Home » Posts tagged 'nsa' (Page 6)

Tag Archives: nsa

Olduvai
Click on image to purchase

Olduvai III: Catacylsm
Click on image to purchase

Post categories

Post Archives by Category

Trump Administration Lobbying Hard for Sweeping Surveillance Law

Admiral Mike Rogers, Director of the National Security Agency (NSA), testifies about the Fiscal Year 2018 budget request for US Cyber Command during a House Armed Services Committee hearing on Capitol Hill in Washington, DC, May 23, 2017. / AFP PHOTO / SAUL LOEB        (Photo credit should read SAUL LOEB/AFP/Getty Images)
Photo: Saul Loeb/AFP/Getty Images

THE TRUMP ADMINISTRATION is pushing hard for the reauthorization of a key 2008 surveillance law — section 702 of the Foreign Intelligence Surveillance Act, known as FISA — three months before it sunsets in December.

To persuade senators to reauthorize the law in full, the Trump administration is holding classified, members-only briefings for the entire House and Senate next Wednesday, with heavy hitters in attendance: Attorney General Jeff Sessions, Director of National Intelligence Dan Coats, NSA Director Mike Rogers, and FBI Director Christopher Wray will give the briefings, according to an internal announcement of the meetings provided to The Intercept and confirmed by multiple sources on Capitol Hill.

Section 702 serves as the legal basis for two of the NSA’s largest mass surveillance programs, both revealed by Edward Snowden. One program, PRISM, allows the government to collect messaging data sent to and from foreign targets, from major internet companies like Google, Facebook, Apple, and Microsoft. The other, UPSTREAM, scans internet backbone sites in the U.S. and copies communications to and from foreign targets.

Both programs ostensibly only “target” foreigners, but likely collect massive amounts of Americans’ communications as well. And despite persistent questioning from members of Congress, the Obama and Trump administrations have repeatedly refused to provide an estimate of how many domestic communications the programs collect. Civil liberties advocates have long warned liberal defenders of the program under President Obama that one day the surveillance apparatus may fall into the hands of a president with little regard for rule of law or constitutional protections.

Privacy activists have also raised concerns about how the data is shared with law enforcement, and routinely used for purposes unrelated to national security. The FBI frequently conducts “backdoor searches” on the data during ordinary criminal investigations, which allows them access to Americans’ communications without having to get a warrant.

…click on the above link to read the rest of the article…

How the NSA Built a Secret Surveillance Network for Ethiopia

Photo: Minasse Wondimu Hailu/Anadolu Agency/Getty Images

“A WARM FRIENDSHIP connects the Ethiopian and American people,” U.S. Secretary of State Rex Tillerson announced earlier this year. “We remain committed to working with Ethiopia to foster liberty, democracy, economic growth, protection of human rights, and the rule of law.”

Indeed, the website for the U.S. Embassy in Ethiopia is marked by press releases touting U.S. aid for farmers and support for public health infrastructure in that East African nation. “Ethiopia remains among the most effective development partners, particularly in the areas of health care, education, and food security,” says the State Department.

Behind the scenes, however, Ethiopia and the U.S. are bound together by long-standing relationships built on far more than dairy processing equipment or health centers to treat people with HIV. Fifteen years ago, the U.S. began setting up very different centers, filled with technology that is not normally associated with the protection of human rights.

In the aftermath of 9/11, according to classified U.S. documents published Wednesday by The Intercept, the National Security Agency forged a relationship with the Ethiopian government that has expanded exponentially over the years. What began as one small facility soon grew into a network of clandestine eavesdropping outposts designed to listen in on the communications of Ethiopians and their neighbors across the Horn of Africa in the name of counterterrorism.

In exchange for local knowledge and an advantageous location, the NSA provided the East African nation with technology and training integral to electronic surveillance. “Ethiopia’s position provides the partnership unique access to the targets,” a commander of the U.S. spying operation wrote in a classified 2005 report. (The report is one of 294 internal NSA newsletters released today by The Intercept.)

…click on the above link to read the rest of the article…

Bill in Congress to Fund CIA & NSA Outlaws Wikileaks

Bill in Congress to Fund CIA & NSA Outlaws Wikileaks

Bill in Congress to Fund CIA & NSA Outlaws Wikileaks

The bill in Congress to fund US intelligence services includes a provision, Sec. 623, which states:

SEC. 623. SENSE OF CONGRESS ON WIKILEAKS.

It is the sense of Congress that WikiLeaks and the senior leadership of WikiLeaks resemble a non-state hostile intelligence service often abetted by state actors and should be treated as such a service by the United States.

In other words: if this bill passes, Wikileaks will be categorized by US Intelligence in the same way as will the intelligence services of Russia, Iran, Syria, North Korea, and other countries that the US Government wants to conquer. (Whereas the Cold War ended in 1991 on the Russian side, it secretly has continued on the American side.) Cooperation with Wikileaks would then be treated by the US Government as treachery, the same as cooperation with Soviet intelligence was treated when the Republican Joseph R. McCarthy (backed by the Democratic Party’s Kennedy family) held sway over the US Senate, from 9 February 1950 to 9 March 1954. Though this was the situation during the Cold War (prior to its having been ended by Russia in 1991), the time when there existed an authentic ideological reason for the US Establishment’s opposition to the Soviet Union’s ruling Establishment (and when there existed not only the ongoing thirst for conquest of the entire world by the US aristocracy), America’s Establishment (the aristocracy and its agents) is trying to restore that hostility now, 26 years after 1991, which was the year when the Soviet Union broke up, and after which, only Russia remained, and when communism had ended, and when the Soviet Union’s military alliance with the Soviet Union’s surrounding nations, the Warsaw Pact (mirroring America’s NATO), also ended — all of that happening in 1991.

…click on the above link to read the rest of the article…

The United States of Hubris

The United States of Hubris

If anyone should have any questions about whether the United States of America is not the most aggressive, warlike, and terroristic nation on the face of the earth, its latest proposed action against the supposed rogue state of North Korea should allay any such doubts.

Last week, the US circulated a draft resolution which it intends to present to the UN Security Council that would give the American Navy and Air Force the power to interdict North Korean ships at sea to determine if they were transporting “weaponry material” or fuel and that US forces would be given “the right” to use “all necessary measures” to “enforce compliance.”*

Not surprisingly, Nikky Haley, the blood-thirsty and incompetent American Ambassador to the UN, has enthusiastically backed the resolution, utterly clueless of its ramifications if passed, the most horrific of which would be the igniting of WWIII.  Trump’s selection of the neocon mouthpiece as UN Ambassador has been a disaster on several fronts: first, it was an early and quite telling sell out of his political base whom he promised an American First foreign policy of less belligerency and intervention.  Second, Haley had no foreign policy experience and has made a fool of herself internationally on more than one occasion with her inane statements.

That the US is even considering such a provocative scheme once again shows the hubris which exists within its vast corridors of power.  Any other country which would suggest such an audacious act would be rightly condemned, ostracized, and labeled as a rogue state.  Yet, it is US lawmakers, policy wonks, and the CIA/NSA-directed American press corps that charge others (mostly those who do not kowtow to US dictates) of “terrorism.”

…click on the above link to read the rest of the article…

Your Bitcoin is NOT Anonymous: IRS Moves To Track Bitcoiners With New Chain Analysis Tools

Your Bitcoin is NOT Anonymous: IRS Moves To Track Bitcoiners With New Chain Analysis Tools

bitcoin-2

Last month Alt-Market.com founder Brandon Smith warned that Bitcoin may not be all that it’s cracked up to be in terms of its purported anonymity:

For years, one of the major original selling points of bitcoin was that it was “anonymous.” It always surprised me that so many people in the liberty movement bought into this scam. Surely after the revelations exposed by Edward Snowden and organizations like Wikileaks, it is utterly foolish to believe that anything in the digital world is truly “anonymous.” The feds have been proving there is no anonymity, even in bitcoin, for some time, as multiple arrests using bitcoin tracking have indeed occurred when the FBI decided it was in their interest. Meaning, when the feds want to track bitcoin transactions, they can, and it does not matter how well the people involved covered their actions.

Because every transaction exists on a public blockchain ledger, an enterprising organization – say like the NSA or IRS – could conceivably implement blockchain analysis tools to track down Bitcoin fund transfers around the globe. These days most bitcoin transactions are originated on “trusted” exchanges that exist in Western nations, where governments have always found new and innovative ways to ensure citizens have no privacy whatsoever, especially when it comes to personal finances. This means that there is more than likely a record of your original Bitcoin transaction, perhaps involving a credit card or bank transfer, and if regulators ask an exchange to turn over the information you can bet they’ll do so in order to avoid unwanted government scrutiny. Moreover, most exchanges now require a driver’s license, passport and even a phone number in order to approve your account for trading.

…click on the above link to read the rest of the article…

How many Americans are swept up in the NSA’s snooping programs?

How many Americans are swept up in the NSA’s snooping programs?

How many Americans are swept up in the NSA's snooping programs?
© Getty Images

Former Director of National Intelligence James Clapper famously (or infamously) told Congress the National Security Agency did not “wittingly” collect data on Americans. That turned out to be false.

More recently, Sen. Ron Wyden (D-Ore.) asked the current director of national intelligence, Dan Coats whether the government could use Section 702 of the Foreign Intelligence Surveillance Act “to collect communications it knows are entirely domestic.”

“Not to my knowledge. That would be illegal,” Coats responded.

However, a subsequent letter from Coats’ office to Wyden’s office suggests the director’s answer was incomplete. The Office of the Director of National Intelligence clarified that “section 702(b)(4) plainly states we ‘may not intentionally acquire any communication as to which the sender and all intended recipients are known at the time of acquisition to be located in the United States.’ The DNI interpreted Senator Wyden’s question to ask about this provision and answered accordingly.”

Wyden has since gone on record with his contention that the DNI did not answer his question, requesting the office provide a public response. The exchange offers insight into how intelligence agencies use semantics to obfuscate their activities, while also illustrating the frustration many privacy advocates and lawmakers encounter in the search for Section 702 surveillance transparency.

FISA Section 702 authorizes two major NSA snooping programs. One is “upstream” collection, a process in which the NSA collects digital communications through the internet’s backbone — undersea cables that process large volumes of internet traffic, which internet service providers send to the government. The government attempts to sort the data for foreign targets’ information and then is supposed to discard the rest.

…click on the above link to read the rest of the article…

EXCLUSIVE: Documents expose how Hollywood promotes war on behalf of the Pentagon, CIA and NSA

EXCLUSIVE: Documents expose how Hollywood promotes war on behalf of the Pentagon, CIA and NSA

US military intelligence agencies have influenced over 1,800 movies and TV shows

Plato’s Cave reimagined for the Hollywood era — copyright Derek Swansonn

Tom Secker and Matthew Alford report on their astonishing findings from trawling through thousands of new US military and intelligence documents obtained under the Freedom of Information Act.

The documents reveal for the first time the vast scale of US government control in Hollywood, including the ability to manipulate scripts or even prevent films too critical of the Pentagon from being made — not to mention influencing some of the most popular film franchises in recent years.

This raises new questions not only about the way censorship works in the modern entertainment industry, but also about Hollywood’s little known role as a propaganda machine for the US national security apparatus.


When we first looked at the relationship between politics, film and television at the turn of the 21st century, we accepted the consensus opinion that a small office at the Pentagon had, on request, assisted the production of around 200 movies throughout the history of modern media, with minimal input on the scripts.

How ignorant we were.

More appropriately, how misled we had been.

We have recently acquired 4,000 new pages of documents from the Pentagon and CIA through the Freedom of Information Act. For us, these documents were the final nail in the coffin.

These documents for the first time demonstrate that the US government has worked behind the scenes on over 800 major movies and more than 1,000 TV titles.

The previous best estimate, in a dry academic book way back in 2005, was that the Pentagon had worked on less than 600 films and an unspecified handful of television shows.

…click on the above link to read the rest of the article…

The Age of No Privacy: The Surveillance State Shifts Into High Gear [SHORT]

The Age of No Privacy: The Surveillance State Shifts Into High Gear [SHORT]

“We are rapidly entering the age of no privacy, where everyone is open to surveillance at all times; where there are no secrets from government.” ― William O. Douglas, Supreme Court Justice (1966)

The government has become an expert in finding ways to sidestep what it considers “inconvenient laws” aimed at ensuring accountability and thereby bringing about government transparency and protecting citizen privacy.

Indeed, it has mastered the art of stealth maneuvers and end-runs around the Constitution.

It knows all too well how to hide its nefarious, covert, clandestine activities behind the classified language of national security and terrorism. And when that doesn’t suffice, it obfuscates, complicates, stymies or just plain bamboozles the public into remaining in the dark.

Case in point: the National Security Agency (NSA) has been diverting “internet traffic, normally safeguarded by constitutional protections, overseas in order to conduct unrestrained data collection on Americans.”

It’s extraordinary rendition all over again, only this time it’s surveillance instead of torture being outsourced.

In much the same way that the government moved its torture programs overseas in order to bypass legal prohibitions against doing so on American soil, it is doing the same thing for its surveillance programs.

By shifting its data storage, collection and surveillance activities outside of the country—a tactic referred to as “traffic shaping” —the government is able to bypass constitutional protections against unwarranted searches of Americans’ emails, documents, social networking data, and other cloud-stored data.

The government, however, doesn’t even need to move its programs overseas. It just has to push the data over the border in order to “[circumvent] constitutional and statutory safeguards seeking to protect the privacy of Americans.”

…click on the above link to read the rest of the article…

Edward Snowden Asks Ron Paul If Intelligence Reports Ever Swayed His Vote

Edward Snowden Asks Ron Paul If Intelligence Reports Ever Swayed His Vote

During an appearance on the Liberty Report last week, Dr. Ron Paul interviewed former NSA contractor Edward Snowden about the rise of the Deep State and how intelligence agencies are threatening Americans’ freedom. But in the closing moments of that interview, Snowden surprised Paul with an unexpected request:

“I was thinking I could ask you a question Dr. Paul, again about the intelligence stuff…I think it’d be interesting to people and I don’t think we’ve ever heard it from your perspective…”

As a former intelligence analyst and operative, Snowden wondered how well the intelligence community had performed in its mission to keep US policymakers informed on important world events, given that Paul had for more than two decades been a “consumer” of the intelligence community’s products.

“In the intelligence community at the working level, not the policy level, everyone is taught that the work that they do is to inform policy makers…to understand what the facts are so they can make the best decisions.”

“You were in Congress for an extraordinary time…and one question I’ve always wondered is during all your time in Congress, how many times did the intelligence community provide some reports that they briefed to you…and the material was so impactful…so valuable that they’d been breaking all these laws to get it…how many times did it impact your vote?”

Paul’s response? Not once.

Paul says he was almost never provided with unadulterated intelligence reports, and on the one occasion when he attended a briefing with the intelligence agencies, the information more closely resembled propaganda than credible intelligence.

…click on the above link to read the rest of the article…

Cyberattacks & the Vulnerability of a Cashless Society

QUESTION: Cyberattacks vs. Cash elimination – an argument against eliminating cash. Hello Mr. Armstrong, it is quite apparent that no government, no financial institution, Anti-virus software developer, or either ‘whatever’ is is really capable to stop cyberattacks. Now these people want to eliminate cash, make larger cash amounts illegal. So theoretically these cyber attackers could/ maybe will, eventually just stop the whole economy. Nobody may even be able to buy food. So instead of eliminating cash, should it not be policy people carry at least a month’s worth of expenses in cash? Your reply should be quite interesting to us, your readership!

Best,

AP

ANSWER: The WannaCry ransom attack is actually variant from a February 2015 sample attributed to the Lazarus Group, a Kaspersky-tracked actor tied to the North Korean government. Parts of the code go beyond shared code. It appears to be written by the same programmer.

Let’s get something straight here. At the core of those responsible is really the NSA and Microsoft itself. The attack exploited a Windows networking protocol to spread within networks, and while Microsoft released a patch nearly two months ago, it’s become very clear that patch didn’t reach all users particularly because institutions often do not install patches fearing that proprietary software may not function.

If behind the curtain we have government demanding back-doors into iPhones and computer so they can listen to everything everywhere, well guess what – so can everyone else. Patches will work for individual users, but not major institutions. Trying to upgrade their operations is a real effort. They are slow to act and thus vulnerable.

…click on the above link to read the rest of the article…

24 Hours Later: “Unprecedented” Fallout From “Biggest Ransomware Attack In History”

24 Hours Later: “Unprecedented” Fallout From “Biggest Ransomware Attack In History”

24 hours after it first emerged, it has been called the first global, coordinated ransomware attack using hacking tools developed by the NSA, crippling over a dozen hospitals across the UK, mass transit around Europe, car factories in France and the UK, universities in China, corporations in the US, banks in Russia and countless other mission-critical businesses and infrastructure.

According to experts, “this could be one of the worst-ever recorded attacks of its kind.” The security researcher who tweets and blogs as MalwareTech told The Intercept, “I’ve never seen anything like this with ransomware,” and “the last worm of this degree I can remember is Conficker.” Conficker was a notorious Windows worm first spotted in 2008; it went on to infect over 9 million computers in nearly 200 countries.

The fallout, according to cyber-specialists, has been “unprecedented”: it has left unprepared governments, companies and security experts from China to the United Kingdom on Saturday reeling, and racing to contain the damage from the audacious cyberattack that spread quickly across the globe, raising fears that people would not be able to meet ransom demands before their data are destroyed.

As reported yesterday, the global efforts come less than a day after malicious software, transmitted via email and stolen from the National Security Agency, exposed vulnerabilities in computer systems in almost 100 countries in one of the largest “ransomware” attacks on record. The cyberattackers took over the computers, encrypted the information on them and then demanded payment of $300 or more from users in the form of bitcoin to unlock the devices.

The ransomware was subsequently identified as a new variant of “WannaCry” that had the ability to automatically spread across large networks by exploiting a known bug in Microsoft’s Windows operating system.

…click on the above link to read the rest of the article…

“Worst-Ever Recorded” Ransomware Attack Strikes Over 57,000 Users Worldwide, Using NSA-Leaked Tools

“Worst-Ever Recorded” Ransomware Attack Strikes Over 57,000 Users Worldwide, Using NSA-Leaked Tools

The ransomware has been identifed as WannaCry

* * *

Update 4: According to experts tracking and analyzing the worm and its spread, this could be one of the worst-ever recorded attacks of its kind. The security researcher who tweets and blogs as MalwareTech told The Intercept “I’ve never seen anything like this with ransomware,” and “the last worm of this degree I can remember is Conficker.” Conficker was a notorious Windows worm first spotted in 2008; it went on to infect over nine million computers in nearly 200 countries. As The Intercept details,

Today’s WannaCry attack appears to use an NSA exploit codenamed ETERNALBLUE, a software weapon that would have allowed the spy agency’s hackers to break into any of millions of Windows computers by exploiting a flaw in how certain version of Windows implemented a network protocol commonly used to share files and to print. Even though Microsoft fixed the ETERNALBLUE vulnerability in a March software update, the safety provided there relied on computer users keeping their systems current with the most recent updates. Clearly, as has always been the case, many people (including in governments) are not installing updates. Before, there would have been some solace in knowing that only enemies of the NSA would have to fear having ETERNALBLUE used against them–but from the moment the agency lost control of its own exploit last summer, there’s been no such assurance.

Today shows exactly what’s at stake when government hackers can’t keep their virtual weapons locked up.

As security researcher Matthew Hickey, who tracked the leaked NSA tools last month, put it, “I am actually surprised that a weaponized malware of this nature didn’t spread sooner.”

Update 3: Microsoft  has issued a statement, confirming the status the vulnerability:

Today our engineers added detection and protection against new malicious software known as Ransom:Win32.WannaCrypt.

…click on the above link to read the rest of the article…

President Obama’s team sought NSA intel on thousands of Americans during the 2016 election

WATCH | The Obama administration distributed thousands of intelligence reports with the  unredacted names of U.S. residents during the 2016 election.

The revelations are particularly sensitive since the NSA is legally forbidden from directly spying on Americans and its authority to conduct warrantless searches on foreigners is up for renewal in Congress later this year. And it comes as lawmakers investigate President Trump’s own claims that his privacy was violated by his predecessor during the 2016 election.

In all, government officials conducted 30,355 searches in 2016 seeking information about Americans in NSA intercept metadata, which include telephone numbers and email addresses. The activity amounted to a 27.5 percent increase over the prior year and more than triple the 9,500 such searches that occurred in 2013, the first year such data was kept.

The government in 2016 also scoured the actual contents of NSA intercepted calls and emails for 5,288 Americans, an increase of 13 percent over the prior year and a massive spike from the 198 names searched in 2013.

…click on the above link to read the rest of the article…

Latest “Shadow Brokers” Leak Reveals NSA Hacked Most Windows Platforms; SWIFT Banks

Latest “Shadow Brokers” Leak Reveals NSA Hacked Most Windows Platforms; SWIFT Banks

One week after the “Shadow Broker” hacker group re-emerged when in a Medium blog post it slammed Donald Trump’s betrayal of his core “base” and the recent attack on Syria, urging Trump to revert to his original promises and not be swept away by globalist and MIC interests, it also released the password which grants access to what Edward Snowden dubbed the NSA’s “Top Secret arsenal of digital weapons”, it has made fresh headlines by releasing data which reportedly reveals that the NSA had hacked the SWIFT banking system of several banks around the globe including in the EU and middle east.

As a reminder, last year the Shadow Brokers claimed to have stolen files from the NSA’s cyber-espionage group known as the Equation Group. After initially putting up the tools up for auction (ultimately nobody was interested in paying the price of 1 million Bitcoin, or around $570 million at the time), Last week, the Shadow Brokers dumped the password for the files they had put up for auction last summer. Missing from last week’s dump were the Windows files they put up for individual auctions over the winter.

Fast forward one week, when on Good Friday the Shadow Brokers dumped a new collection of files, containing what appears to be exploits and hacking tools targeting Microsoft’s Windows OS and evidence the Equation Group had gained access to servers and targeted banks connected to the ubiquitous SWIFT banking system.

The tools were dumped via the Shadow Brokers Twitter account and were accompanied by a new blog post. As Bleeping Computer’s Catalin Cimpanu, who first noticed the release, points out, the blog post is called “Lost in Translation,” and in addition to some premeditated ramblings in broken English…

…click on the above link to read the rest of the article…

Leaked NSA Malware Threatens Windows Users Around the World

The ShadowBrokers, an entity previously confirmed by The Intercept to have leaked authentic malware used by the NSA to attack computers around the world, today released another cache of what appears to be extremely potent (and previously unknown) software capable of breaking into systems running Windows. The software could give nearly anyone with sufficient technical knowledge the ability to wreak havoc on millions of Microsoft users.

The leak includes a litany of typically codenamed software “implants” with names like ODDJOB, ZIPPYBEER, and ESTEEMAUDIT, capable of breaking into — and in some cases seizing control of — computers running version of the Windows operating system earlier than the most recent Windows 10. The vulnerable Windows versions ran more than 65 percent of desktop computers surfing the web last month, according to estimates from the tracking firm Net Market Share.

The crown jewel of the implant collection appears to be a program named FUZZBUNCH, which essentially automates the deployment of NSA malware, and would allow a member of agency’s Tailored Access Operations group to more easily infect a target from their desk.

via Matthew Hickey

According to security researcher and hacker Matthew Hickey, co-founder of Hacker House, the significance of what’s now publicly available, including “zero day” attacks on previously undisclosed vulnerabilities, cannot be understated: “I don’t think I have ever seen so much exploits and 0day [exploits] released at one time in my entire life,” he told The Intercept via Twitter DM, “and I have been involved in computer hacking and security for 20 years.” Affected computers will remain vulnerable until Microsoft releases patches for the zero-day vulnerabilities and, more crucially, until their owners then apply those patches.

…click on the above link to read the rest of the article…

Olduvai IV: Courage
Click on image to read excerpts

Olduvai II: Exodus
Click on image to purchase

Click on image to purchase @ FriesenPress