True World Intelligence News (TWIN)

Voice of Truth: Proclaimer of truth and defender of the faithful

Archive for December 2013

Police State Alert: NSA Has Probably Intercepted Your Laptop and Illegally Planted Spyware Before You Bought It!

leave a comment »

The seal of the U.S. National Security Agency....

The seal of the U.S. National Security Agency. The first use was in September 1966, replacing an older seal which was used briefly. For more information, see here and here. (Photo credit: Wikipedia)

May God help us all when you consider the amount of kafka-esque monitoring of citizens being done in the name of protecting our “freedoms.” As Orwell warned us, Big Brother will tell us that War is Peace. As with spyware illegally planted on computers before they make it to stores, there is a political “malware” planted on our government called the Shadow Government, and it’s “hackers” are special interests, working for a foreign interests, whose main goal is to monitor citizens to identify those who are potential “enemies of the state” and those who will offer no resistance. Which one are you?

When agents with the NSA’s Tailored Access Operations (TAO) division want to infiltrate a network or a computer, they turn to their technical experts. This particular unit of the United States intelligence service is known internally as ANT. The acronym presumably stands for Advanced Network Technology, because that’s what the division produces — tools for penetrating network equipment and monitoring mobile phones and computers. ANT’s products help TAO agents infiltrate networks and divert or even modify data wherever the NSA’s usual methods won’t suffice. You can read more about the TAO division, its strengths and tricks in a SPIEGEL feature that was published in English on Sunday.

SPIEGEL has obtained an internal NSA catalog describing ANT’s various products, along with their prices. A rigged monitor cable, for example, which allows “TAO personnel to see what is displayed on the targeted monitor,” goes for $30 (€22). An “active GSM base station” that makes it possible to mimic the cell phone tower of a target network and thus monitor mobile phones, is available for $40,000. Computer bugging devices disguised as normal USB plugs, capable of sending and receiving data undetected via radio link, are available in packs of 50, for over $1 million.

Intelligence agencies, incidentally, are not the only ones using these types of devices. The same kind of modified USB plug played a role, for example, in a recent high-tech drug-smuggling case uncovered at the port of Antwerp, Belgium.

NSA malware has also been used against international telecommunications companies, such as partially state-owned Belgian company Belgacom and mobile phone billing service provider MACH. One internal NSA document dating from 2004 describes a spyware program called “VALIDATOR” by saying that it provides “unique backdoor access to personal computers of targets of national interest, including but not limited to terrorist targets.”

The NSA has also targeted products made by well-known American manufacturers and found ways to break into professional-grade routers and hardware firewalls, such as those used by Internet and mobile phone operators. ANT [used by NSA hackers] offers malware and hardware for use on computers made by Cisco, Dell, Juniper, Hewlett-Packard and Chinese company Huawei.

TAO’s implants, in place around the world, have played a significant role in the NSA’s ability to establish a global covert network consisting partly of the agency’s own hardware, but also of other computers subverted to serve its purposes.

Intercepting Packages and Manipulating Computers

ANT’s developers often seek to place their malicious code in BIOS, software located directly on a computer’s motherboard that is the first thing to load when the computer is turned on. Even if the hard drive is wiped and a new operating system installed, ANT’s malware continues to function, making it possible to later add other spyware back onto the computer.

Along with the BIOS software of computers and servers, the NSA’s hackers also attack firmware on computer hard drives, essentially the software that makes the hardware work. The ANT catalog includes, for example, spyware capable of embedding itself unnoticed into hard drives manufactured by Western Digital, Seagate and Samsung. The first two of these are American companies.

Many of these digital tools are “remotely installable,” meaning they can be put in place over the Internet. Others, however, require direct intervention, known in NSA jargon as “interdiction.” This means that brand new products being delivered by mail are secretly intercepted, and hardware or software implants installed on them. The package is forwarded to its intended destination only after this has been done.

http://www.spiegel.de/international/world/nsa-secret-toolbox-ant-unit-offers-spy-gadgets-for-every-need-a-941006.html

In January 2010, numerous homeowners in San Antonio, Texas, stood baffled in front of their closed garage doors. They wanted to drive to work or head off to do their grocery shopping, but their garage door openers had gone dead, leaving them stranded. No matter how many times they pressed the buttons, the doors didn’t budge. The problem primarily affected residents in the western part of the city, around Military Drive and the interstate highway known as Loop 410.

In the United States, a country of cars and commuters, the mysterious garage door problem quickly became an issue for local politicians. Ultimately, the municipal government solved the riddle. Fault for the error lay with the United States’ foreign intelligence service, the National Security Agency, which has offices in San Antonio. Officials at the agency were forced to admit that one of the NSA’s radio antennas was broadcasting at the same frequency as the garage door openers. Embarrassed officials at the intelligence agency promised to resolve the issue as quickly as possible, and soon the doors began opening again.

Workers at NSA’s target selection office, which also had Angela Merkel in its sights in 2002 before she became chancellor, sent TAO a list of officials within the Mexican Secretariat they thought might make interesting targets. As a first step, TAO penetrated the target officials’ email accounts, a relatively simple job. Next, they infiltrated the entire network and began capturing data.

Soon the NSA spies had knowledge of the agency’s servers, including IP addresses, computers used for email traffic and individual addresses of diverse employees. They also obtained diagrams of the security agencies’ structures, including video surveillance. It appears the operation continued for years until SPIEGEL first reported on it in October.

The technical term for this type of activity is “Computer Network Exploitation” (CNE). The goal here is to “subvert endpoint devices,” according to an internal NSA presentation that SPIEGEL has viewed. The presentation goes on to list nearly all the types of devices that run our digital lives — “servers, workstations, firewalls, routers, handsets, phone switches, SCADA systems, etc.” SCADAs are industrial control systems used in factories, as well as in power plants. Anyone who can bring these systems under their control has the potential to knock out parts of a country’s critical infrastructure.

The most well-known and notorious use of this type of attack was the development of Stuxnet, the computer worm whose existence was discovered in June 2010. The virus was developed jointly by American and Israeli intelligence agencies to sabotage Iran’s nuclear program, and successfully so. The country’s nuclear program was set back by years after Stuxnet manipulated the SCADA control technology used at Iran’s uranium enrichment facilities in Natanz, rendering up to 1,000 centrifuges unusable.

Once TAO teams have gathered sufficient data on their targets’ habits, they can shift into attack mode, programming the QUANTUM systems to perform this work in a largely automated way. If a data packet featuring the email address or cookie of a target passes through a cable or router monitored by the NSA, the system sounds the alarm. It determines what website the target person is trying to access and then activates one of the intelligence service’s covert servers, known by the codename FOXACID.

One document labeled “top secret” and “not for foreigners” describes the NSA’s success in spying on the “SEA-ME-WE-4” cable system. This massive underwater cable bundle connects Europe with North Africa and the Gulf states and then continues on through Pakistan and India, all the way to Malaysia and Thailand. The cable system originates in southern France, near Marseille. Among the companies that hold ownership stakes in it are France Telecom, now known as Orange and still partly government-owned, and Telecom Italia Sparkle.

The document proudly announces that, on Feb. 13, 2013, TAO “successfully collected network management information for the SEA-Me-We Undersea Cable Systems (SMW-4).” With the help of a “website masquerade operation,” the agency was able to “gain access to the consortium’s management website and collected Layer 2 network information that shows the circuit mapping for significant portions of the network.”

To conduct those types of operations, the NSA works together with other intelligence agencies such as the CIA and FBI, which in turn maintain informants on location who are available to help with sensitive missions. This enables TAO to attack even isolated networks that aren’t connected to the Internet. If necessary, the FBI can even make an agency-owned jet available to ferry the high-tech plumbers to their target. This gets them to their destination at the right time and can help them to disappear again undetected after as little as a half hour’s work.

http://www.spiegel.de/international/world/the-nsa-uses-powerful-toolbox-in-effort-to-spy-on-global-networks-a-940969.html

Advertisements

Written by voiceoftruthusa

December 30, 2013 at 8:59 pm

Police State Alert: India Cracks Down on a Bitcoin Trader. Bitcoin Seen as Threat to Central Bank?

leave a comment »

On Thursday, ED raided the premises of Mahim Gupta in Bopal area of the city who provides trading platform through his website -‑ buysellbit.co.in. During the preliminary investigation, the ED found that it is in clear violation of Foreign Exchange Management Act (FEMA) rules of the country as central bank does not provide permission to indulge in such transactions.

“We have found that through the website 400 persons have recorded 1,000 transactions that amount to a few crores of rupees. We are gathering the data of the transactions, name of the people who have transacted in the virtual currency from Gupta’s server that is hired in the US. At present, we believe that this is a violation of foreign exchange regulations of the country. If we are able to establish money laundering aspect then he can be arrested,” said a top ED official.

As per sources, a separate raid was also conducted in Satellite area of the city, however, the person the investigation agency was looking for could not be found. “When we reached his office, he was not there. We have sealed the premises,” the official added.

http://www.dnaindia.com/india/report-first-time-in-the-country-ed-raids-a-bitcoin-seller-in-ahmedabad-1941187

India’s Central Bank Says Bitcoins Have No Value Backing Them – Kinda Like Paper Currency

leave a comment »

English: Total Bitcoin supply over time. Start...

English: Total Bitcoin supply over time. Starting in 2009, the Bitcoin supply is created at a rate of approximately 50 bitcoins every 10 minutes. Every 210,000 generations (about every four years), the creation rate is cut in half (i.e. 50, 25, 12.5, 6.25, etc.) and tends to zero, such that there will never be more than 21 million total coins created. (Photo credit: Wikipedia)

India‘s largest bitcoin exchange service has suspended its operations, just when the most valuable currency in the world had begun to gain widespread recognition in the country. The central bank cautioned against the risks of using virtual currency.

The Reserve Bank of India has warned users, holders and traders  of virtual currencies, including bitcoins, about “potential  financial, legal, customer protection and security related  risks” they are exposing themselves to.

There is no underlying or backing of any asset for virtual  currencies. As such, their value seems to be a matter of  speculation,” the central bank contended in a statement, adding that the   huge volatility in the value of virtual currencies has  been noted, however.

The Reserve Bank of India emphasized that virtual currencies were  not authorized by any central bank or monetary authority,  thus posing serious risks to their users.  

“There have been several media reports of the usage of  virtual currencies, including bitcoins, for illicit and illegal  activities in several jurisdictions. The absence of information  of counterparties in such peer-to-peer anonymous/ pseudonymous  systems could subject the users to unintentional breaches of  anti-money laundering and combating the financing of terrorism  (AML/CFT) laws,” it stated.

http://rt.com/news/bitcoin-india-exchange-halt-911/

Written by voiceoftruthusa

December 28, 2013 at 11:43 pm

U.S. vs India, Round 2: Are American Values Truly Reflected in Foreign Policy?

leave a comment »

…[D]iplomacy  operates on the principal of reciprocity and I’m afraid the  Americans have not shown the basic courtesies to our diplomat in  New York. And we have every right to retaliate with appropriate  measures of our own. This has not been savory at all. It’s been  rather nasty and we would have never wanted this in the first  place, but the US State Department has always applied double  standards. Think about the Raymond Davies case involving a US CIA  contractor undercover as a diplomat in Pakistan who killed two  citizens. President Obama came out at the time and put a lot of  pressure on Pakistan to save their so-called diplomat who was  actually a spy – and a killer to boot – and said “you know  there’s a broader principle at stake. This is diplomatic  immunity.” We use the same logic with this case. It was a far  smaller offense, it was a much less grave crime, it was a  domestic dispute between our diplomat and her domestic helper.  But they escalated it to a point where you know she was strip  searched and humiliated, so we have every right. US diplomats  often get away with a lot in many foreign postings and we have  been extending these courtesies because in diplomacy, you need to  do it in order for the relations to go ahead. But unfortunately  the Americans seem to have thought that India is a banana  republic and doesn’t have the spine to hit back. So we have taken  measures, but we hope that the Americans will see sense. US  Secretary of State John Kerry has expressed regrets, but that is  actually insufficient because we have been demanding a firmer  apology. But nonetheless, I think they will see sense because  reciprocity means if you do bad you will also get bad. If You  give respect, you get respect…the Indians are sending a  clear message that we want to be with the US as equals; not as  superordinate and subordinate. The world has changed and it needs  to adjust its lenses; [the US] cannot have double standards

Sreeram Chaulia, Dean of Jindal School of International Affairs

http://rt.com/op-edge/india-us-diplomatic-row-806/

Police State Alert: U.S. Gov’t Gets Green Light to Continue War on Citizens and Privacy

leave a comment »

Over 12 years since the Sept 11 attacks, the U.S Government still fails at protecting airports, as we’ve seen with attacks at LAX Airport in L.A., and now two major security breaches at the Newark, NJ and Phoenix airports. Yet, intelligence agencies have been successful in hacking personal and business computers all across American and around the world.

Hmmm…

And now some federal judge has declared that all of the illegal hacking activities of the NSA (and by proxy, the FBI and CIA) are legal! Very interesting times we live in indeed. Notice in the article snippet below that the judge is using the actions of Al Qaeda as a justification for NSA activities, even though it has been well established here and elsewhere that the U.S. and its allies conveniently created Al Qaeda to have an excuse to dominate the Middle East and the entire planet. Let’s hope that someone with some sense takes this to the Supreme Court, and that cooler heads in the highest court prevail.

U.S. judge upholds NSA phone surveillance program

(Reuters) – A U.S. judge ruled the National Security Agency’s program that collects records of millions of Americans’ phone calls is lawful, rejecting a challenge by the American Civil Liberties Union to the controversial counter-terrorism program.

Friday’s decision by U.S. District Judge William Pauley in Manhattan diverges from a December 16 ruling by U.S. District Judge Richard Leon in Washington, D.C., who said the “almost Orwellian” program was likely unconstitutional.

The program’s existence had first been disclosed by Edward Snowden, the former NSA contractor whose leaks have detailed the breadth of U.S. electronic surveillance and sparked a debate over how much leeway to give the government in protecting Americans from terrorism.

In a 54-page decision, Pauley said the program “vacuums up information about virtually every telephone call to, from, or within the United States.”

But he said the program’s constitutionality “is ultimately a question of reasonableness,” and that there was no evidence that the government had used “bulk telephony metadata” for any reason other than to investigate and disrupt terrorist attacks.

Technology allowed al Qaeda to operate decentralized and plot international terrorist attacks remotely,” Pauley wrote. “The bulk telephony metadata collection program represents the government’s counter-punch.”

http://www.reuters.com/article/2013/12/27/us-usa-security-aclu-idUSBRE9BQ0DA20131227

It is time to use the power of the vote to make sure we get citizen-friendly judges, not pro-NSA judges.

Here is an unfortunate casualty of the so-called War on Terror (aka War on Earth’s Citizens):

How economic warfare killed the People’s Bank

London Mayor Boris Johnson calls it ‘soft power’ but the big guns have opened up on Western civilization.

The ‘War on Terror’ is the mainstream media’s name for  the Western power elite’s crusade to destroy the very concept of  an earth freely given to its inhabitants. Driven by insatiability  for ever more power in the face of their own criminality, their  aim is to own the earth and everything in it. Even the millions  profiting from their Quantitative Easing (QE) now, in the casino  economy, are ultimately doomed to become their victims.

The call now is as stark as that declared by Britain’s wartime  leader Sir Winston Churchill on 18th June 1940: “The Battle  of Britain is about to begin. Upon this battle depends the  survival of Christian civilization.” The world had better  understand how it is being fought if Christian or any other  civilization is to survive the coming military, economic and  environmental crises.

This war is as much for the control of territory and natural  resources as any other, but much of NATO countries’ war fighting  resources are going into what London’s conservative mayor and  former member of Oxford’s elite Bullingdon Club, Boris Johnson,  calls “soft power”. Chief among these coercive  instruments are economic, psychological, cyber, SigInt [Signals  Intelligence] and space warfare. The shift to these new  battlefields is to wrong-foot two different ‘target’ audiences:  both the ‘enemy’ and the West’s domestic populations.

This shift in emphasis, by the military and commercial partners  they steal resources and territory for, signals the rise of the  totalitarianism the world hoped had been banished forever in  1945. All honest brokers are being eliminated: the post-9/11  world has seen institutions critical to national security, key  financial, military and cultural infrastructure all keeling over  in the cross-hairs.

Pentagon’s Information Operations illegally targeting senators

As foreign wars are failing, this 21st century war fighting  machinery, like the ‘Eye of Sauron’ in J.R.R. Tolkein’s   ‘Lord of the Rings’, is being turned against activists,  politicians and journalists in the domestic populations.

US Investigative Journalist Michael Hastings told an incredible  story when he returned from his 2010 trip, embedded with US  general Stanley McChrystal in Afghanistan. The Pentagon, he  revealed in his award winning book ‘The Operators’,  spends $4.7bn of public money annually employing 27,000  psychological operations, marketing and public relations staff  around the world. Their daily mission: to push the Pentagon line  into the West’s national newspapers and broadcast bulletins.

http://rt.com/op-edge/war-terror-economy-bank-873/

Lose The Burners: Court Okays Prepaid Phone Tracking

Appeals court rules law enforcement agencies don’t need a warrant to “ping” and track prepaid cellphone locations.

Prepaid cellphone users may be tracked by law enforcement agencies at any time, without police first having to obtain a probable-cause warrant.

That’s one takeaway from a 23-page ruling issued Tuesday by the U.S. Court of Appeals for the Sixth Circuit. The ruling centers around a case involving Melvin Skinner, who was convicted by a jury of drug trafficking and money laundering for his role in what the court described as “a large-scale drug-trafficking operation.”

https://www.informationweek.com/mobile/lose-the-burners-court-okays-prepaid-phone-tracking/d/d-id/1105814

How to Check Which Gov’t Agency is Spying on Your Smartphone

In our post-Snowden world, everyone almost accepts that some gov’t agency or another will be scanning their phone calls and data transmissions. Most people just accept this, and hope for that it’s not really happening.

Here’s a way to check, and see for yourself (instructional video below).

When blogger Alex Heid performed this simple check from his location in the United States, he quickly discovered that his phone was being routed through a British Ministry of Defence, most likely being analysed by GCHQ. Alex was using a pre-paid mobile/cell phone carrier. http://21stcenturywire.com/2013/12/11/video-how-to-check-which-govt-agency-is-spying-on-your-smartphone/

Both George Orwell and Ford Motor founder Henry Ford essentially warned us that the 20th century marked the first time that big government would use words whose meaning was the opposite of what the masses thought. For instance, the U.S. renamed the War Department into the Department of Defense. It is well known that the Dept of Defense is really the Dept of Offense. Social Security is really insecurity. The Federal Reserve is not federal nor does it have any reserves. The War on Terror is really War by Terror (terror on citizens, not Al Qaeda, which is a Frankenstein creation of the West). Peace is War…

A Glimpse of America’s Future Police State

leave a comment »

Immigrant rights march for amnesty in downtown...

Immigrant rights march for amnesty in downtown Los Angeles, California on May Day, 2006. (Photo credit: Wikipedia)

It is sad that so many false flag, deceptive operations have been executed across America, from Boston to Los Angeles, that police have started evolving into anti-American gestapo units. It is not too late to reclaim America for true Americans and make a stand for Christian principles before the darkness completely takes over. Click here for A Glimpse of America’s Future Police State

Written by voiceoftruthusa

December 25, 2013 at 4:35 am

Merry Christmas! Why the War Against Christmas Will Never Prevail

leave a comment »

Written by voiceoftruthusa

December 24, 2013 at 3:53 pm

Posted in Uncategorized