NSA (STASI) Briefs
How the CIA Broke America
A new report indicates the passage of the USA Freedom Act did not prevent the U.S. National Security Agency from collecting 151 million records…
The way GCHQ Obliterated the Guardian's Laptops May Have Revealed More than it Intended
NSA Spying Relies on AT&T’s ‘Extreme Willingness to Help’
The National Security Agency (NSA) is paying to build backdoors security into the Internet of Things (IoT).
Who else is involved in global surveillance..
DATA AND GOLIATH: The Hidden Battles to Collect Your Data and Control Your World
NSA can hack WiFi devices from eight miles away
Secret US cybersecurity report: encryption vital to protect private data
NSA Docs on Malware and Implants
- CSEC document about the recognition of trojans and other "network based anomaly"
- The formalized process through which analysts choose their data requirement and then get to know the tools that can do the job
- QUANTUMTHEORY is a set of technologies allowing man-on-the-side interference attacks on TCP/IP connections (includes STRAIGHTBIZARRE and DAREDEVIL)
- Sample code of a malware program from the Five Eyes alliance
NSA Docs on Exfiltration
- Explanation of the APEX method of combining passive with active methods to exfiltrate data from networks attacked
- Explanation of APEX shaping to put exfiltrating network traffic into patterns that allow plausible deniability
- Presentation on the FASHIONCLEFT protocol that the NSA uses to exfiltrate data from trojans and implants to the NSA
- Methods to exfiltrate data even from devices which are supposed to be offline
- Document detailing SPINALTAP, an NSA project to combine data from active operations and passive signals intelligence
- Technical description of the FASHIONCLEFT protocol the NSA uses to exfiltrate data from Trojans and implants to the NSA
Leaked NSA Documents Reveal The Best Way To Stay Anonymous Online
NSA spying damages US economy, may end up ‘breaking the Internet’
Private information stored online by British computer users could be scrutinised by American law enforcement agencies under a wide-ranging new right-to-snoop being pursued by the US government. Federal authorities in the US are using the courts to try to force American-owned technology companies to disclose emails and other data held in the "Cloud" - the vast network of servers where data is stored for customers.
The claim would require companies such as Microsoft, Apple and Google to open up all their electronic records to agencies - such as the CIA, the NSA and the FBI – even if it is stored in Europe rather than on US soil...MORE
- USA Alexander, Keith B. Former Commander, U.S. Cyber Command; Former Director, National Security Agency
- USA Donilon, Thomas E. Senior Partner, O’Melveny and Myers; Former U.S. National Security Advisor
- NSA used 'back door' to search Americans' communications
- Director of national intelligence confirms use of new legal rule
- Data collected under 'Prism' and 'Upstream' programs
US intelligence chiefs have confirmed that the National Security Agency has used a "back door" in surveillance law to perform warrantless searches on Americans’ communications.
NSA's XkeyScore Targets Internet Users who search for 'Suspicious Stuff'
"Particularly notable is a series of secret NSA slides on the program, dated from 2008. The slides are marked “release to” United Kingdom, New Zealand, Australia, and Canada, suggesting XKEYSCORE is accessible to spy agencies in each of these countries. (It is also reportedly used by German authorities.) They show how the NSA collects data on emails, browsing sessions, and what people are searching for online—“nearly everything a typical user does on the internet..MORE”
NSA Watching You...collecting blackmail information
AT&T, Verizon And Sprint Helped NSA With Mass Collection Of Phone Records
NSA, DEA, IRS Lie About Fact That Americans Are Routinely Spied On By Our Government: Time For A Special Prosecutor
" It seems that every day brings a new revelation about the scope of the NSA’s heretofore secret warrantless mass surveillance programs. And as we learn more, the picture becomes increasingly alarming. Last week we discovered that the NSA shares information with a division of the Drug Enforcement Administration called the Special Operations Division (SOD). The DEA uses the information in drug investigations. But it also gives NSA data out to other agencies – in particular, the Internal Revenue Service, which, as you might imagine, is always looking for information on tax cheats."
The NSA and its British counterpart are tapping popular smartphone apps such as Angry Birds to peek into the tremendous amounts of very personal data those bits of software collect -- including age, location, sex and even sexual preferences, according to new reports from the New York Times and The Guardian.
Dark Government.com: NSA has a collection of FOXACID servers, designed to exploit visitors....Once the QUANTUM wiretap identifies the victim, it simply packet injects a 302 redirect to a FOXACID server. Now the victim’s browser starts talking to the FOXACID server, which quickly takes over the victim’s computer. The NSA calls this QUANTUMINSERT...One particular trick involved identifying the LinkedIn or Slashdot account of an intended target. Then when the QUANTUM system observed individuals visiting LinkedIn or Slashdot, it would examine the HTML returned to identify the user before shooting an exploit at the victim.
NSA intercepts computer deliveries ...including computer monitor cables specially modified to record what is being typed across the screen, USB sticks secretly fitted with radio transmitters to broadcast stolen data over the airwaves, and fake base stations intended to intercept mobile phone signals on the go.
"..[C]lassified documents show that the [NSA]intelligence agency has several means of accessing the internal data traffic of the Society for Worldwide Interbank Financial Telecommunication (SWIFT), a cooperative used by more than 8,000 banks worldwide for their international transactions. The NSA specifically targets other institutes on an individual basis. Furthermore, the agency apparently has in-depth knowledge of the internal processes of credit card companies like Visa and MasterCard. What's more, even new, alternative currencies, as well as presumably anonymous means of payment like the Internet currency Bitcoin, rank among the targets of the American spies."
Time for Answers from the NSA..
In an ironic twist, former U.S. House Speaker Dennis Hastert (shown) has been snared in a federal indictment brought about by the very PATRIOT Act he strongly supported during his tenure as speaker. In the aftermath of the 9/11 attacks, Congress enacted the law purportedly to fight terrorism; however, critics cautioned at the time that it was a major overreach, violating certain portions of the Bill of Rights.
In particular, some warned that the PATRIOT Act would be used by federal authorities for purposes other than to "fight terrorism." Though Hastert, among others, brushed aside such concerns at the time, he has now fallen victim to just such a use of the controversial legislation...MORE
Consider the record. Last week, President Obama told reporters: “I’m comfortable that if the American people examined exactly what was taking place, how it was being used, what the safeguards were, they would say, ‘You know what? These folks are following the law and doing what they say they’re doing.’”
But the NSA audit found that in at least one instance, the agency decided it didn’t need to follow the law and report the unintended surveillance of U.S. citizens. In another case, the FISA court was in the dark about a new NSA collection method for months. When it did learn about it, it promptly declared it unconstitutional...MORE
NSA broke privacy rules thousands of times per year, audit finds
The National Security Agency has broken privacy rules or overstepped its legal authority thousands of times each year since Congress granted the agency broad new powers in 2008, according to an internal audit and other top-secret documents...MORE