Edward Snowden exposes National Security Agency domestic surveillance

Discussion in 'News and Current Events' started by The Wrong Guy, Jun 5, 2013.

  1. The Wrong Guy Member

    Privacy Advocate Exposes NSA Spy Gear at Gathering | The Associated Press

    A well-known privacy advocate has given the public an unusually explicit peek into the intelligence world's tool box, pulling back the curtain on the National Security Agency's arsenal of high-tech spy gear.

    Independent journalist and security expert Jacob Appelbaum on Monday told a hacker conference in Germany that the NSA could turn iPhones into eavesdropping tools and use radar wave devices to harvest electronic information from computer even if they weren't online.

    Appelbaum told hundreds of computer experts gathered at Hamburg's Chaos Communications Conference that his revelations about the NSA's capabilities "are even worse than your worst nightmares."

    "What I am going to show you today is wrist-slittingly depressing," he said.

    Even though in the past six months there have been an unprecedented level of public scrutiny of the NSA and its methods, Appelbaum's claims — supported by what appeared to be internal NSA slideshows — still caused a stir.

    One of the slides described how the NSA can plant malicious software onto Apple Inc.'s iPhone, giving American intelligence agents the ability to turn the popular smartphone into a pocket-sized spy.

    Another slide showcased a futuristic-sounding device described as a "portable continuous wave generator," a remote controlled device which — when paired with tiny electronic implants — can bounce invisible waves of energy off keyboards and monitors to see what is being typed even if the target device isn't connected to the Internet.

    A third slide showcased a piece of equipment called NIGHTSTAND, which can tamper with wireless Internet connections from up to 8 miles away.

    Continued here:
    • Like Like x 1
  2. DeathHamster Member
    Hacking and Philosophy: Surveillance State

    December 30, 2013 by Josh Marsh 43 Comments
    If you don’t live under a rock (though you may want to now) you probably saw yesterday’s article from Spiegel that revealed the NSA has its own catalog for spy gadgets. Today they released an interactive graphic with the catalog’s contents, and even if you’re not a regular reader of Hacking & Philosophy, you’re going to want to take a look at it. I recommend glancing over IRATEMONK, in the “Computer Hardware” category. As the article explains, IRATEMONK is
    An implant hidden in the firmware of hard drives from manufacturers including Western Digital, Seagate, Maxtor and Samsung that replaces the Master Boot Record (MBR).
    It isn’t clear whether the manufacturers are complicit in implanting IRATEMONK in their hardware, or if the NSA has just developed it to work with those drives. Either way, it raises an important question: how do we know we can trust the hardware? The short answer is that we can’t. According to the text accompanying the graphic, the NSA
    …[installs] hardware units on a targeted computer by, for example, intercepting the device when it’s first being delivered to its intended recipient, a process the NSA calls ‘interdiction.’
    We’re interested to hear your responses to this: is the situation as bleak as it seems? How do you build a system that you know you can trust? Are there any alternatives that better guarantee you aren’t being spied on? Read on for more.
    • Like Like x 1
  3. DeathHamster Member

  4. DeathHamster Member

    A minor quibble about the video. Tempest isn't a technology to intercept signals from computers, it's technology to prevent that from happening. Allowances made for the blurring that's probably happened over the decades.

    Sweet memories of a Tempest hardened PC that had a special screen coating, and the monitor and keyboard cables were fiber optic, I believe. Wonderful, except that it was a piece of junk because by the time it passed through the certification process, where failure was never explained, try again, it was five years behind the curve. An IBM PC/ DOS 1.1 class machine when 386s were hot.
  5. ^^


    Slippery, Immoral, Sick Motherfuckers!
  6. The Internet Member

    With all these amazing law enforcement tools behind the scenes, I would expect more financial fraudsters, like our Scientologist friends, shut down. I mean, how could Johnny Law *not* uncover evidence of conspiracy where conspiracies exist? Just find it, invent some reason to get a warrant, then boom! Bad guys caught.
  7. The Wrong Guy Member

    WikiLeaks’ Julian Assange Calls on Computer Hackers to Unite Against NSA Surveillance

    WikiLeaks founder Julian Assange addressed a major gathering of computer experts Monday at the Chaos Communication Congress in Hamburg, Germany, calling on them to join forces in resisting government intrusions on Internet freedom and privacy. We play highlights from Assange’s speech, as well as the one given by Sarah Harrison, the WikiLeaks member who accompanied Edward Snowden to Russia. We also hear from independent journalist and security expert Jacob Appelbaum, who reveals a spying tool used by the National Security Agency known as a "portable continuous wave generator." The remote-controlled device works in tandem with tiny electronic implants to bounce invisible waves of energy off keyboards and monitors to see what is being typed. It works even if the target computer is not connected to the Internet.

    Continued with video and transcript here:
    • Like Like x 1
  8. The Wrong Guy Member

    Howard County finds a customer for its reclaimed waste water: The NSA | Los Angeles Times

    Howard County has agreed to supply treated wastewater to cool a massive computer center being built at Fort Meade by the National Security Agency — a money-saving, environment-conserving deal that officials say could serve as a model for others.

    The NSA is footing the cost of building a pump station, estimated at $40 million, and will pay the county up to $2 million a year for treated water that would otherwise be dumped into the Little Patuxent River. The station is to supply up to 5 million gallons of reclaimed wastewater per day when the NSA computer center opens in 2016.

    "There are so many benefits to this project," said Howard County Executive Ken Ulman.

    But NSA critics see an opportunity to disrupt the agency's controversial surveillance activities. A coalition of rights groups has targeted similar deals elsewhere — notably in Utah, where the NSA recently completed a $1.5 billion data center — lobbying state lawmakers to make it illegal for local governments to supply water, energy or other utilities to the agency.

    "Maryland is one of the most crucial states in this national campaign," said Shahid Buttar, executive director of the Bill of Rights Defense Committee in Washington. "Because Congress has been so abysmally dysfunctional and inactive in the oversight arena for the last 10 years, the municipal checks and balances are really all that we the people have had an opportunity to exercise."

    Continued here:,0,7823084,full.story
    • Like Like x 1
  9. muldrake Member

    Have to say it.


    I wouldn't have gone about it that way and I have serious questions about why you did the way you did.

    But fuck that bullshit. You dun good. You definitely dun got backtraced but it didn't matter.

    You're a fucking hero anyway.

    The Obama Administration can eat a bowl of tiny penises, which it has earned, for its complicity in crimes against humanity.
    • Like Like x 7
  10. Anonymous Member

    ^^^ This!
    • Like Like x 1
  11. The Wrong Guy Member

    New York Times and Guardian editorials say Edward Snowden deserves clemency | The Raw Story

    Both the New York Times and U.K. paper the Guardian published editorials on New Year’s Day calling for clemency for NSA whistleblower Edward Snowden. The publications said that Snowden’s revelations may have revealed some state secrets as part of his mission to expose the National Security Agency’s massive spying apparatus, but that the revelations serve the greater need of informing the public that their privacy is being violated.

    Snowden affair: the case for a pardon | The Guardian

    Snowden gave classified information to journalists, even though he knew the likely consequences. That was an act of courage.

    Edward Snowden, Whistle-Blower | The New York Times

    He may have committed a crime, but he has done his country a great service.
    • Like Like x 3
  12. laughingsock Member

    • Like Like x 1
  13. The Wrong Guy Member

    • Like Like x 1
  14. The Wrong Guy Member

    NSA dreams of quantum computer that can break encryption | Ars Technica

    The National Security Agency is conducting what it calls "basic research" to determine whether it's possible to build a quantum computer that would be useful for breaking encryption.

    The news isn't surprising — it would be surprising if the NSA wasn't researching quantum computing given the measures it's taken to undermine encryption standards used to protect Internet communications. The NSA's quantum work was described in documents leaked by Edward Snowden and published today in the Washington Post. A three-page NSA document describes a project to conduct "basic research in quantum physics and architecture/engineering studies to determine if, and how, a cryptologically useful quantum computer can be built."

    This is part of a $79.7 million research program called "Penetrating Hard Targets." A project goal for fiscal 2013 was to "Demonstrate dynamical decoupling and complete quantum control on two semiconductor qubits," the basic building block of a large-scale quantum computer. The NSA description of the program says the agency will "continue research of quantum communications technology to support the development of novel Quantum Key Distribution (QKD) attacks and assess the security of new QKD system designs."

    Continued here:
    • Like Like x 1
  15. The Wrong Guy Member

    Justice Dept. appeals ruling on NSA snooping | CNN

    The Justice Department on Friday appealed a December federal court decision threatening the National Security Agency's program that collects data on nearly every phone call made in the United States.

    The ruling by U.S. District Judge Richard Leon in Washington found the program was likely unconstitutional.

    Another federal judge in New York has since ruled in a separate case the program is lawful.

    The American Civil Liberties Union, which brought that lawsuit, is appealing the ruling.

    Split decisions likely set the stage for legal wrangling over the course of the coming year that could ultimately result in a Supreme Court case.

    Continued here:
    • Like Like x 1
  16. Anonymous Member

    • Like Like x 1
  17. The Wrong Guy Member

    U.S. court allows phone 'metadata' collection for three months more | Reuters

    The secretive U.S. Foreign Intelligence Surveillance Court on Friday renewed the authority of U.S. intelligence agencies to collect data on millions of Americans' telephone calls in a program that has set off a legal battle over privacy rights.

    The court allowed the intelligence community to collect metadata from phone companies, the Office of Director of National Intelligence James Clapper said in a news release.

    The release offered almost no details about the ruling, but a U.S. official said the authority was renewed for three months, and that it applied to the entire metadata collection program.

    Continued here:
    • Like Like x 2
  18. The Wrong Guy Member

    Motorola Skin Tattoo Patent Contains Bizarre Big Brother Twist | Patently Apple

    In June 2013 Patently Apple reported on both Apple and Motorola looking to introduce device authentication systems for mobile devices. While Apple's Touch ID has since come to market with their new iPhone 5S, Motorola is still working on their own system. One of Motorola's more intriguing authentication system options includes the use of a consumer applied electronic skin tattoo. Motorola first openly discussed this system with Walt Mossberg during their annual D11 conference held in May of 2013 or just weeks prior to Edward Snowden's NSA spying revelations. All of sudden, Motorola's e-skin tattoo authentication system doesn't seem to be as innocent as first thought, especially in light of a bizarre admission that we found in a Motorola patent application published by the US Patent Office.


    While reading Motorola's patent, we discovered a very bizarre entry as follows: "Optionally, the electronic skin tattoo can further include a galvanic skin response detector to detect skin resistance of a user. It is contemplated that a user that may be nervous or engaging in speaking falsehoods may exhibit different galvanic skin responses than a more confident, truth telling individual."

    What is this entry doing in a consumer friendly invention? Could this aspect of the technology be representing a next generation lie detector apparatus? Could this technology be for military interrogations? Is this a possible tool for the police or other governmental agencies? However this ends up being used in the market, its potential for un-friendly applications is rather high.
    • Like Like x 2
  19. The Wrong Guy Member

    WikiLeaks And Edward Snowden | Business Insider

    A strange exchange occurred when members of the anti-secrecy organization WikiLeaks were asked about the flight of Edward Snowden at a Chaos Computer Club conference last week.

    WikiLeaks has been credited with helping Snowden escape extradition to the U.S. after the 30-year-old left Hawaii with at least hundreds of thousands of classified NSA files and flew to Hong Kong on May 20.

    At the Chaos Computer Club conference on Dec. 29, Assange said that "WikiLeaks was able to rescue Edward Snowden because we are an organized institution with collective experience."

    Top WikiLeaks adviser Sarah Harrison, who met Snowden in Hong Kong and accompanied him to Moscow, then asked the last question coming from the Internet:

    "What was the most difficult part on getting Snowden out of the U.S.?"

    Assange, Harrison and "American WikiLeaks Hacker" Jacob Appelbaum all laughed, and then Appelbaum said: "That’s quite a loaded question."

    Assange then said: "Yeah, that’s interesting to think whether we can actually answer that question at all. I’ll give a variant of the answer because of the legal situation it is a little bit difficult."

    That is a very peculiar collective response. Most people have not considered that WikiLeaks became involved with Snowden before June 12, when the former CIA technician contacted the organization after outing himself.

    So the "loaded" question could have easily been pointed out as unsound, and Assange could have denied that WikiLeaks contacted Snowden before he reached out from China.

    Instead, the 42-year-old Australian questioned whether the question could answered at all.

    That's not to say that the exchange proves that WikiLeaks abetted Snowden's theft and getaway. But the reaction is concerning, given the renegade publisher's closeness to the Kremlin and the fact that the two journalists who received documents from Snowden in Hong Kong (Laura Poitras and Glenn Greenwald) both sit of the board of a foundation launched to crowd-source funding for WikiLeaks.

    Continued here:
    • Like Like x 2
  20. The Wrong Guy Member

    • Like Like x 3
  21. Kilia Member

    Umm....doesn't GOGGLE own Motorola cell phones?
  22. Anonymous Member

    • Like Like x 4
  23. The Wrong Guy Member

    • Like Like x 2
  24. Anonymous Member

    • Like Like x 2
  25. The Internet Member

    Sounds like an e-meter.

    How come it isn't common knowledge yet that galvanic skin resistance is not a reliable indicator of "truth telling"?
    • Like Like x 1
  26. The Wrong Guy Member

    NSA exploring alternatives to holding database of domestic phone logs | The Washington Post

    The National Security Agency is exploring how it could relinquish control of the massive database of domestic phone logs that has been the focus of an intense national debate, according to current and former officials briefed on the discussions.

    The agency, in response to political and other pressures, is examining whether there are feasible ways for third parties such as the phone companies to hold the data while still allowing the agency to exploit the records, the officials said.

    The intelligence community is motivated, in part, because Congress likely will not renew the NSA’s bulk collection authority when the statute it is based on expires in June 2015. It is also possible that Congress, which is debating legislation to halt the NSA program, could take action sooner.

    A former senior intelligence official said he expects that the White House “will start the path of shifting it to the phone companies” but that “it’s not going to happen instantly.”

    Describing one possible scenario, a second former intelligence official said: “The phone companies would run the analytics and provide you the analysis. Hey, this bad guy is talking to this bad guy.”

    Having the phone companies analyze the records on behalf of the government, depending on how it is done, may still raise privacy, cost and other concerns.

    Continued here:
    • Like Like x 1
  27. Anonymous Member

    • Like Like x 1
  28. Anonymous Member

    Perhaps of some interest:
    Former NSA whistleblowers plead for chance to brief Obama on agency abuses

    A group of former National Security Agency insiders who went on to become whistleblowers have written a letter to President Barack Obama, requesting a meeting with him to offer “a fuller picture” of the spy agency’s systemic problems.

    The group of four intelligence specialists - William Binney, Thomas Drake, Edward Loomis and Kirk Wiebe - who worked at the NSA for “a total of 144 years, most of them at senior levels” stressed in the letter the need for Obama to address what they’ve seen as abuses that violated Americans’ Fourth Amendment rights and that have made proper, effective intelligence gathering more difficult.

    “What we tell you in this Memorandum is merely the tip of the iceberg,” the group, calling themselves the Veteran Intelligence Professionals for Sanity (VIPS), wrote. “We are ready – if you are – for an honest conversation. That NSA’s bulk collection is more hindrance than help in preventing terrorist attacks should be clear by now despite the false claims and dissembling.”

    The group criticized the NSA for its vast data collection policies, which they say bars the agency from effectively tracking actual terror plots in advance, such as the Boston Marathon bombing in April 2013.

    The “NSA is drowning in useless data lacking adequate privacy provisions, to the point where it cannot conduct effective terrorist-related surveillance and analysis,” they write. “A recently disclosed internal NSA briefing document corroborates the drowning, with the embarrassing admission, in bureaucratese, that NSA collection has been ‘outpacing’ NSA’s ability to ingest, process, and store data – let alone analyze the take.”

    The letter ridicules current and former intelligence community leaders like Director of National Intelligence James Clapper - for lying to Congress - and current NSA director Keith Alexander and its former chief Michael Hayden for purposely distorting the efficiency and vitality of the agency’s surveillance programs

    “Surely you intuit that something is askew when NSA Director Keith Alexander testifies to Congress that NSA’s bulk collection has ‘thwarted’ 54 terrorist plots and later, under questioning, is forced to reduce that number to one, which cannot itself withstand close scrutiny. And surely you understand why former NSA Director and CIA Director Michael Hayden protests too much and too often on Fox News and CNN, and why he and House Intelligence Committee Mike Rogers publicly suggest that whistleblower Edward Snowden be put on your Kill List.”


    The VIPS revisit much of the information already reported, including the case of NSA senior executive Drake’s attempts to convince agency heads that a program developed by Binney should have been used for crucial intelligence gathering. THINTHREAD, produced for a relatively small amount of money shortly before the 9/11 attacks, sorted information without violating the Fourth Amendment or NSA’s privacy standards, the VIPS write.

    But instead, then-NSA director Michael Hayden chose a different program, STELLARWIND, produced by defense contractors that cost billions of dollars while violating Fourth Amendment and privacy rights. Drake sounded the alarm, continuing to push for THINTHREAD use even after all its developers left the NSA in October 2011. In his steady support for the discarded program, he found out how much actionable intelligence the NSA had legally gathered that could have thwarted the 9/11 attacks, he says.

    Upon being asked to prepare a report at the request of Congress on the NSA’s knowledge of the 9/11 plot and hijackers before September 11, 2001, Drake says the agency decided to balk at taking any responsibility.

    “After a couple of weeks [SIGINT chief Maureen] Baginski rejected my draft team Statement for the Record report and removed me from the task,” Drake writes. “When I asked her why, she said there was a ‘data integrity problem’ (not further explained) with my draft Statement for the Record. I had come upon additional damaging revelations. For example, NSA had the content of telephone calls between AA-77 hijacker Khalid al-Mihdhar in San Diego, CA, and the known al-Qaeda safe house switchboard in Yemen well before 9/11, and had not disseminated that information beyond NSA.”

    “In short, when confronted with the prospect of fessing up, NSA chose instead to obstruct the 9/11 congressional investigation, play dumb, and keep the truth buried, including the fact that it knew about all inbound and outbound calls to the safe house switchboard in Yemen. NSA’s senior leaders took me off the task because they realized – belatedly, for some reason – that I would not take part in covering up the truth about how much NSA knew but did not share.”

    The letter, with the subject line “Input for Your Decisions on NSA,” is timed to coincide with deliberations currently happening in the Obama administration to confront recommended NSA reforms from the panel.
    Last month, the five-person review group, made up of intelligence and administration insiders, assembled by Obama presented the White House with a report suggesting that the NSA consider dozens of recommendations meant to reform some of the operations exposed through leaks supplied by Snowden. After that report was completed but before the president went on vacation in late December, Obama said he’d make a "pretty definitive statement about all of this in January."

    The President is now expected to weigh in on those recommendations publically during the annual State of the Union address scheduled for January 28 in Washington.

    Obama will reportedly hold a closed-door meeting with select officials on this week in advance of the public speech to discuss in private the future of the controversial surveillance operations waged by the NSA.
    • Like Like x 2
  29. Anonymous Member

  30. Anonymous Member
  31. The Wrong Guy Member

    • Like Like x 1
  32. Anonymous Member
    • Like Like x 1

  33. Goddamn fucking lies & lairs !!! Goddamn fucking lies & lairs !!! Goddamn fucking lies & lairs !!! Goddamn fucking lies & lairs !!! Goddamn fucking lies & lairs !!! Goddamn fucking lies & lairs !!! Goddamn fucking lies & lairs !!! Goddamn fucking lies & lairs !!! Goddamn fucking lies & lairs !!! Goddamn fucking lies & lairs !!! Goddamn fucking lies & lairs !!! Goddamn fucking lies & lairs !!! Goddamn fucking lies & lairs !!! Goddamn fucking lies & lairs !!! Goddamn fucking lies & lairs !!! Goddamn fucking lies & lairs !!! Goddamn fucking lies & lairs !!! Goddamn fucking lies & lairs !!! Goddamn fucking lies & lairs !!! Goddamn fucking lies & lairs !!! Goddamn fucking lies & lairs !!! Goddamn fucking lies & lairs !!! Goddamn fucking lies & lairs !!! Goddamn fucking lies & lairs !!! Goddamn fucking lies & lairs !!! Goddamn fucking lies & lairs !!! Goddamn fucking lies & lairs !!! Goddamn fucking lies & lairs !!! Goddamn fucking lies & lairs !!! Goddamn fucking lies & lairs !!! Goddamn fucking lies & lairs !!! Goddamn fucking lies & lairs !!! Goddamn fucking lies & lairs !!! Goddamn fucking lies & lairs !!! Goddamn fucking lies & lairs !!! Goddamn fucking lies & lairs !!! Goddamn fucking lies & lairs !!! Goddamn fucking lies & lairs !!! Goddamn fucking lies & lairs !!! Goddamn fucking lies & lairs !!! Goddamn fucking lies & lairs !!! Goddamn fucking lies & lairs !!! Goddamnfucking lies & lairs !!! Goddamn fucking lies & lairs !!! Goddamn fucking lies & lairs !!! Goddamn fucking lies & lairs !!! Goddamn fucking lies & lairs !!! Goddamn fucking lies & lairs !!! Goddamn fucking lies & lairs !!! Goddamn fucking lies & lairs !!! Goddamn fucking lies & lairs !!! Goddamn fucking lies & lairs !!! Goddamn fucking lies & lairs !!! Goddamn fucking lies & lairs !!! Goddamn fucking lies & lairs !!! Goddamn fucking lies & lairs !!! Goddamn fucking lies & lairs !!! Goddamn fucking lies & lairs !!! Goddamn fucking lies & lairs !!! Goddamn fucking lies & lairs !!! Goddamn fucking lies & lairs !!! Goddamn fucking lies & lairs !!! Goddamn fucking lies & lairs !!! Goddamn fucking lies & lairs !!! Goddamn fucking lies & lairs !!! Goddamn fucking lies & lairs !!! Goddamn fucking lies & lairs !!! Goddamn fucking lies & lairs !!! Goddamn fucking lies & lairs !!! Goddamn fucking lies & lairs !!! Goddamn fucking lies & lairs !!! Goddamn fucking lies & lairs !!! Goddamn fucking lies & lairs !!! Goddamn fucking lies & lairs !!! Goddamn fucking lies & lairs !!! Goddamn fucking lies & lairs !!! Goddamn fucking lies & lairs !!! Goddamn fucking lies & lairs !!! Goddamn fucking lies & lairs !!! Goddamn fucking lies & lairs !!! Goddamn fucking lies & lairs !!!

    A Shit article from Steven Levy. WTF! is going on over at Wired Magazine?

    What A Bunch of fucking WANKERS
  34. DeathHamster Member

    Further on down ->
    • Like Like x 2
  35. sallysock Member

    • Like Like x 1
  36. Anonymous Member

    I see what you did thar.jpg

    I See What You Did Thar!
    • Like Like x 2
  37. White Tara Global Moderator

    I am trying very hard to pretend I didn't see what was done thar. :rolleyes: A long and slippery slope, remove one Gofundme, remove them all. That would be a shame IMHO.
    • Like Like x 3

Share This Page

Customize Theme Colors


Choose a color via Color picker or click the predefined style names!

Primary Color :

Secondary Color :
Predefined Skins