 200,000 SSNs, financial data Physical theft Bank of America Feb. 2005 1,200,000 Federal employees SSNs, credit data Physical theft Australian High Tech Crime Center Feb. 2005 3,500 financial data, law enforcement data Loss |
PatentlyApple Apple Wins Surprising Anti-Big Brother Surveillance Patent |
One of the most surprising patents ever to be granted to Apple has been made public today by the US Patent and Trademark Office. It is one of the most interesting patents that I have ever read. It reads like a science fiction novel borrowing from George Orwell's 1949 book titled "Nineteen Eighty-Four." It also has shades of the 1982 movie the "Blade Runner," where the Master Cloner invents a method of implanting false memories into clones so as to provide them with a confident self-image. It also borrows from the movie "The Matrix," where fooling the bots of your presence was an everyday means of survival. Apple's patent is about saving your online identity from what they describe as the "Little Brothers Dataveillance." It's about a method of assisting users to keep their personal information hidden in a Cyberworld that is constantly building a profile on them. It appears that Apple will be able to "save us" from these Little Brothers in the future and it looks as though they're going to execute this via your iCloud ID. Today's report is deliberately lengthy so that you don't miss a detail of Apple's very important anti-big brother surveillance patent. This is really wild stuff. more |
National Security letter, Administrative subpoena color coding airline passengers top | ||
PROGRESSIVE | REFERENCE | CONSERVATIVE 1%* |
|
|
National ID Card top | ||
PROGRESSIVE | REFERENCE | CONSERVATIVE 1%* |
|
|
|
RT PIPS |
License plate scanners let police patrol anyone, anytime Published: 30 October, 2012, 00:49 TAGS: Crime, USA, Police, Security (AFP Photo / Mario Tama) Are you made uneasy by the soaring number of surveillance cameras being installed in big cities across the US? If so, don’t take solace in your sedan: cops are using cameras to collect intelligence on cars, even when no crimes are being committed. License plate scanners are nothing new for law enforcement, but more and more agencies across the US are relying on the technology as equipment becomes more affordable. As the cost of being able to catch a glimpse at every automobile in town drops day by day, though, the odds of being surveilled for simply riding around town is doing just the opposite. A recent post published on the PrivacySOS.org blog directs viewers to a YouTube video produced by PIPS Technology, the self-described world leader in automated license plate recognition, or ALPR, technology. PIPS’ devices are deployed in police cruisers across the US, and in Little Rock, Arkansas, for example, cops say the equipment is well worth the $18,000-per-unit price tag. But while PIPS may be touting their product as something of a must-have for police agencies, the manufacturer is staying silent when it comes to discussing the blatant privacy violations it commits every second its in use. "(It) can scan the mall parking lot in a matter of minutes," Sergeant Brian Dedrick, of the North Little Rock Police Department tells Arkansas Matters of his ALPR scanner. "We couldn't even do that three years go." Sgt. Dedrick is right — ALPRs allow law enforcement to do something that was unheard of only a few years ago. Lieutenant Christopher Morgon of the Long Beach Police Department in Southern California is one of a few cops interviewed by PIPS in their latest advertisement video picked up by the blog, and he agrees that license-plate scanners let his agency do something that was once unheard of. Before adding ALPR technology to cruisers, cops there could only manually dial-in around 150 license plates in a single shift. By equipping patrol cars with high-tech software and a slew of surveillance cameras, though, Lt. Morgon says today the department does a lot more than that. “If you dedicated your day to driving around and putting your vehicle in a place where there’s lots of cars, you could read anywhere from 5 to 10,000 plates in that same shift,” Lt. Morgon says, adding that a single cop car can collect data from upwards of three surveillance cameras simultaneously. Ten thousand plates scanned each day in a single car can put a lot of data in the Long Beach PD’s database, but is all that info used to track down suspects? Lt. Morgon explains in the advert that patrol cars pick up intelligence on every automobile within sight and logs their location and information without ever needing reasonable cause to suspect the driver has committed a crime. “Its catching cars that are parked on the side of the road three lanes over. The old technology never would have done that,” the officer says in the advertisement. “The cameras will catch things you didn’t see, cars you wouldn’t have run, and the beauty of it is that it runs everything,”Lt. Morgon tells the PIPS camera crew. “It doesn’t care whose driving, it doesn’t care what the vehicle looks like. All it sees is a license plate.” While that much is true, it only takes an office a single click of the mouse to input that data into a server and see who owns that car and, presumably, where they are at that given moment. According to Arkansas Matter, at least once police car used in Little Rock records “the exact time and location of every license plate scanned, for up to three years.” In California, Jon Campbell of LA Weekly writes, “The location and photo information is uploaded to a central database, then retained for years — in case it's needed for a subsequent investigation.” As of this past June, Campbell adds, the Los Angeles Police Department itself had around 120 cameras, with the local Sheriff’s Department expected to soon have a total of nearly 300 themselves. In Long Beach, officers plan to have around 45 cameras in all in the coming months — all cameras that are connected to the same servers allowing officers to share intelligence across the state, and lenses don't have to be afixed to cruisers either, but can be installed anywhere in the city. Rita Sklar, the director of the local American Civil Liberties Union chapter, tells Arkansas Matters, "I don't think I have a problem” with the scanner themselves. It’s the sharing of information and how easily it can be connected to individuals, not just automobiles that raise concerns. "It's just one chink in the wall of privacy," she says. The International Association of Chiefs of Police (IACP) defends the scanners, though, and notes that while the technology practically commits clean-cut privacy violations, there’s one little step — that single mouse click — that keeps them in the clear: “A license plate number identifies a specific vehicle, not a specific person,” the IACP notes in their official scanner guidelines. “Although a license plate number may be linked or otherwise associated with an identifiable person, this potential can only be realized through a distinct, separate step (e.g., an inquiry to a Secretary of State or Department of Motor Vehicles data system). Absent this extra step, the license plate number and the time and location data attached to it arenot personally identifying. Thus, even though LPR systems automate the collection of license plate numbers, it is the investigative process that identifies individuals.” “That's a real stretch. But it is a powerful legal assertion,” PrivacySOS notes. “By arguing that license plate reader data isn't personally identifiable, IACP is implicitly saying that it mustn't be protected as seriously as does personal information about us that doesn't require clicking a mouse — the ‘distinct, separate step.’” “That's relevant in the real world because it means officers can collect, retain and share this very sensitive information with virtually no restrictions.” In Long Beach, Lt. Morgon believes that the department has raked in around $3 million in traffic ticket fines after using ALPR scanners for only three years. The LAPD has so far invested $1.8 million on the cameras — and have used them to log more than 160 million data points. |
RT Skype ... didn't wait for a court order to hand over personal info on 16-year-old Dutch boy |
Say goodbye to online service providers protecting the identities of their users. With just a bit of begging, a Texas-based intelligence firm succeeded in convincing Skype to send over sensitive account data pertaining to a teenage WikiLeaks fan. Reports out of Amsterdam this week suggest that Microsoft-owned Skype didn’t wait for a court order or warrant with a judge’s signature before it handed over the personal info of a 16-year-old Dutch boy. The youngster was suspected of being involved in Operation Payback, an Anonymous-endorsed initiative that targeted the servers of PayPal, Visa, Mastercard and others after those companies blocked WikiLeaks from receiving online payment backs in December 2010. When hacktivists responded to the blockade by overflowing the servers of those sites with distributed denial-of-service (DDoS) attacks, PayPal asked Dallas, Texas’ iSIGHT Partners Inc., a self-described“global cyber intelligence firm,” to investigate. It appears that iSIGHT didn’t have deals with just PayPal either. Skype is also a client of the online private eye, and they reached out to the chat company for assistance. Normally the court would enter the equation here and write out a warrant to try and track down that information, but the initial report by Brenno de Winter of Nu.nl reveals that investigators skipped that step. According to English-language transcription of Winter’s account, “the police file notes that Skype handed over the suspect's personal information, such as his user name, real name, e-mail addresses and the home address used for payment.” While that in it of itself isn’t all that unusual, Winter writes that Skype sent over that information voluntarily,“without a court order, as would usually be required.” Joep Gommers, the senior director of global research from iSIGHT, defended the action to Winter, admitting, "On occasion, we share our research findings with relevant law enforcement parties as a public service, just as you would report what appeared to be a crime that you witnessed in your neighborhood.” In emails obtained by Winter, Gommers bragged of his findings to Dutch authorities, writing after he first received assistance from Skype, "Hey, I will have login information soon – but not yet." Skype doesn’t stand by the move, though, and says any virtual handshake between one of their staffers and iSIGHT doesn’t fit with the company’s practices when it terms to protecting private user info. “It is our policy not to provide customer data unless we are served with valid request from legal authorities, or when legally required to do so, or in the event of a threat to physical safety,” Skype said in a statement to Nu.nl. Commenting to Slate, a representative for the chat service noted that it has worked with iSIGHT in the past to “combat spam and malware,” but acknowledged “it appears that some information may have been inappropriately passed on to Dutch authorities without our knowledge.” more |
RT Everyone in US under virtual surveillance |
'Everyone in US under virtual surveillance' - NSA whistleblower Get short URL email story to a friend print version Published: 04 December, 2012, 18:01 TAGS: Crime, Interview, Human rights, Internet,Information Technology,Gayane Chichakyan, FBI, Court, Hacking Screenshot from YouTube user RussiaToday (96.8Mb)embed video The FBI has the e-mails of nearly all US citizens, including congressional members, according to NSA whistleblower William Binney. Speaking to RT he warned that the government can use information against anyone it wants. One of the best mathematicians and code breakers in NSA history resigned in 2001 because he no longer wanted to be associated with alleged violations of the constitution. He asserts, that the FBI has access to this data due to a powerful device Naris. This year Binney received the Callaway award. The annual award was established to recognize those, who stand out for constitutional rights and American values at great risk to their personal or professional lives. RT: In light of the Petraeus/Allen scandal while the public is so focused on the details of their family drama one may argue that the real scandal in this whole story is the power, the reach of the surveillance state. I mean if we take General Allen – thousands of his personal e-mails have been sifted through private correspondence. It’s not like any of those men was planning an attack on America. Does the scandal prove the notion that there is no such thing as privacy in a surveillance state? William Binney: Yes, that’s what I’ve been basically saying for quite some time, is that the FBI has access to the data collected, which is basically the e-mails of virtually everybody in the country. And the FBI has access to it. All the congressional members are on the surveillance too, no one is excluded. They are all included. So, yes, this can happen to anyone. If they become a target for whatever reason – they are targeted by the government, the government can go in, or the FBI, or other agencies of the government, they can go into their database, pull all that data collected on them over the years, and we analyze it all. So, we have to actively analyze everything they’ve done for the last 10 years at least. RT: And it’s not just about those, who could be planning, who could be a threat to national security, but also those, who could be just… WB: It’s everybody. The Naris device if it takes in the entire line, so it takes in all the data. In fact they advertised they can process the lines at session rates, which means 10 gigabit lines. I forgot the name of the device (it’s not the Naris) – the other one does it at 10 gigabits. That’s why the building Buffdale, because they have to have more storage, because they can’t figure out what’s important, so they are just storing everything there. So, e-mails are going to be stored there for the future, but right now stored in different places around the country. But it is being collected – and the FBI has access to it. RT: You mean it’s being collected in bulk without even requesting providers? WB:Yes. RT: Then what about Google, you know, releasing this biannual transparency report and saying that the government’s demands for personal data is at an all-time high and for all of those requesting the US, Google says they complied with the government’s demands 90% of the time. But they are still saying that they are making the request, it’s not like it’s all being funneled into that storage. What do you say to that? WB: I would assume, that it’s just simply another source for the same data they are already collecting. My line is in declarations in a court about the 18-T facility in San Francisco, that documented the NSA room inside that AST&T facility, where they had Naris devices to collect data off the fiber optic lines inside the United States. So, that’s kind of a powerful device, that would collect everything it was being sent. It could collect on the order over one hundred billion one thousand character e-mails a day. One device. RT: You say they sift through billions of e-mails. I wonder how do they prioritize? How do they filter it? WB: I don’t think they are filtering it. They are just storing it. I think it’s just a matter of selecting when they want it. So, if they want to target you, they would take your attributes, go into that database and pull out all your data. RT: Were you on the target list? WB: Oh, sure! I believe I’ve been on it for quite a few years. So I keep telling them everything I think of them in my e-mail. So that when they want to read it they’ll understand what I think of them. RT: Do you think we all should leave messages for the NSA mail box? WB: Sure! RT: You blew the whistle on the agency when George W. Bush was the President. With President Obama in office, in your opinion, has anything changed at the agency – in the surveillance program? In what direction is this administration moving? WB: The change is it’s getting worse. They are doing more. He is supporting the building of the Buffdale facility, which is over two billion dollars they are spending on storage room for data. That means that they are collecting a lot more now and need more storage for it. That facility by my calculations that I submitted to the court for the electronic frontiers foundation against NSA would hold on the order of 5 zettabytes of data. Just that current storage capacity is being advertised on the web that you can buy. And that’s not talking about what they have in the near future. RT: What are they going to do with all of that? Ok, they are storing something. Why should anybody be concerned? WB: If you ever get on the enemies list, like Petraeus did or… for whatever reason, than you can be drained into that surveillance. RT: Do you think they would… General Petraeus, who was idolized by the same administration? Or General Allen? WB: There are certainly some questions, that have to be asked, like why would they target it (to begin with)? What law were they breaking? RT:In case of General Petraeus one would argue that there could have been security breaches. Something like that. But with General Allen – I don’t quite understand, because when they were looking into his private e-mails to this woman. WB: That’s the whole point. I am not sure what the internal politics is… That’s part of the program. This government doesn’t want things in the public. It’s not a transparent government. Whatever the reason or the motivation was, I don’t really know, but I certainly think, that there was something going on in the background, that made them target those fellows. Otherwise why would they be doing it? There is no crime there. RT: It seems that the public is divided between those, who think that the government surveillance program violates their civil liberties, and those, who say: “I’ve nothing to hide. So, why should I care?” What do you say to those, who think that it shouldnt concern them. WB: The problem is if they think they are not doing anything that’s wrong, they don’t get to define that. The central government does, the central government defines what is right and wrong and whether or not they target you. So, it’s not up to the individuals. Even if they think they are doing something wrong, if their position on something is against what the administration has, then they could easily become a target. RT: Tell me about the most outrageous thing that you came across during your work at the NSA. WB: The violations of the constitution and any number of laws that existed at the time. That was the part that I could not be associated with. That’s why I left. They were building social networks on who is communicating and with whom inside this country. So that the entire social network of everybody, of every US citizen was being compiled overtime. So, they are taking from one company alone roughly 320 million records a day. That’s probably accumulated probably close to 20 trillion over the years. The original program that we put together to handle this to be able to identify terrorists anywhere in the world and alert anyone that they were in jeopardy. We would have been able to do that by encrypting everybody’s communications except those, who were targets. So, in essence you would protect their identities and the information about them until you could develop probable cause, and once you showed your probable cause, then you could do a decrypt and target them. And we could do that and isolate those people all alone. It wasn’t a problem at all. There was no difficulty in that. RT: It sounds very difficult and very complicated. Easier to take everything in and… WB: No. It’s easier to use the graphing techniques, if you will, for the relationships for the world to filter out data, so that you don’t have to handle all that data. And it doesn’t burden you with a lot more information to look at, than you really need to solve the problem. RT: Do you think that the agency doesn’t have the filters now? WB: No. RT: You have received the Callaway award for civic courage. Congratulations! On the website and in the press release it says: “It is awarded to those, who stand out for constitutional rights and American values at great risk to their personal or professional lives.” Under the code of spy ethics (I don’t know if there is such a thing) your former colleagues, they probably look upon you as a traitor. How do you look back at them? WB: That’s pretty easy. They are violating the foundation of this entire country. Why this entire government was formed? It’s founded with the constitution and the rights were given to the people in the country under that constitution. They are in violation of that. And under executive order 13526, section 1.7 (governing classification) – you can not classify information to just cover up a crime, which this is- and that was signed by President Obama. Also President Bush signed it earlier executive order, a very similar one. If any of this comes into Supreme court and they rule it unconstitutional, then the entire house of cards of the government falls. RT: What are the chances of that? What are the odds? WB: The government is doing the best they can to try to keep it out of court. And, of course, we are trying to do the best we can to get into court. So, we decided it deserves a ruling from the Supreme court. Ultimately the court is supposed to protect the constitution. All these people in the government take an oath to defend the constitution. And they are not living up to the oath of office. RT: Thank you for this interview. WB: You are welcome. |
WMR Senate delivers fatal end-of-term blow to Constitution ... Texas Republican Representative Lamar Smith's House Resolution 5949, the FISA Amendments Reauthorization Act of 2012. |
December 28-31, 2012 -- Senate delivers fatal end-of-term blow to Constitution In one of the final acts of the 112th Congress, the U.S. Senate dealt a fatal blow to the U.S. Constitution by passing President Obama's National Defense Authorization Act for 2013, which contains the same illegal detention of U.S. citizens as its 2012 predecessor, and defeating amendments to and enacting Texas Republican Representative Lamar Smith's House Resolution 5949, the FISA Amendments Reauthorization Act of 2012. HR 5949 keeps the warrantless surveillance authority imposed by the Bush-Cheney administration under the FISA Amendments Act of 2008 -- the National Security Agency's operation STELLAR WIND -- in place. With the Obama administration forcing through the reauthorization of STELLAR WIND, illegal wiretapping by NSA of American citizens' phone calls, emails, faxes, telexes, social networking instant messages (IMs) and short message services (SMSs), Voice-Over-IP (VOIP), and files contained in cloud storage can now be called Obama's illegal surveillance program. Obama was required by NSA to seek STELLAR WIND's reauthorization because NSA requires congressional cover for the launching of the most massive eavesdropping and storage program in the history of the world. NSA will soon be storing every form of electronic communication sent and received by U.S. citizens at its $1.5 billion Utah Data Center located within the Camp Williams Utah National Guard base near Bluffdale, Utah. The NSA will be combining its signals intelligence functions as NSA/Central Security Service with its computer intelligence and information functions as part of its U.S. Cyber Command responsibilities under the aegis of a program known as the Community Comprehensive National Cybersecurity Initiative Data Center that will deploy the NSA's follow-on to its follow-on to its post-9/11 data mining program, the Novel Intelligence from Massive Data (NIMD). With its new powers granted by Congress, NSA has become the most intrusive intelligence agency in the world today. A few senators attempted to seek amendments to the HR 5949, but no no avail. A substitution to the House bill offered by Senator Patrick Leahy (D-VT) and the Senate President pro tem, failed with a vote of 38 for to 52 against with 10 not voting. Other amendments introduced by Senators Ran Paul (R-KY), Jeff Merkley (D-OR), and Ron Wyden (D-OR) were rejected by the Senate. The Paul amendment would have ensured that Fourth Amendments rights were protected under the re-authorization, Merkley's amendment would have required the Attorney General to disclose Foreign Intelligence Surveillance Court significant interpretations of the eavesdropping statute, and the Wyden amendment would have required an privacy impact report on the effects of the act. The Democratic ringmaster for the "No" votes on the amendments was Senate Intelligence Committee Chair Dianne Feinstein (D-CA). Also voting no were the "senator from NSA" Barbara Mikulski (D-MD), Claire McCaskill (D-MO), the senator from the CIA and co-founder of Capital Cellular Corporation and major investor in NEXTEL Mark Warner (D-VA),* the Bilderberg man Jay Rockefeller (D-WV)♣, Kay Hagan (D-NC), Secretary of State-select John Kerry (D-MA), Mary Landrieu (D-LA), and the outgoing Ben Nelson (D-NE). Paul's "motherhood" amendment on Fourth Amendment protections only received the support of Max Baucus (D-MT), Mark Begich (D-AK), Maria Cantwell (D-WA), Dean Heller (R-NV), Mike Lee (R-UT), Debbie Stabenow (D-MI), Jon Tester (D-MT), Tom Udall (D-NM), Jim Webb (R-VA), and Wyden. In the end, STELLAR WIND reauthorization passed the Senate with a vote of 73 for, 23 against, and 4 not voting. Three of the 23 no votes were Republicans: Lee, Paul, and Lisa Murkowski of Alaska. Among the Democrats voting no were Leahy, newly-appointed Brian Schatz (D-HI), both senators from Oregon, New Mexico, Montana, Vermont, and Washington, and Mark Begich (AK), Sherrod Brown (OH), Dick Durbin (D-IL), Chris Coons (DE), Al Franken (MN), Bob Menendez (NJ), Mark Udall (CO), Dan Akaka (HI),and Tom Harkin (IA). The Congress folded like a two-dollar suitcase in giving NSA congressional cover to begin amassing a yottabyte of personal data at its Utah Data Center. A yottabyte is one septillion bytes of data. The NSA will sweep and store in Utah AT&T's DAYTONA database of caller information, itself one of the world's largest databases, and the firm's 312 terabyte HAWKEYE database, containing every domestic telephone communication from 2001. A large Microsoft facility that handles 10 billion Hotmail messages per day and located near NSA Texas in San Antonio, will feed its take directly into the Utah center. All the signals intelligence (SIGINT) intercepts from NSA and its second, third, and fourth party intelligence sharing partners around the world and contained in the massive OCEANARIUM SIGINT database, which is associated with a central repository of phone number database called ANCHORY/MAUI, will also be stored in Utah. Smaller SIGINT databases called CULTWEAVE and PROTON will also feed into the monster system in Utah. The CREST database automatically translates foreign language intercepts and provides the data to operators in English. The AGILITY database, which stores intercepted voice communications, and PINWALE, which contains intercepted faxes and e-mail, will also be stored in Utah. Another voice intercept database called NUCLEON will also be streamed into the Utah Data Center. A high-capacity/high-speed vacuum cleaner once called SHARKFIN and renamed RC-10, sweeps up all-source communications intelligence (COMINT) from a variety of communication methods and systems. SIGINT analysis tools like PATHFINDER allow operators to drill down on surveillance targets. Exchange of data for human operators is handled by automated message handling systems such as one codenamed MESSIAH. SIGINT targeting and reporting systems called SKYWRITER, SEMESTER, and There is one NSA system with the cover name FASCIA that is hauntingly close in name to the word "fasces," the root word for fascism. Under the UK-USA agreement that for over 65 years has seen the sharing of intercepted civilian communications between "First Party" NSA (OSCAR), and "Second Parties" -- Britain's Government Communications Headquarters (GCHQ) (ALPHA), Canada's Communications Security Establishment (CSE) (UNIFORM), Australia's Defense Signals Directorate (DSD) (ECHO), and New Zealand's Government Communications Security Bureau (GCSB) (INDIA) -- the allied SIGINT partners have moved into stored data surveillance, including financial information, consumer profiling data, and stored personal computer files. All these agencies will have their hooks into the Utah Data Center and the privacy of Americans' personal data will be routinely violated by foreign intelligence operators on duty in Cheltenham, England; Leitrim, Ontario; Waihopi, New Zealand; and Geraldton and Canberra, Australia. But access to the most private data of Americans will note merely be accessible to the English-speaking First and Second Parties. It has been revealed that during the Cold War and its aftermath the First and Second Parties also shared intelligence between themselves and non-English speaking "Third Parties." Such intelligence was classified with the designator DRUID and was shared with third parties, countries with NATO or defense treaty relationships with the United States, with SIGINT Exchange Designators of DIKTER (Norway), SETTEE (South Korea), DYNAMO (Denmark), RICHTER (Germany), and ISHTAR (Japan). Other intelligence was shared between First and Second Parties and "Fourth Parties" that were mainly neutral or special category partners. Such Fourth Party intelligence partners had sharing designators like JAEGER (Austria). Other SIGINT Exchange Designators with Third and Fourth Parties were ARCA, FRONTO, NECTAR, SARDINE, KAMPUS, PROTEIN, SEABOOT, DIVERSITY, KEYRUT, PYLON, MUSKET, RORIPA, and THESPIS. These designators covered the sharing of SIGINT with such nations as France, Thailand, Sweden, the Netherlands, Switzerland, Finland, Turkey, the People's Republic of China, Spain, Portugal, and Italy. There is every indication that these SIGINT agreements continue and now extend to stored data -- phone calls and Internet transactions -- in addition to real-time intercepts. In what should be of concern to every American, Canadian, Briton, Dane, Norwegian, Japanese, Italian, and others, intelligence operators sitting in data fusion centers in Paris (Alliance Base where French, British, German, Canadian, and Australian intelligence analysts comb through databases containing massive amounts of personal data); Cheltenham; Fort Meade, Maryland; the new $1 billion NSA Middle East and North Africa intercept and analysis facility, codenamed SWEET TEA, near Leburda, Georgia; Buckley Air Force Base, Colorado; Canberra; Ottawa; Kunia Camp, Oahu; and the Utah Data Center will be to call up electronic dossiers on everyone with a digital footprint anywhere in the world without regard to national boundaries, court oversight, or data protection and privacy laws. ------------- * It was a technical adviser to then Virginia Governor Mark Warner who revealed that Warner urged his staff to engage in cell phone "batteries out" conversations when they were talking about sensitive topics. Warner's support for STELLAR WIND powers and his past knowledge of NSA's capabilities to use cell phones turned off but with batteries still installed indicates that he was in on, and may have even profited from, NSA's cellular phone technical capabilities. ♣ NSA director and Cyber Command chief General Keith Alexander has attended the last few Bilderberg meetings. |
WMR July 30-31. 2015 -- NSA requested warrantless wiretapping in February 2001 Officials of the National Security Agency requested warrantless wiretapping from the chairman of the President's National Security Telecommunications Advisory Council (NSTAC) at a meeting at NSA headquarters on February 27, 2001, seven months before the 9/11 attack. This stunning revelation was made by the former NSTAC chairman, Joseph Nacchio, who cited court documents from the government's retaliatory 2005 case against him for insider trading. Nacchio made his remarks at a Newsmaker press conference at the National Press Club on July 29. In response to NSA's request, Nacchio asked the agency representatives if they had a Foreign Intelligence Surveillance Court warrant. The reply was no. Nacchio then asked them if they had presidential executive authority. The answer was again no. Although Nacchio also served as chairman and CEO of Qwest Communications, his refusal to provide NSA with warrantless wiretapping of Qwest lines was made more significant in his role as NSTAC chairman. Other NSTAC members quickly followed suit in rejecting NSA's request. They included AT&T, SBC Communications, Sprint, Bell South, Verizon, WorldCom, and others. The Bush administration retaliated against Nacchio by indicting him for insider trading in 2005, five days before the expiration of the statute of limitations. Rather than try Nacchio in the Southern District of New York, where the alleged trades were made, or the Northern District of New Jersey, where Nacchio resided, the Department of Justice went judge shopping and decided to indict in Denver, the location of Qwest's corporate headquarters. George Nottingham, the judge chosen was in a blackmailable position. Joseph Nacchio at National Press Club. Nacchio is the former CEO of Qwest who refused NSA request to spy on Americans. [Photo courtesy of Noel St. John] After trying Nacchio, Nottingham resigned after he was accused of obstruction of justice involving prostitutes and strippers. It was clear that NSA, which operates a large signals intelligence processing center in Aurora, near Denver, was aware that Nottingham had personal problems that could be exploited by Justice Department prosecutors. And that is exactly what happened when Nottingham disallowed Nacchio's defense team's evidence of NSA's attempt to get Nacchio to break the law in 2001 by permitting unlawful intercepts. The NSA wanted to make Nacchio an example for all the other telecommunications CEOs. As a result, the Bush administration discovered that its warrantless program code named STELLAR WIND had the full support of the CEOs who fell in line after 9/11. An unnamed U.S. intelligence agency also requested Nacchio to have Qwest's European subsidiary hire certain employees for unspecified purposes. As a result of Edward Snowden's revelations, it is now known that NSA's and its British counterpart's Operation SOCIALIST, implanted engineers into Belgacom's switches in Brussels to conduct illegal wiretapping. Bacchio served six years at the federal penitentiary in Schuykill, Pennsylvania. He was released in 2013. Nacchio maintains his innocence and says that he was selected for prosecution by a Justice Department willing to retaliate for his refusal to follow NSA's orders. Nacchio also cited court records showing that he was lured to NSA in February 2001 to supposedly meet with General Michael Hayden, NSA's director. Hayden never showed for the meeting as it was a ruse to get Nacchio into one of NSA's top secret rooms called a SCIF.The meeting started out with a conversations about GROUNDBREAKER, a new signals intelligence infrastructure, which, along with TRAILBLAZER, were major pet projects of Hayden. Both systems also disregarded the U,S, Constitution and NSA's own regulations against eavesdropping on U.S. citizens. NSA insiders charged Hayden with his own "insider trading" by awarding lucrative contracts to his favorite firm, SAIC, in return for a cushy job after his retirement from the Air Force. Hayden is now a business partner of Michael Chertoff, the former Homeland Security Secretary. Nacchio criticized the government's prosecutori regime. He said that 98 percent of all federal indictments are plea bargained out.Of the two percent that go to trial, the governmrent has a 95 percent win rate, which is greater than those of the USSR and Nazi Germany. |
H.R. 3200/Division C/Title V/Subtitle C Implantable Device |
H.R. 3200/Division C/Title V/Subtitle C |
Wired Darpa Wants You to Transcribe, and Instantly Recall, All of Your Conversations |
BY ROBERT
BECKHUSEN |
FT.com Unit 8200: Israel’s cyber spy agency |
Unit 8200 Cyber Spy ... or shmone matayim as it’s called in Hebrew, is the equivalent of America’s National Security Agency and the largest single military unit in the Israel Defence Forces....a group of 43 serving and former 8200 reservists revealed what they said were coercive spying tactics being used on innocent Palestinians, including the collection of embarrassing sexual, financial or other information. One of the ![]() |
WMR/Strategic-Culture Five Eyes and Color Revolutions |
|||
|
Interactive 9/11, JFK & Holocaust Spreadsheet | |||||
|
Trump / Clinton 9/11 Truth Timeline |
Nazi Era Timeline |
Google Analytics |