Oct 15

From the article:

“But she did learn that Snowden was running more than one Tor exit node, and that he was trying to get some of his buddies at “work”to set up additional Tor nodes…

H’mmm….So Snowden running powerful Tor nodes and trying to get his NSA colleagues to run them, too?

I reached out to Sandvik for comment. She didn’t reply. But Wired’s Poulsen suggested that running Tor nodes and throwing a crypto party was a pet privacy project for Snowden. “Even as he was thinking globally, he was acting locally.”

But it’s hard to imagine a guy with top secret security clearance in the midst of planning to steal a huge cache of secrets would risk running a Tor node to help out the privacy cause. But then, who hell knows what any of this means.

I guess it’s fitting that Tor’s logo is an onion — because the more layers you peel and the deeper you get, the less things make sense and the more you realize that there is no end or bottom to it. It’s hard to get any straight answers — or even know what questions you should be asking.

In that way, the Tor Project more resembles a spook project than a tool designed by a culture that values accountability or transparency.”

That’s how you can easily know that you may be investigating a CIA/NSA project run by TPTB.

Everything with them is utterly and totally compartmentalized.

NWO-Illuminati-All-Seeing-Eye-Novus-Ordo-Seclorum


tor-logo

- Peeling the onion: Almost everyone involved in developing Tor was (or is) funded by the US government (Pando Daily July 16, 2014):

“The United States government can’t simply run an anonymity system for everybody and then use it themselves only. Because then every time a connection came from it people would say, “Oh, it’s another CIA agent.” If those are the only people using the network.”—Roger Dingledine, co-founder of the Tor Network, 2004

***

In early July, hacker Jacob Appelbaum and two other security experts published a blockbuster story in conjunction with the German press. They had obtained leaked top secret NSA documents and source code showing that the surveillance agency had targeted and potentially penetrated the Tor Network, a widely used privacy tool considered to be the holy grail of online anonymity. Continue reading »

Tags: , , , , , , , , , , , , , , , ,

Oct 14

Tags: , , , , , , , , , , ,

Oct 12

Did he tell us anything we didn’t knew?


linsay-mills-snowden2

- ‘Citizenfour': Documentary shows Snowden reunited with dancer girlfriend in Moscow (RT, Oct 11, 2014):

Edward Snowden is not “skulking” in a secret Russian bunker but is living an ordinary life in Moscow with his longtime girlfriend, Lindsay Mills. “Citizenfour,” a documentary about the whistleblower, premiered Friday at the New York Film Festival.

It has been three months since Lindsay Mills, whom Snowden had to leave behind in Hawaii in May 2013, was reunited with him in Moscow in July, “Citizenfour” reveals. The documentary was directed by investigative journalist and filmmaker Laura Poitras, an associate of former Guardian reporter Glenn Greenwald, who has been Snowden’s primary media contact throughout the NSA revelations campaign.

Lindsay Mills-Snowden
Image from Lindsay Mills’ instagram (lsjourney)

More than a year ago, in August 2013, Snowden’s Russian lawyer Anatoly Kucherena told the media that his client had no immediate plans to leave Russia and was really missing Mills, his girlfriend since 2009. Continue reading »

Tags: , , , , , , , ,

Oct 05

- New docs show how Reagan-era executive order unbounded NSA (Ars Technica, Sep 30, 2014):

Newly declassified info sheds light on EO 12333 and the feds’ obscuring tactics.

A set of newly declassified documents shows definitively and explicitly that the United States intelligence community relies heavily on what is effectively unchecked presidential authority to conduct surveillance operations, as manifested through the Reagan-era Executive Order (EO) 12333.

And at a more basic level, the new documents illustrate that the government is adept at creating obscure legalistic definitions of plain language words, like “collection of information,” which help obfuscate the public’s understanding of the scope and scale of such a dragnet. Continue reading »

Tags: , , , , ,

Sep 19

H/t reader M.G.:

“Since when is truth so dangerous?
This story I am posting chills me to the bone.
We have a truly evil government that abhors the truth…….”


pentagon

- Pentagon increasing surveillance to prevent another Snowden-style leak  (RT, Sep 18, 2014):

On the heels of two of the largest intelligence breaches in American history, the Pentagon reportedly plans to roll out new rules requiring military contractors to more stringently monitor the activities of employees who work with sensitive materials.

Although the intelligence leaks attributed to United States Army Private Chelsea Manning and former contractor Edward Snowden have already spawned significant changes in the way sensitive information is seen and shared by workers with access to classified data, Politico’s Joseph Marks reported this week that the Pentagon plans to put into place further mechanisms intended to diminish the odds of another major breach anytime soon. Continue reading »

Tags: , , , , , , ,

Sep 19

H/t reader M.G.:

“If this were even remotely a nation of law, this SOB would be in prison………………..”


- Intelligence Director Clapper insists he didn’t lie to Congress — but ‘misspoke’ about NSA spying (RT, Sep 18, 2014):

The United States’ top intelligence official said Thursday that he’s disappointed to continuously have his integrity disputed over an unsound remark he made before Congress more than a year ago concerning the National Security Agency’s spy tactics.

Eighteen months after he told lawmakers that the NSA does “not wittingly” collect and store data pertaining to US citizens, Director of National Intelligence James Clapper said during an event Thursday morning in Washington, DC that he still takes heat for his infamous answer.

The gaffe in question occurred when Sen. Ron Wyden (D-Oregon) asked DNI Clapper during an intelligence hearing in March 2013 if American citizens are immune to surveillance programs undertaken by the NSA. Although Clapper responded “not wittingly,” classified documents leaked to the media by former contractor Edward Snowden later that year proved that Americans’ communications are indeed collected by the NSA.

“It has been very disappointing to have my integrity questioned because of a mistake,” Clapper said during an event on Thursday, according to the Associated Press.

Dan Froomkin, a reporter for The Intercept, tweeted that Clapper complained “bitterly” of being “accused of lying.” Continue reading »

Tags: , , , , , , ,

Sep 19

- Nowhere To Hide As Minority Report-Style Facial Recognition Technology Spreads Across America (Economic Collapse, Sep 17, 2014):

What is our society going to look like when our faces are being tracked literally everywhere that we go?  As part of the FBI’s new Next Generation Identification System, a facial recognition database known as the Interstate Photo System will have collected 52 million of our faces by the end of 2015.  But that is only a small part of the story.  According to Edward Snowden, the NSA has been using advanced facial recognition technology for years.  In addition, as you will see below, advertising companies are starting to use Minority Report-style face scanners in their billboards and many large corporations see facial recognition technology as a tool that they can use to serve their customers better.  Someday soon it may become virtually impossible to go out in public in a major U.S. city without having your face recorded.  Is that the kind of society that we want? Continue reading »

Tags: , , , , , , , , , , , , ,

Sep 07

Related info:

- Creepy US Spy Agency Flings WORLD SLURPING OCTOPUS Into Orbit: NROL-39 NOTHING IS BEYOND OUR REACH


US Corporate Espionage (Washington’s Blog, Sep 6, 2014):

Glenn Greenwald documented yesterday that, last August, the US government announced that it:

… does ***not*** engage in economic espionage in any domain, including cyber. [emphasis original]

Right after that, the US government was revealed to be, as Greenwald documents: Continue reading »

Tags: , , , , , , , , , , , , ,

Sep 02

- Top NSA Whistleblower: We Need a New 9/11 Investigation Into the Destruction of the World Trade Center (Washington’ Blog, Aug 31, 2014):

The Observable Facts Were Ignored …

Bill Binney is the NSA’s former senior technical director, 32-year NSA veteran widely regarded as a “legend” within the agency, one of the world’s top crypto-mathematicians, who managed thousands of employees at the agency.

Binney was the original NSA whistleblower, and one of two NSA veterans whose example inspired Edward Snowden.

Binney recently signed Architects and Engineers for 9/11 Truth’s petition, stating: Continue reading »

Tags: , , , , , , ,

Sep 01

-
A demonstrator holds a placard depicting German chancellor’s Angela Merkel and US President Barck Obama reading “That does not work” (Das geht gar nicht) during a demonstration against governmental surveillance on August 30, 2014 in Berlin. (AFP/DPA)

It could also be translated as … “This is totally unacceptable”

- Thousands of Germans rally to end government spying (RT, Aug 31, 2014):

The rally in Berlin against federal surveillance gathered thousands of people under the motto ‘Freedom not fear,’ who were calling for stricter control of German intelligence agencies.The organizers said about 6,500 demonstrators, a broad coalition of pro-transparency, anti-surveillance and civil rights groups including the Electronic Frontier Foundation, Reporters Without Borders, Digital Courage, and Amnesty International joined the rally as they marched from the Brandenburg Gate to the Federal Chancellery. Continue reading »

Tags: , , , , , , , , , , , , ,

Aug 19

- NSA BIOS Backdoor a.k.a. God Mode Malware Part (Infosec Institute):

This article is the first part of a series on NSA BIOS backdoor internals. Before we begin, I’d like to point out why these malwares are classified as “god mode.” First, most of the malware uses an internal (NSA) codename in the realms of “gods,” such as DEITYBOUNCE, GODSURGE, etc. Second, these malwares have capabilities similar to “god mode” cheats in video games, which make the player using it close to being invincible. This is the case with this type of malware because it is very hard to detect and remove, even with the most sophisticated anti-malware tools, during its possible deployment timeframe.

Tags: , , , , , , , ,

Aug 17

- One of NSA’s Biggest Contractors Will Now Be Recording Your License Plate Numbers (Alternet, Aug 16, 2014):

Raytheon was recently awarded a huge contract to install all-electronic tolling systems.

Technology and defense giant Raytheon was recently awarded a $130 million contract to install all-electronic tolling systems on the Massachusetts Turnpike and at several local tunnels. A unit of the company’s Integrated Defense Systems business will install the system over the next year and a half. By replacing manual and electronic toll-collection booths with a system that will automatically charge vehicles, cars will be able to maintain highway speeds as they pass through the station, easing traffic congestion and cutting down driving time for commuters. Continue reading »

Tags: , , , , , , , , , ,

Aug 16

Privacy-Black-Paper

PDF: NSA-Black-Paper

- CIA spies on Senate. Here’s how to take back your digital privacy [FREE] (Sovereign Man, Aug 14, 2014):

Back in March serious allegations came out of the Senate that the CIA was monitoring and even hacking Senate computers. They were denied vehemently at the time by CIA director John Brennan, who went so far as to say “that’s just beyond the scope of reason.”

Unsurprisingly, of course, the CIA has now come out saying that, yes, they did in fact spy on Senate aides’ computers. Oh, and that they’re sorry. Very sorry.

This is stuff that would have been a major scandal not too long ago, causing a public outcry for the heads of those responsible.

Today, it seems par for the course. It’s taken for granted that governments around the world, spearheaded by Uncle Sam, monitor communication via email, phone, social networks, webcam etc. en masse. Continue reading »

Tags: , , , , , , , , , , ,

Aug 11

nsa-1234

- NSA asked judge to delete ‘classified’ testimony without public awareness (RT, Aug 10, 2014):

The National Security Agency worked behind the scenes to remove a section of a court transcript after suspecting one of its lawyers inadvertently disclosed secret information in a court case over alleged illegal surveillance.

Has the wall of secrecy protecting US intelligence-gathering methods become so severe and repressive that even to acknowledge the redaction of sensitive information from public documents is now thought to be revealing too much?

It seems the United States may be heading in that dark direction following a recent session of the Jewel v. NSA case, in which the Electronic Frontier Foundation (EFF) is challenging the NSA’s power to monitor foreign citizens’ US-based communications and social media accounts. Continue reading »

Tags: , , , , , , , ,

Aug 11

FYI.


Iraq3

- America’s Secret Civil War (Veterans Today, Aug 10, 2014):

A Secret American Civil War is now being waged as Terrorist Proxy-Wars in Syria, the Ukraine and Afghanistan.

 This is a remote civil war with the “Aggressors” being Mind-kontrolled Mercenary Zombies fighting on behalf of the City of London (COL) Rothschild World Zionists (WZs), Israeli’s Leaders, Saudi Arabia and Bush Crime Cabal lackeys still deeply embedded inside the Secret Shadow Government (SSG aka the US Privatized Defense establishment).

And on the other side, best viewed as the “Defenders” which are now counter-attacking in Iraq, is the USG on behalf of the current Administration who have been playing along at times but are now directly bucking the City of London and Israeli WZs and the Bush Crime Cabal (BCC).(1)

The reason the US Administration has ordered an attack on ISIS in Iraq when they did nothing for so long? Because the ISIS made the mistake of attacking Kurdistan which has been a very strong secret Allie of the US Administration. It seems clear that this is a line that even President Obama will not allow ISIS to cross. Continue reading »

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

Aug 05

- Lies for Empire (Ludwig von Mises Insitute Canada, July 29, 2014):

The world is no safer than it was when the War on Terror began. Some of the Middle East’s most brutal dictators were removed from power, but radical jihadists have filled the vacuum of authority. Men and women are still coming home in caskets draped with Old Glory, or they come home mentally and physically debilitated. And for what exactly? If Smedley Butler was correct, and war is a racket, then there was another measure of success at work. And it sure wasn’t the promotion of universal democratic values. If empire can’t bring that, then there isn’t much of a point outside of domination. In other words, somebody benefits from imperium, and it’s not the average voter. Sooner or later the jig is up.

 

 

Tags: , , , , , , , , , ,

Aug 03

- U.S. Intelligence Agencies Have All Been Busted Lying Again and Again (Washington’s Blog, Aug 3, 2014)

Tags: , , , , , ,

Jul 28

- NSA Helps Saudi Arabia Crush Dissent … Like It Helps Crush Dissent at Home (Washington’s Blog, July 27, 2014):

The NSA Helps Crush Dissent at Home and Abroad

Numerous high-level NSA whistleblowers say that NSA spying is about crushing dissent and blackmailing opponents … notstoppingterrorism.

In addition, the NSA is giving the raw data on American citizens living in the U.S. to Israel.  That doesn’t seem to be a good strategy for protecting America from terrorism.

Newly-published Snowden documents also show that the NSA is helping one of the world’s most brutal and repressive dictatorships – Saudi Arabia – to crush dissent.

As Glenn Greenwald reports: Continue reading »

Tags: , , , , , , , , , , ,

Jul 28

- Daniel Ellsberg: Snowden Kept His Oath Better Than Anyone in the NSA (The Atlantic, July 25, 2014)

Tags: , , , , , , , ,

Jul 27

Obama-bows-to-Saudi-King

- How the NSA is Actively Helping Saudi Arabia to Crackdown on Dissent (Liberty Blitzkrieg, July 25, 2014):

It is not an exaggeration to say Saudi Arabia is one of the most oppressive, authoritarian regimes on the planet. Despite having been the main foreign instigator pushing for conflict in Syria, as well as its increasingly disturbing ties to the attacks on 9/11, it remains one of the U.S. government’s closest allies.

I’ve covered some of the human rights abuses of the Saudi regime on several occasions due to the fact that it so clearly exposes the total hypocrisy of U.S. foreign policy. The most recent example was the recent sentencing of human rights lawyer and activist Waleed Abu Alkhair to 15 years in prison for “inciting public opinion,” i.e., effectively utilizing free speech. I covered this in detail in the post: Saudi Human Rights Lawyer and Activist Jailed for 15 Years for Free Speech Under New “Anti-Terror” Law.

Thanks to revelations from Edward Snowden, we now know that our taxpayer money is directly funding the ability of this autocratic regime to brutalize its citizenry.

The Intercept reports that: Continue reading »

Tags: , , , , , , , , , , , , ,

Jul 26

Obama-War-On-Whistleblowers

- The “Insider Threat Program” and the Government’s War on Whistleblowers (Liberty Blitzkrieg, July 24, 2014):

The Obama Administration’s Orwellian government employee snitch network, dubbed the “Insider Threat Program,” first made headlines about a year ago. I found it to be so disturbingly significant I wrote a post about it titled: The 3 Key Takeaways from the Ridiculous “Insider Threat Program.” Those 3 key takeaways were that it…

  1. Creates a horrible and counterproductive work environment where everyone distrusts everyone else.
  2. Solidifies the fact the government is not interested in solving problems, but rather is focused on continuing the cronyism and criminality and merely covering it up.
  3. Exposes how completely hopeless and terminal the status quo is.

Fast forward a year, and it appears that several members of Congress are also becoming increasingly concerned. Some are starting to ask questions, but as usual, the “most transparent administration in history” is entirely nontransparent. We learn from the Washington Post that: Continue reading »

Tags: , , , , , , , , , ,

Jul 25

So the Obama administration does not require “concrete facts” or “irrefutable evidence” to brand Americans or foreigners as suspected terrorists.

Does the Obama administration then also not require “concrete facts” or “irrefutable evidence” to put somebody on Obama’s assassination list and dispatch an assassination team or drone under Obama’s assassination program?


Watchlisting Guidance - Rulebook
The rulebook was developed secretly by representatives of the nation’s intelligence, military and law-enforcement establishment. Photo by The Intercept

- U.S. Government Doesn’t Need Evidence to Call You a Terrorist (truthdig, July 24, 2014):

A key government document obtained by The Intercept confirms that the Obama administration does not require “concrete facts” or “irrefutable evidence” to brand Americans or foreigners as suspected terrorists.

Journalists Jeremy Scahill and Ryan Devereaux reported Wednesday: Continue reading »

Tags: , , , , , , , , , , , , , , ,

Jul 25

- Typewriter manufacturers see boom in sales (The Local, July 21, 2014):

German typewriter manufacturers are enjoying a boom in sales following the NSA spying scandal. A German defence manufacturer switched to typewriters last year, while last week a leading politician called for the government to use the old technology.

The head of the parliamentary inquiry into spying by the US National Security Service (NSA) in Germany made headlines last week when he said his committee was considering using typewriters. But he is not alone.

With a turnover of €5 million, the German typewriter market is growing. Continue reading »

Tags: , , , ,

Jul 25

obama-big-brother

- I, spy: Edward Snowden in exile (Guardian, July 19, 2014):

He doesn’t drink, he’s reading Dostoevsky and, no, he doesn’t wear a disguise. A year after blowing the whistle on the NSA, America’s most wanted talks frankly about his life as a hero-pariah – and why the world remains ‘more dangerous than Orwell imagined’.

Tags: , , , , , , , , , , , , , ,

Jul 24

Related info:

- China Fears iPhone Is ‘Threat To National Security’


- Apple engineered surveillance back door into 600 million iPhones (Natural News, July 22, 2014):

A highly skilled hacker who presented at the recent Hackers On Planet Earth (HOPE/X) conference in New York has dropped a massive bomb on the state of smartphone privacy. Jonathan Zdziarski, an active member in the iPhone development community who helped work on many early iOS “jailbreak” iterations, says Apple has deliberately engineered back door surveillance systems into the iPhone, allowing both the company and the government easy access to users’ personal data.

During his presentation, Zdziarski, who goes by the hacker alias “NerveGas,” showed detailed slides explaining how iOS is inherently insecure — on purpose. His investigation into the coding behind iOS revealed that the seemingly user-friendly system, which is used on hundreds of millions of Apple iPhones, contains a number of “undocumented high-value forensic services” and “suspicious design omissions,” both of which make it relatively easy for private data to be extracted from users’ phones. Continue reading »

Tags: , , , , ,

Jul 20

- Exclusive: High-Level NSA Whistleblower Says Blackmail Is a Huge – Unreported – Part of Mass Surveillance (Washington’s Blog, July 21, 2014):

The Untold Story In the NSA Spying Scandal: Blackmail

It is well-documented that governments use information to blackmail and control people.

The Express reported last month: Continue reading »

Tags: , , , , , , ,

Jul 19

From the article:

The U.N. High Commissioner on Human Rights – Navi Pillay – also said this week that Snowden should not be prosecuted:

Those who disclose human rights violations should be protected. We need them. And I see some of it here in the case of Snowden, because his revelations go to the core of what we are saying about the need for transparency, the need for consultation of all, as what we say, ‘multi-stakeholders,’ everybody concerned. So we do owe it to him for drawing our attention to this issue.


- UN High Commissioner: Mass Surveillance Violates International Law … and Snowden Should NOT Be Prosecuted (Washington’s Blog, July 19, 2014):

Mass Surveillance Violates U.S. Law

Despite the fancy footwork of government lawyers, mass surveillance undoubtedly violates the U.S. Constitution.   See this, this and this.

After all: Continue reading »

Tags: , , , , , , , , , , ,

Jul 16

- ​‘No joke’: Germany mulls using typewriters to combat US snooping (RT, July 15, 2014):

Amid the worsening Berlin-Washington spy row, German politicians are considering going back to old-fashioned manual typewriters for confidential documents to protect national secrets from American NSA spooks.

Patrick Sensburg, the chair of the German parliament’s enquiry into NSA alleged spying, said committee members are considering new security measures and are seriously thinking about abandoning email and returning to old school typewriters.

“As a matter of fact, we already have [a typewriter], and it’s even a non-electronic typewriter,” he told the ARD Morning Show Monday. Continue reading »

Tags: , , , , , , , , ,

Jul 14

- How the CIA Partnered With Amazon and Changed Intelligence (Defense One, July 11, 2014):

The intelligence community is about to get the equivalent of an adrenaline shot to the chest. This summer, a $600 million computing cloud developed by Amazon Web Services for the Central Intelligence Agency over the past year will begin servicing all 17 agencies that make up the intelligence community. If the technology plays out as officials envision, it will usher in a new era of cooperation and coordination, allowing agencies to share information and services much more easily and avoid the kind of intelligence gaps that preceded the Sept. 11, 2001, terrorist attacks. Continue reading »

Tags: , , , , , , , , ,

Jul 13

- Whistleblower: NSA stores 80% of all phone calls, not just metadata – full audio  (RT, July 12, 2014):

At least 80 percent of all audio calls are gathered and stored by the NSA, whistleblower William Binney has revealed. The former code-breaker says the spy agency’s ultimate aim is no less than total population control.

The National Security Agency lies about what it stores, said William Binney, one of the highest profile whistleblowers to ever emerge from the NSA, at a conference in London organized by the Center for Investigative Journalism on July 5. Binney left the agency shortly after the 9/11 attacks on the World Trade Center because he was disgusted at the organizations move towards public surveillance.

“At least 80 percent of fiber-optic cables globally go via the US,” Binney said. “This is no accident and allows the US to view all communication coming in. At least 80 percent of all audio calls, not just metadata, are recorded and stored in the US. The NSA lies about what it stores.”
Continue reading »

Tags: , , , , , , , , , , , ,