2015: Guess Who Wasn’t Invited to the CIA’s Hacker Jamboree?

Apple, that’s who. Or Microsoft, or any of the other vendors whose products US government contractors have successfully exploited according to a recent report in the Intercept. While we’re not surprised that the Intelligence Community is actively attempting to develop new spycraft tools and capabilities—that’s their job—we expect them to follow the administration’s rules of engagement. Those rules require an evaluation under what’s known as the “Vulnerabilities Equities Process.” In the White House’s own words , the process should usually result in disclosing software vulnerabilities to vendors, because “in the majority of cases, responsibly disclosing a newly discovered vulnerability is clearly in the national interest.” Nevertheless, the Intercept article describes an annual CIA conference known as the Trusted Computing Base (TCB) Jamboree 1 at which members of the intelligence community present extensively on software vulnerabilities and exploits to be used in spying operations. At the 2012 TCB Jamboree, presenters […] Read More

Movement to Declassify 9/11 Information Gathers Momentum … 9/11 Commission Chairs and Congressmen Call for Declassification

The 9/11 Commission Co-Chairs – Lee Hamilton and Thomas Kean – have called for the 28-page section of the 9/11 Commission Report which is classified to be declassified. Kean said that 60-70% of what was classified shouldn’t have been classified in the first place: Congressman Thomas Massie read the 28 classified pages of the Joint Intelligence Committee Inquiry into 9/11 (the joint Senate and House investigation into 9/11) and immediately called for them to be released to the public: A bipartisan bill – introduced by congressmen Walter B. Jones (Republican from North Carolina) and Stephen Lynch (Democrat from Massachusetts) – would declassify the 28 pages of the Joint Inquiry which implicate the Saudi government. Former Congressman Ron Paul is also demanding the 28 pages be declassified: The Co-Chair of the congressional investigation into 9/11 – Bob Graham – and 9/11 Commissioner and former Senator Bob Kerrey are calling for […] Read More

2014: Is Convenience Creating Hazards In The Digital Age?

Home automation technology: is it an asset or a liability? Alternately referred to as “The Internet of Things,” such systems allow homeowners to control multiple devices within their house, which communicate with each other via wireless technology. However egalitarian this may sound, it’s worth noting that such systems do pose multiple security risks. Part of what’s alarming about this situation is that Google recently acquired the home automation tech developer Nest. On the one hand, Google has done a tremendous amount to create an experience for internet browsers that weeds out marketing ploys and, ideally speaking, takes users to the sites which are most relevant to their search queries. On the other hand, because so many people use Google, they have comprehensive data about virtually everyone in the developed world, and they’ve also been working, rather pro-actively, towards increasing internet availability in remote corners of the United States, as […] Read More

2013: National Security Agency Employee Manual

Security Guidelines This handbook is designed to introduce you to some of the basic security principles and procedures with which all NSA employees must comply. It highlights some of your security responsibilities and provides guidelines for answering questions you may be asked concerning your association with this Agency. Although you will be busy during the forthcoming weeks learning your job, meeting co-workers, and becoming accustomed to a new work environment, you are urged to become familiar with the security information contained in this handbook. Please note that a listing of telephone numbers is provided at the end of this handbook should you have any questions or concerns. Introduction In joining NSA you have been given an opportunity to participate in the activities of one of the most important intelligence organizations of the United States Government. At the same time, you have also assumed a trust which carries with it […] Read More

2005: NSA and the Clipper Chip

by Chuck Dupree I wrote what follows in 1995 as a letter to my Congressional representatives. The final product was significantly longer than I intended, as I got caught up in recounting the abuses of the Nixon era. A discussion of the Clipper chip is not likely to interest most readers these days. (Briefly, it was a government-approved encryption chip with a built-in back door, called the Law Enforcement Exploitation Field.) Nevertheless, I include this document here for two reasons. Mainly, because the first two-thirds recounts some history that seems more relevant than ever given the attacks on privacy and liberty we’;ve suffered since 9/11. Secondarily, because it’;s appeared around the web in bastardized form (frequently missing the third word of the first sentence, for instance). It’;s often been marked as copyrighted by Quadralay Corporation, but in fact Quadralay had nothing to do with it and would, I expect, […] Read More

2013: Israeli Responsibility For Hacking Millions Of French Phones?

By Stephen Lendman Steve Lendman Blog Mossad’s credentials are notorious. They’re well known. Its expertise is acknowledged. Its rap sheet is longstanding and nefarious. Its tactics include targeted assassinations, satellite, drone and other type spying, hacking and espionage expertise, computer viruses, other cyber attacks, bombings, sabotage, and other lawless practices. On October 25, France’s Le Monde headlined “The NSA’s intern inquiry about the Elysee hacking revealed.” Edward Snowden connected important dots for millions. Documents he released included “a four-page internal NSA memo,” said Le Monde. It’s marked “top secret.” France sent it. It said French secret service technical director Bernard Barbier and National Agency for IT systems security head Patrick Pailloux “are coming to ask their American counterparts, whom they suspect are (conducting Elysee Palace espionage) for an explanation.” It’s the official French president’s residence. It includes his office. It’s where government ministers meet to discuss official business. France […] Read More

2013: Internet freedom on decline worldwide as governments tighten grip – report

Authors highlighted greater internet activism as a bright spot among worrying developments. A protest against cybercrime law near the presidential palace in Manila October 13, 2012. (Reuters / Cheryl Ravelo) Improved surveillance, takedown of opposition websites for “illegal content” and paid pro-government commentators are among the increasingly sophisticated tools used by authorities to restrict internet freedom, a new report claims. The 2013 Freedom on the Net report, compiled by non-profit Freedom House, says that 34 out of the 60 countries it surveyed suffered a falloff in internet freedom over the past year. Iran, Cuba, China and Syria were ranked as countries with the greatest restrictions. China, which blocks millions of websites and employs thousands-strong armies of censors, “led the way in expanding an elaborate technological apparatus for system internet censorship, while further increasing offline coercion and arrests to deter freedom of expression online.” Iceland, Estonia and Germany took the […] Read More

2013: Satanic Super Soldiers: The Sinister Reality of Trauma-Based Mind Control

Mind control? How would you know if you were…? A fearsome concept, a historic reality and a super-secret underground burgeoning technology. Are millions now under forms of mind control that will be used in the future to control, alter and transmute hundreds of millions more? Now just like before Auschwitz was ever visited the skeptic will ask with a scowl….How can this be? What you’re about to read is not conjecture or just flying saucer conspiracy. The victims of this menace are already her by the millions. Their pain, stolen history and disfigured minds have sought to find reality, but reconstructing what has happened to them is like working on a 10,000 piece puzzle that the wind just scattered all over the ground. Though the process of figuring it all out piece by piece is arduous the growing puzzle is revealing the source, the perpetrators and purpose behind such […] Read More

COMPUTER BIG BROTHER STATE

by Paul Baird http://www.surveillanceissues.com/article_computerstate.pdf There is no doubt that the global conquest which has been secretly carried out by the U.S based military/agency/corporate crime conglomerate would not have been possible without the vast capabilities of extremely advanced computer systems. These technologies certainly enable the U.S and its close allies to exert absolute control over many organisations and individuals including the worldwide mass media and all telecommunications networks. They thereby determine the ebb and flow of most information. Computer technology has also allowed the U.S and its allies to secretly amass space and ground-based weaponry which goes well beyond the knowledge or understanding of the general population. This equipment is used not so much on genuine enemies as it is on those innocent, concerned citizens who seek to address issues like the undue influence exercised by the crime conglomerate over global affairs; finance, politics, public opinion, weather and much more. […] Read More