Archive for December 2013
Police State Alert: NSA Has Probably Intercepted Your Laptop and Illegally Planted Spyware Before You Bought It!
May God help us all when you consider the amount of kafka-esque monitoring of citizens being done in the name of protecting our “freedoms.” As Orwell warned us, Big Brother will tell us that War is Peace. As with spyware illegally planted on computers before they make it to stores, there is a political “malware” planted on our government called the Shadow Government, and it’s “hackers” are special interests, working for a foreign interests, whose main goal is to monitor citizens to identify those who are potential “enemies of the state” and those who will offer no resistance. Which one are you?
When agents with the NSA’s Tailored Access Operations (TAO) division want to infiltrate a network or a computer, they turn to their technical experts. This particular unit of the United States intelligence service is known internally as ANT. The acronym presumably stands for Advanced Network Technology, because that’s what the division produces — tools for penetrating network equipment and monitoring mobile phones and computers. ANT’s products help TAO agents infiltrate networks and divert or even modify data wherever the NSA’s usual methods won’t suffice. You can read more about the TAO division, its strengths and tricks in a SPIEGEL feature that was published in English on Sunday.
SPIEGEL has obtained an internal NSA catalog describing ANT’s various products, along with their prices. A rigged monitor cable, for example, which allows “TAO personnel to see what is displayed on the targeted monitor,” goes for $30 (€22). An “active GSM base station” that makes it possible to mimic the cell phone tower of a target network and thus monitor mobile phones, is available for $40,000. Computer bugging devices disguised as normal USB plugs, capable of sending and receiving data undetected via radio link, are available in packs of 50, for over $1 million.
Intelligence agencies, incidentally, are not the only ones using these types of devices. The same kind of modified USB plug played a role, for example, in a recent high-tech drug-smuggling case uncovered at the port of Antwerp, Belgium.
NSA malware has also been used against international telecommunications companies, such as partially state-owned Belgian company Belgacom and mobile phone billing service provider MACH. One internal NSA document dating from 2004 describes a spyware program called “VALIDATOR” by saying that it provides “unique backdoor access to personal computers of targets of national interest, including but not limited to terrorist targets.”
The NSA has also targeted products made by well-known American manufacturers and found ways to break into professional-grade routers and hardware firewalls, such as those used by Internet and mobile phone operators. ANT [used by NSA hackers] offers malware and hardware for use on computers made by Cisco, Dell, Juniper, Hewlett-Packard and Chinese company Huawei.
TAO’s implants, in place around the world, have played a significant role in the NSA’s ability to establish a global covert network consisting partly of the agency’s own hardware, but also of other computers subverted to serve its purposes.
Intercepting Packages and Manipulating Computers
ANT’s developers often seek to place their malicious code in BIOS, software located directly on a computer’s motherboard that is the first thing to load when the computer is turned on. Even if the hard drive is wiped and a new operating system installed, ANT’s malware continues to function, making it possible to later add other spyware back onto the computer.
Along with the BIOS software of computers and servers, the NSA’s hackers also attack firmware on computer hard drives, essentially the software that makes the hardware work. The ANT catalog includes, for example, spyware capable of embedding itself unnoticed into hard drives manufactured by Western Digital, Seagate and Samsung. The first two of these are American companies.
Many of these digital tools are “remotely installable,” meaning they can be put in place over the Internet. Others, however, require direct intervention, known in NSA jargon as “interdiction.” This means that brand new products being delivered by mail are secretly intercepted, and hardware or software implants installed on them. The package is forwarded to its intended destination only after this has been done.
In January 2010, numerous homeowners in San Antonio, Texas, stood baffled in front of their closed garage doors. They wanted to drive to work or head off to do their grocery shopping, but their garage door openers had gone dead, leaving them stranded. No matter how many times they pressed the buttons, the doors didn’t budge. The problem primarily affected residents in the western part of the city, around Military Drive and the interstate highway known as Loop 410.
In the United States, a country of cars and commuters, the mysterious garage door problem quickly became an issue for local politicians. Ultimately, the municipal government solved the riddle. Fault for the error lay with the United States’ foreign intelligence service, the National Security Agency, which has offices in San Antonio. Officials at the agency were forced to admit that one of the NSA’s radio antennas was broadcasting at the same frequency as the garage door openers. Embarrassed officials at the intelligence agency promised to resolve the issue as quickly as possible, and soon the doors began opening again.
Workers at NSA’s target selection office, which also had Angela Merkel in its sights in 2002 before she became chancellor, sent TAO a list of officials within the Mexican Secretariat they thought might make interesting targets. As a first step, TAO penetrated the target officials’ email accounts, a relatively simple job. Next, they infiltrated the entire network and began capturing data.
Soon the NSA spies had knowledge of the agency’s servers, including IP addresses, computers used for email traffic and individual addresses of diverse employees. They also obtained diagrams of the security agencies’ structures, including video surveillance. It appears the operation continued for years until SPIEGEL first reported on it in October.
The technical term for this type of activity is “Computer Network Exploitation” (CNE). The goal here is to “subvert endpoint devices,” according to an internal NSA presentation that SPIEGEL has viewed. The presentation goes on to list nearly all the types of devices that run our digital lives — “servers, workstations, firewalls, routers, handsets, phone switches, SCADA systems, etc.” SCADAs are industrial control systems used in factories, as well as in power plants. Anyone who can bring these systems under their control has the potential to knock out parts of a country’s critical infrastructure.
The most well-known and notorious use of this type of attack was the development of Stuxnet, the computer worm whose existence was discovered in June 2010. The virus was developed jointly by American and Israeli intelligence agencies to sabotage Iran’s nuclear program, and successfully so. The country’s nuclear program was set back by years after Stuxnet manipulated the SCADA control technology used at Iran’s uranium enrichment facilities in Natanz, rendering up to 1,000 centrifuges unusable.
Once TAO teams have gathered sufficient data on their targets’ habits, they can shift into attack mode, programming the QUANTUM systems to perform this work in a largely automated way. If a data packet featuring the email address or cookie of a target passes through a cable or router monitored by the NSA, the system sounds the alarm. It determines what website the target person is trying to access and then activates one of the intelligence service’s covert servers, known by the codename FOXACID.
One document labeled “top secret” and “not for foreigners” describes the NSA’s success in spying on the “SEA-ME-WE-4” cable system. This massive underwater cable bundle connects Europe with North Africa and the Gulf states and then continues on through Pakistan and India, all the way to Malaysia and Thailand. The cable system originates in southern France, near Marseille. Among the companies that hold ownership stakes in it are France Telecom, now known as Orange and still partly government-owned, and Telecom Italia Sparkle.
The document proudly announces that, on Feb. 13, 2013, TAO “successfully collected network management information for the SEA-Me-We Undersea Cable Systems (SMW-4).” With the help of a “website masquerade operation,” the agency was able to “gain access to the consortium’s management website and collected Layer 2 network information that shows the circuit mapping for significant portions of the network.”
To conduct those types of operations, the NSA works together with other intelligence agencies such as the CIA and FBI, which in turn maintain informants on location who are available to help with sensitive missions. This enables TAO to attack even isolated networks that aren’t connected to the Internet. If necessary, the FBI can even make an agency-owned jet available to ferry the high-tech plumbers to their target. This gets them to their destination at the right time and can help them to disappear again undetected after as little as a half hour’s work.
- Report: NSA intercepts computer deliveries to plant spyware (networkworld.com)
- Report: NSA intercepts computer deliveries to plant spyware (itworld.com)
- The NSA Has A Way To Intercept Computers Mid-Shipment And Install Spyware On Them (businessinsider.com)
- Report: NSA Intercepting Laptops Ordered Online, Installing Spyware (forbes.com)
- The NSA’s 50-Page Catalog Of Back Door Penetration Techniques Revealed (zerohedge.com)
On Thursday, ED raided the premises of Mahim Gupta in Bopal area of the city who provides trading platform through his website -‑ buysellbit.co.in. During the preliminary investigation, the ED found that it is in clear violation of Foreign Exchange Management Act (FEMA) rules of the country as central bank does not provide permission to indulge in such transactions.
“We have found that through the website 400 persons have recorded 1,000 transactions that amount to a few crores of rupees. We are gathering the data of the transactions, name of the people who have transacted in the virtual currency from Gupta’s server that is hired in the US. At present, we believe that this is a violation of foreign exchange regulations of the country. If we are able to establish money laundering aspect then he can be arrested,” said a top ED official.
As per sources, a separate raid was also conducted in Satellite area of the city, however, the person the investigation agency was looking for could not be found. “When we reached his office, he was not there. We have sealed the premises,” the official added.
- First time in the country, ED raids a Bitcoin seller in Ahmedabad (India) (dnaindia.com)
- Indian Bitcoin Exchanges Halted As Government Shifts Capital Control Attention Away From Gold (zerohedge.com)
- Bitcoin exchanges shut down after threat from India’s central bank (engadget.com)
- Indian Bitcoin exchanges suspend operations after gov’t warning (venturebeat.com)
- Open letter to Bank Indonesia: Bitcoin can protect against US monetary policy (techinasia.com)
India‘s largest bitcoin exchange service has suspended its operations, just when the most valuable currency in the world had begun to gain widespread recognition in the country. The central bank cautioned against the risks of using virtual currency.
The Reserve Bank of India has warned users, holders and traders of virtual currencies, including bitcoins, about “potential financial, legal, customer protection and security related risks” they are exposing themselves to.
“There is no underlying or backing of any asset for virtual currencies. As such, their value seems to be a matter of speculation,” the central bank contended in a statement, adding that the “huge volatility in the value of virtual currencies“ has been noted, however.
The Reserve Bank of India emphasized that virtual currencies were not authorized by any central bank or monetary authority, thus posing serious risks to their users.
“There have been several media reports of the usage of virtual currencies, including bitcoins, for illicit and illegal activities in several jurisdictions. The absence of information of counterparties in such peer-to-peer anonymous/ pseudonymous systems could subject the users to unintentional breaches of anti-money laundering and combating the financing of terrorism (AML/CFT) laws,” it stated.
- India’s central bank acknowledges Dogecoin as virtual currency (neowin.net)
- Top India Bitcoin Operator Halts Trading After Bank Warning (embargozone.com)
- RBI warns against Bitcoin use in India (thehindu.com)
- Top India Bitcoin Operator Halts Trading After Bank Warning (businessinsider.com)
- First time in the country, ED raids a Bitcoin seller in Ahmedabad (India) (dnaindia.com)
…[D]iplomacy operates on the principal of reciprocity and I’m afraid the Americans have not shown the basic courtesies to our diplomat in New York. And we have every right to retaliate with appropriate measures of our own. This has not been savory at all. It’s been rather nasty and we would have never wanted this in the first place, but the US State Department has always applied double standards. Think about the Raymond Davies case involving a US CIA contractor undercover as a diplomat in Pakistan who killed two citizens. President Obama came out at the time and put a lot of pressure on Pakistan to save their so-called diplomat who was actually a spy – and a killer to boot – and said “you know there’s a broader principle at stake. This is diplomatic immunity.” We use the same logic with this case. It was a far smaller offense, it was a much less grave crime, it was a domestic dispute between our diplomat and her domestic helper. But they escalated it to a point where you know she was strip searched and humiliated, so we have every right. US diplomats often get away with a lot in many foreign postings and we have been extending these courtesies because in diplomacy, you need to do it in order for the relations to go ahead. But unfortunately the Americans seem to have thought that India is a banana republic and doesn’t have the spine to hit back. So we have taken measures, but we hope that the Americans will see sense. US Secretary of State John Kerry has expressed regrets, but that is actually insufficient because we have been demanding a firmer apology. But nonetheless, I think they will see sense because reciprocity means if you do bad you will also get bad. If You give respect, you get respect…the Indians are sending a clear message that we want to be with the US as equals; not as superordinate and subordinate. The world has changed and it needs to adjust its lenses; [the US] cannot have double standards
—Sreeram Chaulia, Dean of Jindal School of International Affairs
- U.s. Thinks India Is a Banana Republic (tomfernandez28.com)
- Diplomatic row: US thinks India is a banana republic (rt.com)
- India’s efforts to have charges against Devyani dropped hit a wall (thehindu.com)
- US tries again to calm India over accused diplomat – Reuters Canada (ca.reuters.com)
- Pak foreign policy aims at peace: Sharif (thehindu.com)
- Devyani Khobragade case: India tightens screws, withdraws privileges for US consular officials (alrasub.com)
- New twist: Devyani had full diplomatic status at time of arrest (thehindu.com)
Over 12 years since the Sept 11 attacks, the U.S Government still fails at protecting airports, as we’ve seen with attacks at LAX Airport in L.A., and now two major security breaches at the Newark, NJ and Phoenix airports. Yet, intelligence agencies have been successful in hacking personal and business computers all across American and around the world.
And now some federal judge has declared that all of the illegal hacking activities of the NSA (and by proxy, the FBI and CIA) are legal! Very interesting times we live in indeed. Notice in the article snippet below that the judge is using the actions of Al Qaeda as a justification for NSA activities, even though it has been well established here and elsewhere that the U.S. and its allies conveniently created Al Qaeda to have an excuse to dominate the Middle East and the entire planet. Let’s hope that someone with some sense takes this to the Supreme Court, and that cooler heads in the highest court prevail.
U.S. judge upholds NSA phone surveillance program
(Reuters) – A U.S. judge ruled the National Security Agency’s program that collects records of millions of Americans’ phone calls is lawful, rejecting a challenge by the American Civil Liberties Union to the controversial counter-terrorism program.
Friday’s decision by U.S. District Judge William Pauley in Manhattan diverges from a December 16 ruling by U.S. District Judge Richard Leon in Washington, D.C., who said the “almost Orwellian” program was likely unconstitutional.
The program’s existence had first been disclosed by Edward Snowden, the former NSA contractor whose leaks have detailed the breadth of U.S. electronic surveillance and sparked a debate over how much leeway to give the government in protecting Americans from terrorism.
In a 54-page decision, Pauley said the program “vacuums up information about virtually every telephone call to, from, or within the United States.”
But he said the program’s constitutionality “is ultimately a question of reasonableness,” and that there was no evidence that the government had used “bulk telephony metadata” for any reason other than to investigate and disrupt terrorist attacks.
“Technology allowed al Qaeda to operate decentralized and plot international terrorist attacks remotely,” Pauley wrote. “The bulk telephony metadata collection program represents the government’s counter-punch.”
It is time to use the power of the vote to make sure we get citizen-friendly judges, not pro-NSA judges.
Here is an unfortunate casualty of the so-called War on Terror (aka War on Earth’s Citizens):
How economic warfare killed the People’s Bank
London Mayor Boris Johnson calls it ‘soft power’ but the big guns have opened up on Western civilization.
The ‘War on Terror’ is the mainstream media’s name for the Western power elite’s crusade to destroy the very concept of an earth freely given to its inhabitants. Driven by insatiability for ever more power in the face of their own criminality, their aim is to own the earth and everything in it. Even the millions profiting from their Quantitative Easing (QE) now, in the casino economy, are ultimately doomed to become their victims.
The call now is as stark as that declared by Britain’s wartime leader Sir Winston Churchill on 18th June 1940: “The Battle of Britain is about to begin. Upon this battle depends the survival of Christian civilization.” The world had better understand how it is being fought if Christian or any other civilization is to survive the coming military, economic and environmental crises.
This war is as much for the control of territory and natural resources as any other, but much of NATO countries’ war fighting resources are going into what London’s conservative mayor and former member of Oxford’s elite Bullingdon Club, Boris Johnson, calls “soft power”. Chief among these coercive instruments are economic, psychological, cyber, SigInt [Signals Intelligence] and space warfare. The shift to these new battlefields is to wrong-foot two different ‘target’ audiences: both the ‘enemy’ and the West’s domestic populations.
This shift in emphasis, by the military and commercial partners they steal resources and territory for, signals the rise of the totalitarianism the world hoped had been banished forever in 1945. All honest brokers are being eliminated: the post-9/11 world has seen institutions critical to national security, key financial, military and cultural infrastructure all keeling over in the cross-hairs.
Pentagon’s Information Operations illegally targeting senators
As foreign wars are failing, this 21st century war fighting machinery, like the ‘Eye of Sauron’ in J.R.R. Tolkein’s ‘Lord of the Rings’, is being turned against activists, politicians and journalists in the domestic populations.
US Investigative Journalist Michael Hastings told an incredible story when he returned from his 2010 trip, embedded with US general Stanley McChrystal in Afghanistan. The Pentagon, he revealed in his award winning book ‘The Operators’, spends $4.7bn of public money annually employing 27,000 psychological operations, marketing and public relations staff around the world. Their daily mission: to push the Pentagon line into the West’s national newspapers and broadcast bulletins.
Lose The Burners: Court Okays Prepaid Phone Tracking
Appeals court rules law enforcement agencies don’t need a warrant to “ping” and track prepaid cellphone locations.
Prepaid cellphone users may be tracked by law enforcement agencies at any time, without police first having to obtain a probable-cause warrant.
That’s one takeaway from a 23-page ruling issued Tuesday by the U.S. Court of Appeals for the Sixth Circuit. The ruling centers around a case involving Melvin Skinner, who was convicted by a jury of drug trafficking and money laundering for his role in what the court described as “a large-scale drug-trafficking operation.”
How to Check Which Gov’t Agency is Spying on Your Smartphone
In our post-Snowden world, everyone almost accepts that some gov’t agency or another will be scanning their phone calls and data transmissions. Most people just accept this, and hope for that it’s not really happening.
Here’s a way to check, and see for yourself (instructional video below).
When blogger Alex Heid performed this simple check from his location in the United States, he quickly discovered that his phone was being routed through a British Ministry of Defence, most likely being analysed by GCHQ. Alex was using a pre-paid mobile/cell phone carrier. http://21stcenturywire.com/2013/12/11/video-how-to-check-which-govt-agency-is-spying-on-your-smartphone/
Both George Orwell and Ford Motor founder Henry Ford essentially warned us that the 20th century marked the first time that big government would use words whose meaning was the opposite of what the masses thought. For instance, the U.S. renamed the War Department into the Department of Defense. It is well known that the Dept of Defense is really the Dept of Offense. Social Security is really insecurity. The Federal Reserve is not federal nor does it have any reserves. The War on Terror is really War by Terror (terror on citizens, not Al Qaeda, which is a Frankenstein creation of the West). Peace is War…
- Terror Factory: Inside The FBI’s Manufactured War On Terrorism (21stcenturywire.com)
- NY Judge Rules NSA Phone Surveillance Is Legal (abcnews.go.com)
- NSA Program Stopped No Terror Attacks, Says White House Panel Member! (socioecohistory.wordpress.com)
- The NSA Report: Another Step Toward Ending the War on Terrorism (swampland.time.com)
- The War on Terror is the Private War of Bush and Obama (rinf.com)
- NY judge rules NSA phone surveillance is legal (hosted.ap.org)
- The War on Terror’s Jedi Mind Trick – Julian Sanchez – The Atlantic (theatlantic.com)
- Top-secret file shows unusual way ‘war on terror’ is waged (huffingtonpost.com)
- NSA May Get Its Wings Clipped (swampland.time.com)
- Iraq requests U.S. drones, missiles to thwart al Qaeda attacks (washingtontimes.com)
It is sad that so many false flag, deceptive operations have been executed across America, from Boston to Los Angeles, that police have started evolving into anti-American gestapo units. It is not too late to reclaim America for true Americans and make a stand for Christian principles before the darkness completely takes over. Click here for A Glimpse of America’s Future Police State
- Former Top NSA Official: We Are Now In A Police State (downtrend.com)
- America and Israel: Police States Writ Large (southweb.org)
- New TSA Kids Video Prepares Youth For Police State (downtrend.com)
- Police State – Armored tanks now patrolling Salinas California streets (fireandreamitchell.com)
- “Years ago when I described the George W. Bush regime as a police state, right-wing eyebrows were raised. When I described the Obama regime as an even worse police state, liberals rolled their eyes. Alas! Now I am no longer controversial. Everybody says i (thatrandomcandidate.com)
- 32 year former NSA executive says, “we are now in a police state” (thisgotmyattention.wordpress.com)
- X22 Report Exposes US Police State! (b4inmain.wordpress.com)
- The U.S. Is Now An NSA-Run Police State (politicaloutcast.com)