Raw List of NSA Nicknames and Codewords

istock_000004093101small

Below is a listing of nicknames and codewords related to US Signals Intelligence (SIGINT) and Communications Security (COMSEC). Most of them are from the NSA, some are from other government or military agencies. Some of them also have an abbreviation which is shown in brackets.

NICKNAMES are generally unclassified. NSA uses single word nicknames, outside NSA they usually consist of two separate words, with the first word selected from alphabetical blocks that are assigned to different agencies by the Joint Staff. Usually, nicknames are printed using all capital letters.

CODEWORDS are always classified and always consist of a single word. Active codewords, or their three-letter abbreviations, which identify a classification compartment always need to be shown in the classification or banner line. Normally, codewords are printed using all capital letters.

Due to very strict secrecy, it’s not always clear whether we see a nickname or a codeword, but terms mentioned in public sources like job descriptions are of course unclassified nicknames.

Please keep in mind that a listing like this will always be work in progress (this list has been copied on some other websites and forums, but only this one is being updated frequently!).

See also the lists of Abbreviations and Acronyms and GCHQ Nicknames and Codewords

A

ACIDWASH – Covert access point for a mobile phone network in Afghanistan

ACORN – Retired SIGINT product codeword

ACCORDIAN – Type 1 Cryptographic algorithm used in a number of crypto products

AETHER – ONI tool “to correlate seemingly disparate entities and relationships, to identify networks of interest, and to detect patterns”

AGILITY – NSA internet information tool or database

AGILEVIEW – NSA internet information tool or database

AIRGAP – Database which deals with priority DoD missions

AIRHANDLER – NSA-G operations center for producing intelligence from Afghanistan

AIRSTEED – Cell phone tracking program of the Global Access Operations (GAO)

AIRWOLF – ?

ALAMITO – The mission of Mexico at the United Nations in New York

ALPHA – Retired SIGINT Exchange Designator for Great Britain

ALTEREGO – A type of Question-Focused Dataset based on E.164

AMBERJACK – SIGINT/EW collection and exploitation system

AMBLE – Retired SIGINT product codeword

AMBULANT (AMB) – SI-ECI compartment related to the BULLRUN program

ANCHORY – NSA software system which provides web access to textual intelligence documents

ANGRYNEIGHBOR – Family of radar retro-reflector tools used by NSA’s TAO division

APALATCHEE – The EU mission in New York

APERIODIC – SI-ECI compartment related to the BULLRUN program

APEX – IP packet reconstruction tool(?)

APPLE1 – Upstream collection site

APSTARS – NSA tool that provides “semantic integration of data from multiple sources in support of intelligence processing”

ARKSTREAM – Implant used to reflash BIOS, installed by remote access or intercepted shipping

ARTIFICE – SSO corporate partner (foreign?)

AUTOSOURCE – NSA tool or database

AQUACADE – A class of SIGINT spy satellites (formerly RHYOLITE)

AQUADOR – Merchant ship tracking tool

ARCA – SIGINT Exchange Designator for ?

ARGON – Satellite mapping program

ARTIFICE – SSO corporate partner under the STORMBREW program

ASPHALT – Project to increase the volume of satellite intercepts at Menwith Hill Station

ASPHALT-PLUS – See above

ASSOCIATION – NSA analytical tool or database

ATALANTA – EU anti-piracy operation

ATLAS – CSEC database

AUNTIE – SI-ECI compartment related to the BULLRUN program

AUTO ASSOCIATION – Second party database

B

BAMBOOSPRING – ?

BANANAGLEE – Software implant that allows remote Jetplow firmware installation

BANISTER – The Columbian trade bureau in New York

BANYAN – NSA tactical geospatial correlation database

BASECOAT – Program targeting the mobile phone network on the Bahamas

BASTE – Retired SIGINT product codeword

- Type 1 Block cipher algorithm, used with many crypto products

BEACHHEAD – Computer exploit delivered by the FERRETCANON system

BEAMER – ?

BELLTOPPER – NSA database

BELLVIEW – SIGINT reporting tool

- List of personnel cleared for access to highly sensitive information or operations

BINOCULAR – Former NSA intelligence dissemination tool

BIRCHWOOD – Upstream collection site

BLACKBOOK – ODNI tool for large-scale semantic data analysis

BLACKFOOT – The French mission at the United Nations in New York

BLACKHEART – Collection through FBI implants

BLACKMAGIC – NSA database or tool

BLACKPEARL – NSA database of survey/case notations(?)

BLACKWATCH – NSA reporting tool

- Program for intercepting phone and internet traffic at switches in the US (since 1978)

BLINDDATE – Hacking tools for WLAN collection, plus GPS

BLUEANCHOR – Partner providing a network access point for the YACHTSHOP program

BLUEFISH (BLFH) – Compartment of the KLONDIKE control system

BLUEZEPHYR – Sub-program of OAKSTAR

BOOTY – Retired SIGINT product codeword

- DNI and DNR metadata visualization tool

BOURBON – Joint NSA and GCHQ program for breaking Soviet encryption codes (1946-?)

BROKENRECORD – NSA tool

BROKENTIGO – Tool for computer network operations

BROADSIDE – Covert listening post in the US embassy in Moscow

BROOMSTICK – ?

BRUNEAU – Operation against the Italian embassy in Washington DC using LIFESAVER techniques

BRUTUS – Tool or program related to MARINA

BUFFALOGREEN – The name ORANGECRUSH was known to Polish partners

BULLDOZER – PCI bus hardware implant on intercepted shipping

- An NSA COI for decryption of network communications

BULLSEYE – NSG High-Frequency Direction-Finding (HF-DF) network (now called CROSSHAIR)

(BYE) – Retired SCI control system for overhead collection systems (1961-2005)

BYZANTINE – First word of nicknames for programs involving defense against Chinese cyber-warfare and US offensive cyber-warfare

BYZANTINE ANCHOR (BA) – A group of Chinese hackers which compromised multiple US government and defense contractor systems since 2003

BYZANTINE CANDOR (BC) – A group of Chinese hackers which compromised a US-based ISP and at least one US government agency

BYZANTINE FOOTHOLD (BF) – A group of Chinese hackers who attacked various international companies and internet services providers

BYZANTINE HADES (BH) – A concerted effort against Chinese hackers who attacked the Pentagon and military contractors. Probably renamed to the LEGION-series

C

CADENCE – NSA database with tasking dictionaries

CAJABLOSSOM – Automated system for analysing and profiling internet browsing histories

CALYPSO – Remote SATCOM collection facility

CANDYGRAM – Laptop mimicking GSM cell tower, sends out SMS whenever registered target enters its area, for tracking and ID of targets

- Class of COMINT spy satellites (1968-1977)

CANOE – Retired SIGINT product codeword

CANNON LIGHT – Counterintelligence database of the US Army

CAPRICORN – (former?) database for voice data

CAPTIVATEDAUDIENCE – Computer implant plug-in to take over a targeted computer’s microphone and record conversations taking place near the device

CARBOY – Second Party satellite intercept station at Bude, England

CARBOY II – Units of ECHELON which break down satellite links into telephone and telegraph channels

CARILLON – NSA high performance computing center, since 1976 made up of IBM 360s and later four IBM 3033s

CASport – NSA user authorization service

- Computer system capable of automatically analyzing the massive quantities of data gathered across the entire intelligence community

CENTER ICE – Data center for the exchange of intelligence regarding Afghanistan among the members of the 14-Eyes/SSEUR

CENTERMASS – NSA tool or database

CERF CALL MOSES1 – Contact Event Record Format – for certain telephony metadata

CHALKFUN – Analytic tool, used to search the FASCIA database

CHASEFALCON – Major program of the Global Access Operations (GAO)

CHEER – Retired SIGINT product codeword

CHESS – Compartment of TALENT KEYHOLE for the U-2 spy plane

CHEWSTICK – NSA tool or database

CHIMNEYPOOL – Framework or specification of GENIE-compliance for hardware/software implants

CHIPPEWA – Some communications network, involving Israel

CHUTE – Retired SIGINT product codeword

CIMBRI – Probably a metadata database

CINEPLEX – NSA tool or database

CLASSIC BULLSEYE – Worldwide ocean SIGINT surveillance system (1960’s-?)

CLEVERDEVICE – Upstream collection site

CLOUD – NSA database

COASTLINE – NSA tool or database

COBALTFALCON – Sub-program of OAKSTAR

COBRA FOCUS – NSA-G operations center for producing intelligence from Iraq

COGNOS – NSA tool or database

CORDOBA – Type 2 Cryptographic algorithm used in a number of crypto chips

COMBAT SENT – Reconaissance operation

COMMONDEER – Computer exploit for looking whether a computer has security software

COMMONVIEW – NSA database or tool

CONFIRM – NSA database for personell access

CONJECTURE – Network compatible with HOWLERMONKEY

CONTRAOCTAVE – NSA telephony tasking database Used to determine ‘foreigness’

CONVEYANCE – Voice content ingest processor

COPILOT – System that automatically scans digital data for things like language, phone and creditcard numbers and attachments

COPSE – Retired SIGINT product codeword

CORALINE – NSA satellite intercept station at Sabena Seca at Puerto Rico (closed)

CORALREEF – Database for VPN crypto attack data

- A series of photographic surveillance satellites (1959-1972)

CO-TRAVELER – Set of tools for finding unknown associates of intelligence targets by tracking movements based upon cell phone locations

COTTONMOUTH (CM) – Computer implant devices used by NSA’s TAO division

COTTONMOUTH-I (CM-I) – USB hardware implant providing wireless bridge into target network and loading of exploit software onto target PCs, formerly DEWSWEEPER

COTTONMOUTH-II (CM-II) – USB hardware host tap provides covert link over USP into target’s network co-located with long haul relay; dual-stacked USB connector, consists of CM-I digital hardware plus long haul relay concealed in chassis; hub with switches is concealed in a dual stacked USB connector and hard-wired to provide intra-chassis link.

COTTONMOUTH-III (CM-III) – Radio Frequency link for commands to software implants and data infiltration/exfiltration, short range inter-chassis link within RJ45 Dual Stacked USB connector

COURIERSKILL – NSA Collection mission system

COWBOY – The DICTIONARY computer used at the Yakima station of ECHELON

CRANKSHAFT – Codename for Osama bin Laden

CREAM – Retired SIGINT product codeword

CREDIBLE – Transport of intelligence materials to partner agencies

CREST – Database that automatically translates foreign language intercepts in English

CRISSCROSS – Database of telecommunications selectors

CROSSBEAM – GSM module mating commercial Motorola cell with WagonBed controller board for collecting voice data content via GPRS (web), circuit-switched data, data over voice, and DTMF to secure facility, implanted cell tower switch

CROSSHAIR – NSG High-Frequency Direction-Finding (HF-DF) network (formerly BULLSEYE)

CROSSBONES – Analytic tool

CRUMPET – Covert network with printer, server and desktop nodes

CULTWEAVE – Smaller size SIGINT database

CYBERTRANS – A common interface to a number of underlying machine translation systems

CYCLONE Hx9 – Base station router, network in a box using Typhon interface

D

DAFF – Codeword for products of satellite imagery

DAMEON – Remote SATCOM collection facility

DANCINGOASIS (DGO) – SSO program collecting data from fiber optic cables between Europe and the Far East (since 2011)

DANDERSPRITZ – Software tool that spoofs IP and MAC addresses, intermediate redirector node

DANGERMOUSE – Tactical SIGINT collecting system for like cell phone calls

DARDANUS – Remote SATCOM collection facility

DAREDEVIL – Shooter/implant as part of the QUANTUM system

DARKTHUNDER – SSO Corporate/TAO Shaping program

DARKQUEST – Automated FORNSAT survey system

DAUNT – Retired SIGINT product codeword

DECKPIN – NSA crisis cell activated during emergencies

DEEPDIVE – An XKEYSCORE related method

DEITYBOUNCE – Provides implanted software persistence on Dell PowerEdge RAID servers via motherboard BIOS using Intel’s System Management Mode for periodic execution, installed via ArkStream to reflash the BIOS

DELTA – Former SCI control system for intercepts from Soviet military operations

DENIM – Retired SIGINT product codeword

DESPERADO – NSA software tool to prepare reports

DEWSWEEPER – Technique to tap USB hardware hosts

DIKTER – SIGINT Exchange Designator for Norway

DINAR – Retired compartment for intercepts from foreign embassies in Washington

DIONYSUS – Remote SATCOM collection facility

DIRESCALLOP – Method to circumvent commercial products that prevent malicious software from making changes to a computer system

DISCOROUTE – A tool for targeting passively collected telnet sessions

- NSA database for text messages (SMS)

DISTANTFOCUS – A pod for tactical SIGINT and precision geolocation (since 2005)

DIVERSITY – SIGINT Exchange Designator for ?

DOBIE – The South African consulate and mission at the UN in New York

DOCKETDICTATE – Something related to NSA’s TAO division

DOGCOLLAR – A type of Question-Focussed Dataset based on the Facebook display name cookie

DOGHUT – Upstream collection site

DOUBLEARROW – One of NSA’s voice processing databases?

DRAGGABLEKITTEN – An XKEYSCORE Map/Reduce analytic

DREADNOUGHT – NSA operation focused on Ayatollah Khamenei

- Passive collection of emanations (e.g. from printers or faxes) by using a radio frequency antenna

DROPOUTJEEP – STRAITBIZARRE-based software implant for iPhone, initially close access but later remotely

- System for processing data from mobile communication networks

DRUID – SIGINT Exchange Designator for third party countries

- A US military numeral cipher/authentication system

DRYTORTUGAS – Analytic tool

DYNAMO – SIGINT Exchange Designator for Denmark

E

EAGLE – Upstream collection site

- A SIGINT collection network run by Australia, Canada, New Zealand, the United Kingdom, and the United States

ECHO – SIGINT Exchange Designator for Australia

ECRU (EU) – Compartment of the ENDSEAL control system

EDEN – Upstream collection site

EGOTISTICALGIRAFFE (EGGI) – NSA program for exploiting the TOR network

EGOTISTICALGOAT (EGGO) – NSA tool for exploiting the TOR network

EIDER – Retired SIGINT product codeword

EINSTEIN – Cell phone network intercepting equipment used by SCS units

- Intrusion detection system for US government network gateways (deployed in 2004)

EINSTEIN 2 – Second version of the EINSTEIN program for detecting malicious network activity

EINSTEIN 3 – Third version of the EINSTEIN program that will monitor government computer traffic on private sector sites too

ELEGANTCHAOS – Large scale FORNSAT data analysis system

EMBRACEFLINT – Tool for computer network operations

ENDSEAL (EL) – SCI control system

ENDUE – A COI for sensitive decrypts of the BULLRUN program

ENTOURAGE – Directional finder for line of bearing for GSM, UMTS, CDMA, FRS signals, works with NEBULA active interrogator within GALAXY program

EPICSHELTER – Sophisticated data backup system designed by Edward Snowden

ERRONEOUSINGENUITY (ERIN) – NSA tool for exploiting the TOR network

EVENINGEASEL – Program for surveillance of phone and text communications from Mexico’s cell phone network

EVILOLIVE – Iinternet geolocation tool

EVOLVED MUTANT BROTH – Second party database

EYESPY – System that scans data for logos of companies, political parties and other organizations, as well for pictures with faces for facial recognition

F

FACELIFT – Codeword related to NSA’s Special Source Operations division

- NSA corporate partner with access to international cables, routers, and switches (since 1985)

FAIRVIEWCOTS – System for processing telephony metadata collected under the FAIRVIEW program

FALLENORACLE – NSA tool or database

FALLOUT – DNI metadata ingest processor/database

- DNR metadata ingest processor/database

FASCINATOR – Series of Type 1 encryption modules for Motorola digital-capable voice radios

FASHIONCLEFT (FC) – Wrapper used to exfiltrate data of VPN and VoIP communications

FASTBAT – Telephony related database?

FASTFOLLOWER – Tool to identify foreign agents who might tail American case officers overseas by correlating cellphone signals

FASTSCOPE – NSA database

FEEDTROUGH – Software implant for unauthorized access to Juniper firewall models N5XT, NS25, NS50, NS200, NS500, ISG1000

FERRETCANON – Subsystem of the FOXACID system

FINKDIFFERENT (FIDI) – Tool used for exploiting TOR networks

FIRE ANT – Open Source visualisation tool

- NSA key generation scheme, used for exchanging EKMS public keys

FIRETRUCK – SIGINT tool or database

FIREWALK -Bidirectional network implant, passive gigabit ethernet traffic collector and active ethernet packet injector within RJ45 Dual Stacked USB connector, digital core used with HOWLERMONKEY, formerly RADON

- NSA program for securing commercial smartphones

FLARE – Retired SIGINT product codeword

FLATLIQUID – TAO operation against the office of the Mexican president

FLEMING – The embassy of Slovakia in Washington DC

FLINTLOCK – The DICTIONARY computer used at the Waihopai station of ECHELON

FLUXBABBITT – Hardware implant for Dell PowerEdge RAID servers using Xeon processors

FOGGYBOTTOM – Computer implant plug-in that records logs of internet browsing histories and collects login details and passwords used to access websites and email accounts

FOREMAN – Tactical SIGINT database? Used to determine ‘foreigness’

FOURSCORE – (former?) database for fax and internet data

FOXACID (FA?) – System of secret internet servers used to attack target computers

FOXSEARCH – Tool for monitoring a QUANTUM target which involves FOXACID servers

FOXTRAIL – NSA tool or database

FRIARTUCK – VPN Events tool or database (CSEC?)

FREEFLOW-compliant – Supported by TURBULENCE architecture

FREEZEPOST – Something related to NSA’s TAO division

FRONTO – Retired SIGINT Exchange Designator for ?

FROSTBURG – Connection Machine 5 (CM-5) supercomputer, used by NSA from 1991-1997

FROTH – Retired SIGINT product codeword

FRUGALSHOT – FOXACID servers for receiving callbacks from computers infected with NSA spying software

G

GALACTICHALO – Remote SATCOM collection facility

GALAXY – Find/fix/finish program of locating signal-emitting devices of targets

GAMMA (G) – Compartment for highly sensitive communication intercepts

GAMUT – NSA collection tasking tool or database

GARLIC – The NSA satellite intercept station at Bad Aibling (Germany)

GATEKEEPER – NSA user account management system

GAVEL – Retired SIGINT product codeword

GECKO II – System consisting of hardware implant MR RF or GSM, UNITEDRAKE software implant, IRONCHEF persistence back door

GEMINI – Remote SATCOM collection facility

GENESIS – Modified GSM handset for covert network surveys, recording of RF spectrum use, and handset geolocation based on software defined radio

GENIE – Overall close-access program, collection by Sigads US-3136 and US-3137

GHOSTMACHINE – NSA’s Special Source Operations cloud analytics platform

GINSU – Provides software persistence for the CNE implant KONGUR having PCI bus hardware implant BULLDOZER on MS desktop PCs

GILGAMESH – Predator-based NSA geolocation system used by JSOC

GISTQEUE (GQ) – NSA software or database

GJALLER – NSA tool or database

GLINT – Retired SIGINT product codeword

GLOBALBROKER – NSA tool or database

GM-PLACE – Database for the BOUNDLESSINFORMANT tool

GODLIKELESION – Modernization program for NSA’s European Technical Center (ETC) in Wiesbaden in 2011

GODSURGE – Runs on FLUXBABBITT circuit board to provide software persistence by exploiting JTAG debugging interface of server processors, requires interdiction and removal of motherboard of JTAG scan chain reconnection

GOPHERSET – Software implant on GMS SIM phase 2+ Toolkit cards that exfiltrates contact list, SMS and call log from handset via SMS to user-defined phone; malware loaded using USB smartcard reader or over-the-air.

GOSSAMER – SIGINT/EW collection and exploitation system

GOTHAM – Processor for external monitor recreating target monitor from red video

GOURMETTROUGH – Configurable implant for Juniper NetScreen firewalls including SSG type, minimal beaconing

GOUT – Subcompartment of GAMMA for intercepts of South Vietnamese government communications

GOVPORT – US government user authentication service

GRAB – SIGINT satellite program

GREY FOX – The 2003 covername of the Mission Support Activity (MSA) of JSOC

GREYSTONE (GST) – CIA’s highly secret rendition and interrogation programs

GROK – Computer implant plug-in used to log keystrokes

GUMFISH – Computer implant plug-in to take over a computer’s webcam and snap photographs

GUPY – Subcompartment of GAMMA for intercepts from Soviet leadership car phones (1960’s-70’s)

H

HALLUXWATER – Software implant as boot ROM upgrade for Huawei Eudemon firewalls, finds patch points in inbound packet processing, used in O2, Vodafone and Deutsche Telekom

HAMMERCHANT – Implant for network routers to intercept and perform exploitation attacks against data sent through a Virtual Private Network (VPN) and/or phone calls via Skype and other VoIP software

HAMMERMILL – Insertion Tool controls HEADWATER boot ROM backdoor

HAMMERSTEIN – Implant for network routers to intercept and perform exploitation attacks against data sent through a Virtual Private Network (VPN) and/or phone calls via Skype and other VoIP software

HAPPYFOOT – Program that intercepts traffic generated by mobile apps that send a smartphone’s location to advertising networks

HARD ASSOCIATION – Second party database

- An IBM supercomputer used by NSA from 1962-1976

HAVE BLUE – Development program of the F-117A Stealth fighter-bomber

HAVE QUICK (HQ) – Frequency-hopping system protecting military UHF radio traffic

HEADWATER – Permanent backdoor in boot ROM for Huawei routers stable to firmware updates, installed over internet, capture and examination of all IP packets passing through host router, controlled by Hammermill Insertion Tool

HEMLOCK – Operation against the Italian embassy in Washington DC using HIGHLANDS techniques

HERCULES – CIA terrorism database

HERETIC – NSA tool or database

HEREYSTITCH – Collaboration program between NSA units T1222 and SSG

HERMOS – Joint venture between the German BND and another country with access for NSA (2012)

HERON – Retired SIGINT product codeword

HIGHCASTLE – Tactical database?

HIGHLANDS – Technique for collection from computer implants

HIGHTIDE – NSA tool or database

HOBGOBLIN – NSA tool or database

HOLLOWPOINT – Software defined radio platform

HOMEBASE – Database which allows analysts to coordinate tasking with DNI mission priorities

HOMEMAKER – Upstream collection site

HOMINGPIGEON – Program to intercept communications from airplane passengers

HOTZONE – ?

HOWLERMONKEY (HM) – Generic radio frequency (RF) transceiver tool used for various applications

HUFF – System like FOXACID?

HYSON – Retired SIGINT product codeword

I

ICEBERG – Major NSA backbone project

ICREACH – Tool that uses telephony metadata

IDITAROD (IDIT) – Compartment of the KLONDIKE control system

INCENSER – A joint NSA-GCHQ high-volume cable tapping operation, part of the WINDSTOP program

INDIA – SIGINT Exchange Designator for New Zealand (retired)

- Satellite intercept station near Khon Khaen, Thailand (1979-ca. 2000)

INTREPID SPEAR – The 2009 covername of the Mission Support Activity (MSA) of JSOC

- Series of ELINT and COMINT spy satellites (since 2009)

IRATEMONK – Hard drive firmware providing software persistence for desktops and laptops via Master Boot Record substitution, for Seagate Maxtor Samsung file systems FAR NRFS EXT3 UFS, payload is implant installer, shown at internet cafe

IRONAVENGER – NSA hacking operation against an ally and an adversary (2010)

IRONCHEF – Provides access persistence back door exploiting BIOS and SMM to communicate with a 2-way RF hardware implant

IRONSAND – Second Party satellite intercept station in New Zealand

ISHTAR – SIGINT Exchange Designator for Japan (retired)

ISLANDTRANSPORT – Internal messaging service, as part of the QUANTUM system

IVORY – Retired SIGINT product codeword

IVY BELLS – NSA, CIA and Navy operation to place wire taps on Soviet underwater communication cables

J

JACKKNIFE – The NSA satellite intercept station at Yakima (US)

JACKPOT – Internal NSA process improvement program (early 1990s – early 2000s)

JETPLOW – Persistent firmware back door for Cisco PIX and ASA firewall and routers, modifies OS at boot time

JOLLYROGER – NSA database

JOSEKI-1 – Classified Suite A algorithm

JOURNEYMAN – Major NSA backbone project

JUGGERNAUT – Ingest system for processing signals from (mobile?) phone networks

- Class of SIGINT reconnaissance satellites (1971-1983)

JUNIORMINT – Implant digital core, either mini printed circuit board or ultra-mini Flip Chip Module, contains ARM9 micro-controller, FPGA Flash SDRAM and DDR2 memories

K

KAMPUS – SIGINT Exchange Designator for ? (retired)

KANDIK (KAND) – Compartment of the KLONDIKE control system

KARMA POLICE – Second party database

KATEEL – The Brazilian embassy in Washington

KEA – Asymmetric-key Type 2 algorithm used in products like Fortezza, Fortezza Plus

KEELSON – Internet metadata processing system

KEYCARD – Database for VPN key exchange IP packet addresses

KEYRUT – SIGINT Exchange Designator for ? (retired)

KILTING – ELINT database

KIMBO – Retired SIGINT product codeword

KLIEGLIGHT (KL) – Tactical SIGINT reports

KLONDIKE (KDK) – Control system for sensitive geospatial intelligence

KLONDIKE – The embassy of Greece in Washington DC

KNIGHTHAWK – Probably a military SIGINT tool

- Method for summarizing very large textual data sets

KONGUR – Software implant restorable by GINSU after OS upgrade or reinstall

KRONE – Retired SIGINT product codeword

L

(LAC) – Retired NSA dissemination control marking

LADYLOVE – The NSA satellite intercept station at Misawa, Japan (since 1982)

LANYARD – Reconaissance satellite program

LARUM – Retired SIGINT product codeword

LEGION AMBER – Chinese hacking operation against a major US software company

LEGION JADE – A group of Chinese hackers

LEGION RUBY – A group of Chinese hackers

LEGION YANKEE – Chinese hacking operation against the Pentagon and defense contractors (2011)

LEMONWOOD – NSA satellite intercept station in Thailand

LEXHOUND – Tool for targeting social networking?

LIBERTY – First word of nicknames for collection and analysis programs used by JSOC and other sensitive DOD activities

LIBERTY BLUE – Modified RC-12 Guardrail surveillance airplane used by JSOC’s Mission Support Activity (MSA)

LIFESAVER – Technique which images the hard drive of computers

LIONSHARE – Internal NSA process improvement program (2003-2008)

LITHIUM – Facility to filter and gather data at a major (foreign?) telecommunications company under the BLARNEY program

LODESTONE – NSA’s CRAY-1 supercomputer

LOGGERHEAD – Device to collect contents of analog cell phone calls (made by Harris Corp.)

LOMA – SCI control system for Foreign Instrumentation and Signature Intelligence

LOPERS – Software application for Public Switched Telephone Networks or some kind of hardware

LOUDAUTO – An ANGRYNEIGHBOR radar retro-reflector, microphone captures room audio by pulse position modulation of square wave

M

MACHINESHOP – ?

MADCAPOCELOT – Sub-program of STORMBREW for collection of internet metadata about Russia and European terrorism

MAESTRO-II – Mini digital core implant, standard TAO implant architecture

MAGIC – Codeword for decrypted high-level diplomatic Nazi messages

- A keystroke logging software developed by the FBI

MAGNES – Remote SATCOM collection facility

MAGNETIC – Technique of sensor collection of magnetic emanations

- Series of SIGINT spy satellites (since 1985)

MAGOTHY – The embassy of the European Union in Washington DC

MAILORDER – Data transfer tool (SFTP-based?)

- Federal database of personal and financial data of suspicious US citizens

- NSA database of bulk phone metadata

MANASSAS – Former NSA counter-encryption program, succeeded by BULLRUN

- NSA database of bulk internet metadata

MARKHAM – NSA data system?

MARTES – NSA software tool to prepare reports

MASTERLINK – NSA tasking source

MASTERSHAKE – NSA tool or database

MATRIX – Some kind of data processing system

MAYTAG – Upstream collection site

MEDLEY – Classified Suite A algorithm

MENTOR – Class of SIGINT spy satellites (since 1995)

MERCED – The Bulgarian embassy in Washington DC

MERCURY – Soviet cipher machine partially exploited by NSA in the 1960’s

MERCURY – Remote SATCOM collection facility

MESSIAH – NSA automated message handling system

METAWAVE – Warehouse of unselected internet metadata

METROTUBE – Analytic tool for VPN data

METTLESOME – NSA Collection mission system

MIDAS – Satellite program

MIDDLEMAN – TAO covert network

MILKBONE – Question-Focused Dataset used for text message collection

- A sister project to Project SHAMROCK (1967-1973)

MINERALIZE – Technique for collection through LAN implants

MIRANDA – Some kind of number related to NSA targets

MIRROR – Interface to the ROADBED system

MOCCASIN – A hardware implant, permanently connected to a USB keyboard

MONKEYCALENDAR – Software implant on GMS SIM cards that exfiltrates user geolocation data

MONKEYROCKET – Sub-program of OAKSTAR for collecting internet metadata and content through a foreign access point

MOONLIGHTPATH (EGL?) – SSO collection facility

MOONPENNY – The NSA satellite intercept station at Harrogate (Great Britain)

MORAY – Compartment for the least sensitive COMINT material, retired in 1999

MORPHEUS – Program of the Global Access Operations (GAO)

MOTHMONSTER – NSA tool for exploiting the TOR network

MOVEONYX – Tool related to CASPORT

MULBERRY – The mission of Japan at the United Nations in New York

(JPM?) – Joint NSA-GCHQ operation to tap the cables linking Google and Yahoo data clouds to the internet Part of WINDSTOP

MUSKET – Retired SIGINT Exchange Designator for ?

MUSKETEER – NSA’s Special Signal Collection unit

- SSO unilateral voice interception program

- Presidential Global Communications System

N

NASHUA – The mission of India at the United Nations in New York

NAVAJO – The mission of Vietnam at the United Nations in New York

NAVARRO – The embassy of Georgia in Washington DC

NEBULA – Base station router similar to CYCLONE Hx9

NECTAR – SIGINT Exchange Designator for ? (retired)

NELEUS – Remote SATCOM collection facility

NEMESIS – SIGINT satellite

- Operation to kill or capture Osama bin Laden (2011)

NETBOTZ – Remote monitoring tool

NEWSDEALER – NSA’s internal intelligence news network

NIAGARAFILES – Data transfer tool (SFTP-based?)

NIGHTSTAND – 802.11 wireless packet injection tool that runs on standalone x86 laptop running Linux Fedora Core 3 and exploits windows platforms running Internet Explorer, from 8 miles away

NIGHTWATCH – Portable computer in shielded case for recreating target monitor from progressive-scan non-interlaced VAGRANT signals

NINJANIC – Something related to TURMOIL

NITESURF – NSA tool or database

NITRO – Remote SATCOM collection facility

NOCON – NSA dissemination marking or COI

NONBOOK (NK) – Compartment of the ENDSEAL control system

NORMALRUN – NSA tool or database

NUCLEON – Database for contents of phone calls

NYMROD – Automated name recognition system

O

- Umbrella program to filter and gather information at major telecommunications companies (since 2004)

OCEAN – Optical collection system for raster-based computer screens

OCEANARIUM – Database for SIGINT from NSA and intelligence sharing partners around the world

OCEANFRONT – Part of the communications network for ECHELON

OCEAN SHIELD – NATO anti-piracy operation

OCEANSURF – Engineering hub of the Global Access Operations (GAO)

OCELOT – Actual name: MADCAPOCELOT

OCTAVE – NSA tool for telephone network tasking (succeeded by the UTT?)

OCTSKYWARD – Collection of GSM data from flying aircraft

OILSTOCK – A system for analyzing air warning and surveillance data

- CSEC tool for discovering and identifying telephone and computer connections

OLYMPIC – First word of nicknames for programs involving defense against Chinese cyber-warfare and US offensive cyber-warfare

OLYMPIC GAMES – Joint US and Israel operation against the Iranian nuclear program (aka Stuxnet)

OLYMPUS – Software component of VALIDATOR/SOMBERKNAVE used to communicate via wireless LAN 802.11 hardware

OMNIGAT – Field network component

ONEROOF – Main tactical SIGINT database, with raw and unfiltered intercepts

- Newer units of the LACROSSE reconaissance satellites

ORANGEBLOSSOM – Sub-program of OAKSTAR for collection from an international transit switch (sigad: US-3251)

ORANGECRUSH – Sub-program of OAKSTAR for collecting metadata, voice, fax, phone and internet content through a foreign access point

ORION – SIGINT satellite

ORLANDOCARD – NSA operation thtat attracted visits from 77,413 foreign computers and planted spyware on more than 1,000 by using a ‘honeypot’ computer

OSAGE – The embassy of India in Washington DC

OSCAR – SIGINT Exchange Designator for the USA

OSWAYO – The embassy annex of India in Washington DC

- The Lockheed A-12 program (better known as SR-71)

P

PACKAGEDGOODS – Program which tracks the ‘traceroutes’ through which data flows around the Internet

PACKETSCOPE – Internet cable tapping system

PACKETSWING – NSA tool or database

PACKETWRENCH – Computer exploit delivered by the FERRETCANON system

PADSTONE – Type 1 Cryptographic algorithm used in several crypto products

PAINTEDEAGLE – SI-ECI compartment related to the BULLRUN program

PALANTERRA – A family of spatially and analytically enabled Web-based interfaces used by the NGA

PANGRAM (PM) – Alleged SCI control system

PANTHER – The embassy of Vietnam in Washington DC

PARCHDUSK (PD) – Productions Operation of NSA’s TAO division

PARTNERMALL PROGRAM (PMP) – A single collaboration environment, to be succeeded by the Global Collaboration Environment (GCE)

PARTSHOP – ?

PATHFINDER – SIGINT analysis tool (developed by SAIC)

PATHWAY – NSA’s former main computer communications network

- Call chaining analysis tool (developed by i2)

PAWLEYS – SI-ECI compartment related to the BULLRUN program

PEARL – Retired SIGINT product codeword

PEDDLECHEAP – Computer exploit delivered by the FERRETCANON system

PENDLETON – SI-ECI compartment related to the BULLRUN program

PEPPERBOX – Tool or database for targeting Requests (CSEC?)

PERDIDO – The mission of the European Union at the United Nations in New York

PERFECTMOON – An out-sites covering system

PHOTOANGLO – A continuous wave generator and receiver. The bugs on the other end are ANGRYNEIGHBOR class

PIEDMONT – SI-ECI compartment related to the BULLRUN program

PICARESQUE (PIQ) – SI-ECI compartment related to the BULLRUN program

PICASSO – Modified GSM handset that collects user data plus room audio

PINUP – Retired SIGINT product codeword

- Database for recorded signals intercepts/internet content

PITCHFORD – SI-ECI compartment related to the BULLRUN program

PIVOT – Retired SIGINT product codeword

PIXIE – Retired SIGINT product codeword

PLATFORM – Computer system linking the ECHELON intercept sites

PLUS – NSA SIGINT production feedback program

POCOMOKE – The Brazilian Permanent Mission to the UN in New York

POISON NUT – CES VPN attack orchestrator

POLARBREEZE – NSA technique to tap into nearby computers

POPPY – SIGINT satellite program

POPTOP – Collection system for telephony data

POWELL – The Greek mission at the United Nations in New York

PREFER – System for identifying and extracting text messages (SMS) from the DISHFIRE database

PRESSUREPORT – Software interface related to PRESSUREWAVE

PRESSUREWAVE – NSA cloud database for VPN and VoIP content and metadata

PRIMECANE – American high-tech company cooperating in providing a network access point for the ORANGECRUSH program

- Program for collecting foreign internet data from US internet companies

PROFORMA – Intelligence derived from computer-based data

- Mobile tactical SIGINT collection system

PROTEIN – SIGINT Exchange Designator for ?

PROTON – SIGINT database for time-sensitive targets/counterintelligence

PROTOSS – Local computer handling radio frequency signals from implants

PURPLE – Codename for a Japanese diplomatic cryptosystem during WWII

- US military OPSEC program (since 1966)

PUTTY – NSA tool or database

PUZZLECUBE – NSA tool or database

PYLON – SIGINT Exchange Designator for ?

Q

QUADRANT – A crypto implementation code

QUADRESPECTRE PRIME – ?

- A consolidated QUANTUMTHEORY platform to reduce latencies by co-locating passive sensors with local decisioning and traffic injection (under development in 2011)

- Secret servers placed by NSA at key places on the internet backbone; part of the TURMOIL program

QUANTUMBISCUIT – Enhancement of QUANTUMINSERT for targets which are behind large proxies

QUANTUMBOT – Method for taking control of idle IRC bots and botnets)

QUANTUMBOT2 – Combination of Q-BOT and Q-BISCUIT for webbased botnets

QUANTUMCOOKIE – Method to force cookies onto target computers

QUANTUMCOPPER – Method for corrupting file uploads and downloads

QUANTUMDNS – DNS injection/redirection based off of A record queries

QUANTUMHAND – Man-on-the-side technique using a fake Facebook server

QUANTUMINSERT (QI) – Man-on-the-side technique that redirects target internet traffic to a FOXACID server for exploitation

QUANTUMMUSH – Targeted spam exploitation method

QUANTUMNATION – Umbrella for COMMONDEER and VALIDATOR computer exploits

QUANTUMPHANTOM – Hijacks any IP address to use as covert infrastructure

QUANTUMSKY – Malware used to block targets from accessing certain websites through RST packet spoofing

QUANTUMSMACKDOWN – Method for using packet injection to block attacks against DoD computers

QUANTUMSPIN – Exploitation method for instant messaging

QUANTUMSQUEEL – Method for injecting MySQL persistant database connections

QUANTUMSQUIRREL – Using any IP address as a covert infrastructure

QUANTUMTHEORY (QT) – Computer hacking toolbox used by NSA’s TAO division, which dynamically injects packets into target’s network session

QUANTUM LEAP – CIA tool to “find non-obvious linkages, new connections, and new information” from within a dataset

QUARTERPOUNDER – Upstream collection site

- Relay satellite for reconaissance satellites

QUEENSLAND – Upstream collection site

R

RADIOSPRING – ?

RADON – Host tap that can inject Ethernet packets

RAGEMASTER – Part of ANGRYNEIGHBOR radar retro-reflectors, for red video graphics array cable in ferrite bead RFI chokers between video card and monitor, target for RF flooding and collection of VAGRANT video signal

(RGT) – ECI compartment for call and e-mail content collected under FISA authority

RAILHEAD – NCTC database project

RAISIN – NSA database or tool

RAMPART – NSA operational branches that intercept heads of state and their closest aides. Known divisions are RAMPART-A, RAMPART-I and RAMPART-T. Also mentioned as a suite of programs for assuring system functionality

RAVEN – SIGINT satellite

REACTOR – Tool or program related to MARINA?

REBA – Major NSA backbone project

REDHAWK – NSA tool

REDROOF – NSA tool

REMATION – Joint NSA-GCHQ counter-TOR workshop

RENOIR – NSA telephone network visualization tool

REQUETTE – A Taiwanese TECO in New York

RESERVE (RSV) – Control system for the National Reconnaissance Office (NRO)

RESERVEVISION – Remote monitoring tool

RESOLUTETITAN – Internet cable access program?

RETRO – see RETROSPECTIVE

RETROSPECTIVE – 30-day retrospective retrieval tool for SCALAWAG

RETURNSPRING – High-side server shown in UNITEDRAKE internet cafe monitoring graphic

RHINEHEART – NSA tool or database

- Class of SIGINT spy satellites (in 1975 changed to AQUACADE)

RICHTER – SIGINT Exchange Designator for Germany

RIPCORD – ?

RIVET JOINT – Reconaissance operation

ROADBED – Probably a military SIGINT database

ROCKYKNOB – Optional DSP when using Data Over Voice transmission in CROSSBEAM

RONIN – NSA tool for detecting TOR-node IP-addresses

RORIPA – SIGINT Exchange Designator for ?

ROYALNET – Internet exploitation tool

RUFF – Compartment of TALENT KEYHOLE for IMINT satellites

RUMBUCKET – Analytic tool

RUTLEY – Network of SIGINT satellites launched in 1994 and 1995

S

SABRE – Retired SIGINT product codeword

SALEM – ?

SALVAGERABBIT – Computer implant plug-in that exfiltrates data from removable flash drives that connect to an infected computer

SAMOS – Reconnaissance satellite program

SAPPY – Retired SIGINT product codeword

SARATOGA – SSO access facility (since 2011)

SARDINE – SIGINT Exchange Designator for Sweden

- Narrow band voice encryption for radio and telephone communication

SAVIN – Retired SIGINT product codeword

SCALAWAG – Collection facility under the MYSTIC program

SCALLION – Upstream collection site

SCAPEL – Second Party satellite intercept station in Nairobi, Kenia

SCHOOLMONTANA – Software implant for Juniper J-series routers used to direct traffic between server, desktop computers, corporate network and internet

SCIMITAR – A tool to create contact graphs?

SCISSORS – System used for separating different types of data and protocols

SCORPIOFORE – SIGINT reporting tool

SEABOOT – SIGINT Exchange Designator for ?

SEADIVER – Collection system for telephony data

SEAGULLFARO – High-side server shown in UNITEDRAKE internet cafe monitoring graphic

SEARCHLITE – Tactical SIGINT collecting system for like cell phone calls

SEASONEDMOTH (SMOTH) – Stage0 computer implant which dies after 30 days, deployed by the QUANTUMNATION method

SECONDDATE – Method to influence real-time communications between client and server in order to redirect web-browsers to FOXACID malware servers

SECUREINSIGHT – A software framework to support high-volume analytics

SEMESTER – NSA SIGINT reporting tool

- Transportable suite of ISR equipment (since 1991)

- Radome on top of the U2 to relay SIGINT data to ground stations

SENTINEL – NSA database security filter

SERENADE – SSO corporate partner (foreign?)

SERUM – Bank of servers within ROC managing approvals and ticket system

SETTEE – SIGINT Exchange Designator for ?

- Operation for intercepting telegraphic data going in or out the US (1945-1975)

SHAREDVISION – Mission program at Menwith Hill satellite station

SHARKFIN – Sweeps up all-source communications intelligence at high speed and volumes

SHARPFOCUS (SF2) – Productions Operation of NSA’s TAO division

SHELLTRUMPET – NSA metadata processing program (since December 2007)

SHENANIGANS – Aircraft-based NSA geolocation system used by CIA

SHIFTINGSHADOW – Sub-program of OAKSTAR for collecting telephone metadata and voice content from Afghanistan through a foreign access point

SHILLELAGH – Classified Suite A algorithm

SHORTSHEET – NSA tool for Computer Network Exploitation

SHOTGIANT – NSA operation for hacking and monitoring the Huawei network (since 2009)

SIERRAMONTANA – Software implant for Juniper M-series routers used by enterprises and service providers

SIGINT NAVIGATOR – NSA database

SIGSALY – The first secure voice system from World War II

SILKWORTH – A software program used for the ECHELON system

SILLYBUNNY – Some kind of webbrowser tag which can be used as selector

SILVER – Soviet cipher machine partially exploited by NSA in the 1960’s

SILVERCOMET – SIGINT satellites?

SILVERZEPHYR (SZ) – Sub-program of OAKSTAR for collecting phone and internet metadata and content from Latin and South America through an international transit switch

SIRE – A software program used for the ECHELON system(?)

- Type 2 Block cipher algorithms used in various crypto products

SKOPE – SIGINT analytical toolkit

SKYSCRAPER – Interface to the ROADBED system

SKYWRITER – NSA tool to prepare (internet) intelligence reports

SLICKERVICAR – Used with UNITEDRAKE or STRAITBIZARRE to upload hard drive firmware to implant IRATEMONK

SLINGSHOT – End Product Reports (CSEC?)

SMOKEYSINK – SSO access facility (since 2011?)

SNICK – 2nd Party satellite intercept station in Oman

SNORT – Repository of computer network attack techniques/coding

SOAPOPERA – (former?) database for voice, end product and SRI information

SOMBERKNAVE – Windows XP wireless software implant providing covert internet connectivity, routing TCP traffic via an unused 802.11 network device allowing OLYMPUS or VALIDATOR to call home from air-gapped computer

SORTING HAT – ?

SORTING LEAD – ?

SOUFFLETROUGH – Software implant in BIOS Juniper SSG300 and SSG500 devices, permanent backdoor, modifies ScreenOS at boot, utilizes Intel’s System Management Mode

SOUNDER – Second Party satellite intercept station at Cyprus

SPARKLEPONY – Tool or program related to MARINA

SPARROW II – Airborne wireless network detector running BLINDDATE tools via 802.11

SPECTRE – SCI control system for intelligence on terrorist activities

SPECULATION – Protocol for over-the-air communication between COTTONMOUTH computer implant devices, compatible with HOWLERMONKEY

SPHINX – Counterintelligence database of the Defense Intelligence Agency

SPINNERET (SPN) – SSO collection facility

SPLITGLASS – NSA analytical database

SPLUNK – Tool used for SIGINT Development

SPOKE – Compartment for less sensitive COMINT material, retired in 1999

SPOTBEAM – ?

SPORTCOAST – Upstream collection site

SPRIG – Retired SIGINT product codeword

SPRINGRAY – Some kind of internal notification system

SPYDER – Analytic tool for selected content of text messages from the DISHFIRE database

STARBURST – The initial code word for the STELLARWIND compartment

STARLIGHT – Analyst tool

STARPROC – User lead that can be uses as a selector

STARSEARCH – Target Knowledge tool or database (CSEC?)

STATEROOM – Covert SIGINT collection sites based in US diplomatic facilities

STEELFLAUTA – SSO Corporate/TAO Shaping program

STEELKNIGHT – (foreign?) partner providing a network access point for the SILVERZEPHYR program

STEELWINTER – A supercomputer acquired by the Norwegian military intelligence agency

STELLAR – Second Party satellite intercept station at Geraldton, Australia

STELLARWIND (STLW) – SCI compartment for the President’s Surveillance Program information

STEPHANIE – Covert listening post in the Canadian embassy in Moscow (est. 1972)

STINGRAY – Device for tracking the location of cell phones (made by Harris Corp.) STONEGHOST – DIA network for information exchange with UK, Canada, Australia and New Zealand (TS/SCI)

STORMBREW – Program for collection from an international transit switches and cables (since 2001)

STRAIGHTBIZARRE – Software implant used to communicate through covert channels

STRATOS – Tool or databse for GPRS Events (CSEC?)

STRAWHAT – NSA datalinks between field sites and processing centers (1969-?)

STRIKEZONE – Device running HOWLERMONKEY personality

STRONGMITE – Computer at remote operations center used for long range communications

STRUM – (see abbreviations)

STUCCOMONTANA – Software implant for Juniper T-Series routers used in large fixed-line, mobile, video, and cloud networks, otherwise just like SCHOOLMONTANA

STUMPCURSOR – Foreign computer accessing program of the NSA’s Tailored Access Operations

SUBSTRATUM – Upstream collection site

SUEDE – Retired SIGINT product codeword

SULPHUR – The mission of South Korea at the United Nations in New York

SUNSCREEN – Tool or database

SURFBOARD – NSA tool or database

SURLEYSPAWN – Data RF retro-reflector, gathers keystrokes FSK frequency shift keyed radar retro-reflector, USB or IBM keyboards

SURPLUSHANGAR – High to low diode, part of the QUANTUM system

SURREY – Main NSA requirements database, where tasking instructions are stored and validated, used by the FORNSAT, SSO and TAO divisions

SUTURESAILOR – Printed circuit board digital core used with HOWLERMONKEY

SWAMP – NSA data system?

SWAP – Implanted software persistence by exploiting motherboard BIOS and hard drive Host Protected Area for execution before OS loads, operative on windows linux, freeBSD Solaris

- NSA data model for analyzing target connections

T

TACOSUAVE – ?

TALENT KEYHOLE (TK) – Control system for space-based collection platforms

TALK QUICK – An interim secure voice system created to satisfy urgent requirements imposed by conditions to Southeast Asia. Function was absorbed by AUTOSEVOCOM

TAPERLAY – Covername for Global Numbering Data Base (GNDB), used for looking up the registered location of a mobile device

TARMAC – Improvement program at Menwith Hill satellite station

TAROTCARD – NSA tool or database

TAWDRYYARD – Beacon radio frequency radar retro-reflector used to positionally locate deployed RAGEMASTER units

TEMPEST – Investigations and studies of compromising electronic emanations

- GCHQ program for intercepting internet and telephone traffic

THESPIS – SIGINT Exchange Designator for ?

THINTREAD – NSA program for wiretapping and sophisticated analysis of the resulting data

THUMB – Retired SIGINT product codeword

THUNDERCLOUD – Collaboration program between NSA units T1222 and SSG

TIAMAT – Joint venture between the German BND and another country with access for NSA

TICKETWINDOW – System that makes SSO collection available to 2nd Party partners

TIDALSURGE – Router Configurations tool (CSEC?)

TIDEWAY – Part of the communications network for ECHELON

TIMBERLINE – The NSA satellite intercept station at Sugar Grove (US)

TINMAN – Database related to air warning and surveillance

TITAN POINTE – Upstream collection site

- Presumably Chinese attacks on American computer systems (since 2003)

TITLEHOLDER – NSA tool

TOPAZ – Satellite program

TOTECHASER – Software implant in flash ROM windows CE for Thuraya 2520 satellite/GSM/web/email/MMS/GPS

TOTEGHOSTLY – Modular implant for windows mobile OS based on SB using CP framework, Freeflow-compliant so supported by TURBULENCE architecture

TOWERPOWER – NSA tool or database

TOXICARE – NSA tool

TOYGRIPPE – NSA’s CES database for VPN metadata

TRACFIN – NSA database for financial data like credit card purchases

TRAFFICTHIEF – Part of the TURBULENCE and the PRISM programs

TRAILBLAZER – NSA Program to analyze data carried on communications networks

TRAILMAPPER – NSA tool or database

TRANSX – NSA database

TREACLEBETA – TAO hacking against the Pakistani terrorist group Lashkar-e-Taiba

TREASUREMAP – NSA internet traffic visualization tool

TREASURETROVE – Analytic tool

TRIBUTARY – NSA provided voice threat warning network

TRIGGERFISH – Device to collect the content of digital cell phone calls (made by Harris Corp.)

TRINE – Predecessor of the UMBRA compartment for COMINT

TRINITY – Implant digital core concealed in COTTONMOUTH-I, providing ARM9 microcontroller, FPGA Flash and SDRAM memories

TRITON – Tool or database for TOR Nodes (CSEC?)

- Series of ELINT reconnaissance satellites (1994-2008)

TRYST – Covert listening post in the British embassy in Moscow

TUBE – Database for selected internet content?

TUMULT – Part of the TURBULENCE program

TUNINGFORK – Sustained collection linked to SEAGULLFARO, previously NSA database or tool for protocol exploitation

TURBINE – Active SIGINT: centralized automated command/control system for managing a large network of active computer implants for intelligence gathering (since 2010)

TURBOPANDA – The Turbopanda Insertion Tool allows read/write to memory, execute an address or packet; joint NSA/CIA project on Huawei network equipment

TURBULENCE (TU) – Integrate NSA architecture with several layers and sub-programs to detect threats in cyberspace (since 2005)

TURMOIL – Passive SIGINT sensors: high speed collection of foreign target satellite, microwave and cable communications, part of the TURBULENCE program Maybe for selecting common internet encryption technologies to exploit.

TURTLEPOWER -NSA tool

TUSKATTIRE – Ingest system for cleaning and processing DNR (telephony) data

TUTELAGE – Active defense system to monitor network traffic in order to detect malicious code and network attacks, part of the TURBULENCE program

TWEED – Retired SIGINT product codeword

TWISTEDKILT – Writes to Host Protected area on hard drive to implant Swap and its implant installer payload

TWISTEDPATH – NSA tool or database

TYPHON HX – GSM base station router network in box for tactical Sigint geolocating and capturing user

U

ULTRA – Decrypted high-level military Nazi messages, like from the Enigma machine

UMBRA – Retired compartment for the most sensitive COMINT material

UNIFORM – SIGINT Exchange Designator for Canada

UNITEDRAKE – Computer exploit delivered by the FERRETCANON system

USHER – Retired SIGINT product codeword

V

VAGRANT – Radar retro-reflector technique on video cable to reproduce open computer screens

VALIDATOR – Computer exploit delivered by the FERRETCANON system for looking whether a computer has security software, runs as user process on target OS, modified for SCHOOLMONTANA, initiates a call home, passes to SOMBERKNAVE, downloads OLYMPUS and communicates with remote operation center

- Decrypted intercepts of messages from Soviet intelligence agencies

VERDANT (VER) – Alleged SCI control system

VESUVIUS – Prototype quantum computer, situated in NSA’s Utah Data Center

VICTORYDANCE – Joint NSA-CIA operation to map WiFi fingerprints of nearly every major town in Yemen

VIEWPLATE – Processor for external monitor recreating target monitor from red video

VINTAGE HARVEST – Probably a military SIGINT tool

VITALAIR – NSA tool

VOICESAIL – Intelligence database

- Class of SIGINT spy satellites (1978-1989)

VOXGLO – Multiple award contract providing cyber security and enterprise computing, software development, and systems integration support

W

WABASH – The embassy of France in Washington DC

WAGONBED – Hardware GSM controller board implant on CrossBeam or HP Proliant G5 server that communicates over I2C interface

WALBURN – High-speed link encryption, used in various encryption products

WARPDRIVE – Joint venture between the German BND and another country with access for NSA (2013)

WATERWITCH – Hand-held tool for geolocating targeted handsets to last mile

WAVELEGAL – Authorization service that logs data queries

WEALTHYCLUSTER – Program to hunt down tips on terrorists in cyberspace (2002- )

WEASEL – Type 1 Cryptographic algorithm used in SafeXcel-3340

WEBCANDID – NSA tool or database

WESTPORT – The mission of Venezuela at the United Nations in New York

WILLOWVIXEN – Method to deploy malware by sending out spam emails that trick targets into clicking a malicious link

WISTFULTOLL – Plug-in for UNITEDRAKE and STRAITBIZARRE used to harvest target forensics via Windows Management Instrumentation and Registry extractions, can be done through USB thumb drive

WHIPGENIE (WPG) – ECI compartment for details about the STELLARWIND program

WHITEBOX – Program for intercepting the public switched telephone network?

WHITELIST – NSA tool

WHITETAMALE – Operation for collecting e-mails from Mexico’s Public Security Secretariat

WINDCHASER – Tool or program related to MARINA

WINDSORBLUE – Supercomputer program at IBM

WINDSTOP – Joint NSA-GCHQ unilateral high-volume cable tapping program

WINTERLIGHT – A QUANTUM computer hacking program in which Sweden takes part

WIRESHARK – Database with malicious network signatures

WITCH – Retired SIGINT product codeword

WITCHHUNT – ?

WOLFPOINT – SSO corporate partner under the STORMBREW program

WORDGOPHER – Platform to enable demodulation of low-rate communication carriers

WRANGLER – Database or system which focuses on Electronic Intelligence

X

- Program for finding key words in foreign language documents

XKEYSCORE (XKS) – Program for analysing SIGINT traffic

Y

YACHTSHOP – Sub-program of OAKSTAR for collecting internet metadata

YELLOWPIN – Printed circuit board digital core used with HOWLERMONKEY

YELLOWSTONE – NSA analytical database

YUKON – The embassy of Venezuela in Washington DC

Z

ZAP – (former?) database for texts

ZARF – Compartment of TALENT KEYHOLE for ELINT satellites, retired in 1999

ZESTYLEAK – Software implant that allows remote JETPLOW firmware installation, used by NSA’s CES unit

- See also this list of NSA codewords from 2002

Links and Sources

- List of NSA Code Names Revealed

- About What the NSA’s Massive Org Chart (Probably) Looks Like

- About Code Names for U.S. Military Projects and Operations

- National Reconnaissance Office: Review and Redaction Guide (pdf)

- About How Codes Names Are Assigned

- Wikipedia article about the Secret Service codename

- List of crypto machine designators

- Wikipedia article about the CIA cryptonym

- Article about Security Clearances and Classifications

- Listing in German: Marjorie-Wiki: SIGDEV

- William M. Arkin, Code Names, Deciphering U.S. Military Plans, Programs, adn Operations in the 9/11 World, Steerforth Press, 2005.

via Electrospaces.Blogspot.com

Read more
Whitehouse ‘Panel’ Is Dead Before It Even Starts – Lacks Tech And Telco Execs

obama-nsa-panel-wink

As part of his promises regarding better oversight of the National Security Agency, President Obama called for expert external opinion on where the lines of privacy should be drawn:

Fourth, we’re forming a high-level group of outside experts to review our entire intelligence and communications technologies. We need new thinking for a new era. We now have to unravel terrorist plots by finding a needle in the haystack of global telecommunications. And meanwhile, technology has given governments — including our own — unprecedented capability to monitor communications. – President Obama.

And yet, no. Obama’s panel is not a set of outsiders in the slightest. As some have pointed out in recent days, the group is instead a slurry of insiders, former insiders, and a previous colleague of the president’s.

Member Michael Morell is from the CIA, Richard Clarke is former national security, Cass Sunstein is ex-Obama White House, Peter Swire was part of the Clinton administration, and Geoffrey Stone is also University Chicago stock, same as the president.

Stone, at a minimum, is part of the ACLU, and thus might have a bit of a backbone on the privacy side of things. But the group is surprisingly un-outsidery, and hardly undogmatic. This has not gone unnoticed. However, something that fewer have noticed is that the group contains no technology or telecom folk.

This is almost comical, as we are arguing over digital and telephonic surveillance. PRISM, tapping of fiber-optic cables, storing the nation’s phone records, and forcing telcos to send huge swatches of the Internet to the NSA, and yet not a single voice from the industries impacted will take part.

In the age of cynicism, this must be a high point.

The group is in fact a good mix of people from the establishment who have perspectives on security, but it is utterly incomplete. To exclude from the conversation companies that are directly impacted by the NSA — bullied is probably a better word — is to silence possible dissent. And that is the opposite of open, or fair.

Not that in this discussion there has been much proffered openness of fairness, but when the president assembles a panel of “outsiders” to examine current policy, one could hope for a bit of each. In the assembled group, those in favor of curtailing the NSA’s surveillance activities couldn’t win a voice vote. That’s not so good, really.

If we are going to legally force tech and telco firms to hand over private information of regular folks, they deserve a hand in the discussion. Unless, naturally, the meetings are a sham in the hopes of quieting public outrage and dissent. In that case, a few former insiders can be tossed together for a chat that will mean little and accomplish less. Which appears to be the case.

At each stage of the NSA revelation saga, the government has obfuscuated or offered little. This is another example of the latter.

via TechCrunch

Read more
Anonymous #OpNSA – A Message to Intel Puppet Saxby Chambliss

We do not forgive

We do not forget

Expect Us

 

 

Read more
11 Secret Documents Americans Deserve to See

top-secret-documents

Many documents produced by the U.S. government are confidential and not released to the public for legitimate reasons of national security.  Others, however, are kept secret for more questionable reasons.  The fact that presidents and other government officials have the power to deem materials classified provides them with an opportunity to use national security as an excuse to suppress documents and reports that would reveal embarrassing or illegal activities.

 

I’ve been collecting the stories of unreleased documents for several years. Now I have chosen 11 examples that were created—and buried—by both Democratic and Republican administrations and which cover assassinations, spying, torture, 50-year-old historical events, presidential directives with classified titles and…trade negotiations.

 

1. Obama Memo Allowing the Assassination of U.S. Citizens      

When the administration of George W. Bush was confronted with cases of Americans fighting against their own country, it responded in a variety of ways. John Walker Lindh, captured while fighting with the Taliban in December 2001, was indicted by a federal grand jury and sentenced to 20 years in prison. José Padilla was arrested in Chicago in May 2002 and held as an “enemy combatant” until 2006 when he was transferred to civilian authority and, in August 2007, sentenced to 17 years in prison for conspiring to support terrorism. Adam Gadahn, who has made propaganda videos for al-Qaeda, was indicted for treason in 2006 and remains at large.

 

After he took over the presidency, Barack Obama did away with such traditional legal niceties and decided to just kill some Americans who would previously have been accused of treason or terrorism. His victims have included three American citizens killed in Yemen in 2011 by missiles fired from drones: U.S.-born anti-American cleric Anwar al-Awlaki, Samir Khan, an al-Qaeda propagandist from North Carolina, and Awlaki’s 16-year-old son, Abdulrahman al-Awlaki.

 

Obama justified his breach of U.S. and international law with a 50-page memorandum prepared by the Justice Department’s Office of Legal Counsel.  Attorney General Eric Holder argued that the killing of Awlaki was legal because he was a wartime enemy and he could not be captured, but the legal justification for this argument is impossible to confirm because the Obama administration has refused to release the memo.

 

2. The Obama Interpretation of Section 215 of the Patriot Act

Section 215 of the Patriot Act allows the FBI, in pursuit of spies and terrorists, to order any person or entity to turn over “any tangible things” without having to justify its demands by demonstrating probable cause. For example, a library can be forced to reveal who borrowed a book or visited a web site. According to Section 215, the library is prohibited from telling anyone what it has turned over to the FBI.

 

The Obama administration has created a secret interpretation of Section 215 that goes beyond the direct wording of the law to include other information that can be collected. Democratic Senator Ron Wyden of Oregon, who, as a member of the Senate Intelligence Committee, was briefed about this secret interpretation, urged the president to make it public. “I want to deliver a warning this afternoon,” he said. “When the American people find out how their government has secretly interpreted the Patriot Act, they will be stunned and they will be angry.”

 

Wyden and Sen. Mark Udall of Colorado, also a Democrat, have implied that the Obama administration has expanded the use of Section 215 to activities other than espionage and terrorism. In a letter to Attorney General Eric Holder, Wyden and Udall wrote that “there is now a significant gap between what most Americans think the law allows and what the government secretly claims the law allows. This is a problem, because it is impossible to have an informed public debate about what the law should say when the public doesn’t know what its government thinks the law says.”
3. 30-page Summary of 9/11 Commission Interview with Bush and Cheney

You would have thought that, in the interests of the nation, the Bush administration would have demanded a thorough investigation of the terrorist attacks of September 11, 2001, the deadliest assault ever on U.S. soil. Instead, they fought tooth and nail against an independent investigation. Public pressure finally forced President George W. Bush to appoint a bipartisan commission that came to be known as the 9/11 Commission.  It was eventually given a budget of $15 million…compared to the $39 million spent on the Monica Lewinsky/Bill Clinton investigation. When the commission completed its work in August 2004, the commissioners turned over all their records to the National Archives with the stipulation that the material was to be released to the public starting on January 2, 2009. However, most of the material remains classified. Among the more tantalizing still-secret documents are daily briefings given to President Bush that reportedly described increasingly worried warnings of a possible attack by operatives of Osama bin Laden.

 

Another secret document that the American people deserve to see is the 30-page summary of the interview of President Bush and Vice-President Dick Cheney conducted by all ten commissioners on April 29, 2004.  Bush and Cheney refused to be interviewed unless they were together. They would not testify under oath and they refused to allow the interview to be recorded or transcribed.  Instead the commission was allowed to bring with them a note taker. It is the summary based on this person’s notes that remains sealed.

 

4. Memos from President George W. Bush to the CIA Authorizing Waterboarding and other Torture Techniques

Four days after the terrorist attacks of September 11, 2001, President George W. Bush signed a “memorandum of notification” (still secret) that authorized the CIA to do what it needed to fight al-Qaeda.  However the memo did not address what interrogation and torture techniques could be used on captured suspects. By June 2003, Director George Tenet and others at the CIA were becoming worried that if their seemingly illegal tactics became known to the public, the White House would deny responsibility and hang the CIA out to dry.  After much discussion, Bush’s executive office handed over two memos, one in 2003 and another in 2004, confirming White House approval of the CIA interrogation methods, thus giving the CIA “top cover.” It is not known if President Bush himself signed the memos.

 

5. 1,171 CIA Documents Related to the Assassination of President Kennedy

It’s been 49 years since President John F. Kennedy was shot to death in Dallas, yet the National Archives and Records Administration (NARA) insists that more than one thousand documents relating to the case should not be released to the public until NARA is legally required to do so in 2017…unless the president at that time decides to extend the ban.  It would appear that some of the blocked material deals with the late CIA agent David Phillips, who is thought to have dealt with Lee Harvey Oswald in Mexico City six weeks before the assassination.

 

6. Volume 5 of the CIA’s History of the Bay of Pigs Fiasco

In the late 1970s and early 1980s, CIA historian Dr. Jack B. Pfeiffer compiled a multi-volume history of the failed US attempt to invade Cuba in April 1961.  In August 2005, the National Security Archive at George Washington University, citing the Freedom of Information Act, requested access to this history.  The CIA finally released the information almost six years later, in July 2011. However it refused to release Volume V, which is titled “CIA’s Internal Investigation of the Bay of Pigs Operations.”  Although more than 50 years have passed since the invasion, the U.S. District Court for the District of Columbia ruled that Volume V is exempt from the Freedom of Information Act because it “is covered by the deliberative process privilege” which “covers documents reflecting advisory opinions, recommendations and deliberations comprising part of a process by which governmental decisions and policies are formulated.”

 

7. National Security Decision Directives with Classified Titles

The day before he left the White House on January 20, 1993, President George H. W. Bush issued National Security Directive (NSD) #79, a document so secret that even its title remains classified almost 20 years later. The same goes for National Security Directive #77, issued a few days earlier, as well as four others issued in 1989 (#11, 13a, 19a and 25a). If the “a”s are any indication of the subjects, it is worth noting that NSD 13 dealt with countering cocaine trafficking in Peru; NSD 19 dealt with Libya and NSD 25 with an election in Nicaragua.

 

President Ronald Reagan also issued six NSDs with classified titles, and President Bill Clinton issued 29.  President George W. Bush issued two such NSDs, presumably shortly after the terrorist attacks of September 11, 2001. President Barack Obama has issued at least seven Presidential Policy Directives with classified titles.

 

8. Major General Douglas Stone’s 700-Page Report on Prisoners Held in Afghanistan

Marine Corps General Douglas Stone earned positive reviews for his revamping of detention operations in Iraq, where he determined that most of the prisoners held by the United States were not actually militants and could be taught trades and rehabilitated. Based on his success in Iraq, Stone was given the task of making an evaluation of detainee facilities in Afghanistan. His findings, conclusions and recommendations were included in a 700-page report that he submitted to the U.S. Central Command in August 2009. According to some accounts of the report, Stone determined that two-thirds of the Afghan prisoners were not a threat and should be released. However, three years after he completed it, Stone’s report remains classified.

 

9. Detainee Assessment Briefs for Abdullah Tabarak and Abdurahman Khadr

In 2011, WikiLeaks released U.S. military files known as Detainee Assessment Briefs (DABs), which describe the cases of 765 prisoners held at Guantánamo Bay. However, there were actually 779 prisoners. So what happened to the files for the other fourteen? Andy Worthington, author of The Guantanamo Files, has noted that two of the fourteen missing stories are especially suspicious: those of Abdullah Tabarak and Abdurahman Khadr.

 

Tabarak, a Moroccan, was allegedly one of Osama bin Laden’s long-time bodyguards, and took over bin Laden’s satellite phone in order to draw U.S. fire to himself instead of to bin Laden when U.S. forces were chasing the al-Qaeda leader in the Tora Bora mountains in December 2001.  Captured and sent to Guantánamo, Tabarak was mysteriously released, sent back to Morocco in July 2003, and set free shortly thereafter.

 

Abdurahman Khadr, the self-described “black sheep” of a militant family from Canada, was 20 years old when he was captured in Afghanistan and turned over to American forces. He has said that he was recruited by the CIA to become an informant at Guantánamo and then in Bosnia. When the CIA tried to send him to Iraq, he refused and returned to Canada. His younger brother, Omar, was 15 years old when he was captured in Afghanistan and accused of killing an American soldier, Sergeant First Class Christopher Speer, during a firefight.  He was incarcerated at Guantánamo for almost ten years until he was finally released to Canadian custody on September 29, 2012.

 

10. FBI Guidelines for Using GPS Devices to Track Suspects

On January 23, 2012, in the case of United States v. Jones, the Supreme Court ruled unanimously that attaching a GPS device to a car to track its movements constitutes a “search” and is thus covered by the Fourth Amendment protecting Americans against “unreasonable searches and seizures.”  But it did not address the question of whether the FBI and other law enforcement agencies must obtain a warrant to attach a GPS device or whether it is enough for an agent to believe that such a search would turn up evidence of wrongdoing.

 

A month later, at a symposium at the University of San Francisco, FBI lawyer Andrew Weissman announced that the FBI was issuing two memoranda to its agents to clarify how the agency would interpret the Supreme Court decision. One memo dealt with the use of GPS devices, including whether they could be attached to boats and airplanes and used at international borders. The second addressed how the ruling applied to non-GPS techniques used by the FBI.

 

The ACLU, citing the Freedom of Information Act, has requested publication of the two memos because they “will shape not only the conduct of its own agents but also the policies, practices and procedures of other law enforcement agencies—and, consequently, the privacy rights of Americans.”

 

11. U.S. Paper on Negotiating Position on the Free Trade Agreement of the Americas

The subject of international trade negotiations is one that makes most people’s eyes glaze over. So why is the Obama administration fighting so hard to keep secret a one-page document that relates to early negotiations regarding the Free Trade Agreement of the Americas (FTAA), an accord that was proposed 18 years ago and about which public negotiations ended in 2005? All we know is that the document “sets forth the United States’ initial proposed position on the meaning of the phrase ‘in like circumstances.’” This phrase “helps clarify when a country must treat foreign investors as favorably as local or other foreign investors.”

 

Responding to a Freedom of Information Act lawsuit filed by The Center for International Environmental Law, DC District Judge Richard W. Roberts ordered the Office of the United States Trade Representative (USTR) to release the document, but the Obama administration has refused, claiming that disclosure “reasonably could be expected to result in damage to the national security” because all the nations involved in the failed negotiations agreed to keep all documents secret until December 31, 2013…“unless a country were to object to the release of one of its own documents at that time.” Judge Roberts ruled that the USTR has failed to present any evidence that release of the document would damage national security.

 

Most likely, the Obama administration is afraid that release of the document would set a precedent that could impede another secret trade negotiation, the Trans-Pacific Partnership (TPP), also known as the Trans-Pacific Strategic Economic Partnership Agreement, which seeks to establish a free trade zone among the U.S., New Zealand, Chile, Singapore, Brunei, Australia, Peru, Vietnam, Malaysia and possibly Canada, Mexico and Japan.

Read more
NSA Whistleblower: Everyone in US Under Virtual Surveillance, All Info Stored

RT talks to William Binney, whistleblower and former NSA crypto-mathematician who served in the agency for decades. Virtual privacy in US, Petraeus affair and whistleblowers’ odds in fight against the authorities are among key topics of this exclusive interview

RT: In light of the Petraeus/Allen scandal while the public is so focused on the details of their family drama, one may argue that the real scandal in this whole story is the power, the reach of the surveillance state. I mean if we take General Allen – thousands of his personal e-mails have been sifted through private correspondence. It’s not like any of those men was planning an attack on America. Does the scandal prove the notion that there is no such thing as privacy in a surveillance state?

William Binney: Yes, that’s what I’ve been basically saying for quite some time, is that the FBI has access to the data collected, which is basically the emails of virtually everybody in the country. And the FBI has access to it. All the congressional members are on the surveillance too, no one is excluded. They are all included. So, yes, this can happen to anyone. If they become a target for whatever reason – they are targeted by the government, the government can go in, or the FBI, or other agencies of the government, they can go into their database, pull all that data collected on them over the years, and we analyze it all. So, we have to actively analyze everything they’ve done for the last 10 years at least.

RT: And it’s not just about those, who could be planning, who could be a threat to national security, but also those, who could be just…

WB: It’s everybody. The Naris device, if it takes in the entire line, so it takes in all the data. In fact they advertised they can process the lines at session rates, which means 10-gigabit lines. I forgot the name of the device (it’s not the Naris) – the other one does it at 10 gigabits. That’s why they’re building Bluffdale [database facility], because they have to have more storage, because they can’t figure out what’s important, so they are just storing everything there. So, emails are going to be stored there in the future, but right now stored in different places around the country. But it is being collected – and the FBI has access to it.

RT: You mean it’s being collected in bulk without even requesting providers?

WB: Yes.

RT: Then what about Google, you know, releasing this biannual transparency report and saying that the government’s demands for personal data is at an all-time high and for all of those requesting the US, Google says they complied with the government’s demands 90 percent of the time. But they are still saying that they are making the request, it’s not like it’s all being funneled into that storage. What do you say to that?

WB: I would assume that it’s just simply another source for the same data they are already collecting. My line is in declarations in a court about the 18-T facility in San Francisco, that documented the NSA room inside that AST&T facility, where they had Naris devices to collect data off the fiber optic lines inside the United States. So, that’s kind of a powerful device, that would collect everything it was being sent. It could collect on the order over of 100 billion 1,000-character emails a day. One device.

RT: You say they sift through billions of e-mails. I wonder how do they prioritize? How do they filter it?

WB: I don’t think they are filtering it. They are just storing it. I think it’s just a matter of selecting when they want it. So, if they want to target you, they would take your attributes, go into that database and pull out all your data.

RT: Were you on the target list?

WB: Oh, sure! I believe I’ve been on it for quite a few years. So I keep telling them everything I think of them in my email. So that when they want to read it they’ll understand what I think of them.

RT: Do you think we all should leave messages for the NSA mail box?

WB: Sure!

RT: You blew the whistle on the agency when George W. Bush was the president. With President Obama in office, in your opinion, has anything changed at the agency, in the surveillance program? In what direction is this administration moving?

WB: The change is it’s getting worse. They are doing more. He is supporting the building of the Bluffdale facility, which is over two billion dollars they are spending on storage room for data. That means that they are collecting a lot more now and need more storage for it. That facility by my calculations that I submitted to the court for the Electronic Frontiers Foundation against NSA would hold on the order of 5 zettabytes of data. Just that current storage capacity is being advertised on the web that you can buy. And that’s not talking about what they have in the near future.

RT: What are they going to do with all of that? Ok, they are storing something. Why should anybody be concerned?

WB: If you ever get on the enemies list, like Petraeus did or… for whatever reason, than you can be drained into that surveillance.

RT: Do you think they would… General Petraeus, who was idolized by the same administration? Or General Allen?

WB: There are certainly some questions, that have to be asked, like why would they target it to begin with? What law were they breaking?

RT: In case of General Petraeus one would argue that there could have been security breaches. Something like that. But with General Allen  – I don’t quite understand, because when they were looking into his private emails to this woman.

WB: That’s the whole point. I am not sure what the internal politics is… That’s part of the program. This government doesn’t want things in the public. It’s not a transparent government. Whatever the reason or the motivation was, I don’t really know, but I certainly think that there was something going on in the background that made them target those fellows. Otherwise why would they be doing it? There is no crime there.

RT: It seems that the public is divided between those, who think that the government surveillance program violates their civil liberties, and those who say, ‘I’ve nothing to hide. So, why should I care?’ What do you say to those who think that it shouldnt concern them.

WB: The problem is if they think they are not doing anything that’s wrong, they don’t get to define that. The central government does, the central government defines what is right and wrong and whether or not they target you. So, it’s not up to the individuals. Even if they think they aren’t doing something wrong, if their position on something is against what the administration has, then they could easily become a target.

RT: Tell me about the most outrageous thing that you came across during your work at the NSA.

WB: The violations of the constitution and any number of laws that existed at the time. That was the part that I could not be associated with. That’s why I left. They were building social networks on who is communicating and with whom inside this country. So that the entire social network of everybody, of every US citizen was being compiled overtime. So, they are taking from one company alone roughly 320 million records a day. That’s probably accumulated probably close to 20 trillion over the years.

The original program that we put together to handle this to be able to identify terrorists anywhere in the world and alert anyone that they were in jeopardy. We would have been able to do that by encrypting everybody’s communications except those who were targets. So, in essence you would protect their identities and the information about them until you could develop probable cause, and once you showed your probable cause, then you could do a decrypt and target them. And we could do that and isolate those people all alone. It wasn’t a problem at all. There was no difficulty in that.

RT: It sounds very difficult and very complicated. Easier to take everything in and…

WB: No. It’s easier to use the graphing techniques, if you will, for the relationships for the world to filter out data, so that you don’t have to handle all that data. And it doesn’t burden you with a lot more information to look at, than you really need to solve the problem.

RT: Do you think that the agency doesn’t have the filters now?

WB: No.

RT: You have received the Callaway award for civic courage. Congratulations! On the website and in the press release it says: “It is awarded to those, who stand out for constitutional rights and American values at great risk to their personal or professional lives.” Under the code of spy ethics I don’t know if there is such a thing your former colleagues, they probably look upon you as a traitor. How do you look back at them?

WB: That’s pretty easy. They are violating the foundation of this entire country. Why this entire government was formed? It’s founded with the Constitution and the rights were given to the people in the country under that Constitution. They are in violation of that. And under executive order 13526, section 1.7 – you can not classify information to just cover up a crime, which this is, and that was signed by President Obama. Also President Bush signed it earlier as an executive order, a very similar one. If any of this comes into Supreme Court and they rule it unconstitutional, then the entire house of cards of the government falls.

RT: What are the chances of that? What are the odds?

WB: The government is doing the best they can to try to keep it out of court. And, of course, we are trying to do the best we can to get into court. So, we decided it deserves a ruling from the Supreme Court. Ultimately the court is supposed to protect the Constitution. All these people in the government take an oath to defend the Constitution. And they are not living up to the oath of office.

Read more
DHS Insider Part 2: Gun Confiscation, Assassination, Timeline & End Of The Constitution

fema_camp_DHS_gun_confiscation_insider

The latest from “DHS Insider” (Part II)

By Douglas J. Hagmann

DH: Wait, this sounds way, way over the top. Are you telling me… [Interrupts]

RB: [Over talk/Unintelligible] …know who was selected or elected twice now. You know who his associates are. And you are saying this is way over the top? Don’t forget what Ayers said – you talked to Larry Grathwohl. This guy is a revolutionary. He does not want to transform our country in the traditional sense. He will destroy it. And he’s not working alone. He’s not working for himself, either. He has his handlers. So don’t think this is going to be a walk in the park, with some type of attempt to rescue the country. Cloward-Piven. Alinsky. Marx. All rolled into one. And he won’t need the rest of his four years to do it.

DH: I need you to be clear. Let’s go back again, I mean, to those who speak out about what’s happening.

RB: [Edit note: Obviously irritated] How much clearer do you want it? The Second Amendment will be gone, along with the first, at least practically or operationally. The Constitution will be gone, suspended, at least in an operational sense. Maybe they won’t actually say that they are suspending it, but will do it. Like saying the sky is purple when it’s actually blue. How many people will look a the sky and say yeah, it’s purple? They see what they want to see.
So the DHS, working with other law enforcement organizations, especially the TSA as it stands right now, will oversee the confiscation of assault weapons, which includes all semi-automatic weapons following a period of so-called amnesty. It also includes shotguns that hold multiple rounds, or have pistol grips. They will go after the high capacity magazines, anything over, say 5 rounds.
They will also go after the ammunition, especially at the manufacturer’s level. They will require a special license for certain weapons, and make it impossible to own anything. More draconian than England. This is a global thing too. Want to hunt? What gives you the right to hunt their animals? Sound strange? I hope so, but they believe they own the animals. Do you understand now, how sick and twisted this is? Their mentality?
The obvious intent is to disarm American citizens. They will say that we’ll still be able to defend ourselves and go hunting, but even that will be severely regulated. This is the part that they are still working out, though. While the plans were made years ago, there is some argument over the exact details. I know that Napalitano, even with her support of the agenda, would like to see this take place outside of an E.O. [Executive Order] in favor of legislative action and even with UN involvement.

DH: But UN involvement would still require legislative approval.

RB: Yes, but your still thinking normal – in normal terms. Stop thinking about a normal situation. The country is divided, which is exactly where Obama wants us to be. We are as ideologically divided as we were during the Civil War and that rift is growing every day. Add in a crisis – and economic crisis – where ATM and EBT cards will stop working. Where bank accounts will contain nothing but air. They are anticipating a revolution and a civil war rolled into one (emphasis added by this author).
Imagine when talk show hosts or Bloggers or some other malcontent gets on the air or starts writing about the injustice of it all, and about how Obama is the anti-Christ or something. They will outlaw such talk or writing as inciting the situation – they will make it illegal by saying that it is causing people to die. The Republicans will go along with everything as it’s – we have – a one party system. Two parties is an illusion. It’s all so surreal to talk about but you see where this is headed, right?

DH: Well, what about the lists?

RB: Back to that again, okay. Why do you think the NSA has surveillance of all communications? To identify and stop terrorism? Okay, to be fair, that is part of it, but not the main reason. The federal agencies have identified people who present a danger to them and their agendas. I don’t know if they are color coded like you mentioned, red blue purple or peach mango or whatever, but they exist. In fact, each agency has their own. You know, why is it so [deleted] hard for people to get their heads around the existence of lists with names of people who pose a threat to their plans? The media made a big deal about Nixon’s enemies list and everyone nodded and said yeah, that [deleted], but today? They’ve been around for years and years.

DH: I think it’s because of the nature of the lists today. What do they plan to do with their enemies?

RB: Go back to what Ayers said when, in the late 60’s? 70’s? I forget. Anyway, he was serious. But to some extent, the same thing that happened before. They – the people on some of these lists – are under surveillance, or at least some, and when necessary, some are approached and made an offer. Others, well, they can be made to undergo certain training. Let’s call it sensitivity training, except on a much different level. Others, most that are the most visible and mainstream are safe for the most part. And do you want to know why? It’s because they are in the pockets of the very people we are talking about, but they might or might not know it. Corporate sponsorship – follow the money. You know the drill. You saw it happen before, with the birth certificate.
It’s people that are just under the national radar but are effective. They have to worry. Those who have been publicly marginalized already but continue to talk or write or post, they are in trouble. It’s people who won’t sell out, who think that they can make a difference. Those are the people who have to worry.
Think about recent deaths that everybody believes were natural or suicides. Were they? People are too busy working their [butts] off to put food on the table to give a damn about some guy somewhere who vapor locks because of too many doughnuts and coffee and late nights. And it seems plausible enough to happen. This time, when everything collapses, do you think they will care if it is a bullet or a heart attack that takes out the opposition? [Deleted] no.

DH: That’s disturbing. Do you… [interrupts]

RB: Think about the Oklahoma City bombing in ’95. Remember how Clinton blamed that on talk radio, or at least in part. Take what happened then and put it in context of today. Then multiply the damnation by 100, and you will begin to understand where this is going. People like Rush and Hannity have a narrow focus of political theater. They’ll still be up and running during all of this to allow for the appearance of normal. Stay within the script, comrade.
But as far as the others, they have certain plans. And these plans are becoming more transparent. They are getting bolder. They are pushing lies, and the bigger the lie, the easier it is to sell to the people. They will even try to sell a sense of normalcy as things go absolutely crazy and break down. It will be surreal. And some will believe it, think that it’s only happening in certain places, and we can draw everything back once the dust settles. But when it does, this place will not be the same.

DH: Will there be resistance within the ranks of law enforcement? You know, will some say they won’t go along with the plan, like the Oath Keepers?

RB: Absolutely. But they will not only be outnumbered, but outgunned – literally. The whole objective is to bring in outside forces to deal with the civil unrest that will happen in America. And where does their allegiance lie? Certainly not to Sheriff Bob. Or you or me.
During all of this, and you’ve got to remember that the dollar collapse is a big part of this, our country is going to have to be redone. I’ve seen – personally – a map of North America without borders. Done this year. The number 2015 was written across the top, and I believe that was meant as a year. Along with this map – in the same area where this was – was another map showing the United States cut up into sectors. I’m not talking about what people have seen on the internet, but something entirely different. Zones. And a big star on the city of Denver.
Sound like conspiracy stuff on the Internet? Yup. But maybe they were right. It sure looks that way. It will read that way if you decide to write about this. Good luck with that. Anyway, the country seemed to be split into sectors, but not the kind shown on the internet. Different.

DH: What is the context of that?

RB: Across the bottom of this was written economic sectors. It looked like a work in progress, so I can’t tell you any more than that. From the context I think it has to do with the collapse of the dollar.

DH: Why would DHS have this? I mean, it seems almost contrived, doesn’t it?

RB: Not really, when you consider the bigger picture. But wait before we go off into that part. I need to tell you about Obamacare, you know, the new health care coming up. It plays a big part – a huge [deleted] part in the immediate reshaping of things.

DH: How so?

RB: It creates a mechanism of centralized control over people. That’s the intent of this monster of a bill, not affordable health care. And it will be used to identify gun owners. Think your health records are private? Have you been to the doctor lately? Asked about owning a gun? Why do you think they ask, do you think they care about your safety? Say yes to owning a gun and your information is shared with another agency, and ultimately, you will be identified as a security risk. The records will be matched with other agencies.
You think that they are simply relying on gun registration forms? This is part of data collection that people don’t get. Oh, and don’t even think about getting a script for some mood enhancement drug and being able to own a gun.
Ayers and Dohrn are having the times of their lives seeing things they’ve worked for all of their adult lives actually coming to pass. Oh, before I forget, look at the recent White House visitor logs.

DH: Why? Where did that come from?

RB: Unless they are redacted, you will see the influence of Ayers. Right now. The Weather Underground has been reborn. So has their agenda.

DH: Eugenics? Population control?

RB: Yup. And re-education camps. But trust me, you write about this, you’ll be called a kook. It’s up to you, it’s your reputation, not mine. And speaking about that, you do know that this crew is using the internet to ruin people, right? They are paying people to infiltrate discussion sites and forums to call people like you idiots. Show me the proof they say. Why doesn’t you source come forward? If he knows so much, why not go to Fox or the media? To them, if it’s not broadcast on CNN, it’s not real. Well, they’ve got it backwards. Very little on the news is real. The stock market, the economy, the last presidential polls, very little is real.
But this crew is really internet savvy. They’ve got a lot of people they pay to divert issues on forums, to mock people, to marginalize them. They know what they’re doing. People think they’ll take sites down – hack them. Why do that when they are more effective to infiltrate the discussion? Think about the birth certificate, I mean the eligibility problem of Obama. Perfect example.

DH: How soon do you see things taking place?

RB: They already are in motion. If you’re looking for a date I can’t tell you. Remember, the objectives are the same, but plans, well, they adapt. They exploit. Watch how this fiscal cliff thing plays out. This is the run-up to the next beg economic event. I can’t give you a date. I can tell you to watch things this spring. Start with the inauguration and go from there. Watch the metals, when they dip. It will be a good indication that things are about to happen. I got that little tidbit from my friend at [REDACTED].

NOTE: At this point, my contact asked me to reserve further disclosures until after the inauguration.

via SteveQuayle

Read more
10 Outrageous Tactics Cops Get Away With

Talk to someone who has never dealt with the cops about police behaving badly, and he or she will inevitably say, “But they can’t do that! Can they?” The question of what the cops can or can’t do is natural enough for someone who never deals with cops, especially if their inexperience is due to class and/or race privilege. But a public defender would describe that question as naïve. In short, the cops can do almost anything they want, and often the most maddening tactics are actually completely legal.

There are many reasons for this, but three historical developments stand out: the war on drugs provided the template for social control based on race; 9/11 gave federal and local officials the opportunity to ensnare Muslims (and activists) in the ever-increasing surveillance and incarceration state; and a lack of concern from the public at large means these tactics can be applied, often controversy-free, to anyone who resists them.

What follows are 10 of the innumerable tactics the police can use against a population often incapable of constraining their behavior.

1. Infiltration, informants and monitoring. The NYPD’s Demographics Unit has engaged in a massive surveillance program directed at Muslims throughout the entire Northeast region, ignoring any jurisdictional limitations and acting as a secret police and intelligence gathering agency – a regional FBI of sorts. The AP’s award-winning reports [3] on the Demographics Unit helped bring some information about the program to light, including the revelation that its efforts have resulted in exactly zero terrorism leads. [4]

Although a lawsuit from 1971, the Handschu case, [4] “resulted in federal guidelines that prohibit the NYPD from collecting information about political speech unless it is related to potential terrorism,” legal experts worry that privacy rights have been so diminished that Muslims who are spied on may not be able to seek recourse. The AP quoted [5] Donna Lieberman in November 2011, who said, “It’s really not clear that people can do anything if they’ve been subjected to unlawful surveillance anymore.”

Muslims are not the only group that has been targeted. The AP reported [6] that the NYPD has also infiltrated liberal groups and protest organizers. Other cases of entrapment of activists, such as the NATO 5 [7] and the Cleveland 5, are also troubling. [8]

2. Warrantless home surveillance. Just in case you still think there must be some limit on how the authorities can surveil you, there’s this — a federal agency, not the police, but the larger point stands. The Ninth Circuit Court of Appeals recently ruled that it is legal for a law enforcement agent [9] to enter your house and videotape you without your consent. The case, United States v. Wahchumwah, revolved around a U.S. Fish and Wildlife undercover agent who recorded Wahchumwah without a warrant. The Ninth Circuit found the search to be “voluntary,” which led the EFF to write on its Web site: “The sad truth is that as technology continues to advance, surveillance becomes ‘voluntary’ only by virtue of the fact we live in a modern society where technology is becoming cheaper, easier and more invasive.”

The Ninth Circuit isn’t the only one who thinks warrantless video surveillance is perfectly OK. [10]

“CNET has learned that U.S. District Judge William Griesbach [11] ruled that it was reasonable for Drug Enforcement Administration agents to enter rural property without permission — and without a warrant — to install multiple ‘covert digital surveillance cameras’ in hopes of uncovering evidence that 30 to 40 marijuana plants were being grown.”

During the Bush years, Congress had to grant retroactive immunity to giant telecoms that engaged in warrantless wiretapping. It seems, the judicial branch wants to save Congress the trouble.

3. Preemptive visits and harassment. One of the favorite tactics of police departments is targeting activists a day before a large event. We saw this on May Day in New York City, as cops descended on several activists’ apartments before the day of action, [12] and in Chicago before the massive No NATO protests. [13] The Cleveland 5 were also arrested before May Day, and back in 2008 the RNC8 were also preemptively arrested. [7]

4. Creating call logs from stolen phones. If you lose your phone in NYC and report it to the police, they’ll help you find it. So far, so good. Where the agreement turns pear-shaped, however, is what they do with your call logs. The NYPD subpoenas your call log from the day it was stolen onward, under the logic that the records could help find your phone.

But — and here’s the kicker — they get info for the calls you made on the day it was swiped, and possibly even info from your new cell phone if you keep your number. The information is added to a database called the Enterprise Case Management System, and the numbers are hyperlinked for cross-referencing. The call logs, all obtained without a court order and often without the victim’s permission or knowledge, could “conceivably be used for any investigative purpose,” according to the New York Times. [14]

5. Consent searches. Sometimes a cop gives you a command, but phrases it as a question, like, “Would you open your bag so I can look inside?” If you’re anything like the vast majority of people in the United States, you have no idea that you’re under no lawful obligation to answer in the affirmative. You can, legally speaking, ask if you are being detained, and if the answer is no, you are free to walk away. Or at the very least, not open your bag.

Cops are aware that they can intimidate someone they decide to search, and once they obtain “consent” – e.g. “Yes, man with a gun who is towering over me, you can look in my bag” – any evidence of criminality they find can be used in court. This method of searching people was developed, like several other tactics on this list, during the early 1980s when the Reagan administration ramped up the so-called war on drugs.

Many critics argue that the very idea of a “consensual” interaction between police and the public is impossible, if the police initiate contact. As Justin Peters writes [15], “[Police] know the average person doesn’t feel they’re in a position to decline a conversation with a cop.” A common tactic [16] is for officers to say they’ll let someone off with a warning, then proceed to ask a bunch of questions, even though the person is technically free to go.

6. Stop and frisk. You’ve probably heard about stop and frisk by now, but for years this odious tactic – and close cousin to consent searches – went woefully underreported in establishment media. The NYCLU released staggering statistics for the year 2011 detailing the massive size of the program in New York City. One particularly memorable figure was that the NYPD stopped more young men of color than there are men of color in NYC. [17] (More information at stopmassincarceration.org [18].)

7. Pretext stops (Operation Pipeline). The Supreme Court has repeatedly ruled that cops are free to use minor traffic violations as a pretext to pull over people they suspect of committing drug crimes. Once pulled over, the police obtain “consent” – “Would you get out of the car and empty your pockets?” – and can go on fishing expeditions.

In the Supreme Court’s ruling in Ohio v. Robinette, “The Court made clear to all lower courts that, from now on, the Fourth Amendment should place no meaningful constraints on the police in the War on Drugs,” writes Michelle Alexander in The New Jim Crow. The Court determined [19] that cops don’t have to tell motorists they’re free to leave before getting “permission” to search their car.

In the mid-1980s, the DEA rolled out Operation Pipeline, a federal program that trained city cops in the shady art of leveraging pretext stops into consent searches. The discretionary nature of many of these searches resulted in massive amounts of racial profiling, so much so that some officials say [20] “the reason racial profiling is a national problem is that it was initiated, and in many ways encouraged, by the federal government’s war on drugs.”

8. Police dogs. Don’t consent to cops searching your bag? If you’re in a car or an airport, police can bring in the dogs to smell your stuff, and if the dog responds, they have probable cause to search you without your consent. “The Supreme Court has ruled that walking a drug-sniffing dog around someone’s vehicle (or someone’s luggage) does not constitute a ‘search,’ and therefore does not trigger Fourth Amendment scrutiny,” Michelle Alexander writes.

But if a dog barks or sits, shouldn’t we be comfortable with that triggering probable cause? Radley Balko has reported on the phenomenon of drug dogs giving false positives after reading cues from their handlers [16]:

The problem isn’t that the dogs aren’t capable of picking up the scent; it’s that dogs have been bred to please and interact with humans. A dog can easily be manipulated to alert whenever needed. But even with conscientious cops, a dog without the proper training may pick up on its handler’s body language and alert whenever it detects its handler is suspicious.

This is called the “Clever Hans effect,” [21] named after the horse who could do arithmetic by tapping his hoof. In reality, the horse could recognize the shift in his owner’s body language when he had arrived at the right number.

9. Surveillance drones. The drones are coming, and the few illusions of privacy we cling to will soon disappear. The domestic market for drones in the next decade is estimated in the billions, [22] and police departments are chomping at the bit to implement this new technology. Drones already patrol the US-Mexico border, [23] and cities such as Seattle are moving toward using surveillance drones [24]. In August, a North Dakota court ruled [25] that the first-ever drone-assisted arrest was perfectly legal.

In our ever more authoritarian society, [26] expect politicians and the lobbyists who fund their campaigns to justify increased incursions into privacy in the name of security. The short-term incentives to value privacy have been all but forgotten, as “if you’re not doing anything wrong you’ve got nothing to fear” has gone from self-evidently absurd cliché to national motto.

10. Enlist the private sector. The comedian Chris Laker says of privatization: “You can’t privatize everything. Learned that from RoboCop.” But it seems police departments haven’t learned that lesson. In Arizona, police enlisted the help of the Corrections Corporation of America, a private, for-profit prison corporation, in a drug sweep of a public school. PRWatch reports: [27]

“To invite for-profit prison guards to conduct law enforcement actions in a high school is perhaps the most direct expression of the ‘schools-to-prison pipeline’ I’ve ever seen,” said Caroline Isaacs, program director of the Tucson office of the American Friends Service Committee (AFSC), a Quaker social justice organization that advocates for criminal justice reform.

The privatization of nearly all aspects of public life, from education to law enforcement, is a trend we should all find disturbing, not least of all when a company that profits from locking humans in cages is directly involved in the arrest process.

The larger point here is obvious. In the last decade, the Bill of Rights has been shredded at the federal level and the local level. There are few constraints on police, FBI, NSA, and private intelligence companies when it comes to surveillance of the public. That many of these programs and tactics are discretionary exacerbates and magnifies conscious and subconscious racist and classist attitudes among those who carry them out.

Editor’s note: a formatting error which has since been corrected erased a block quote from the text of this article, leading to inadvertently  incorrect attribution of a quote. 

See more stories tagged with:

police [28],
rights [29],

Links:
[1] http://www.alternet.org
[2] http://www.alternet.org/authors/john-knefel
[3] http://www.ap.org/media-center/nypd/investigation
[4] http://www.ap.org/Content/AP-In-The-News/2012/NYPD-Muslim-spying-led-to-no-leads-terror-cases
[5] http://www.ap.org/Content/AP-In-The-News/2011/Law-may-not-be-on-Muslims-side-in-NYPD-intel-case
[6] http://www.ap.org/Content/AP-In-The-News/2012/Documents-NY-police-infiltrated-liberal-groups
[7] http://dissenter.firedoglake.com/2012/05/21/the-preemptive-prosecution-of-the-nato-5/
[8] http://www.rollingstone.com/culture/news/the-plot-against-occupy-20120926
[9] https://www.eff.org/deeplinks/2012/11/ninth-circuit-gives-ok-warrantless-home-video-surveillance
[10] http://news.cnet.com/8301-13578_3-57542510-38/court-oks-warrantless-use-of-hidden-surveillance-cameras/
[11] http://www.wied.uscourts.gov/index.php?option=com_contxtd&task=view&contact_id=6&Itemid=85
[12] http://gawker.com/5906500/
[13] http://dissenter.firedoglake.com/2012/05/17/police-preemptively-raid-apartment-arrest-activists-ahead-of-nato-summit/
[14] http://www.nytimes.com/2012/11/27/nyregion/new-york-city-police-amassing-a-trove-of-cellphone-logs.html?hpw
[15] http://www.slate.com/blogs/crime/2012/11/30/stop_and_frisk_florida_is_there_such_thing_as_a_consensual_police_encounter.html
[16] http://www.huffingtonpost.com/2012/03/31/drug-search-trekies-stopped-searched-illinois_n_1364087.html
[17] http://thinkprogress.org/justice/2012/05/10/481589/nypd-stop-and-frisk-young-black-men/?mobile=nc
[18] http://stopmassincarceration.org/
[19] http://www.law.cornell.edu/supct/search/display.html?terms=drugs&url=/supct/html/95-891.ZS.html
[20] http://www.nytimes.com/2000/11/29/nyregion/new-jersey-argues-that-the-us-wrote-the-book-on-race-profiling.html
[21] http://reason.com/archives/2011/02/21/the-mind-of-a-police-dog
[22] http://www.sfgate.com/nation/article/Push-to-step-up-domestic-use-of-drones-4064482.php#page-2
[23] http://www.washingtonpost.com/world/more-predator-drones-fly-us-mexico-border/2011/12/01/gIQANSZz8O_story.html
[24] http://rt.com/usa/news/seattle-police-drone-surveillance-341/
[25] http://www.usnews.com/news/articles/2012/08/02/court-upholds-domestic-drone-use-in-arrest-of-american-citizen
[26] http://www.nytimes.com/roomfordebate/2012/02/20/civilian-drones-in-the-united-states/curbing-police-surveillance-with-drones
[27] http://www.prwatch.org/news/2012/11/11876/corrections-corporation-america-used-drug-sweeps-public-school-students
[28] http://www.alternet.org/tags/police-0
[29] http://www.alternet.org/tags/rights-0
[30] http://www.alternet.org/tags/liberties
[31] http://www.alternet.org/%2Bnew_src%2B

Read more
Stingrays: The Biggest Technological Threat to Cell Phone Privacy You Don’t Know About

 

On Friday, EFF and the ACLU submitted an amicus brief in United States v. Rigmaiden, a closely-followed case that has enormous consequences for individuals’ Fourth Amendment rights in their home and on their cell phone. As the Wall Street Journal explained today, the technology at the heart of the case invades the privacy of countless innocent people that have never even been suspected of a crime.

Rigmaiden centers around a secretive device that federal law enforcement and local police have been using with increased frequency: an International Mobile Subscriber Identity locator, or “IMSI catcher.” These devices allows the government to electronically search large areas for a particular cell phone’s signal—sucking down data on potentially thousands of innocent people along the way—while attempting to avoid many of the traditional limitations set forth in the Constitution.

How Stingrays Work

The Stingray is a brand name of an IMSI catcher targeted and sold to law enforcement. A Stingray works by masquerading as a cell phone tower—to which your mobile phone sends signals to every 7 to 15 seconds whether you are on a call or not— and tricks your phone into connecting to it. As a result, the government can figure out who, when and to where you are calling, the precise location of every device within the range, and with some devices, even capture the content of your conversations. (Read the Wall Street Journal’s detailed explanation for more.)

Given the breadth of information that it can stealthily obtain, the government prefers the public and judges alike not know exactly how Stingrays work and they have even argued in court that it should be able to keep its use of the technology secret. The Electronic Privacy Information Center has filed a FOIA request for more information on Stingrays, but the FBI is dragging its feet and is sitting on 25,000 pages of documents explaining the device.

The Rigmaiden Case: An Illusory Warrant

In Rigmaiden, the government asked a federal judge in Northern California to order Verizon to assist in locating the defendant, who was a suspect in a tax fraud scheme. But after they received an order telling Verizon to provide the location information of an Aircard they thought to be the defendant’s, the government took matters into their own hands: they claimed this authorization somehow permitted its own use of a Stingray.

Not only did the Stringray find the suspect, Rigmaiden, but it also got the records of every other innocent cell phone user nearby.

The government now concedes that the use of the device was a “search” under the Fourth Amendment and claims it had a warrant, despite the fact that, as we explain in our brief, “the Order directs Verizon to provide the government with information and assistance, but nowhere authorizes the government to search or seize anything.”

In fact, the government’s application made no mention of an IMSI catcher or a Stingray, and only has a brief sentence about its plans buried at the end of an 18-page declaration: “the mobile tracking equipment ultimately generate[s] a signal that fixes the geographic position of the Target Broadband Access Card/Cellular Telephone.”

A judge initially signed off on this order, but clearly, the government did not accurately and adequately explain what it was really up to.

General Warrants: Unconstitutional, All You Can Eat Data Buffets

Beyond the government’s conduct in this specific case, there is an even broader danger in law enforcement using these devices to locate suspects regardless of whether they explain the technology to judges: these devices allow the government to conduct broad searches amounting to “general warrants,” the exact type of search the Fourth Amendment was written to prevent.

A Stingray—which could potentially be beamed into all the houses in one neighborhood looking for a particular signal—is the digital version of the pre-Revolutionary war practice of British soldiers going door-to-door, searching Americans’ homes without rationale or suspicion, let alone judicial approval. The Fourth Amendment was enacted to prevent these general fishing expeditions. As the Supreme Court has explained, a warrant requires probable cause for all places searched, and is supposed to detail the scope of the search to ensure “nothing is left to the discretion of the officer executing the warrant”.

But if uninformed courts approve the unregulated use of Stingrays, they are essentially allowing the government to enter into the home via a cellular signal at law enforcement’s discretion and rummage at will without any supervision. The government can’t simply use technology to upend centuries of Constitutional law to conduct a search they would be prevented from doing physically.

Stingrays Collect Data on Hundreds of Innocent People

And when police use a Stingray, it’s not just the suspects’ phone information the device sucks up, but all the innocent people around such suspect as well. Some devices have a range of “several kilometers,” meaning potentially thousands of people could have their privacy violated despite not being suspected of any crime. This is another fact the government didn’t fully explain to the magistrate judge in Rigmaiden.

The government now claims it protected privacy by deleting all third-party data on its own after it collected it. But the government’s unilateral decision to binge and purge comes with its own consequences. Now there’s no way to know what exactly the government obtained when it used the device.

Had the government told the court what it really was planning on doing and the amount of information it would obtain, the court may have exercised its constitutional role of ensuring the government narrowed its search. After all, it was for the court, not the government, to decide how best to balance the government’s need for information with third-party privacy, and any suspect’s future interest in access to potentially exculpatory information.

Enough Warrantless Excursions

Unfortunately, US government excuses for conducting warrantless searches are becoming all too familiar. Whether it’s the hundreds of thousands of searches for cell phone location information, the skyrocketing of warrantless surveillance of who and when you’re calling, or the NSA’s still-active warrantless wiretapping program, Americans are seeing their Fourth Amendment privacy rights under attack from all angles. We hope in this case and others like it, the court will prevent such violations of privacy from occuring again.

via EFF.org

Read more
The Supreme Court Isn’t Bothered By the NSA’s Warrantless Wiretapping

The Supreme Court refused to hear a case on Tuesday that holds telecom companies accountable for letting the National Security Agency spy on unknowing Americans without a warrant. Dating back to 2006 when the American Civil Liberties Union and the Electronic Frontier Foundation first filed the class-action lawsuit, the case accuses AT&T of providing the NSA with customers’ personal information — phone calls, emails and web browsing history — without seeking a court order. Verizon and Sprint are also mentioned. The plaintiff, former AT&T technician Mark Klein, even provided internal documentation that showed evidence of the NSA surveilling Americans’ Internet traffic from a secret room in San Francisco. That case, Hepting v. AT&T, has now been thrown out, and the Supreme Court didn’t even comment on why.

This sound very important! After all, doesn’t the Constitution protect American citizens from being spied on by their government without their knowledge or consent? Well, yes and no. Warrantless wiretapping sounds invasive and terrible, sure, but it’s actually technically legal under a 2008 law that retroactively granted immunity to all of the telecom companies that were spying on Americans at the government’s behest. Unsurprisingly, the practice can be traced back to President George W. Bush’s anti-terrorism program following the 2001 World Trade Center attacks. Once things calmed down and people actually started suing the government for eavesdropping on everyday Americans, Congress passed the FISA Amendements Act. (FISA stands for the original law, the Federal Intelligence Surveillance Act.) That law is currently up for renewal in Congress.

As Wired points out, neither the Bush administration nor the Obama administration has confirmed or denied allegations of warrantless wiretapping. They’ve both argued that the surveillance program is a state secret and any sort of disclosure would endanger national security. The EFF doesn’t buy this argument. “The government still claims that this massive program of surveillance of Americans is a state secret, but after eleven years and multiple Congressional reports, public admissions and media coverage, the only place that this program hasn’t been seriously considered is in the courts — to determine whether it’s legal or constitutional,” said Cindy Cohn, the EFF’s legal director. “We look forward to rectifying that.”

Indeed, Heptig v. AT&T is not the civil liberties advocates’ last hope at gaining some clarity on the warrantless wiretapping issue. In a separate case, the EFF sued the government directly, rather than going after the telecom companies. The case was tossed out by a district court judge only to be picked up by the 9th Circuit Court of Appeals, where Judge Margaret McKeown ruled that the EFF’s arguments “are not abstract, generalized grievances and instead meet the constitutional standing requirement of concrete injury.”

That case will be heard in December. Until then, be careful what you say on the phone. You know who is listening.

via AtalanticWire

Read more
New Book Details the NSA’s Warrantless Wiretapping Program, As Government Moves to Avoid All Accountability in Court

Former New York Times reporter Kurt Eichenwald’s new book, published last week, provides yet more details about how the the NSA’s unconstitutional warrantless wiretapping program came about, and confirms that even top Bush Administration lawyers felt there was a “strong argument” that the program violated the law. “Officials might be slammed for violating the Fourth Amendment as a result of having listened in on calls to people inside the country and collecting so much personal data,” Eichenwald wrote, and “in the future, others may question the legality” of their actions.

Yet even today, eleven years later, the government continues to claim that no court can judge the program’s legality. In the next month, the government will argue—in EFF’s case in federal district court and ACLU’s case in the Supreme Court—that courts must dismiss the legal challenges without ever coming to a ruling on the merits.

Eichenwald’s book, 500 Days: Secrets and Lies in the Terror Wars, describes how the NSA’s illegal program—what he calls “the most dramatic expansion of NSA’s power and authority in the agency’s 49 year history”— was devised just days after 9/11 to disregard requirements in the Foreign Intelligence Surveillance Act (FISA). Instead of getting individualized warrants to monitor Americans communicating overseas, the Bush administration unilaterally gave the NSA the power to sweep up millions of emails and phone calls into a database for analysis without court approval:

Connections between a suspect e-mail address and others—accounts that both sent and received messages there, whether in the United States or not—would be examined. At that point, a more detailed level of analysis would be applied creating something of a ripple effect. The suspect e-mail address would lead to a second, the second to the accounts it contacted.

In other words, the NSA was given the green light to warrantlessly spy of Americans communications on American soil—a power that was illegal under FISA. And the government—instead of finding probable cause for surveillance like the Constitution requires—started using a burden of proof akin to the game Six Degrees from Kevin Bacon.

Eichenwald’s reporting, focused on the immediate aftermath of 9/11, unfortunately overlooks the NSA’s longstanding desire to live “on the network” reflected in its presentations to the incoming Bush Administration officials in December, 2000. The idea that the NSA only came up with this idea after 9/11 isn’t really accurate.1 But regardless, Eichenwald’s reporting makes clear that Bush administration officials were terrified that this program would become public.

Of course, after several years, much of the NSA’s program did become public when the New York Times exposed its existence in their 2005 Pulitzer Prize winning investigation. Virtually every major news organization in the US subsequently reported on the NSA and its mass spying programs, which led to congressional investigations and a multitude of lawsuits—two which will be argued in the coming month.

In EFF’s lawsuit, in addition to a mountain of public information including many governmental admissions, the court will see evidence from AT&T whistleblower Mark Klein showing blueprints and photographs of the NSA’s secret room in AT&T’s facility in San Francisco. Three more NSA whistleblowers, including William Binney a former high ranking official involved with the program during its infancy, also submitted affidavits laying out how the NSA illegally spied on Americans in the aftermath of 9/11.

Despite this all of this, the government recently filed a motion in the Northern District of California invoking the controversial “state secrets” privilege. Essentially, the government argues that—even if all of the allegations are true—the case should be dismissed entirely because admitting or denying any fact would potentially endanger national security, even in the face of the government’s own craftily wordsmithed  “denials” before Congress and elsewhere.

In the ACLU’s case going before the Supreme Court this term, a group of journalists, lawyers, and human rights activists has sued over surveillance conducted after the passage of the FISA Amendments Act (FAA). The FAA was passed in 2008 and formalized some of the admitted portions of NSA’s program, allowing emails and phone calls to and from from overseas to continue to be acquired without a warrant. The government only needs one general court order to target large groups of people—even entire countries—communicating to Americans for an entire year.

The plaintiffs, given that their professions, regularly talk to people who are almost certainly spied on. They argue that surveillance of them without warrants  renders the statute unconstitutional. But the government contends the case must be dismissed on “standing” grounds because the plaintiffs can’t prove with certainty they have been surveilled, because, in a perfectly circular argument, the government won’t “admit” they have been surveilled, as if public admissions by the government is the only way to prove illegal wiretapping.

As the ACLU writes, “The government theory of standing would render real injuries nonjusticiable and insulate the government’s surveillance activities from meaningful judicial review.” The same can be said of the ‘state secrets’ privilege in EFF’s case. The government is contending they can use government secrecy as a sword to terminate judicial accountability. It doesn’t matter how much evidence is in the public domain, just by telling the Court that the information implicates “national security,” they can wall off entire subject matters from judicial oversight, effectively hiding illegality, unconstitutionality along with embarrassing or overreaching acts by NSA spooks and others.

Eichenwald is just the latest in a long line of journalists to discuss and organize details about the NSA’s unconstitutional program. At this point the American people are well aware of the NSA’s actions – only the courts have been kept in the dark.  And if the courts go along with blinding themselves, the government will have been given a license to violate the law and constitution long into the future.

via EFF.org

Read more
Shredding the Constitution: National Detention, Targeted Killing and Spying Cases
Indefinite detention, targeted killing and warrantless wiretapping are hot issues in the courts this week. Here’s the latest:
  • INDEFINITE DETENTION // The National Defense Authorization Act (NDAA) of 2012 provision that allows the government to indefinitely detain US citizens without charge or trial is once again in effect, after a Second Circuit Court overturned Judge Katherine Forrest’s permanent injunction against Section 1021 (b)(2). The fight over the widely-despised authority appears to be far from over. Read more.

UPDATE: Chris Hedges, one of the plaintiffs in the NDAA indefinite detention lawsuit, spoke with live stream journalist Tim Pool at Occupy Wall Street on Monday, September 17 about his case and the Obama administration’s appeal. Hedges put forward the thesis that the Obama administration may already be holding US citizens without due process — otherwise they wouldn’t have acted so quickly to overturn Forrest’s permanent injunction. The administration doesn’t want to be held in contempt, Hedges said, and so immediately moved to appeal her verdict. Note: This was filmed before the court overturned Forrest’s injunction, so it’s obsolete in that sense.

Watch:

  • TARGETED KILLING // Can the federal government talk publicly about its targeted killing drone program on television, in interviews with journalists, and before audiences of hundreds, and then turn around and deny the existence of the program in court to ensure that the public remains in the dark about its legal justifications for pursuing it? The ACLU says ‘no':
The American Civil Liberties Union will be in federal appeals court Thursday to argue that the CIA cannot deny the existence of the government’s targeted killing program and refuse to respond to Freedom of Information Act requests about the program while officials continue to make public statements about it.
The ACLU’s FOIA request, filed in January 2010, seeks to learn when, where and against whom drone strikes can be authorized, and how the U.S. ensures compliance with international laws relating to extrajudicial killings.
“The notion that the CIA’s targeted killing program is a secret is nothing short of absurd,” said ACLU Deputy Legal Director Jameel Jaffer, who will argue the case before a three-judge panel of the D.C. Circuit Appeals Court. “For more than two years, senior officials have been making claims about the program both on the record and off. They’ve claimed that the program is effective, lawful and closely supervised. If they can make these claims, there is no reason why they should not be required to respond to requests under the Freedom of Information Act.”
Read more about the case here.
  • WARRANTLESS SPYING // A 2005 class action lawsuit brought by AT&T customers who say the NSA illegally spied on their communications is slowly winding itself through the court system. In 2008, Congress immunized AT&T and other telecoms from lawsuits related to companies turning over customer information to the NSA, but the government still faces a number of challenges to the warrantless spying program, among them the AT&T class action suit. A judge first threw the case out in 2010, claiming that the plaintiffs didn’t have standing to bring the lawsuit because they couldn’t prove they were spied on. Another court reversed that decision a year later, instructing the court to look at whether the state secrets privilege bars the court from considering the case at all — regardless of whether there’s evidence of spying or not. As a result, the main plaintiff in the case, Carolyn Jewel, filed for summary judgment in July, providing the court with testimony from NSA whistleblowers and former AT&T employees to prove the existence of vacuum style, dragnet surveillance. The NSA makes some contradictory and utterly confusing arguments about why the plaintiffs shouldn’t have a right to challenge its spying programs. From Courthouse News:

The government has amply demonstrated in the DNI and NSA public and classified declarations that disclosure of the privileged information reasonably could be expected to cause exceptionally grave damage to national security,” a 48-page memorandum states. “The disclosure of information concerning whether plaintiffs have been subject to alleged NSA intelligence activity would necessarily reveal NSA intelligence sources and methods, including whether certain intelligence collection activities existed and the nature of any such activity. The disclosure of whether specific individuals were targets of alleged NSA activities would also reveal who is subject to investigative interest – helping that person to evade surveillance – or who is not – thereby revealing the scope of intelligence activities as well as the existence of secure channels for communication.

But those statements thoroughly contradict something else the government says:

The DNI explains that, as the government has previously indicated, the NSA’s collection of content of communications under the now inoperative TSP was directed at international communications in which a participant is reasonably believed to be associated with al Qaeda or an affiliate terrorist organization, and thus plaintiffs’ allegation that the NSA has indiscriminately collected the content of millions of communications sent or received by people inside the United States after 9/11 under the TSP is false.

The national security establishment first tells the public that it cannot disclose who is and who is not a target of its surveillance programs because doing so would tip off the bad guys, and then goes on to say that the program “was directed at…al Qaeda[.]” In other words, the government will readily admit that al Qaeda and “affiliate terrorist organization[s]” are targets of its surveillance programs, but it can’t acknowledge whether or not non-terrorist US citizens are also targets of that program because disclosure of whether non-terrorist US citizens are being spied on without constitutional protections would “cause exceptionally grave harm to national security.” As BoingBoing observed: the NSA says it can’t tell us if it is spying on us because “REASONS.”

  • WARRANTLESS SPYING // The ACLU has its own warrantless wiretapping lawsuit in the works to challenge the constitutionality of the FISA Amendments Act of 2008, and the government has thrown up similar roadblocks to prevent the case from being heard on the merits. Here’s the ACLU answer to the government’s claims that our clients — journalists, human rights workers and academics — don’t have a right to bring the lawsuit:
The government’s insistence that plaintiffs cannot establish standing without proving the certainty of surveillance is at bottom not a standing argument but a bid for a kind of immunity. This is because its proposed standard is one that neither plaintiffs nor anyone else will ever be able to meet—not because the surveillance they fear will never take place but because they will be unaware of it when it does…
The government theory of standing would render real injuries nonjusticiable and insulate the government’s surveillance activities from meaningful judicial review.
More than forty years ago, when surveillance technology was comparatively primitive, this Court recognized that “few threats to liberty exist which are greater than that posed by the use of eavesdropping devices” … and it cautioned that the threat to core democratic rights was especially pronounced where surveillance authority was exercised in the service of national security…. To accept the government’s theory of standing would be to accept that the courts are powerless to address the threat presented by surveillance authorities exercised in secret, and powerless to protect Americans’ most fundamental rights against the encroachment of increasingly sophisticated and intrusive forms of government power.
Read more about the ACLU’s challenge, which will go before the Supreme Court in late October to decide the standing issue once and for all. Just last week the House passed a reauthorization of the FISA Amendments Act, which would extend the law through December 31, 2017. Read the brief in the ACLU’s challenge, Clapper v. Amnesty, et al., here.
Read more
Full Spectrum Dominance: Totalitarian Democracy in the New World Order

Book Description
Publication Date: May 12, 2009
For the faction controlling the Pentagon, the military industry, and the oil industry, the Cold War never ended. They engineered an incredible plan to grab total control of the planet, of land, sea, air, space, outer space and cyberspace. Continuing ‘below the radar,’ they created a global network of military bases and conflicts to advance the long-term goal of Full Spectrum Dominance. Methods included control of propaganda, use of NGOs for regime change, Color Revolutions to advance NATO eastwards, and a vast array of psychological and economic warfare techniques. They even used ‘save the gorilla’ organizations in Africa to secretly run arms in to create wars for raw materials. It was all part of a Revolution in Military Affairs, as they termed it. The events of September 11, 2001 would allow an American President to declare a worldwide War on Terror, on an enemy who was everywhere, and nowhere. 9/11 justified the Patriot Act, the very act that destroyed Americans’ Constitutional freedoms in the name of security. This book gives a disturbing look at the strategy of Full Spectrum Dominance, at what is behind a strategy that could lead us into a horrific nuclear war in the very near future, and at the very least, to a world at continuous war.
Seeds of Destruction: The Hidden Agenda of… by William F. Engdahl
4.3 out of 5 stars (28)
$16.47
A Century of War: : Anglo-American Oil Poli… by F. William Engdahl
5.0 out of 5 stars (1)
$24.95
Gods of Money: Wall Street and the Death of... by F. William Engdahl
5.0 out of 5 stars (1)
$21.33
They Own It All (Including You)!: By Means o… by Ronald MacDonald
4.8 out of 5 stars (38)
$14.96 Next
——————————————————————————–

Editorial Reviews
About the Author
F. William Engdahl is author of the international best-selling book on oil and geopolitics, A Century of War: Anglo-American Politics and the New World Order. He is a widely discussed analyst of current political and economic developments whose articles have appeared in numerous newspapers and magazines and well-known international websites. His book, ‘Seeds of Destruction: The Hidden Agenda Behind Genetic Manipulation,’ deals with agribusiness and the attempt to control world food supply and thereby populations. He may be reached at his website, www.engdahl.oilgeopolitics.net –This text refers to an alternate Paperback edition.

——————————————————————————–
Product Details
Paperback: 268 pages
Publisher: Third Millennium Press (May 12, 2009)
Language: English
ISBN-10: 0979560861
ISBN-13: 978-0979560866
Product Dimensions: 8.9 x 5.9 x 0.6 inches
Shipping Weight: 5.6 ounces
Average Customer Review: 4.7 out of 5 stars See all reviews (15 customer reviews)
Amazon Best Sellers Rank: #1,109,639 in Books (See Top 100 in Books)
5.0 out of 5 stars Urgent and Essential Reading, June 21, 2009
By Margot L. White “M. Lachlan White”
(REAL NAME) This review is from: Full Spectrum Dominance: Totalitarian Democracy in the New World Order (Paperback)
FULL SPECTRUM DOMINANCE is a rare and essential book — one that orients readers quickly and deeply to the world we live in, and how we arrived here. William Engdahl presents the historical background of policy making and decision analysis that explains how the United States arrived at its present “mission” in the world. The value of Engdahl’s brilliant book is not only that it familiarizes American readers with a history that is not usually revealed to us, but it also guides us through the many overt and covert tactics employed by the US for regime change– primarily via the Pentagon and its nefarious weapons contractors, but also through various think tanks and foundations with innocuous names disingenuously referring to “democracy” and “freedom.” The “full spectrum” of tactics and deceptions and tricks — both violent and non-violent — is revealed here. Needless to say, this book falls within the honorable tradition of political histories that blow the cover off America’s much vaunted pretense and propaganda about serving the cause of “freedom” and “democracy” around the world! It is the only book available today that covers ALL of this, with ample quotations and documents from the architects of US policies, in just 250 well written pages. FULL SPECTRUM DOMINANCE is unique in presenting the evolution of CIA tactics, ranging from its crude “coups” of yesteryear (as in Iran and Guatemala) to its current — and perhaps more insidious — use of “non-violent” electronically manipulated technological “crowd control” via cell phones and (as is currently evident on the streets of Tehran) Twitter. If Americans are woefully ignorant of the full range and dangerous extremes of American violence around the world, of American interventions into and manipulations of other countries’ elections and environments and economics, then there is no longer any excuse for such ignorance. FULL SPECTRUM DOMINANCE is a “must read.” To understand pipeline politics, the critical importance of Eurasia to US defense contractors, read this book. To understand how and why America has become such a rapacious and violent empire with bases all over the world and tens of thousands of agents provocateurs doing its dirty work from Tibet to Tehran, manipulating elections, staging phony “revolutions” to surround Russia with hostile Made-in-USA regimes, propping up American-trained puppets or fomenting chaos from Myanmar to Congo and from Ukraine to Iran — read this book! Help other customers find the most helpful reviews
Was this review helpful to you? Yes No Report abuse | Permalink
Comment Comment (1)
5.0 out of 5 stars Essential reading, June 1, 2009
By Lori “The Rogue Reader Mom” (Arizona) This review is from: Full Spectrum Dominance: Totalitarian Democracy in the New World Order (Paperback)
F W Engdahl has succeeded again at the difficult task of explaining the complexities of how our world really works and how we got to this frightful point in world affairs.
An exacting researcher, Mr. Engdahl, with his latest book, has taken on the task of sorting out the USA’s real intentions as it pertains to the rest of the world. In connecting the dots he takes us on a journey of clarity and comprehension regarding the aggressive path our nation is on as it builds the American Empire.
To follow Mr. Engdahl’s logical explanations of why we do what we do to the rest of the world is to come to the realization that the US may not be the ‘good guys’ we think we are and the rest of the world may have plenty of reasons to be wary of the US.
A sobering examination of our real past and current policies towards Russia, China, Europe, the Middle East and the rest of world community, ‘full spectrum dominance’, as the Pentagon calls it, is a strong-arm policy of control over the rest of the world that is leading us down a disastrous path towards a possible world war. We can’t solve our world’s problems until we properly identify them. Mr. Engdahl has done that in superb fashion.
5.0 out of 5 stars A book everyone needs to read!, July 1, 2009
By William Fetty “Kamakazi” (Sweden)
(REAL NAME) This review is from: Full Spectrum Dominance: Totalitarian Democracy in the New World Order (Paperback)
Engdahl’s books are at the very top of my list of books I recommend to people who want to know what is happening geopolitically in the world, but more importantly WHY things are happening!
Engdahl, though an academic scholar and very well educated with years of experince has once again written a book that anyone can understand and which reads like a great documentary film, much due to the fact that Engdahl is also a journalist, historian and economic researcher!
Full Spectrum Dominance picks up where his first book on the subject “A Century Of War:Anglo-American oil politics and the new world order” ends.
Engdahl once again leads us through the matrix of anglo-american foreign policy and their century old agenda of literal world domination through brute force and covert non-violent means. The evil and criminal actions of the anglo-american empire throughout the 20th century which has now spilled over in to the new millenium are presented in great detail and just like Engdahls previous books makes for a page turner. Once again I cannot recommend this book enough! Read it!

http://www.amazon.com/exec/obidos/ASIN/0979560861/ref=nosim/cryptogoncom-20

Read more
Why can’t you say “Tavistock” on Godlike Productions?

I’ve been hearing rumours for a few months now that Godlike Productions has a “banned words” list that will result in you being blocked from reading the website should you decide to use one.

While I fully expect certain keywords to result in you unable to make a posting on the site, but I have never heard of a site that bans you 100% for using said words.

As well, there are only 2 keywords that I know that are blocked… “Alex Jones” and “Tavistock”.   Thinking this may just be an urban legend, I wanted to put it to the test.

I opened up my browser and headed over to Godlike Productions.  To ensure that I wasn’t already banned (which does happen sometimes) I commented on a few posts.

Then I spy a post from the form administrator.  The admin goes by the name “Trinity” and is one of the 2 main administrators.  The post was entitled “A Heart Felt Thank You To All Participants On This Website!” where Trinity thanks the visitors of GLP.

Thinking that this would be a perfect place to test my theory, I typed in the following comment:

“I never knew it would be so much fun hanging with the guys from Tavistock”

And then hit the submit button.   The screen flashed and suddenly I was greeted with the following message:

SORRY – YOUR IP ADDRESS <REMOVED FOR PRIVACY> HAS BEEN BANNED FROM VIEWING THIS WEBSITE

If you have an upgraded account you are immune to bans while logged in. Please log in now to browse the site.

If you have a free account you may also log in now and upgrade your account to get immunity from bans.
If you still don’t have an account you may create an account now and then upgrade it to get past bans (and get access to other exclusive features).

Thank you for not stalking!

So why would GLP be banning people for using the words Tavistock?   Mind control and culture creation are big subjects in the alternative media and Tavistock is at the head of those operations.

Is this just a way for GLP to create buzz in the community?  If you ban certain words, like Tavistock, the visitors of the forums will spread that all around the Internet while calling you disinformation.

Unfortunately, Google doesn’t see “truth or false”.  They only see that links are being feed back into GLP, thus GLP must be popular.  Now Google will rank GLP pages higher because they have more “authority” due to the back-links.

Thinking this was all a bit strange, I decided to see if I could find out who owns GLP and then I could maybe gauge if they are brilliant marketers or full on COINTELPRO.

A Dark Rabbit Hole full of Vipers

As I’ve done with most of my investigations, I started this one without a conclusion in my head.   I really wanted to believe that this was just some smart viral marketing campaign by GLP to help bring in hits and advertising dollars.  But what I found made me really nervous.

So nervous, in fact, that I’m considering not publishing this article as I write it.   Sticking your nose at Intelligence Operations can make you ended up hanging yourself with your hands tied behind your back, but I must continue on.   The people have the right to know.

After some digging, and lots and lots of web-speculation, I believe I may have the answer on who actually owns GLP.

Come to find out Trinity’s real name is Jason Lucas and is located in Shalimar, Florida.  Jason is one of the principal people behind a company known as “C2 Media” which is a spyware company.  This was proven by the following documents submitted to the FTC on a presentation by Mr. Lucas regarding spyware.

FTC Public Workshop: “Monitoring Software On Your PC: Spyware, Adware, And Other Software” April 19, 2004

Not long after, it seems Mr. Lucas was drafted by the US intelligence community and became Deputy Director of  a “data mining” for the Department of Defense’s Joint Task force.

In fact, the more you dig on Mr. Lucas and his business partner, Alex Shamash, you can see they are involved in all the “dirty” technologies on the Internet (aka Spyware, Adware, Malware, etc).

You can trace C2 Media (and their offset company Lop.com, who is well known for their massive spyware campaigns) by just searching through older computer magazines online.

If you want to know more about Jason Lucas and Alex Shamash, please read this article.

The Dark Conclusion

It is the users choice on what sites they visit, but they should be informed of what those sites are monitoring.

In fact, here at Conspiracy HQ, you can easily see our “Privacy Policy” by clicking the link in the top menu bar.   We do use cookies to help personalize the users experience, but everything tracked is 100% anonymous.

GLP on the other hand immediately does a port scan of your computer when you connect to their website.  This gives the operators plenty of information about you, your computer and what software or holes in security you may have.

Why would a site that is so entrenched in the alternative media track your moves, scan your computer and know exactly who you are when you connect to their site?

COINTELPRO… that is the only reason.

by Rob Daven, ConspiracyHQ.com

 

Oh and then there’s this little gem…  via http://pastebin.com/yDNuBEzC

Hello all:

I am Jason Anthony Lucas, and am the owner and administrator of a website: godlikeproductions.com

I was born April 10, 1974. Roughly a decade or so ago, I used a business model that installed spyware on hundreds of thousands, perhaps millions, of computers around the world. It was extremely difficult for the average user to get rid of this software, and many people, including well-known computing magazines deemed my software as malware.

By selling the information the software gleaned from unsuspecting individual’s computers, I and my partners made a lot of money. I became rich by most standards, and was able to retire in my early 30’s. Fearing that the spyware might face legal challenges, I sent letters to the Federal Trade Commission, attempting to delineate the software, from spyware/malware. It was clear that the software was indeed spyware/malware, in that it transmitted information from people’s computers without their knowledge to my clients – and I was paid handsomely. Of course, I atempted to convince the FTC otherwise.

Around this time I was looking for ways to spend some of my money, so I bought a website, now commonly known as GLP. I played on peoples’ fears and desires – fears of conspiracies, and desires to be part of a community, as millions of people disassociate from the real world and interpersonal relationships, and are only able to function in a detached, virtual world. By marketing my product toward these two demographics (I’m good at marketing), I have now turned my website into a money making venture, by convincing otherwise intelligent people, to pay me money to have an avatar on my forum, and thereby obtain a “personality” of sorts – something they are unable to do successfully in the real world.

In 2006, my girlfriend at that time, graduated from Cooley law school on January 22. Though still single, we together purchased her childhood home from her parents. On January 30, 2006 her parents provided us a warranty deed to the property, and we signed a mortgage for $535,920 on the same day. I paid off the mortgage in full 13 months later, on March 12, 2007.

We did not marry until March 31, 2007. She put up with my shenanigans such as business dealings with pornographic websites and GLP, as it supplied a steady income stream, in addition to my already acquired wealth. Quite honestly though, things fell apart quite rapidly as my now wife was already pregnant with our daughter when we married. I’m sure my wife expected a “normal” life for us and especially her daughter-to-be; but I’ll admit that my shortcomings proved too much for the relationship. By August 20, 2007, I was kicked out of the house, divorce proceedings had begun, and I legally relinquished the house back to my soon-to-be ex-wife, as I already had another home in my possession; this is still the house I live in to this day. As you can see, my marriage lasted only a few months. My ex-wife was, by this time, living with her parents and the baby. The house I bought back in 2006 (from her parents, and near the ocean) was put up for sale some years ago, and is unoccupied and still for sale to this day. I invested ~ $300,000 of custom work in the house. This means I have roughly $835,000 into the house, but my current asking price is only $585,500.

As part of the divorce legal settlement, my ex-wife deeded the house I bought from her parents, back to me on February 9, 2008. I immediately had the house placed in the Jason A. Lucas Revocable Trust on February 28, 2008. My Successor Trustee is my sister, and I added another trustee, but will not name him yet, as he and I have some business dealings which may put our freedom in jeopardy. My divorce was finalized (recorded) on July 3, 2008.

I’m writing this as an introspective – a catharsis of the mind. Looking back, I’ve been quite an asshole much of my life. My parents divorced when I was 14, and in a little unusual move, my mom had my sister and my surnames changed from my father’s name, back to her maiden name. I am no stranger to the legal system – I have been to court for writing bad checks, my divorce, I sued my next door neighbor and lost (my attorney actually quit on me while in court!), and of course, my various business dealings.

Now that you know some of my history, I’ll open up as to how I feel about myself. I would rather liken my failed life resulting from a Napoleonic Complex (literally). I am of short stature, my parents divorced while I was an early teenager, and found I could use my marketing skills to install spyware onto perhaps millions of computers, and made a lot of money early in life.

With money comes some degree of a feeling of power. I grew up, and remain in the Fort Walton/Shalimar/Freeport area. I devolved into a small little world of hatred and mistrust, all-the-while using my money as influence and threats (mainly lawsuits) against anyone I fear who might enter my encampment of personal failure. I am a known alcoholic, but beat my breast with bravado because I have money. However, possessions, money, and alcohol are all I really have now, along with some degree of notoriety because of my website, but also fueled by the myths bestowed upon me by an unknowing and foolish public. They have built me up to be this figure of intrigue and allure, with all the stories of government spying/psy-ops, etc. None of this is true, of course.

I know I am a pathetic 38 year old tiny man (literally), who has money, no friends (other than the virtual variety), and am a failure as a husband and father. I could make better use of my time, i.e., instead of devoting untold hours and energy to a website, bravado, and alcohol… if I instead heaped all that energy on my daughter, she might actually have a more normal life of two loving, yet separate parents. By way of default, I’d have to say I am more of a hands-off dad, thinking that money and possessions will make my daughter happy.

Imagine having a father with enough monetary wealth to retire in his mid-thirties, and has the ability to spend much of his free time with you, playing, going to parks, museums, the beach, telling bedtime stories, taking you to school, helping with homework, etc.; yet he chooses instead to be on a computer playing macho-man, and drinking. Kind of sad for her… and me.

Which is why, I think, that all the attention I get from the interwebz just goes to feed my insatiable desire to feel powerful, all the while recognizing that in fact, I am a failure as a human.

The public, however, continues my mythical status, and assures a steady stream of income by paying me to have avatars on my website, and buying me (through “donations”) a telescope costing more than $35,000 (that’s just the instrument and mount).

One could assert that my alcohol-driven rants and lifestyle lends itself to being an unfit father, and generally loathsome human. I have turned to alcohol to drown my sorrows, and I currently have no desire to refrain from imbibing. My ego cannot let go.

I have had professional therapists say I need to disconnect from the virtual world in which I live. I’ll agree with that, and as a result, I’d like to request the following by those who care about me and GLP:

I am wealthy, and do not need additional money. For this reason, I am requesting that all of you, paying members or donators, stop sending money or donations. This will only enable my self-destructing lifestyle, and I need to heal before causing my ultimate demise.

So please, STOP sending me money. I’ll still be around, and maybe someday, can turn my life around.

Sincerely,

Jason Anthony Lucas
4571 State Highway 20 East
Freeport, Florida 32439
(private road is Plantation Lane)

If you’d like to see the telescope on the property, just copy/paste the following into Google Earth:
30 29 00 N 86 03 39 W

http://www.imagebam.com/image/abe729222041835.jpg

http://www.imagebam.com/image/98bdc6222041836.jpg

http://www.imagebam.com/image/3dcab7222041837.jpg

http://www.imagebam.com/image/526121222042273.jpg

http://www.ftc.gov/os/comments/spyware/040312lucas.pdf

http://www.ftc.gov/os/comments/spyware/040414lucas2.pdf

Divorce announcement:

http://www.pcnh-d.net/archives/2008/DailyNews/2008_Jul_4/c3.pdf

Since I’m coming clean, I will soon be giving an explanation of my involvement in spyware/malware, how I tried to pass it off legally as adware, along with the business model and business partners and their connections to me.

Read more
Three NSA Whistleblowers Back EFF’s Lawsuit Over Government’s Massive Spying Program

EFF Asks Court to Reject Stale State Secret Arguments So Case Can Proceed

San Francisco – Three whistleblowers – all former employees of the National Security Agency (NSA) – have come forward to give evidence in the Electronic Frontier Foundation’s (EFF’s) lawsuit against the government’s illegal mass surveillance program, Jewel v. NSA.

In a motion filed today, the three former intelligence analysts confirm that the NSA has, or is in the process of obtaining, the capability to seize and store most electronic communications passing through its U.S. intercept centers, such as the “secret room” at the AT&T facility in San Francisco first disclosed by retired AT&T technician Mark Klein in early 2006.

“For years, government lawyers have been arguing that our case is too secret for the courts to consider, despite the mounting confirmation of widespread mass illegal surveillance of ordinary people,” said EFF Legal Director Cindy Cohn. “Now we have three former NSA officials confirming the basic facts. Neither the Constitution nor federal law allow the government to collect massive amounts of communications and data of innocent Americans and fish around in it in case it might find something interesting. This kind of power is too easily abused. We’re extremely pleased that more whistleblowers have come forward to help end this massive spying program.”

The three former NSA employees with declarations in EFF’s brief are William E. Binney, Thomas A. Drake, and J. Kirk Wiebe. All were targets of a federal investigation into leaks to the New York Times that sparked the initial news coverage about the warrantless wiretapping program. Binney and Wiebe were formally cleared of charges and Drake had those charges against him dropped.

Jewel v. NSA is back in district court after the 9th U.S. Circuit Court of Appeals reinstated it in late 2011. In the motion for partial summary judgment filed today, EFF asked the court to reject the stale state secrets arguments that the government has been using in its attempts to sidetrack this important litigation and instead apply the processes in the Foreign Intelligence Surveillance Act that require the court to determine whether electronic surveillance was conducted legally.

“The NSA warrantless surveillance programs have been the subject of widespread reporting and debate for more than six years now. They are just not a secret,” said EFF Senior Staff Attorney Lee Tien. “Yet the government keeps making the same ‘state secrets’ claims again and again. It’s time for Americans to have their day in court and for a judge to rule on the legality of this massive surveillance.”

For the full motion for partial summary judgment:
https://www.eff.org/document/plaintiffs-motion-partial-summary-judgment

For more on this case:
https://www.eff.org/cases/jewel

Contacts:

Cindy Cohn
Legal Director
Electronic Frontier Foundation
[email protected]

Lee Tien
Senior Staff Attorney
Electronic Frontier Foundation
[email protected]

Related Cases

Read more
Real Journalism Under Attack: RAP NEWS Nails it Again with “A News Hope”

Juice Rap News: Episode XIII – A NEWS HOPE. It is a time of corporate war; deprived of a reliable media the people of Planet Earth are kept misinformed and in a state of perpetual conflict. Is an honest Fourth Estate the only Force than can restore peace and balance to the Galaxy? To find out, we consult two of journalism’s most influential and inflammatory figures: Rebel journalist enfant terrible, Julian Assange, who awaits a verdict in London which could see him ‘extradited’ to Sweden. And on the opposite end of the journalistic spectrum: Rupert Murdoch, head of the mighty NewsCorp media Empire, embroiled in legal scandals that go to the highest and lowest levels of celebrity in Britain. In the manichean manner of some ancient laser sword and forcery epic, join the wisest news-anchor in the Galaxy, Robert Foster, as he attempts to wrangle these two figures together for a rap-debate. Will the light or the dark side prevail – and is it really that easy to know which is which? How many Bothans died to bring us this information? Is the Force Estate with Robert? Will we see THE RETURN OF THE JOURNALI before the EMPIRE EXTRADITES BACK? For answers to all these questions and more, pull down your blast shields, switch off your on-board computer and feel the Force, in this latest episode of Juice Rap News… or click play.

CONNECT with us through:
Our website: http://thejuicemedia.com
Twitter: http://twitter.com/juicerapnews
Farcebook: https://www.facebook.com/rapnews

DOWNLOAD free MP3: http://www.reverbnation.com/rapnews
LYRICS available here: http://thejuicemedia.com/video/lyrics

SUPPORT the creation of new episodes of Juice Rap News – a show which relies on private donations: http://thejuicemedia.com/donate

CREDITS:
– ARTWORK by Zoe Tame http://visualtonic.com.au
– ORIGINAL MUSIC: Main Beat: “The Golden Era” – by The GOAT, ILL Beat Constructor: http://www.thegoatbeats.com
– ORIGINAL RAP-WARS theme music composed by Adrian Sergovich.
– VIDEO: Special thanks to Jonas Schweizer in Germany for creating the animated intro and RapWars special FX. (ATM he’s working on an awesome new documentary project: http://www.indiegogo.com/CaribbeanNewcomer)
– Many thanks to the following humans for lending their time and talent to the making of this episode: Ellen (Brianna Manning and SwededTrooper_1) and Zoe (SwedeTrooper_2); Lucy for voiceovers (Admiral Gillard, Manning & SwedeTroopers); Rosie Dunlop for make-up magick; Dave Abbott for technical & video advice. And finally, to Kristinn Hrafnsson of WikiLeaks for his debut kameo.

CAPTIONS: Thanks Koolfy & Siltaar at La Quadrature du Net for English captions.

TRANSLATIONS: Thanks to Euclides for Portuguese translation :)
**If you would like to translate this episode into your language, please contact us first via: http://thejuicemedia.com/contact**

Read more
The US Government Is Running A Massive Spy Campaign On Occupy Wall Street

Remember the Occupy Movement? Since last November, when the NYPD closed the Zuccotti Park encampment in downtown Manhattan –the Movement’s birthplace and symbolic nexus—Occupy’s relevance has seriously dwindled, at least as measured by coverage in the mainstream media. We’re told that this erosion is due to Occupy’s own shortcomings—an inevitable outcome of its disjointed message and decentralized leadership.

While that may be the media’s take, the U.S. Government seems to have a different view.

If recent documents obtained by the Partnership for Civil Justice Fund (PCJF) are any indication, the Occupy Movement continues to be monitored and curtailed in a nationwide, federally-orchestrated campaign, spearheaded by the Department of Homeland Security (DHS).

In response to repeated Freedom of Information Act (FOIA) requests by the Fund, made on behalf of filmmaker Michael Moore and the National Lawyers Guild, the DHS released a revealing set of documents in April.  But the latest batch, made public on May 3rd, exposes the scale of the government’s “attention” to Occupy as never before.

The documents, many of which are partially blacked-out emails, demonstrate a surprising degree of coordination between the DHS’s National Operations Center (NOC) and local authorities in the monitoring of the Occupy movement. Cities implicated in this wide-scale snooping operation include New York, Oakland, Atlanta, Washington, D.C., Denver, Boston, Portland, Detroit, El Paso, Houston, Dallas, Seattle, San Diego, and Los Angeles.

Interest in the Occupy protesters was not limited to DHS and local law enforcement authorities.  The most recently released correspondence contains Occupy-related missives between the DHS and agencies at all levels of government, including the Mayor of Portland, regional NOC “fusion centers,” the General Services Administration (GSA), the Pentagon’s USNORTHCOM (Northern Command), and the White House. Mara Verheyden-Hilliard, Executive Director of the PCJF, contends that the variety and reach of the organizations involved point to the existence of a larger, more pervasive domestic surveillance network than previously suspected.

These documents show not only intense government monitoring and coordination in response to the Occupy Movement, but reveal a glimpse into the interior of a vast, tentacled, national intelligence and domestic spying network that the U.S. government operates against its own people. These heavily redacted documents don’t tell the full story. They are likely only a subset of responsive materials and the PCJF continues to fight for a complete release. They scratch the surface of a mass intelligence network including Fusion Centers, saturated with ‘anti-terrorism’ funding, that mobilizes thousands of local and federal officers and agents to investigate and monitor the social justice movement. (justiceonline.org)

As alarmist as Verheyden-Hilliard’s charge may sound, especially given the limited, bowdlerized nature of the source material, the texts made available contain disturbing evidence of insistent federal surveillance. In particular, the role of the “Fusion Centers,” a series of 72 federally-funded information hubs run by the NOC, raises questions about the government’s expansive definition of “Homeland Security.”

Created in the wake of 9/11, the Fusion Centers were founded to expedite the sharing of information among state and local law enforcement and the federal government, to monitor localized terrorist threats, and to sidestep the regulations and legislation preventing the CIA and the military from carrying out domestic surveillance (namely, the CIA ban on domestic spying and the Posse Comitatus Act).

Is nonviolent, albeit obstructive, citizen dissent truly an issue of national security? The DHS, for its part, is aware of the contentiousness of civilian monitoring. That’s why, in a White House-approved statement to CBS News included in the dossier, DHS Press Secretary Matthew Chandler asserts that

Any decisions on how to handle specifics (sic) situations are dealt with by local authorities in that location. . . DHS is not actively coordinating with local law enforcement agencies and/or city governments concerning the evictions of Occupy encampments writ large.

However, as a reading of the documents unmistakably demonstrates, this expedient PR nugget is far from the truth. In example after example, from its seeking of  “public health and safety” grounds from the City of Portland for Occupy’s ejection from Terry Schrunk Plaza, to its facilitation of information sharing between the police departments of Chicago and Boston (following a 1500-person Occupy protest in Chicago), the DHS’s active ”coordinating” with local authorities is readily apparent. Other communiqués are even more explicit in revealing a national focus, such as the DHS’s preemptive coordination with the Pentagon about a port closure in Oakland, and its collection of identity and contact information of Occupy protesters arrested at a Bank of America in Dallas.

Those Pesky Amendments

The right to public assembly is a central component of the First Amendment. The Fourth Amendment is supposed to protect Americans from warrantless searches—with the definition of “search” expanded in 1967 to include electronic surveillance, following the Supreme Court’s ruling in Katz v. United States. Assuming the Occupy protesters refrain from violence—and the vast majority do, in accord with a stated tenet of the Occupy movement—the movement’s existence is constitutionally protected, or should be.

The DHS’s monitoring, documenting, and undermining of protesters may in fact violate the First Amendment. In a recent piece for Dissent Magazine, sociologist James B. Rule explains the fundamental importance of a movement like Occupy in the American political landscape.

This surveillance campaign against Occupy is bad news for American democracy. Occupy represents an authentic, utterly home-grown, grassroots movement. Taken as a whole, it is neither terrorist nor conspiratorial. Indeed, it is hard to think of another movement so cumbersomely public in its deliberations and processes. Occupy is noisy, disorderly, insubordinate, and often inconvenient for all concerned—statements that could equally well apply to democracy in general. But it should never be targeted as a threat to the well-being of the country—quite the contrary.

Accordingly, Rule calls for the White House to rein in the ever-expanding surveillance activity of the DHS—which he contends is motivated by its own funding interests, and which prioritizes security at the expense of civil liberties.

The resource-rich Department of Homeland Security and its allies no doubt see in the rise of the movement another opportunity to justify their own claims for public legitimacy. We can be sure that many in these agencies view any noisy dissent as tantamount to a threat to national security.

[snip]

Nobody who cares about democracy wants to live in a world where simply engaging in vociferous protest qualifies any citizen to have his or her identity and life details archived by state security agencies. Specific, overt threats of civil disobedience or other law-breaking should be dealt with on a piecemeal basis—not by attempting to monitor everyone who might be moved to such actions, all the time. Meanwhile, the White House should issue clear directives that identification and tracking of lawful protesters will play no further role in any government response to this populist moment.

Optimistic as it may be, Rule’s appeal to the White House is a problematic one, given the ubiquitous influence of the DHS revealed by these documents. If the White House-approved press release is any indication, the Oval Office, while not directly authorizing the DHS’s initiatives, is certainly turning a blind eye to the Department’s focus on the Occupy movement as a potential terrorist threat. Federal surveillance of citizens in the Bush years, most visible in NSA warrantless wiretapping controversy, has apparently not ceased with Obama’s inauguration.

Which raises the question: Does Obama, as he claims, “stand with the 99 percent,” or with those who cannot stand them?

# #

WhoWhatWhy plans to continue doing this kind of groundbreaking original reporting. You can count on it. But can we count on you? We cannot do our work without your support.

Please click here to donate; it’s tax deductible. And it packs a punch.

Read more posts on WhoWhatWhy »

Read more
US Police Can Copy Your iPhone’s Contents In Under Two Minutes

It has emerged that Michigan State Police have been using a high-tech mobile forensics device that can extract information from over 3,000 models of mobile phone, potentially grabbing all media content from your iPhone in under two minutes.

The CelleBrite UFED is a handheld device that Michigan officers have been using since August 2008 to copy information from mobile phones belonging to motorists stopped for minor traffic violations. The device can circumvent password restrictions and extract existing, hidden, and deleted phone data, including call history, text messages, contacts, images, and geotags.

 

In short, it can copy everything on your smartphone in a matter of minutes.

Learning that the police had been using mobile forensic devices, the American Civil Liberties Union (ACLU) has issued freedom of information requests which demand that state officials open up the data collected, to better assess if penalised motorists warrant having their data copied.

Michigan State Police were more than happy to provide the information – as long as the ACLU paid $544,680. Obviously not pocket change.

“Law enforcement officers are known, on occasion, to encourage citizens to cooperate if they have nothing to hide,” ACLU staff attorney Mark P. Fancher wrote. “No less should be expected of law enforcement, and the Michigan State Police should be willing to assuage concerns that these powerful extraction devices are being used illegally by honoring our requests for cooperation and disclosure.”

Once the data is obtained, the device’s “Physical Analyzer” can map both existing and deleted locations on Google Earth, porting location data and image geotags on Google Maps.

The ACLU’s main worry is that the handheld is quietly being used to bypass Fourth Amendment protections against unreasonable searches:

“With certain exceptions that do not apply here, a search cannot occur without a warrant in which a judicial officer determines that there is probable cause to believe that the search will yield evidence of criminal activity.

A device that allows immediate, surreptitious intrusion into private data creates enormous risks that troopers will ignore these requirements to the detriment of the constitutional rights of persons whose cell phones are searched.”

The next time you are Michigan, be sure drive carefully!

SOURCE:
http://thenextweb.com/us/2011/04/20/us-police-can-copy-your-iphones-contents-in-under-two-minutes/

Read more
Whistleblower: The NSA Is Lying–U.S. Government Has Copies of Most Of Your Emails

In his first television interview since he resigned from the National Security Agency over its domestic surveillance program, William Binney discusses the NSA’s massive power to spy on Americans and why the FBI raided his home after he became a whistleblower. Binney was a key source for investigative journalist James Bamford’s recent exposé in Wired Magazine about how the NSA is quietly building the largest spy center in the country in Bluffdale, Utah. The Utah spy center will contain near-bottomless databases to store all forms of communication collected by the agency, including private emails, cell phone calls, Google searches and other personal data.

Binney served in the NSA for over 30 years, including a time as technical director of the NSA’s World Geopolitical and Military Analysis Reporting Group. Since retiring from the NSA in 2001, he has warned that the NSA’s data-mining program has become so vast that it could “create an Orwellian state.” Today marks the first time Binney has spoken on national television about NSA surveillance. This interview is part of a 5-part special on state surveillance. Click here to see segment 2, 3, 4 and 5. [includes rush transcript]

Read more
Twitter, the FBI, and You

In the future, if you tweet out a photo of a hilarious, meme-tastic kitten, it might be best not to include terms like “white powder,” “dirty bomb,” or “Death to America.”

Since late January, the Federal Bureau of Investigation has been asking the IT industry to help it develop an open-source social-media application that would provide a panoramic real-time picture of any “breaking event, crisis, activity, or natural disaster…in progress in the U.S. or globally,” according tostatements released by the agency. Essentially, the bureau wants to crowd-source software that would data-mine Twitter and other websites to scan for—and perhaps predict—mass uprisings, criminal activity, and terror plots.

To make something like what the FBI is looking for, a programmer would have to write a scriptto yank content from, say, open Facebook profiles and Twitter feeds. Once the data is obtained, it can be quickly searched for key terms. The next step is “geotagging“—tying individual posts to specific geographical locations. But the app would have to deal with more than just keywords. Ideally, the FBI wants a “threat index” that combines multiple metrics such as locations, links, and networks into one waterfall search engine. Think Klout, but souped-up for the NatSec establishment.

At first glance, the concept seems sensible enough. It’s no surprise the US government would want to use every resource possible to stay ahead of the news and intelligence curve in case a new crisis hits at home or abroad. And because the program would be aimed at monitoring open sources, it might not sound like a major civil-liberties tripwire, since tweets and online forums are usually available for anybody to view.

Still, the idea of Big Brother checking up on whom you’ve friended on Facebook or watching the embarrassing videos you’ve posted on YouTube might be off-putting, even if you’re not a die-hard civil libertarian. Such initiatives are probably legal, says Rebecca Jeschke, a digital-rights analyst at the Electronic Frontier Foundation, but they’re also “creepy.”

The FBI isn’t completely oblivious to such concerns. In statement sent to Mother Jones, a bureau spokeswoman insisted that the FBI is not looking for a program that would access private data or “focus on specific persons or protected groups.” Instead, she claims, the program would hone in on “activities constituting violations of federal criminal law or threats to national security.” The FBI also provided examples of words the application would be built to single out, including “bomb,” “suspicious package,” “white powder,” “active shoot,” and “lockdown.” “Although the FBI has always adapted to meet changes in technology,” the statement reads, “the rule of law civil liberties, and civil rights, will remain our guiding principles.” (They don’t always live up to those.)

Privacy concerns aside, the efficacy of open-source data-mining applications is, at best, questionable. “It reads almost like science fiction,” Mike German, a senior policy counsel for the ACLU’s Washington Legislative Office and former FBI agent, says. “The FBI has this unquenchable thirst for more data…Here they are in this day and age, thinking there is some easy solution to identifying threats against the country. But it’s often foolish for agents to take what they see online and treat it as intelligence. For instance, if you run a search for some of their key terms like ‘lockdown,’ ‘white powder,’ and ‘active shoot,’ you get over 345 million hits. That’s 345 million potential false tips.”

The government has tried this sort of thing before, without much success. The Department of Homeland Security already has several controversial data-mining programs. In 2007, a DHS program known as ADVISE was suspended following an internal audit by the department’s inspector general for dodging a required privacy review. And last September, the Government Accountability Office issued a report (PDF) that urged stronger executive oversight of DHS data-mining to ensure necessary privacy protections. The Defense Intelligence Agency, National Security Agency, and Central Intelligence Agency also have well-documented histories of flirting with large-scale data-mining, with mixedsecret, and often controversial results.

In 2008, a privacy and terrorism commission backed by DHS published a 376-page report titled “Protecting Individual Privacy in the Struggle Against Terrorists” that panned the logic behind post-9/11 data-mining. “Automated identification of terrorists through data mining (or any other known methodology) is neither feasible as an objective nor desirable as a goal of technology development effort,” the commissioners wrote. “Even in well-managed programs, such tools are likely to return significant rates of false positives, especially if the tools are highly automated.”

The FBI, however, is undaunted. As of Wednesday, it’s still looking for programmers.

SOURCE:
http://motherjones.com/transition/inter.php?dest=http://motherjones.com/politics/2012/04/fbi-twitter-data-mining

By: Asawin Suebsaeng, April 5, 2012

Read more
Jacob Appelbaum on Being Target of Widespread Gov’t Surveillance

We speak with Jacob Appelbaum, a computer researcher who has faced a stream of interrogations and electronic surveillance since he volunteered with the whistleblowing website, WikiLeaks. He describes being detained more than a dozen times at the airport and interrogated by federal agents who asked about his political views and confiscated his cell phone and laptop. When asked why he cannot talk about what happened after he was questioned, Appelbaum says, “Because we don’t live in a free country. And if I did, I guess I could tell you about it.” A federal judge ordered Twitter to hand over information about Appelbaum’s account. Meanwhile, he continues to work on the Tor Project, an anonymity network that ensures every person has the right to browse the internet without restriction and the right to speak freely. This interview is part of a 5-part special on growing state surveillance. Click here to see segment 1, 2, 4 and 5surveillance. [includes rush transcript]

SOURCE:
http://www.democracynow.org/2012/4/20/we_do_not_live_in_a

Read more