NSA Spy Program So Secret Judge Can’t Explain Why It Can’t Be Challenged

NSA Spy Program So Secret Judge Can’t Explain Why It Can’t Be Challenged

NSA Spy Program A federal judge ruled in favor of the National Security Agency NSA Spy Program in a key surveillance case on Tuesday, dismissing a challenge which claimed the government’s spying operations were groundless and unconstitutional.

Filed in 2008 by the Electronic Frontier Foundation, the lawsuit, Jewel v. NSA, aimed to end the agency’s unwarranted surveillance of U.S. citizens, which the consumer advocacy group said violated the 4th Amendment.

The lawsuit also implicated AT&T in the operations, alleging that the phone company “routed copies of Internet traffic to a secret room in San Francisco controlled by the NSA.” That charge was based off of a 2006 document leak by former AT&T technician and whistleblower Mark Klein, who disclosed a collection program between the company and the NSA that sent AT&T user metadata to the intelligence agency.

US District Judge Jeffrey White on Tuesday denied a partial summary judgment motion to the EFF and granted a cross-motion to the government, dismissing the case without a trial. In his order, White said the plaintiff, Carolyn Jewel, an AT&T customer, was unable to prove she was being targeted for surveillance—and that if she could, “any possible defenses would require impermissible disclosure of state secret information.” NSA Spy Program

Offering his interpretation of the decision, EFF senior staff attorney David Greene explained in a blog post:

Agreeing with the government, the court found that the plaintiffs lacked “standing” to challenge the constitutionality of the program because they could not prove that the surveillance occurred as plaintiffs’ alleged. Despite the judge’s finding that he could not adjudicate the standing issue without  “risking exceptionally grave damage to national security,” he expressed frustration that he could not fully explain his analysis and reasoning because of the state secrets issue.

The EFF later Tweeted:

Calling the ruling “frustrating,” Greene said the EFF “disagree[s] with the court’s decision and it will not be the last word on the constitutionality of the government’s mass surveillance of the communications of ordinary Americans.”Jewel v. NSA is the EFF’s longest-running case. Despite the decision, the EFF said it would not back down from its pursuit of justice and was careful to note that the ruling did not mean that the NSA’s operations were legal.

“Judge White’s ruling does not end our case. The judge’s ruling only concerned Upstream Internet surveillance, not the telephone records collection nor other mass surveillance processes that are also at issue in Jewel,” said Kurt Opsahl, deputy legal council at EFF. “We will continue to fight to end NSA mass surveillance.”

The issue is similar to the 2013 Supreme Court decision in Clapper v. Amnesty International, which found that plaintiffs who had reason to believe they were being spied on could not provide substantial proof of surveillance, and thus could not bring their case. NSA Spy Program

Jewel v. NSA stems from the EFF’s 2006 case, Hepting v. AT&T, which was dismissed in 2009 after Congress, including then-Senator Barack Obama, voted to give telecommunications companies immunity from such lawsuits.

“It would be a travesty of justice if our clients are denied their day in court over the ‘secrecy’ of a program that has been front-page news for nearly a decade,” Opsahl added.

via MintPressNews

Raw List of NSA Nicknames and Codewords

Raw List of NSA Nicknames and Codewords

istock_000004093101small

Below is a listing of nicknames and codewords related to US Signals Intelligence (SIGINT) and Communications Security (COMSEC). Most of them are from the NSA, some are from other government or military agencies. Some of them also have an abbreviation which is shown in brackets.

NICKNAMES are generally unclassified. NSA uses single word nicknames, outside NSA they usually consist of two separate words, with the first word selected from alphabetical blocks that are assigned to different agencies by the Joint Staff. Usually, nicknames are printed using all capital letters.

CODEWORDS are always classified and always consist of a single word. Active codewords, or their three-letter abbreviations, which identify a classification compartment always need to be shown in the classification or banner line. Normally, codewords are printed using all capital letters.

Due to very strict secrecy, it’s not always clear whether we see a nickname or a codeword, but terms mentioned in public sources like job descriptions are of course unclassified nicknames.

Please keep in mind that a listing like this will always be work in progress (this list has been copied on some other websites and forums, but only this one is being updated frequently!).

See also the lists of Abbreviations and Acronyms and GCHQ Nicknames and Codewords

A

ACIDWASH – Covert access point for a mobile phone network in Afghanistan

ACORN – Retired SIGINT product codeword

ACCORDIAN – Type 1 Cryptographic algorithm used in a number of crypto products

AETHER – ONI tool “to correlate seemingly disparate entities and relationships, to identify networks of interest, and to detect patterns”

AGILITY – NSA internet information tool or database

AGILEVIEW – NSA internet information tool or database

AIRGAP – Database which deals with priority DoD missions

AIRHANDLER – NSA-G operations center for producing intelligence from Afghanistan

AIRSTEED – Cell phone tracking program of the Global Access Operations (GAO)

AIRWOLF – ?

ALAMITO – The mission of Mexico at the United Nations in New York

ALPHA – Retired SIGINT Exchange Designator for Great Britain

ALTEREGO – A type of Question-Focused Dataset based on E.164

AMBERJACK – SIGINT/EW collection and exploitation system

AMBLE – Retired SIGINT product codeword

AMBULANT (AMB) – SI-ECI compartment related to the BULLRUN program

ANCHORY – NSA software system which provides web access to textual intelligence documents

ANGRYNEIGHBOR – Family of radar retro-reflector tools used by NSA’s TAO division

APALATCHEE – The EU mission in New York

APERIODIC – SI-ECI compartment related to the BULLRUN program

APEX – IP packet reconstruction tool(?)

APPLE1 – Upstream collection site

APSTARS – NSA tool that provides “semantic integration of data from multiple sources in support of intelligence processing”

ARKSTREAM – Implant used to reflash BIOS, installed by remote access or intercepted shipping

ARTIFICE – SSO corporate partner (foreign?)

AUTOSOURCE – NSA tool or database

AQUACADE – A class of SIGINT spy satellites (formerly RHYOLITE)

AQUADOR – Merchant ship tracking tool

ARCA – SIGINT Exchange Designator for ?

ARGON – Satellite mapping program

ARTIFICE – SSO corporate partner under the STORMBREW program

ASPHALT – Project to increase the volume of satellite intercepts at Menwith Hill Station

ASPHALT-PLUS – See above

ASSOCIATION – NSA analytical tool or database

ATALANTA – EU anti-piracy operation

ATLAS – CSEC database

AUNTIE – SI-ECI compartment related to the BULLRUN program

AUTO ASSOCIATION – Second party database

B

BAMBOOSPRING – ?

BANANAGLEE – Software implant that allows remote Jetplow firmware installation

BANISTER – The Columbian trade bureau in New York

BANYAN – NSA tactical geospatial correlation database

BASECOAT – Program targeting the mobile phone network on the Bahamas

BASTE – Retired SIGINT product codeword

– Type 1 Block cipher algorithm, used with many crypto products

BEACHHEAD – Computer exploit delivered by the FERRETCANON system

BEAMER – ?

BELLTOPPER – NSA database

BELLVIEW – SIGINT reporting tool

– List of personnel cleared for access to highly sensitive information or operations

BINOCULAR – Former NSA intelligence dissemination tool

BIRCHWOOD – Upstream collection site

BLACKBOOK – ODNI tool for large-scale semantic data analysis

BLACKFOOT – The French mission at the United Nations in New York

BLACKHEART – Collection through FBI implants

BLACKMAGIC – NSA database or tool

BLACKPEARL – NSA database of survey/case notations(?)

BLACKWATCH – NSA reporting tool

– Program for intercepting phone and internet traffic at switches in the US (since 1978)

BLINDDATE – Hacking tools for WLAN collection, plus GPS

BLUEANCHOR – Partner providing a network access point for the YACHTSHOP program

BLUEFISH (BLFH) – Compartment of the KLONDIKE control system

BLUEZEPHYR – Sub-program of OAKSTAR

BOOTY – Retired SIGINT product codeword

– DNI and DNR metadata visualization tool

BOURBON – Joint NSA and GCHQ program for breaking Soviet encryption codes (1946-?)

BROKENRECORD – NSA tool

BROKENTIGO – Tool for computer network operations

BROADSIDE – Covert listening post in the US embassy in Moscow

BROOMSTICK – ?

BRUNEAU – Operation against the Italian embassy in Washington DC using LIFESAVER techniques

BRUTUS – Tool or program related to MARINA

BUFFALOGREEN – The name ORANGECRUSH was known to Polish partners

BULLDOZER – PCI bus hardware implant on intercepted shipping

– An NSA COI for decryption of network communications

BULLSEYE – NSG High-Frequency Direction-Finding (HF-DF) network (now called CROSSHAIR)

(BYE) – Retired SCI control system for overhead collection systems (1961-2005)

BYZANTINE – First word of nicknames for programs involving defense against Chinese cyber-warfare and US offensive cyber-warfare

BYZANTINE ANCHOR (BA) – A group of Chinese hackers which compromised multiple US government and defense contractor systems since 2003

BYZANTINE CANDOR (BC) – A group of Chinese hackers which compromised a US-based ISP and at least one US government agency

BYZANTINE FOOTHOLD (BF) – A group of Chinese hackers who attacked various international companies and internet services providers

BYZANTINE HADES (BH) – A concerted effort against Chinese hackers who attacked the Pentagon and military contractors. Probably renamed to the LEGION-series

C

CADENCE – NSA database with tasking dictionaries

CAJABLOSSOM – Automated system for analysing and profiling internet browsing histories

CALYPSO – Remote SATCOM collection facility

CANDYGRAM – Laptop mimicking GSM cell tower, sends out SMS whenever registered target enters its area, for tracking and ID of targets

– Class of COMINT spy satellites (1968-1977)

CANOE – Retired SIGINT product codeword

CANNON LIGHT – Counterintelligence database of the US Army

CAPRICORN – (former?) database for voice data

CAPTIVATEDAUDIENCE – Computer implant plug-in to take over a targeted computer’s microphone and record conversations taking place near the device

CARBOY – Second Party satellite intercept station at Bude, England

CARBOY II – Units of ECHELON which break down satellite links into telephone and telegraph channels

CARILLON – NSA high performance computing center, since 1976 made up of IBM 360s and later four IBM 3033s

CASport – NSA user authorization service

– Computer system capable of automatically analyzing the massive quantities of data gathered across the entire intelligence community

CENTER ICE – Data center for the exchange of intelligence regarding Afghanistan among the members of the 14-Eyes/SSEUR

CENTERMASS – NSA tool or database

CERF CALL MOSES1 – Contact Event Record Format – for certain telephony metadata

CHALKFUN – Analytic tool, used to search the FASCIA database

CHASEFALCON – Major program of the Global Access Operations (GAO)

CHEER – Retired SIGINT product codeword

CHESS – Compartment of TALENT KEYHOLE for the U-2 spy plane

CHEWSTICK – NSA tool or database

CHIMNEYPOOL – Framework or specification of GENIE-compliance for hardware/software implants

CHIPPEWA – Some communications network, involving Israel

CHUTE – Retired SIGINT product codeword

CIMBRI – Probably a metadata database

CINEPLEX – NSA tool or database

CLASSIC BULLSEYE – Worldwide ocean SIGINT surveillance system (1960’s-?)

CLEVERDEVICE – Upstream collection site

CLOUD – NSA database

COASTLINE – NSA tool or database

COBALTFALCON – Sub-program of OAKSTAR

COBRA FOCUS – NSA-G operations center for producing intelligence from Iraq

COGNOS – NSA tool or database

CORDOBA – Type 2 Cryptographic algorithm used in a number of crypto chips

COMBAT SENT – Reconaissance operation

COMMONDEER – Computer exploit for looking whether a computer has security software

COMMONVIEW – NSA database or tool

CONFIRM – NSA database for personell access

CONJECTURE – Network compatible with HOWLERMONKEY

CONTRAOCTAVE – NSA telephony tasking database Used to determine ‘foreigness’

CONVEYANCE – Voice content ingest processor

COPILOT – System that automatically scans digital data for things like language, phone and creditcard numbers and attachments

COPSE – Retired SIGINT product codeword

CORALINE – NSA satellite intercept station at Sabena Seca at Puerto Rico (closed)

CORALREEF – Database for VPN crypto attack data

– A series of photographic surveillance satellites (1959-1972)

CO-TRAVELER – Set of tools for finding unknown associates of intelligence targets by tracking movements based upon cell phone locations

COTTONMOUTH (CM) – Computer implant devices used by NSA’s TAO division

COTTONMOUTH-I (CM-I) – USB hardware implant providing wireless bridge into target network and loading of exploit software onto target PCs, formerly DEWSWEEPER

COTTONMOUTH-II (CM-II) – USB hardware host tap provides covert link over USP into target’s network co-located with long haul relay; dual-stacked USB connector, consists of CM-I digital hardware plus long haul relay concealed in chassis; hub with switches is concealed in a dual stacked USB connector and hard-wired to provide intra-chassis link.

COTTONMOUTH-III (CM-III) – Radio Frequency link for commands to software implants and data infiltration/exfiltration, short range inter-chassis link within RJ45 Dual Stacked USB connector

COURIERSKILL – NSA Collection mission system

COWBOY – The DICTIONARY computer used at the Yakima station of ECHELON

CRANKSHAFT – Codename for Osama bin Laden

CREAM – Retired SIGINT product codeword

CREDIBLE – Transport of intelligence materials to partner agencies

CREST – Database that automatically translates foreign language intercepts in English

CRISSCROSS – Database of telecommunications selectors

CROSSBEAM – GSM module mating commercial Motorola cell with WagonBed controller board for collecting voice data content via GPRS (web), circuit-switched data, data over voice, and DTMF to secure facility, implanted cell tower switch

CROSSHAIR – NSG High-Frequency Direction-Finding (HF-DF) network (formerly BULLSEYE)

CROSSBONES – Analytic tool

CRUMPET – Covert network with printer, server and desktop nodes

CULTWEAVE – Smaller size SIGINT database

CYBERTRANS – A common interface to a number of underlying machine translation systems

CYCLONE Hx9 – Base station router, network in a box using Typhon interface

D

DAFF – Codeword for products of satellite imagery

DAMEON – Remote SATCOM collection facility

DANCINGOASIS (DGO) – SSO program collecting data from fiber optic cables between Europe and the Far East (since 2011)

DANDERSPRITZ – Software tool that spoofs IP and MAC addresses, intermediate redirector node

DANGERMOUSE – Tactical SIGINT collecting system for like cell phone calls

DARDANUS – Remote SATCOM collection facility

DAREDEVIL – Shooter/implant as part of the QUANTUM system

DARKTHUNDER – SSO Corporate/TAO Shaping program

DARKQUEST – Automated FORNSAT survey system

DAUNT – Retired SIGINT product codeword

DECKPIN – NSA crisis cell activated during emergencies

DEEPDIVE – An XKEYSCORE related method

DEITYBOUNCE – Provides implanted software persistence on Dell PowerEdge RAID servers via motherboard BIOS using Intel’s System Management Mode for periodic execution, installed via ArkStream to reflash the BIOS

DELTA – Former SCI control system for intercepts from Soviet military operations

DENIM – Retired SIGINT product codeword

DESPERADO – NSA software tool to prepare reports

DEWSWEEPER – Technique to tap USB hardware hosts

DIKTER – SIGINT Exchange Designator for Norway

DINAR – Retired compartment for intercepts from foreign embassies in Washington

DIONYSUS – Remote SATCOM collection facility

DIRESCALLOP – Method to circumvent commercial products that prevent malicious software from making changes to a computer system

DISCOROUTE – A tool for targeting passively collected telnet sessions

– NSA database for text messages (SMS)

DISTANTFOCUS – A pod for tactical SIGINT and precision geolocation (since 2005)

DIVERSITY – SIGINT Exchange Designator for ?

DOBIE – The South African consulate and mission at the UN in New York

DOCKETDICTATE – Something related to NSA’s TAO division

DOGCOLLAR – A type of Question-Focussed Dataset based on the Facebook display name cookie

DOGHUT – Upstream collection site

DOUBLEARROW – One of NSA’s voice processing databases?

DRAGGABLEKITTEN – An XKEYSCORE Map/Reduce analytic

DREADNOUGHT – NSA operation focused on Ayatollah Khamenei

– Passive collection of emanations (e.g. from printers or faxes) by using a radio frequency antenna

DROPOUTJEEP – STRAITBIZARRE-based software implant for iPhone, initially close access but later remotely

– System for processing data from mobile communication networks

DRUID – SIGINT Exchange Designator for third party countries

– A US military numeral cipher/authentication system

DRYTORTUGAS – Analytic tool

DYNAMO – SIGINT Exchange Designator for Denmark

E

EAGLE – Upstream collection site

– A SIGINT collection network run by Australia, Canada, New Zealand, the United Kingdom, and the United States

ECHO – SIGINT Exchange Designator for Australia

ECRU (EU) – Compartment of the ENDSEAL control system

EDEN – Upstream collection site

EGOTISTICALGIRAFFE (EGGI) – NSA program for exploiting the TOR network

EGOTISTICALGOAT (EGGO) – NSA tool for exploiting the TOR network

EIDER – Retired SIGINT product codeword

EINSTEIN – Cell phone network intercepting equipment used by SCS units

– Intrusion detection system for US government network gateways (deployed in 2004)

EINSTEIN 2 – Second version of the EINSTEIN program for detecting malicious network activity

EINSTEIN 3 – Third version of the EINSTEIN program that will monitor government computer traffic on private sector sites too

ELEGANTCHAOS – Large scale FORNSAT data analysis system

EMBRACEFLINT – Tool for computer network operations

ENDSEAL (EL) – SCI control system

ENDUE – A COI for sensitive decrypts of the BULLRUN program

ENTOURAGE – Directional finder for line of bearing for GSM, UMTS, CDMA, FRS signals, works with NEBULA active interrogator within GALAXY program

EPICSHELTER – Sophisticated data backup system designed by Edward Snowden

ERRONEOUSINGENUITY (ERIN) – NSA tool for exploiting the TOR network

EVENINGEASEL – Program for surveillance of phone and text communications from Mexico’s cell phone network

EVILOLIVE – Iinternet geolocation tool

EVOLVED MUTANT BROTH – Second party database

EYESPY – System that scans data for logos of companies, political parties and other organizations, as well for pictures with faces for facial recognition

F

FACELIFT – Codeword related to NSA’s Special Source Operations division

– NSA corporate partner with access to international cables, routers, and switches (since 1985)

FAIRVIEWCOTS – System for processing telephony metadata collected under the FAIRVIEW program

FALLENORACLE – NSA tool or database

FALLOUT – DNI metadata ingest processor/database

– DNR metadata ingest processor/database

FASCINATOR – Series of Type 1 encryption modules for Motorola digital-capable voice radios

FASHIONCLEFT (FC) – Wrapper used to exfiltrate data of VPN and VoIP communications

FASTBAT – Telephony related database?

FASTFOLLOWER – Tool to identify foreign agents who might tail American case officers overseas by correlating cellphone signals

FASTSCOPE – NSA database

FEEDTROUGH – Software implant for unauthorized access to Juniper firewall models N5XT, NS25, NS50, NS200, NS500, ISG1000

FERRETCANON – Subsystem of the FOXACID system

FINKDIFFERENT (FIDI) – Tool used for exploiting TOR networks

FIRE ANT – Open Source visualisation tool

– NSA key generation scheme, used for exchanging EKMS public keys

FIRETRUCK – SIGINT tool or database

FIREWALK -Bidirectional network implant, passive gigabit ethernet traffic collector and active ethernet packet injector within RJ45 Dual Stacked USB connector, digital core used with HOWLERMONKEY, formerly RADON

– NSA program for securing commercial smartphones

FLARE – Retired SIGINT product codeword

FLATLIQUID – TAO operation against the office of the Mexican president

FLEMING – The embassy of Slovakia in Washington DC

FLINTLOCK – The DICTIONARY computer used at the Waihopai station of ECHELON

FLUXBABBITT – Hardware implant for Dell PowerEdge RAID servers using Xeon processors

FOGGYBOTTOM – Computer implant plug-in that records logs of internet browsing histories and collects login details and passwords used to access websites and email accounts

FOREMAN – Tactical SIGINT database? Used to determine ‘foreigness’

FOURSCORE – (former?) database for fax and internet data

FOXACID (FA?) – System of secret internet servers used to attack target computers

FOXSEARCH – Tool for monitoring a QUANTUM target which involves FOXACID servers

FOXTRAIL – NSA tool or database

FRIARTUCK – VPN Events tool or database (CSEC?)

FREEFLOW-compliant – Supported by TURBULENCE architecture

FREEZEPOST – Something related to NSA’s TAO division

FRONTO – Retired SIGINT Exchange Designator for ?

FROSTBURG – Connection Machine 5 (CM-5) supercomputer, used by NSA from 1991-1997

FROTH – Retired SIGINT product codeword

FRUGALSHOT – FOXACID servers for receiving callbacks from computers infected with NSA spying software

G

GALACTICHALO – Remote SATCOM collection facility

GALAXY – Find/fix/finish program of locating signal-emitting devices of targets

GAMMA (G) – Compartment for highly sensitive communication intercepts

GAMUT – NSA collection tasking tool or database

GARLIC – The NSA satellite intercept station at Bad Aibling (Germany)

GATEKEEPER – NSA user account management system

GAVEL – Retired SIGINT product codeword

GECKO II – System consisting of hardware implant MR RF or GSM, UNITEDRAKE software implant, IRONCHEF persistence back door

GEMINI – Remote SATCOM collection facility

GENESIS – Modified GSM handset for covert network surveys, recording of RF spectrum use, and handset geolocation based on software defined radio

GENIE – Overall close-access program, collection by Sigads US-3136 and US-3137

GHOSTMACHINE – NSA’s Special Source Operations cloud analytics platform

GINSU – Provides software persistence for the CNE implant KONGUR having PCI bus hardware implant BULLDOZER on MS desktop PCs

GILGAMESH – Predator-based NSA geolocation system used by JSOC

GISTQEUE (GQ) – NSA software or database

GJALLER – NSA tool or database

GLINT – Retired SIGINT product codeword

GLOBALBROKER – NSA tool or database

GM-PLACE – Database for the BOUNDLESSINFORMANT tool

GODLIKELESION – Modernization program for NSA’s European Technical Center (ETC) in Wiesbaden in 2011

GODSURGE – Runs on FLUXBABBITT circuit board to provide software persistence by exploiting JTAG debugging interface of server processors, requires interdiction and removal of motherboard of JTAG scan chain reconnection

GOPHERSET – Software implant on GMS SIM phase 2+ Toolkit cards that exfiltrates contact list, SMS and call log from handset via SMS to user-defined phone; malware loaded using USB smartcard reader or over-the-air.

GOSSAMER – SIGINT/EW collection and exploitation system

GOTHAM – Processor for external monitor recreating target monitor from red video

GOURMETTROUGH – Configurable implant for Juniper NetScreen firewalls including SSG type, minimal beaconing

GOUT – Subcompartment of GAMMA for intercepts of South Vietnamese government communications

GOVPORT – US government user authentication service

GRAB – SIGINT satellite program

GREY FOX – The 2003 covername of the Mission Support Activity (MSA) of JSOC

GREYSTONE (GST) – CIA’s highly secret rendition and interrogation programs

GROK – Computer implant plug-in used to log keystrokes

GUMFISH – Computer implant plug-in to take over a computer’s webcam and snap photographs

GUPY – Subcompartment of GAMMA for intercepts from Soviet leadership car phones (1960’s-70’s)

H

HALLUXWATER – Software implant as boot ROM upgrade for Huawei Eudemon firewalls, finds patch points in inbound packet processing, used in O2, Vodafone and Deutsche Telekom

HAMMERCHANT – Implant for network routers to intercept and perform exploitation attacks against data sent through a Virtual Private Network (VPN) and/or phone calls via Skype and other VoIP software

HAMMERMILL – Insertion Tool controls HEADWATER boot ROM backdoor

HAMMERSTEIN – Implant for network routers to intercept and perform exploitation attacks against data sent through a Virtual Private Network (VPN) and/or phone calls via Skype and other VoIP software

HAPPYFOOT – Program that intercepts traffic generated by mobile apps that send a smartphone’s location to advertising networks

HARD ASSOCIATION – Second party database

– An IBM supercomputer used by NSA from 1962-1976

HAVE BLUE – Development program of the F-117A Stealth fighter-bomber

HAVE QUICK (HQ) – Frequency-hopping system protecting military UHF radio traffic

HEADWATER – Permanent backdoor in boot ROM for Huawei routers stable to firmware updates, installed over internet, capture and examination of all IP packets passing through host router, controlled by Hammermill Insertion Tool

HEMLOCK – Operation against the Italian embassy in Washington DC using HIGHLANDS techniques

HERCULES – CIA terrorism database

HERETIC – NSA tool or database

HEREYSTITCH – Collaboration program between NSA units T1222 and SSG

HERMOS – Joint venture between the German BND and another country with access for NSA (2012)

HERON – Retired SIGINT product codeword

HIGHCASTLE – Tactical database?

HIGHLANDS – Technique for collection from computer implants

HIGHTIDE – NSA tool or database

HOBGOBLIN – NSA tool or database

HOLLOWPOINT – Software defined radio platform

HOMEBASE – Database which allows analysts to coordinate tasking with DNI mission priorities

HOMEMAKER – Upstream collection site

HOMINGPIGEON – Program to intercept communications from airplane passengers

HOTZONE – ?

HOWLERMONKEY (HM) – Generic radio frequency (RF) transceiver tool used for various applications

HUFF – System like FOXACID?

HYSON – Retired SIGINT product codeword

I

ICEBERG – Major NSA backbone project

ICREACH – Tool that uses telephony metadata

IDITAROD (IDIT) – Compartment of the KLONDIKE control system

INCENSER – A joint NSA-GCHQ high-volume cable tapping operation, part of the WINDSTOP program

INDIA – SIGINT Exchange Designator for New Zealand (retired)

– Satellite intercept station near Khon Khaen, Thailand (1979-ca. 2000)

INTREPID SPEAR – The 2009 covername of the Mission Support Activity (MSA) of JSOC

– Series of ELINT and COMINT spy satellites (since 2009)

IRATEMONK – Hard drive firmware providing software persistence for desktops and laptops via Master Boot Record substitution, for Seagate Maxtor Samsung file systems FAR NRFS EXT3 UFS, payload is implant installer, shown at internet cafe

IRONAVENGER – NSA hacking operation against an ally and an adversary (2010)

IRONCHEF – Provides access persistence back door exploiting BIOS and SMM to communicate with a 2-way RF hardware implant

IRONSAND – Second Party satellite intercept station in New Zealand

ISHTAR – SIGINT Exchange Designator for Japan (retired)

ISLANDTRANSPORT – Internal messaging service, as part of the QUANTUM system

IVORY – Retired SIGINT product codeword

IVY BELLS – NSA, CIA and Navy operation to place wire taps on Soviet underwater communication cables

J

JACKKNIFE – The NSA satellite intercept station at Yakima (US)

JACKPOT – Internal NSA process improvement program (early 1990s – early 2000s)

JETPLOW – Persistent firmware back door for Cisco PIX and ASA firewall and routers, modifies OS at boot time

JOLLYROGER – NSA database

JOSEKI-1 – Classified Suite A algorithm

JOURNEYMAN – Major NSA backbone project

JUGGERNAUT – Ingest system for processing signals from (mobile?) phone networks

– Class of SIGINT reconnaissance satellites (1971-1983)

JUNIORMINT – Implant digital core, either mini printed circuit board or ultra-mini Flip Chip Module, contains ARM9 micro-controller, FPGA Flash SDRAM and DDR2 memories

K

KAMPUS – SIGINT Exchange Designator for ? (retired)

KANDIK (KAND) – Compartment of the KLONDIKE control system

KARMA POLICE – Second party database

KATEEL – The Brazilian embassy in Washington

KEA – Asymmetric-key Type 2 algorithm used in products like Fortezza, Fortezza Plus

KEELSON – Internet metadata processing system

KEYCARD – Database for VPN key exchange IP packet addresses

KEYRUT – SIGINT Exchange Designator for ? (retired)

KILTING – ELINT database

KIMBO – Retired SIGINT product codeword

KLIEGLIGHT (KL) – Tactical SIGINT reports

KLONDIKE (KDK) – Control system for sensitive geospatial intelligence

KLONDIKE – The embassy of Greece in Washington DC

KNIGHTHAWK – Probably a military SIGINT tool

– Method for summarizing very large textual data sets

KONGUR – Software implant restorable by GINSU after OS upgrade or reinstall

KRONE – Retired SIGINT product codeword

L

(LAC) – Retired NSA dissemination control marking

LADYLOVE – The NSA satellite intercept station at Misawa, Japan (since 1982)

LANYARD – Reconaissance satellite program

LARUM – Retired SIGINT product codeword

LEGION AMBER – Chinese hacking operation against a major US software company

LEGION JADE – A group of Chinese hackers

LEGION RUBY – A group of Chinese hackers

LEGION YANKEE – Chinese hacking operation against the Pentagon and defense contractors (2011)

LEMONWOOD – NSA satellite intercept station in Thailand

LEXHOUND – Tool for targeting social networking?

LIBERTY – First word of nicknames for collection and analysis programs used by JSOC and other sensitive DOD activities

LIBERTY BLUE – Modified RC-12 Guardrail surveillance airplane used by JSOC’s Mission Support Activity (MSA)

LIFESAVER – Technique which images the hard drive of computers

LIONSHARE – Internal NSA process improvement program (2003-2008)

LITHIUM – Facility to filter and gather data at a major (foreign?) telecommunications company under the BLARNEY program

LODESTONE – NSA’s CRAY-1 supercomputer

LOGGERHEAD – Device to collect contents of analog cell phone calls (made by Harris Corp.)

LOMA – SCI control system for Foreign Instrumentation and Signature Intelligence

LOPERS – Software application for Public Switched Telephone Networks or some kind of hardware

LOUDAUTO – An ANGRYNEIGHBOR radar retro-reflector, microphone captures room audio by pulse position modulation of square wave

M

MACHINESHOP – ?

MADCAPOCELOT – Sub-program of STORMBREW for collection of internet metadata about Russia and European terrorism

MAESTRO-II – Mini digital core implant, standard TAO implant architecture

MAGIC – Codeword for decrypted high-level diplomatic Nazi messages

– A keystroke logging software developed by the FBI

MAGNES – Remote SATCOM collection facility

MAGNETIC – Technique of sensor collection of magnetic emanations

– Series of SIGINT spy satellites (since 1985)

MAGOTHY – The embassy of the European Union in Washington DC

MAILORDER – Data transfer tool (SFTP-based?)

– Federal database of personal and financial data of suspicious US citizens

– NSA database of bulk phone metadata

MANASSAS – Former NSA counter-encryption program, succeeded by BULLRUN

– NSA database of bulk internet metadata

MARKHAM – NSA data system?

MARTES – NSA software tool to prepare reports

MASTERLINK – NSA tasking source

MASTERSHAKE – NSA tool or database

MATRIX – Some kind of data processing system

MAYTAG – Upstream collection site

MEDLEY – Classified Suite A algorithm

MENTOR – Class of SIGINT spy satellites (since 1995)

MERCED – The Bulgarian embassy in Washington DC

MERCURY – Soviet cipher machine partially exploited by NSA in the 1960’s

MERCURY – Remote SATCOM collection facility

MESSIAH – NSA automated message handling system

METAWAVE – Warehouse of unselected internet metadata

METROTUBE – Analytic tool for VPN data

METTLESOME – NSA Collection mission system

MIDAS – Satellite program

MIDDLEMAN – TAO covert network

MILKBONE – Question-Focused Dataset used for text message collection

– A sister project to Project SHAMROCK (1967-1973)

MINERALIZE – Technique for collection through LAN implants

MIRANDA – Some kind of number related to NSA targets

MIRROR – Interface to the ROADBED system

MOCCASIN – A hardware implant, permanently connected to a USB keyboard

MONKEYCALENDAR – Software implant on GMS SIM cards that exfiltrates user geolocation data

MONKEYROCKET – Sub-program of OAKSTAR for collecting internet metadata and content through a foreign access point

MOONLIGHTPATH (EGL?) – SSO collection facility

MOONPENNY – The NSA satellite intercept station at Harrogate (Great Britain)

MORAY – Compartment for the least sensitive COMINT material, retired in 1999

MORPHEUS – Program of the Global Access Operations (GAO)

MOTHMONSTER – NSA tool for exploiting the TOR network

MOVEONYX – Tool related to CASPORT

MULBERRY – The mission of Japan at the United Nations in New York

(JPM?) – Joint NSA-GCHQ operation to tap the cables linking Google and Yahoo data clouds to the internet Part of WINDSTOP

MUSKET – Retired SIGINT Exchange Designator for ?

MUSKETEER – NSA’s Special Signal Collection unit

– SSO unilateral voice interception program

– Presidential Global Communications System

N

NASHUA – The mission of India at the United Nations in New York

NAVAJO – The mission of Vietnam at the United Nations in New York

NAVARRO – The embassy of Georgia in Washington DC

NEBULA – Base station router similar to CYCLONE Hx9

NECTAR – SIGINT Exchange Designator for ? (retired)

NELEUS – Remote SATCOM collection facility

NEMESIS – SIGINT satellite

– Operation to kill or capture Osama bin Laden (2011)

NETBOTZ – Remote monitoring tool

NEWSDEALER – NSA’s internal intelligence news network

NIAGARAFILES – Data transfer tool (SFTP-based?)

NIGHTSTAND – 802.11 wireless packet injection tool that runs on standalone x86 laptop running Linux Fedora Core 3 and exploits windows platforms running Internet Explorer, from 8 miles away

NIGHTWATCH – Portable computer in shielded case for recreating target monitor from progressive-scan non-interlaced VAGRANT signals

NINJANIC – Something related to TURMOIL

NITESURF – NSA tool or database

NITRO – Remote SATCOM collection facility

NOCON – NSA dissemination marking or COI

NONBOOK (NK) – Compartment of the ENDSEAL control system

NORMALRUN – NSA tool or database

NUCLEON – Database for contents of phone calls

NYMROD – Automated name recognition system

O

– Umbrella program to filter and gather information at major telecommunications companies (since 2004)

OCEAN – Optical collection system for raster-based computer screens

OCEANARIUM – Database for SIGINT from NSA and intelligence sharing partners around the world

OCEANFRONT – Part of the communications network for ECHELON

OCEAN SHIELD – NATO anti-piracy operation

OCEANSURF – Engineering hub of the Global Access Operations (GAO)

OCELOT – Actual name: MADCAPOCELOT

OCTAVE – NSA tool for telephone network tasking (succeeded by the UTT?)

OCTSKYWARD – Collection of GSM data from flying aircraft

OILSTOCK – A system for analyzing air warning and surveillance data

– CSEC tool for discovering and identifying telephone and computer connections

OLYMPIC – First word of nicknames for programs involving defense against Chinese cyber-warfare and US offensive cyber-warfare

OLYMPIC GAMES – Joint US and Israel operation against the Iranian nuclear program (aka Stuxnet)

OLYMPUS – Software component of VALIDATOR/SOMBERKNAVE used to communicate via wireless LAN 802.11 hardware

OMNIGAT – Field network component

ONEROOF – Main tactical SIGINT database, with raw and unfiltered intercepts

– Newer units of the LACROSSE reconaissance satellites

ORANGEBLOSSOM – Sub-program of OAKSTAR for collection from an international transit switch (sigad: US-3251)

ORANGECRUSH – Sub-program of OAKSTAR for collecting metadata, voice, fax, phone and internet content through a foreign access point

ORION – SIGINT satellite

ORLANDOCARD – NSA operation thtat attracted visits from 77,413 foreign computers and planted spyware on more than 1,000 by using a ‘honeypot’ computer

OSAGE – The embassy of India in Washington DC

OSCAR – SIGINT Exchange Designator for the USA

OSWAYO – The embassy annex of India in Washington DC

– The Lockheed A-12 program (better known as SR-71)

P

PACKAGEDGOODS – Program which tracks the ‘traceroutes’ through which data flows around the Internet

PACKETSCOPE – Internet cable tapping system

PACKETSWING – NSA tool or database

PACKETWRENCH – Computer exploit delivered by the FERRETCANON system

PADSTONE – Type 1 Cryptographic algorithm used in several crypto products

PAINTEDEAGLE – SI-ECI compartment related to the BULLRUN program

PALANTERRA – A family of spatially and analytically enabled Web-based interfaces used by the NGA

PANGRAM (PM) – Alleged SCI control system

PANTHER – The embassy of Vietnam in Washington DC

PARCHDUSK (PD) – Productions Operation of NSA’s TAO division

PARTNERMALL PROGRAM (PMP) – A single collaboration environment, to be succeeded by the Global Collaboration Environment (GCE)

PARTSHOP – ?

PATHFINDER – SIGINT analysis tool (developed by SAIC)

PATHWAY – NSA’s former main computer communications network

– Call chaining analysis tool (developed by i2)

PAWLEYS – SI-ECI compartment related to the BULLRUN program

PEARL – Retired SIGINT product codeword

PEDDLECHEAP – Computer exploit delivered by the FERRETCANON system

PENDLETON – SI-ECI compartment related to the BULLRUN program

PEPPERBOX – Tool or database for targeting Requests (CSEC?)

PERDIDO – The mission of the European Union at the United Nations in New York

PERFECTMOON – An out-sites covering system

PHOTOANGLO – A continuous wave generator and receiver. The bugs on the other end are ANGRYNEIGHBOR class

PIEDMONT – SI-ECI compartment related to the BULLRUN program

PICARESQUE (PIQ) – SI-ECI compartment related to the BULLRUN program

PICASSO – Modified GSM handset that collects user data plus room audio

PINUP – Retired SIGINT product codeword

– Database for recorded signals intercepts/internet content

PITCHFORD – SI-ECI compartment related to the BULLRUN program

PIVOT – Retired SIGINT product codeword

PIXIE – Retired SIGINT product codeword

PLATFORM – Computer system linking the ECHELON intercept sites

PLUS – NSA SIGINT production feedback program

POCOMOKE – The Brazilian Permanent Mission to the UN in New York

POISON NUT – CES VPN attack orchestrator

POLARBREEZE – NSA technique to tap into nearby computers

POPPY – SIGINT satellite program

POPTOP – Collection system for telephony data

POWELL – The Greek mission at the United Nations in New York

PREFER – System for identifying and extracting text messages (SMS) from the DISHFIRE database

PRESSUREPORT – Software interface related to PRESSUREWAVE

PRESSUREWAVE – NSA cloud database for VPN and VoIP content and metadata

PRIMECANE – American high-tech company cooperating in providing a network access point for the ORANGECRUSH program

– Program for collecting foreign internet data from US internet companies

PROFORMA – Intelligence derived from computer-based data

– Mobile tactical SIGINT collection system

PROTEIN – SIGINT Exchange Designator for ?

PROTON – SIGINT database for time-sensitive targets/counterintelligence

PROTOSS – Local computer handling radio frequency signals from implants

PURPLE – Codename for a Japanese diplomatic cryptosystem during WWII

– US military OPSEC program (since 1966)

PUTTY – NSA tool or database

PUZZLECUBE – NSA tool or database

PYLON – SIGINT Exchange Designator for ?

Q

QUADRANT – A crypto implementation code

QUADRESPECTRE PRIME – ?

– A consolidated QUANTUMTHEORY platform to reduce latencies by co-locating passive sensors with local decisioning and traffic injection (under development in 2011)

– Secret servers placed by NSA at key places on the internet backbone; part of the TURMOIL program

QUANTUMBISCUIT – Enhancement of QUANTUMINSERT for targets which are behind large proxies

QUANTUMBOT – Method for taking control of idle IRC bots and botnets)

QUANTUMBOT2 – Combination of Q-BOT and Q-BISCUIT for webbased botnets

QUANTUMCOOKIE – Method to force cookies onto target computers

QUANTUMCOPPER – Method for corrupting file uploads and downloads

QUANTUMDNS – DNS injection/redirection based off of A record queries

QUANTUMHAND – Man-on-the-side technique using a fake Facebook server

QUANTUMINSERT (QI) – Man-on-the-side technique that redirects target internet traffic to a FOXACID server for exploitation

QUANTUMMUSH – Targeted spam exploitation method

QUANTUMNATION – Umbrella for COMMONDEER and VALIDATOR computer exploits

QUANTUMPHANTOM – Hijacks any IP address to use as covert infrastructure

QUANTUMSKY – Malware used to block targets from accessing certain websites through RST packet spoofing

QUANTUMSMACKDOWN – Method for using packet injection to block attacks against DoD computers

QUANTUMSPIN – Exploitation method for instant messaging

QUANTUMSQUEEL – Method for injecting MySQL persistant database connections

QUANTUMSQUIRREL – Using any IP address as a covert infrastructure

QUANTUMTHEORY (QT) – Computer hacking toolbox used by NSA’s TAO division, which dynamically injects packets into target’s network session

QUANTUM LEAP – CIA tool to “find non-obvious linkages, new connections, and new information” from within a dataset

QUARTERPOUNDER – Upstream collection site

– Relay satellite for reconaissance satellites

QUEENSLAND – Upstream collection site

R

RADIOSPRING – ?

RADON – Host tap that can inject Ethernet packets

RAGEMASTER – Part of ANGRYNEIGHBOR radar retro-reflectors, for red video graphics array cable in ferrite bead RFI chokers between video card and monitor, target for RF flooding and collection of VAGRANT video signal

(RGT) – ECI compartment for call and e-mail content collected under FISA authority

RAILHEAD – NCTC database project

RAISIN – NSA database or tool

RAMPART – NSA operational branches that intercept heads of state and their closest aides. Known divisions are RAMPART-A, RAMPART-I and RAMPART-T. Also mentioned as a suite of programs for assuring system functionality

RAVEN – SIGINT satellite

REACTOR – Tool or program related to MARINA?

REBA – Major NSA backbone project

REDHAWK – NSA tool

REDROOF – NSA tool

REMATION – Joint NSA-GCHQ counter-TOR workshop

RENOIR – NSA telephone network visualization tool

REQUETTE – A Taiwanese TECO in New York

RESERVE (RSV) – Control system for the National Reconnaissance Office (NRO)

RESERVEVISION – Remote monitoring tool

RESOLUTETITAN – Internet cable access program?

RETRO – see RETROSPECTIVE

RETROSPECTIVE – 30-day retrospective retrieval tool for SCALAWAG

RETURNSPRING – High-side server shown in UNITEDRAKE internet cafe monitoring graphic

RHINEHEART – NSA tool or database

– Class of SIGINT spy satellites (in 1975 changed to AQUACADE)

RICHTER – SIGINT Exchange Designator for Germany

RIPCORD – ?

RIVET JOINT – Reconaissance operation

ROADBED – Probably a military SIGINT database

ROCKYKNOB – Optional DSP when using Data Over Voice transmission in CROSSBEAM

RONIN – NSA tool for detecting TOR-node IP-addresses

RORIPA – SIGINT Exchange Designator for ?

ROYALNET – Internet exploitation tool

RUFF – Compartment of TALENT KEYHOLE for IMINT satellites

RUMBUCKET – Analytic tool

RUTLEY – Network of SIGINT satellites launched in 1994 and 1995

S

SABRE – Retired SIGINT product codeword

SALEM – ?

SALVAGERABBIT – Computer implant plug-in that exfiltrates data from removable flash drives that connect to an infected computer

SAMOS – Reconnaissance satellite program

SAPPY – Retired SIGINT product codeword

SARATOGA – SSO access facility (since 2011)

SARDINE – SIGINT Exchange Designator for Sweden

– Narrow band voice encryption for radio and telephone communication

SAVIN – Retired SIGINT product codeword

SCALAWAG – Collection facility under the MYSTIC program

SCALLION – Upstream collection site

SCAPEL – Second Party satellite intercept station in Nairobi, Kenia

SCHOOLMONTANA – Software implant for Juniper J-series routers used to direct traffic between server, desktop computers, corporate network and internet

SCIMITAR – A tool to create contact graphs?

SCISSORS – System used for separating different types of data and protocols

SCORPIOFORE – SIGINT reporting tool

SEABOOT – SIGINT Exchange Designator for ?

SEADIVER – Collection system for telephony data

SEAGULLFARO – High-side server shown in UNITEDRAKE internet cafe monitoring graphic

SEARCHLITE – Tactical SIGINT collecting system for like cell phone calls

SEASONEDMOTH (SMOTH) – Stage0 computer implant which dies after 30 days, deployed by the QUANTUMNATION method

SECONDDATE – Method to influence real-time communications between client and server in order to redirect web-browsers to FOXACID malware servers

SECUREINSIGHT – A software framework to support high-volume analytics

SEMESTER – NSA SIGINT reporting tool

– Transportable suite of ISR equipment (since 1991)

– Radome on top of the U2 to relay SIGINT data to ground stations

SENTINEL – NSA database security filter

SERENADE – SSO corporate partner (foreign?)

SERUM – Bank of servers within ROC managing approvals and ticket system

SETTEE – SIGINT Exchange Designator for ?

– Operation for intercepting telegraphic data going in or out the US (1945-1975)

SHAREDVISION – Mission program at Menwith Hill satellite station

SHARKFIN – Sweeps up all-source communications intelligence at high speed and volumes

SHARPFOCUS (SF2) – Productions Operation of NSA’s TAO division

SHELLTRUMPET – NSA metadata processing program (since December 2007)

SHENANIGANS – Aircraft-based NSA geolocation system used by CIA

SHIFTINGSHADOW – Sub-program of OAKSTAR for collecting telephone metadata and voice content from Afghanistan through a foreign access point

SHILLELAGH – Classified Suite A algorithm

SHORTSHEET – NSA tool for Computer Network Exploitation

SHOTGIANT – NSA operation for hacking and monitoring the Huawei network (since 2009)

SIERRAMONTANA – Software implant for Juniper M-series routers used by enterprises and service providers

SIGINT NAVIGATOR – NSA database

SIGSALY – The first secure voice system from World War II

SILKWORTH – A software program used for the ECHELON system

SILLYBUNNY – Some kind of webbrowser tag which can be used as selector

SILVER – Soviet cipher machine partially exploited by NSA in the 1960’s

SILVERCOMET – SIGINT satellites?

SILVERZEPHYR (SZ) – Sub-program of OAKSTAR for collecting phone and internet metadata and content from Latin and South America through an international transit switch

SIRE – A software program used for the ECHELON system(?)

– Type 2 Block cipher algorithms used in various crypto products

SKOPE – SIGINT analytical toolkit

SKYSCRAPER – Interface to the ROADBED system

SKYWRITER – NSA tool to prepare (internet) intelligence reports

SLICKERVICAR – Used with UNITEDRAKE or STRAITBIZARRE to upload hard drive firmware to implant IRATEMONK

SLINGSHOT – End Product Reports (CSEC?)

SMOKEYSINK – SSO access facility (since 2011?)

SNICK – 2nd Party satellite intercept station in Oman

SNORT – Repository of computer network attack techniques/coding

SOAPOPERA – (former?) database for voice, end product and SRI information

SOMBERKNAVE – Windows XP wireless software implant providing covert internet connectivity, routing TCP traffic via an unused 802.11 network device allowing OLYMPUS or VALIDATOR to call home from air-gapped computer

SORTING HAT – ?

SORTING LEAD – ?

SOUFFLETROUGH – Software implant in BIOS Juniper SSG300 and SSG500 devices, permanent backdoor, modifies ScreenOS at boot, utilizes Intel’s System Management Mode

SOUNDER – Second Party satellite intercept station at Cyprus

SPARKLEPONY – Tool or program related to MARINA

SPARROW II – Airborne wireless network detector running BLINDDATE tools via 802.11

SPECTRE – SCI control system for intelligence on terrorist activities

SPECULATION – Protocol for over-the-air communication between COTTONMOUTH computer implant devices, compatible with HOWLERMONKEY

SPHINX – Counterintelligence database of the Defense Intelligence Agency

SPINNERET (SPN) – SSO collection facility

SPLITGLASS – NSA analytical database

SPLUNK – Tool used for SIGINT Development

SPOKE – Compartment for less sensitive COMINT material, retired in 1999

SPOTBEAM – ?

SPORTCOAST – Upstream collection site

SPRIG – Retired SIGINT product codeword

SPRINGRAY – Some kind of internal notification system

SPYDER – Analytic tool for selected content of text messages from the DISHFIRE database

STARBURST – The initial code word for the STELLARWIND compartment

STARLIGHT – Analyst tool

STARPROC – User lead that can be uses as a selector

STARSEARCH – Target Knowledge tool or database (CSEC?)

STATEROOM – Covert SIGINT collection sites based in US diplomatic facilities

STEELFLAUTA – SSO Corporate/TAO Shaping program

STEELKNIGHT – (foreign?) partner providing a network access point for the SILVERZEPHYR program

STEELWINTER – A supercomputer acquired by the Norwegian military intelligence agency

STELLAR – Second Party satellite intercept station at Geraldton, Australia

STELLARWIND (STLW) – SCI compartment for the President’s Surveillance Program information

STEPHANIE – Covert listening post in the Canadian embassy in Moscow (est. 1972)

STINGRAY – Device for tracking the location of cell phones (made by Harris Corp.) STONEGHOST – DIA network for information exchange with UK, Canada, Australia and New Zealand (TS/SCI)

STORMBREW – Program for collection from an international transit switches and cables (since 2001)

STRAIGHTBIZARRE – Software implant used to communicate through covert channels

STRATOS – Tool or databse for GPRS Events (CSEC?)

STRAWHAT – NSA datalinks between field sites and processing centers (1969-?)

STRIKEZONE – Device running HOWLERMONKEY personality

STRONGMITE – Computer at remote operations center used for long range communications

STRUM – (see abbreviations)

STUCCOMONTANA – Software implant for Juniper T-Series routers used in large fixed-line, mobile, video, and cloud networks, otherwise just like SCHOOLMONTANA

STUMPCURSOR – Foreign computer accessing program of the NSA’s Tailored Access Operations

SUBSTRATUM – Upstream collection site

SUEDE – Retired SIGINT product codeword

SULPHUR – The mission of South Korea at the United Nations in New York

SUNSCREEN – Tool or database

SURFBOARD – NSA tool or database

SURLEYSPAWN – Data RF retro-reflector, gathers keystrokes FSK frequency shift keyed radar retro-reflector, USB or IBM keyboards

SURPLUSHANGAR – High to low diode, part of the QUANTUM system

SURREY – Main NSA requirements database, where tasking instructions are stored and validated, used by the FORNSAT, SSO and TAO divisions

SUTURESAILOR – Printed circuit board digital core used with HOWLERMONKEY

SWAMP – NSA data system?

SWAP – Implanted software persistence by exploiting motherboard BIOS and hard drive Host Protected Area for execution before OS loads, operative on windows linux, freeBSD Solaris

– NSA data model for analyzing target connections

T

TACOSUAVE – ?

TALENT KEYHOLE (TK) – Control system for space-based collection platforms

TALK QUICK – An interim secure voice system created to satisfy urgent requirements imposed by conditions to Southeast Asia. Function was absorbed by AUTOSEVOCOM

TAPERLAY – Covername for Global Numbering Data Base (GNDB), used for looking up the registered location of a mobile device

TARMAC – Improvement program at Menwith Hill satellite station

TAROTCARD – NSA tool or database

TAWDRYYARD – Beacon radio frequency radar retro-reflector used to positionally locate deployed RAGEMASTER units

TEMPEST – Investigations and studies of compromising electronic emanations

– GCHQ program for intercepting internet and telephone traffic

THESPIS – SIGINT Exchange Designator for ?

THINTREAD – NSA program for wiretapping and sophisticated analysis of the resulting data

THUMB – Retired SIGINT product codeword

THUNDERCLOUD – Collaboration program between NSA units T1222 and SSG

TIAMAT – Joint venture between the German BND and another country with access for NSA

TICKETWINDOW – System that makes SSO collection available to 2nd Party partners

TIDALSURGE – Router Configurations tool (CSEC?)

TIDEWAY – Part of the communications network for ECHELON

TIMBERLINE – The NSA satellite intercept station at Sugar Grove (US)

TINMAN – Database related to air warning and surveillance

TITAN POINTE – Upstream collection site

– Presumably Chinese attacks on American computer systems (since 2003)

TITLEHOLDER – NSA tool

TOPAZ – Satellite program

TOTECHASER – Software implant in flash ROM windows CE for Thuraya 2520 satellite/GSM/web/email/MMS/GPS

TOTEGHOSTLY – Modular implant for windows mobile OS based on SB using CP framework, Freeflow-compliant so supported by TURBULENCE architecture

TOWERPOWER – NSA tool or database

TOXICARE – NSA tool

TOYGRIPPE – NSA’s CES database for VPN metadata

TRACFIN – NSA database for financial data like credit card purchases

TRAFFICTHIEF – Part of the TURBULENCE and the PRISM programs

TRAILBLAZER – NSA Program to analyze data carried on communications networks

TRAILMAPPER – NSA tool or database

TRANSX – NSA database

TREACLEBETA – TAO hacking against the Pakistani terrorist group Lashkar-e-Taiba

TREASUREMAP – NSA internet traffic visualization tool

TREASURETROVE – Analytic tool

TRIBUTARY – NSA provided voice threat warning network

TRIGGERFISH – Device to collect the content of digital cell phone calls (made by Harris Corp.)

TRINE – Predecessor of the UMBRA compartment for COMINT

TRINITY – Implant digital core concealed in COTTONMOUTH-I, providing ARM9 microcontroller, FPGA Flash and SDRAM memories

TRITON – Tool or database for TOR Nodes (CSEC?)

– Series of ELINT reconnaissance satellites (1994-2008)

TRYST – Covert listening post in the British embassy in Moscow

TUBE – Database for selected internet content?

TUMULT – Part of the TURBULENCE program

TUNINGFORK – Sustained collection linked to SEAGULLFARO, previously NSA database or tool for protocol exploitation

TURBINE – Active SIGINT: centralized automated command/control system for managing a large network of active computer implants for intelligence gathering (since 2010)

TURBOPANDA – The Turbopanda Insertion Tool allows read/write to memory, execute an address or packet; joint NSA/CIA project on Huawei network equipment

TURBULENCE (TU) – Integrate NSA architecture with several layers and sub-programs to detect threats in cyberspace (since 2005)

TURMOIL – Passive SIGINT sensors: high speed collection of foreign target satellite, microwave and cable communications, part of the TURBULENCE program Maybe for selecting common internet encryption technologies to exploit.

TURTLEPOWER -NSA tool

TUSKATTIRE – Ingest system for cleaning and processing DNR (telephony) data

TUTELAGE – Active defense system to monitor network traffic in order to detect malicious code and network attacks, part of the TURBULENCE program

TWEED – Retired SIGINT product codeword

TWISTEDKILT – Writes to Host Protected area on hard drive to implant Swap and its implant installer payload

TWISTEDPATH – NSA tool or database

TYPHON HX – GSM base station router network in box for tactical Sigint geolocating and capturing user

U

ULTRA – Decrypted high-level military Nazi messages, like from the Enigma machine

UMBRA – Retired compartment for the most sensitive COMINT material

UNIFORM – SIGINT Exchange Designator for Canada

UNITEDRAKE – Computer exploit delivered by the FERRETCANON system

USHER – Retired SIGINT product codeword

V

VAGRANT – Radar retro-reflector technique on video cable to reproduce open computer screens

VALIDATOR – Computer exploit delivered by the FERRETCANON system for looking whether a computer has security software, runs as user process on target OS, modified for SCHOOLMONTANA, initiates a call home, passes to SOMBERKNAVE, downloads OLYMPUS and communicates with remote operation center

– Decrypted intercepts of messages from Soviet intelligence agencies

VERDANT (VER) – Alleged SCI control system

VESUVIUS – Prototype quantum computer, situated in NSA’s Utah Data Center

VICTORYDANCE – Joint NSA-CIA operation to map WiFi fingerprints of nearly every major town in Yemen

VIEWPLATE – Processor for external monitor recreating target monitor from red video

VINTAGE HARVEST – Probably a military SIGINT tool

VITALAIR – NSA tool

VOICESAIL – Intelligence database

– Class of SIGINT spy satellites (1978-1989)

VOXGLO – Multiple award contract providing cyber security and enterprise computing, software development, and systems integration support

W

WABASH – The embassy of France in Washington DC

WAGONBED – Hardware GSM controller board implant on CrossBeam or HP Proliant G5 server that communicates over I2C interface

WALBURN – High-speed link encryption, used in various encryption products

WARPDRIVE – Joint venture between the German BND and another country with access for NSA (2013)

WATERWITCH – Hand-held tool for geolocating targeted handsets to last mile

WAVELEGAL – Authorization service that logs data queries

WEALTHYCLUSTER – Program to hunt down tips on terrorists in cyberspace (2002- )

WEASEL – Type 1 Cryptographic algorithm used in SafeXcel-3340

WEBCANDID – NSA tool or database

WESTPORT – The mission of Venezuela at the United Nations in New York

WILLOWVIXEN – Method to deploy malware by sending out spam emails that trick targets into clicking a malicious link

WISTFULTOLL – Plug-in for UNITEDRAKE and STRAITBIZARRE used to harvest target forensics via Windows Management Instrumentation and Registry extractions, can be done through USB thumb drive

WHIPGENIE (WPG) – ECI compartment for details about the STELLARWIND program

WHITEBOX – Program for intercepting the public switched telephone network?

WHITELIST – NSA tool

WHITETAMALE – Operation for collecting e-mails from Mexico’s Public Security Secretariat

WINDCHASER – Tool or program related to MARINA

WINDSORBLUE – Supercomputer program at IBM

WINDSTOP – Joint NSA-GCHQ unilateral high-volume cable tapping program

WINTERLIGHT – A QUANTUM computer hacking program in which Sweden takes part

WIRESHARK – Database with malicious network signatures

WITCH – Retired SIGINT product codeword

WITCHHUNT – ?

WOLFPOINT – SSO corporate partner under the STORMBREW program

WORDGOPHER – Platform to enable demodulation of low-rate communication carriers

WRANGLER – Database or system which focuses on Electronic Intelligence

X

– Program for finding key words in foreign language documents

XKEYSCORE (XKS) – Program for analysing SIGINT traffic

Y

YACHTSHOP – Sub-program of OAKSTAR for collecting internet metadata

YELLOWPIN – Printed circuit board digital core used with HOWLERMONKEY

YELLOWSTONE – NSA analytical database

YUKON – The embassy of Venezuela in Washington DC

Z

ZAP – (former?) database for texts

ZARF – Compartment of TALENT KEYHOLE for ELINT satellites, retired in 1999

ZESTYLEAK – Software implant that allows remote JETPLOW firmware installation, used by NSA’s CES unit

– See also this list of NSA codewords from 2002

Links and Sources

– List of NSA Code Names Revealed

– About What the NSA’s Massive Org Chart (Probably) Looks Like

– About Code Names for U.S. Military Projects and Operations

– National Reconnaissance Office: Review and Redaction Guide (pdf)

– About How Codes Names Are Assigned

– Wikipedia article about the Secret Service codename

– List of crypto machine designators

– Wikipedia article about the CIA cryptonym

– Article about Security Clearances and Classifications

– Listing in German: Marjorie-Wiki: SIGDEV

– William M. Arkin, Code Names, Deciphering U.S. Military Plans, Programs, adn Operations in the 9/11 World, Steerforth Press, 2005.

via Electrospaces.Blogspot.com

January 28, 2013 – Decrypted Matrix Radio: 2nd Amendment Arguments, Ben Fulford Update, Gold to Rally, NY Gun Control, Body Scan Opt Out Victory!

January 28, 2013 – Decrypted Matrix Radio: 2nd Amendment Arguments, Ben Fulford Update, Gold to Rally, NY Gun Control, Body Scan Opt Out Victory!

Dr Susan Gratia-Hupp – Survivor of the 1991 Kileen TX Lubys Shooting Massacre

Ben Fulford – Full Update – The Sabbatean Mafia And Vatican P2 Lodge Are On What Will Be Their Final Offensive

Jim Sinclair- Gold Specialist & Market Advisor “gold to skyrocket”

Miami Martial Law Drill: Machine Gun Fire & Black Hawk Helicopters Invade Miami Skyline

Journalist Jason Mattera – Bullied by Security Guards after asking Mayor Michael Bloomberg about gun control

4th Amendment Airport Arrest – WINS!!

1-28

Every Week Night 12-1am EST (9-10pm PST)

– Click Image to Listen LIVE –

New Book Details the NSA’s Warrantless Wiretapping Program, As Government Moves to Avoid All Accountability in Court

New Book Details the NSA’s Warrantless Wiretapping Program, As Government Moves to Avoid All Accountability in Court

Former New York Times reporter Kurt Eichenwald’s new book, published last week, provides yet more details about how the the NSA’s unconstitutional warrantless wiretapping program came about, and confirms that even top Bush Administration lawyers felt there was a “strong argument” that the program violated the law. “Officials might be slammed for violating the Fourth Amendment as a result of having listened in on calls to people inside the country and collecting so much personal data,” Eichenwald wrote, and “in the future, others may question the legality” of their actions.

Yet even today, eleven years later, the government continues to claim that no court can judge the program’s legality. In the next month, the government will argue—in EFF’s case in federal district court and ACLU’s case in the Supreme Court—that courts must dismiss the legal challenges without ever coming to a ruling on the merits.

Eichenwald’s book, 500 Days: Secrets and Lies in the Terror Wars, describes how the NSA’s illegal program—what he calls “the most dramatic expansion of NSA’s power and authority in the agency’s 49 year history”— was devised just days after 9/11 to disregard requirements in the Foreign Intelligence Surveillance Act (FISA). Instead of getting individualized warrants to monitor Americans communicating overseas, the Bush administration unilaterally gave the NSA the power to sweep up millions of emails and phone calls into a database for analysis without court approval:

Connections between a suspect e-mail address and others—accounts that both sent and received messages there, whether in the United States or not—would be examined. At that point, a more detailed level of analysis would be applied creating something of a ripple effect. The suspect e-mail address would lead to a second, the second to the accounts it contacted.

In other words, the NSA was given the green light to warrantlessly spy of Americans communications on American soil—a power that was illegal under FISA. And the government—instead of finding probable cause for surveillance like the Constitution requires—started using a burden of proof akin to the game Six Degrees from Kevin Bacon.

Eichenwald’s reporting, focused on the immediate aftermath of 9/11, unfortunately overlooks the NSA’s longstanding desire to live “on the network” reflected in its presentations to the incoming Bush Administration officials in December, 2000. The idea that the NSA only came up with this idea after 9/11 isn’t really accurate.1 But regardless, Eichenwald’s reporting makes clear that Bush administration officials were terrified that this program would become public.

Of course, after several years, much of the NSA’s program did become public when the New York Times exposed its existence in their 2005 Pulitzer Prize winning investigation. Virtually every major news organization in the US subsequently reported on the NSA and its mass spying programs, which led to congressional investigations and a multitude of lawsuits—two which will be argued in the coming month.

In EFF’s lawsuit, in addition to a mountain of public information including many governmental admissions, the court will see evidence from AT&T whistleblower Mark Klein showing blueprints and photographs of the NSA’s secret room in AT&T’s facility in San Francisco. Three more NSA whistleblowers, including William Binney a former high ranking official involved with the program during its infancy, also submitted affidavits laying out how the NSA illegally spied on Americans in the aftermath of 9/11.

Despite this all of this, the government recently filed a motion in the Northern District of California invoking the controversial “state secrets” privilege. Essentially, the government argues that—even if all of the allegations are true—the case should be dismissed entirely because admitting or denying any fact would potentially endanger national security, even in the face of the government’s own craftily wordsmithed  “denials” before Congress and elsewhere.

In the ACLU’s case going before the Supreme Court this term, a group of journalists, lawyers, and human rights activists has sued over surveillance conducted after the passage of the FISA Amendments Act (FAA). The FAA was passed in 2008 and formalized some of the admitted portions of NSA’s program, allowing emails and phone calls to and from from overseas to continue to be acquired without a warrant. The government only needs one general court order to target large groups of people—even entire countries—communicating to Americans for an entire year.

The plaintiffs, given that their professions, regularly talk to people who are almost certainly spied on. They argue that surveillance of them without warrants  renders the statute unconstitutional. But the government contends the case must be dismissed on “standing” grounds because the plaintiffs can’t prove with certainty they have been surveilled, because, in a perfectly circular argument, the government won’t “admit” they have been surveilled, as if public admissions by the government is the only way to prove illegal wiretapping.

As the ACLU writes, “The government theory of standing would render real injuries nonjusticiable and insulate the government’s surveillance activities from meaningful judicial review.” The same can be said of the ‘state secrets’ privilege in EFF’s case. The government is contending they can use government secrecy as a sword to terminate judicial accountability. It doesn’t matter how much evidence is in the public domain, just by telling the Court that the information implicates “national security,” they can wall off entire subject matters from judicial oversight, effectively hiding illegality, unconstitutionality along with embarrassing or overreaching acts by NSA spooks and others.

Eichenwald is just the latest in a long line of journalists to discuss and organize details about the NSA’s unconstitutional program. At this point the American people are well aware of the NSA’s actions – only the courts have been kept in the dark.  And if the courts go along with blinding themselves, the government will have been given a license to violate the law and constitution long into the future.

via EFF.org

Full Spectrum Dominance: Totalitarian Democracy in the New World Order

Full Spectrum Dominance: Totalitarian Democracy in the New World Order

Book Description
Publication Date: May 12, 2009
For the faction controlling the Pentagon, the military industry, and the oil industry, the Cold War never ended. They engineered an incredible plan to grab total control of the planet, of land, sea, air, space, outer space and cyberspace. Continuing ‘below the radar,’ they created a global network of military bases and conflicts to advance the long-term goal of Full Spectrum Dominance. Methods included control of propaganda, use of NGOs for regime change, Color Revolutions to advance NATO eastwards, and a vast array of psychological and economic warfare techniques. They even used ‘save the gorilla’ organizations in Africa to secretly run arms in to create wars for raw materials. It was all part of a Revolution in Military Affairs, as they termed it. The events of September 11, 2001 would allow an American President to declare a worldwide War on Terror, on an enemy who was everywhere, and nowhere. 9/11 justified the Patriot Act, the very act that destroyed Americans’ Constitutional freedoms in the name of security. This book gives a disturbing look at the strategy of Full Spectrum Dominance, at what is behind a strategy that could lead us into a horrific nuclear war in the very near future, and at the very least, to a world at continuous war.
Seeds of Destruction: The Hidden Agenda of… by William F. Engdahl
4.3 out of 5 stars (28)
$16.47
A Century of War: : Anglo-American Oil Poli… by F. William Engdahl
5.0 out of 5 stars (1)
$24.95
Gods of Money: Wall Street and the Death of... by F. William Engdahl
5.0 out of 5 stars (1)
$21.33
They Own It All (Including You)!: By Means o… by Ronald MacDonald
4.8 out of 5 stars (38)
$14.96 Next
——————————————————————————–

Editorial Reviews
About the Author
F. William Engdahl is author of the international best-selling book on oil and geopolitics, A Century of War: Anglo-American Politics and the New World Order. He is a widely discussed analyst of current political and economic developments whose articles have appeared in numerous newspapers and magazines and well-known international websites. His book, ‘Seeds of Destruction: The Hidden Agenda Behind Genetic Manipulation,’ deals with agribusiness and the attempt to control world food supply and thereby populations. He may be reached at his website, www.engdahl.oilgeopolitics.net –This text refers to an alternate Paperback edition.

——————————————————————————–
Product Details
Paperback: 268 pages
Publisher: Third Millennium Press (May 12, 2009)
Language: English
ISBN-10: 0979560861
ISBN-13: 978-0979560866
Product Dimensions: 8.9 x 5.9 x 0.6 inches
Shipping Weight: 5.6 ounces
Average Customer Review: 4.7 out of 5 stars See all reviews (15 customer reviews)
Amazon Best Sellers Rank: #1,109,639 in Books (See Top 100 in Books)
5.0 out of 5 stars Urgent and Essential Reading, June 21, 2009
By Margot L. White “M. Lachlan White”
(REAL NAME) This review is from: Full Spectrum Dominance: Totalitarian Democracy in the New World Order (Paperback)
FULL SPECTRUM DOMINANCE is a rare and essential book — one that orients readers quickly and deeply to the world we live in, and how we arrived here. William Engdahl presents the historical background of policy making and decision analysis that explains how the United States arrived at its present “mission” in the world. The value of Engdahl’s brilliant book is not only that it familiarizes American readers with a history that is not usually revealed to us, but it also guides us through the many overt and covert tactics employed by the US for regime change– primarily via the Pentagon and its nefarious weapons contractors, but also through various think tanks and foundations with innocuous names disingenuously referring to “democracy” and “freedom.” The “full spectrum” of tactics and deceptions and tricks — both violent and non-violent — is revealed here. Needless to say, this book falls within the honorable tradition of political histories that blow the cover off America’s much vaunted pretense and propaganda about serving the cause of “freedom” and “democracy” around the world! It is the only book available today that covers ALL of this, with ample quotations and documents from the architects of US policies, in just 250 well written pages. FULL SPECTRUM DOMINANCE is unique in presenting the evolution of CIA tactics, ranging from its crude “coups” of yesteryear (as in Iran and Guatemala) to its current — and perhaps more insidious — use of “non-violent” electronically manipulated technological “crowd control” via cell phones and (as is currently evident on the streets of Tehran) Twitter. If Americans are woefully ignorant of the full range and dangerous extremes of American violence around the world, of American interventions into and manipulations of other countries’ elections and environments and economics, then there is no longer any excuse for such ignorance. FULL SPECTRUM DOMINANCE is a “must read.” To understand pipeline politics, the critical importance of Eurasia to US defense contractors, read this book. To understand how and why America has become such a rapacious and violent empire with bases all over the world and tens of thousands of agents provocateurs doing its dirty work from Tibet to Tehran, manipulating elections, staging phony “revolutions” to surround Russia with hostile Made-in-USA regimes, propping up American-trained puppets or fomenting chaos from Myanmar to Congo and from Ukraine to Iran — read this book! Help other customers find the most helpful reviews
Was this review helpful to you? Yes No Report abuse | Permalink
Comment Comment (1)
5.0 out of 5 stars Essential reading, June 1, 2009
By Lori “The Rogue Reader Mom” (Arizona) This review is from: Full Spectrum Dominance: Totalitarian Democracy in the New World Order (Paperback)
F W Engdahl has succeeded again at the difficult task of explaining the complexities of how our world really works and how we got to this frightful point in world affairs.
An exacting researcher, Mr. Engdahl, with his latest book, has taken on the task of sorting out the USA’s real intentions as it pertains to the rest of the world. In connecting the dots he takes us on a journey of clarity and comprehension regarding the aggressive path our nation is on as it builds the American Empire.
To follow Mr. Engdahl’s logical explanations of why we do what we do to the rest of the world is to come to the realization that the US may not be the ‘good guys’ we think we are and the rest of the world may have plenty of reasons to be wary of the US.
A sobering examination of our real past and current policies towards Russia, China, Europe, the Middle East and the rest of world community, ‘full spectrum dominance’, as the Pentagon calls it, is a strong-arm policy of control over the rest of the world that is leading us down a disastrous path towards a possible world war. We can’t solve our world’s problems until we properly identify them. Mr. Engdahl has done that in superb fashion.
5.0 out of 5 stars A book everyone needs to read!, July 1, 2009
By William Fetty “Kamakazi” (Sweden)
(REAL NAME) This review is from: Full Spectrum Dominance: Totalitarian Democracy in the New World Order (Paperback)
Engdahl’s books are at the very top of my list of books I recommend to people who want to know what is happening geopolitically in the world, but more importantly WHY things are happening!
Engdahl, though an academic scholar and very well educated with years of experince has once again written a book that anyone can understand and which reads like a great documentary film, much due to the fact that Engdahl is also a journalist, historian and economic researcher!
Full Spectrum Dominance picks up where his first book on the subject “A Century Of War:Anglo-American oil politics and the new world order” ends.
Engdahl once again leads us through the matrix of anglo-american foreign policy and their century old agenda of literal world domination through brute force and covert non-violent means. The evil and criminal actions of the anglo-american empire throughout the 20th century which has now spilled over in to the new millenium are presented in great detail and just like Engdahls previous books makes for a page turner. Once again I cannot recommend this book enough! Read it!

http://www.amazon.com/exec/obidos/ASIN/0979560861/ref=nosim/cryptogoncom-20

Obama OK’s Detainment For 1st Amendment Activities

Obama OK’s Detainment For 1st Amendment Activities

The Obama administration is battling to restore a controversial provision of a new federal law that it admits could have been used to arrest and detain citizens indefinitely – even if their actions were protected by the First Amendment.

A federal judge this week made permanent an injunction against enforcement of Section 1021 of the most recent National Defense Authorization Act, which was declared unconstitutional.

The Obama administration then took only hours to file an appeal of the order from U.S. District Judge Katherine Forrest, and attorneys also asked her to halt enforcement of her order.

In her order, Forrest wrote, “The government put forth the qualified position that plaintiffs’ particular activities, as described at the hearing, if described accurately, if they were independent, and without more, would not subject plaintiffs to military detention under Section 1021.”

But she continued, “The government did not – and does not – generally agree or anywhere argue that activities protected by the First Amendment could not subject an individual to indefinite military detention under Section 1021.”

The case was brought last January by a number of writers and reporters, led by New York Times reporter Christopher Hedges. The journalists contend the controversial section allows for detention of citizens and residents taken into custody in the U.S. on “suspicion of providing substantial support” to anyone engaged in hostilities against the U.S.

The lawsuit alleges the law is vague and could be read to authorize the arrest and detention of people whose speech or associations are protected by the First Amendment. They wonder whether interviewing a member of al-Qaida would be considered “substantial support.”

“Here, the stakes get no higher: indefinite military detention – potential detention during a war on terrorism that is not expected to end in the foreseeable future, if ever. The Constitution requires specificity – and that specificity is absent from Section 1021,” the judge wrote.

Dan Johnson, a spokesman with People Against the NDAA, told WND it took only hours for the government to file an appeal to the 2nd Circuit Court of Appeals.

“It most definitely tells us something about their intent,” he told WND.

He cited Obama’s signing statement, when the bill was made law, that he would not use the provision allowing detention of American citizens without probable cause in military facilities.

“Just because someone says something doesn’t mean they’re not lying,” he said.

Bloomberg reports the Obama administration also is asking Forrest for a stay of the ruling that found the law violates the First, Fifth and 14th Amendments.

The judge expressed dissatisfaction with what one observer described as the arrogance of the Department of Justice in the case.

Forrest asked the government to define the legal term, noting the importance of how they apply to reporting and other duties.

“The court repeatedly asked the government whether those particular past activities could subject plaintiffs to indefinite military detention; the government refused to answer,” she wrote.

“The Constitution places affirmative limits on the power of the executive to act, and these limits apply in times of peace as well as times of war,” she wrote.

She said the law “impermissibly impinges on guaranteed First Amendment rights and lacks sufficient definitional structure and protection to meet the requirements of due process.”

“This court rejects the government’s suggestion that American citizens can be placed in military detention indefinitely, for acts they could not predict might subject them to detention, and have as their sole remedy a habeas petition adjudicated by a single decision-maker (a judge versus a jury), by a ‘preponderance of the evidence’ standard,” she wrote.

“That scenario dispenses with a number of guaranteed rights,” she said.

The Obama administration already has described those who hold a pro-life position or support third-party presidential candidates or the Second Amendment fit the profile of a domestic terrorist.

Obama stated when he put his signature to the legislative plan that his administration “will not authorize the indefinite military detention without trial of American citizens.”

Virginia already has passed a law that states it would not cooperate with such detentions, and several local jurisdictions have done the same. Arizona, Rhode Island, Maryland, Oklahoma, Tennessee and Washington also have considered similar legislation.

The case was brought on behalf of Christopher Hedges, Daniel Ellsberg, Jennifer Bolen, Noam Chomsky, Alex O’Brien, Kai Warg All, Brigitta Jonsottir and the group U.S. Day of Rage. Many of the plaintiffs are authors or reporters who stated that the threat of indefinite detention by the U.S. military already had altered their activities.

Constitutional expert Herb Titus filed a friend-of-the-court brief on behalf of the sponsor of the Virginia law, Delegate Bob Marshall and others.

Titus, an attorney with William J. Olson, P.C., told WND the judge’s first decision to grant a preliminary injunction halting enforcement of paragraph 1021 “affirms the constitutional position taken by Delegate Marshall is correct.”

The impact is that “the statute does not have sufficient constitutional guidelines to govern the discretion of the president in making a decision whether to hold someone in indefinite military detention,” Titus said.

The judge had noted that the law doesn’t have a requirement that there be any knowledge that an act is prohibited before a detention. The judge also said the law is vague, and she appeared to be disturbed that the administration lawyers refused to answer her questions.

Titus said the judge’s conclusions underscore “the arrogance of the current regime, in that they will not answer questions that they ought to answer to a judge because they don’t think they have to.”

The brief was filed on behalf of Marshall and other individuals and organizations, including the United States Justice Foundation, Downsize DC Foundation, Institute on the Constitution, Gun Owners of America, Western Center for Journalism, the Tenth Amendment Center and Pastor Chuck Baldwin.

Marshall’s HB1160 passed the Virginia House of Delegates by a vote of 87-7 and the Virginia Senate 36-1. Since the vote was on changes recommended by Gov. Bob McDonnell, it was scheduled to take effect without further vote.

Marshall then wrote leaders in state legislatures around the country suggesting similar votes in their states.

Marshall’s letter noted Virginia was the first state in the nation to refuse cooperation “with federal authorities who, acting under the authority of section 1021 of the National Defense Authorization Act of 2012 (NDAA), could arrest and detain American citizens suspected of aiding terrorists without probable cause, without the right to know the charges against them, and without the procedural rights guaranteed by the Bill of Rights.”

He told lawmakers, “While we would hope that the U.S. Senate and U.S. House of Representatives would be vigilant to protect the constitutional rights of American citizens, even when addressing the problem of international terrorism, those efforts in Congress failed at the end of last year, and President Obama signed NDAA into law on December 31, 2011.”

Endorsing Marshall’s plan was the Japanese American Citizens League, which cited the detention of tens of thousands of Japanese Americans during World War II on no authorization other than the president’s signature.

The Obama administration continues to argue the law allows for detention without legal due process only those who “substantially supported” terror groups such as al-Qaida or “associated forces.” But the plaintiffs note that the law does not define those terms.

Instead, they point to the law’s provision that such individuals may be detained “without trial until the end of the hostilities.”

Obama attorneys said the new law simply affirms what already was precedent under the Authorization for Use of Military Force, which was adopted in the dust of the 9/11 terror attacks.

But plaintiffs wrote, “Nowhere does the AUMF convey to the executive the power to detain any person – citizen or otherwise – who ‘substantially supported’ al-Qaida or the Taliban or their associate forces, as section 1021 of the NDAA now provides.”

“No case has ever recognized the government’s contention that the AUMF authorized the detention of noncombatants. … Neither case law nor the actual text of the AUMF supports the government’s contention that such detention power already existed.”

Source: WND.com

War Toys: US Kicks-off Global Drones Race – Ultimately to Collect Data and Search Citizens

War Toys: US Kicks-off Global Drones Race – Ultimately to Collect Data and Search Citizens

Last week, Venezuelan President Hugo Chavez showcased his country’s first unmanned drone. It seems that an international race to dominate the sky has gone underway and the South American country has become a player in the game of drones with the help of Iran, Russia and China. Retired Army Colonel Douglas Macgregor joins us to explain why more and more countries are rushing to get their hands on an unmanned aircraft.

Like us and/or follow us:

http://twitter.com/RT_America
http://www.facebook.com/RTAmerica

 

Air Force Set to Be Deployed Inside U.S. to Collect Data and Search Citizens

 

By Alex Thomas
theintelhub.com
June 7, 2012

The United States Air Force, through the use of unmanned aerial drones, is set to be deployed inside the United States to collect data, investigate places of interest, and share data with local police agencies.

An unclassified Air Force Memo from late April documents the fact that the military is operating drone aircraft domestically and that, through a complete end run around the Constitution, can essentially share it with local law enforcement even if it has no relation to terrorism.

While many articles have already been published detailing the fact that the military is or will be sharing information they collect with local law enforcement, a more startling fact has been largely ignored by the corporate controlled media. (until now)

In a recently published op-ed, Andrew Napolitano outlined the fact that once the military identifies something of interest they can apply to a military commander for permission to conduct searches of American property and or citizens which in turn is a form of martial law.

“It gets worse. If the military personnel see something of interest from a drone, they may apply to a military judge or “military commander” for permission to conduct a physical search of the private property that intrigues them. And, any “incidentally acquired information” can be retained or turned over to local law enforcement. What’s next? Prosecutions before military tribunals in the U.S,” wrote Napolitano.

The Electronic Frontier Foundation has also publicly commented on the fact that the Air Force is now openly recording information on the American people in domestic situations.

“We’ve seen in some records that were released by the Air Force just recently, that under their rules, they are allowed to fly drones in public areas and record information on domestic situations,” explained Jennifer Lynch, of the EFF.

Madison Ruppert, writing for EndtheLie.com, detailed the broad exceptions to a guideline that is supposed to limit the military from non-consensual surveillance.

While the U.S. Air Force’s guidelines claim that drones are not allowed to carry out “non-consensual surveillance” on U.S. citizens or property, there are plenty of exceptions to this allowing such surveillance to occur.

Some of these many exceptions outlined in the Air Force documents include:

– Investigating or preventing clandestine intelligence activities by foreign powers, international narcotics activities, or international terrorist activities

– Protecting DoD employees, information, property and facilities

– Preventing, detecting or investigating other violations of law

Seems pretty broad, doesn’t it? “Other violations of law” leaves the door wide open for the drones to be used for just about everything. After all, jaywalking is a violation of law. Does this mean that if a drone captures someone jaywalking, the use of military drones in U.S. airspace is somehow justified?

That’s right, the Air Force now has the authority to carry out drone surveillance on American citizens for essentially any violation of law.

Sadly, we now live in a country were 30,000 drones are set to be launched by various law enforcement agencies, the military, and private companies.

The idea of the military not being used against the American people has now been completely thrown out the window with the only hope citizens of this country have left being the support of individual military members who choose to go against these Unconstitutional directives.

 

 

Line Noise: Electronic Device Search and Seizure

Line Noise: Electronic Device Search and Seizure

EFF activist Eva Galperin interviews EFF criminal defense attorney, Hanni Fakhoury, on the newest edition of Line Noise, the EFF podcast. Whether law enforcement wants to search your home computer, tries to browse through your smart phone at a traffic stop, or seeks to thumb through your camera at customs, you should know your rights.

Learn more about your privacy rights by reading our Know Your Rights guide, or test your skills with our quiz.

This edition of Line Noise was recorded on-site from the San Francisco studio of Bamm.tv

 

https://www.eff.org/deeplinks/2011/08/line-noise-electronic-device-search-and-seizure