Jar2

The NSA List

http://88.88.1.60/Files/Lists/NSA_List.html

Jar2

From FVEY to 14 Eyes - The World Takeover of the NSA

September 27, 2019 - Source Electrospaces.net

https://electrospaces.blogspot.com/2019/09/from-9-eyes-to-14-eyes-afghanistan.html

September 22, 2019

From 9-Eyes to 14-Eyes: the Afghanistan SIGINT Coalition (AFSC)

For over five years it was a mystery: the 9-Eyes intelligence cooperation, which was first revealed by The Guardian in November 2013. It was only an extensive new piece on the website The Intercept from last May that made clear that the 9-Eyes is actually the Afghanistan SIGINT Coalition (AFSC).

The main purpose of the AFSC was to collect GSM metadata using DRT interception devices and feeding them into the NSA's huge data analysis platform for Afghanistan operations called the Real Time Regional Gateway (RT-RG).

The AFSC started in 2009 with nine members but eventually grew to the same 14 countries that already cooperated in another intelligence exchange group called SIGINT Seniors Europe (SSEUR). The AFSC existed at least until the end of 2014.

Slide from an NSA presentation about the Afghanistan SIGINT Coalition (June 2009)

Intelligence sharing coalitions

The existance of the 9-Eyes group was first revealed by the British newspaper The Guardian on November 2, 2013:

"The NSA operates in close co-operation with four other English-speaking countries - the UK, Canada, Australia and New Zealand - sharing raw intelligence, funding, technical systems and personnel. Their top level collective is known as the '5-Eyes'.

Beyond that, the NSA has other coalitions, although intelligence-sharing is more restricted for the additional partners: the 9-Eyes, which adds Denmark, France, the Netherlands and Norway; the 14-Eyes, including Germany, Belgium, Italy, Spain and Sweden; and 41-Eyes, adding in others in the allied coalition in Afghanistan."

This revelation caused some embarrassment, as especially France and The Netherlands had clearly expressed their anger about the NSA's alleged eavesdropping operations against their citizens (see below), but now it turned out they were also engaged in some close alliances with the Americans.

Other 9-Eyes: CFBLNet

The Guardian's revelation started speculation about the differences between these groups and their specific purposes. From open sources, a range of similar "Eyes" for sharing military and intelligence information were identified on this weblog in November 2013 in a posting titled Five Eyes, 9-Eyes and many more.

It turned out that the term 9-Eyes was already used since 2008 for exchanging classified information among the Five Eyes and nine NATO members of the Combined Federated Battle Laboratories Network (CFBLNet). This is a multilateral network for research, development and testing on C4ISR systems.

However, the members of the CFBLNet 9-Eyes were not fully identical with those in the Guardian article, so it seemed not likely that this was the mysterious 9-Eyes group mentioned in the Omidyar documents.

The 9-Eyes of the CFBLNet listed in a NATO standardization document from 2010

14-Eyes: SSEUR

In December 2013, Swedish television published a range of NSA-documents from the Snowden files which revealed that the 14-Eyes were also known as the SIGINT Seniors Europe (SSEUR) and consisted of the Five Eyes plus nine European partners: Belgium, Denmark, France, Germany, Italy, the Netherlands, Norway, Spain and Sweden:

From various other sources it became clear that the SIGINT Seniors Europe is a group in which the heads of the participating military or signals intelligence agencies coordinate the exchange of military intelligence according to the needs of each member.

The SSEUR group was established in 1982 for more efficiently monitoring the Soviet Union* and a database system called SIGDASYS was set up so the participating agencies could exchange as much military SIGINT and other information as possible.* In the early 2000s, a sub-group for counter-terrorism was formed under the name SIGINT Seniors Europe Counter Terrorism coalition (SISECT).

Afghanistan

Meanwhile, the function of the 9-Eyes remained unclear: the Dutch interior minister Ronald Plasterk refused to say anything about it, but there were rumours that it was for exchanging military signals intelligence related to operations in Afghanistan.

That could explain why no other documents about the 9-Eyes had been published, because apparently Glenn Greenwald had an agreement with Snowden not to disclose information that could endanger American troops in Afghanistan.

Nonetheless, information about NSA's involvement in Afghanistan did came out: in June 2014 for example, the German magazine Der Spiegel released an NSA paper from January 2013, which lists all the members of the Afghanistan SIGINT Coalition (AFSC). Its membership appeared identical with the SIGINT Seniors Europe or 14-Eyes.

NSA presentation slide showing the 2nd and 3rd Party partners and some coalition and multilateral exchange groups. Published in No Place To Hide, May 2014.

From 9-Eyes to 14-Eyes

But as was revealed in The Intercept's article from last May, the Afghanistan SIGINT Coalition not always had 14 members: the group started in 2009 with just nine members and was therefore called 9-Eyes. Besides the Five Eyes it included Denmark, France, the Netherlands and Norway.

In 2010, Sweden and Germany joined the Afghanistan SIGINT Coalition and by January 2013, Belgium, Italy, and Spain had also become members of the group. By then, the AFSC had exactly the same membership as the SIGINT Seniors Europe or 14-Eyes.

It is not known whether the number of "Eyes" increased with each new AFSC member, but it's clear that an "Eyes" designation is not always a unique designator and there can be multiple groups with the same number of Eyes at the same time. To avoid confusion, such multilateral partnerships can best be called by their actual names.

The Real Time Regional Gateway

The Afghanistan SIGINT Coalition was created because the NSA needed additional linguistic capabilities as well as data from regions in Afghanistan where they had little or no coverage themselves.

Therefore they turned to trusted coalition partners and provided them with wireless interception equipment known as DRT-boxes, which were first identified as such on this weblog in November 2013.

After Dutch, Danish, Norwegian, German and Spanish troops each got one, two or three DRT devices, they started feeding intercepted GSM metadata into a huge distribution and analysis system called Real Time Regional Gateway (RT-RG) as of Summer 2008.

This RT-RG system was first publicly mentioned in a Defense News article from October 2010 and in the book Top Secret America from 2011 it was described as follows:

"RTRG allows users to see all signal intelligence that collectors are working on in real time. This includes ground collectors, Air Force RC-135 Rivet Joint and Liberty planes, SIGINT-equipped drones, and SIGINT satellites operated by the NRO. RTRG has provided a tenfold increase in the speed with which intercepts are povided to operators on the ground."

This is already a pretty accurate description, except that it doesn't mention the participation of coalition partners, which governments always handle as something extremely sensitive.

Slide from an NSA presentation showing all the collection systems that fed the RT-RG platform

RT-RG started as a project called RT-10, which was first deployed in Baghdad in 2007. An internal NSA newsletter says that in order to provide a comprehensive real-time view of the telephone and internet communications in Baghdad (with roughly 4 to 5 million residents), the RT-10 system had to be able to ingest each day:

- 100 million telephone metadata records
- 1 million pieces of telephone content
- 100 million internet metadata records

The success of the RT-RG system lay in the fact that these massive amounts of data were stored locally: in 2009, a large RT-RG data center was built at Area 82 of Bagram Airport north of Kabul. It was right next to the Afghanistan Regional Operations Cryptologic Center (A-ROCC), where analysts from the 9-Eyes countries worked side-by-side.

Previously, war-fighters in the field had to retrieve their intelligence from central databases at NSA headquarters. This costed time and bandwith, but it also meant that only data related to known targets was sent back and stored. But with storing the full-take collection in a regional repository, all data could be subjected to analytic algorithms in order to find new targets for the so-called Find, Fix, Finish operations.

In 2011, the Afghanistan RT-RG had a database of 27 terabytes, which could only store approximately one month of regional data (90% of the user queries were within a one-week timeframe though). A planned move to NSA's new cloud architecture would increase the storage space to up to 125 TB and would allow larger-scale analytics to be conducted.

Architecture of the Real Time Regional Gateway (RT-RG) in 2012 (source: NSA presentation)

BOUNDLESSINFORMANT

How many GSM metadata the countries from the Afghanistan SIGINT Coalition collected can be seen in charts from the NSA's data visualization tool BOUNDLESSINFORMANT. The available charts show that the following numbers were acquired through the DRTBOX system during a one month period between December 10, 2012 and January 8, 2013:

- France: 62 million metadata records
- Spain: 60 million metadata records
- Italy: 45 million metadata records
- Sweden: 33 million metadata records
- Norway: 33 million metadata records
- Denmark: 22 million metadata records

(The chart for the Netherlands shows the CERF CALL method through which cellphone metadata from Somalia were collected. DRTBOX is not mentioned, maybe because Dutch troops had left Afghanistan already by August 2010)

These numbers are very small compared to what NSA and American military units collected. They also, once again, show that "mass surveillance" of entire populations would require the collection of billions of metadata records rather than the millions that showed up in these particular charts (60 million would roughly be the number of metadata generated by 20.000 handsets).

In the second half of 2013, these charts were published in various major European newspapers saying that they proved that NSA monitored millions of phone calls in those countries. Soon it turned out this interpretation was completely wrong, something which co-author Glenn Greenwald only admitted in The Intercept's article from last May.

> See also: Dutch government tried to hide the truth about metadata collection

BOUNDLESSINFORMANT chart showing metadata collected by French intelligence, including 62 million records through the DRTBOX system

3rd Party partners

Interesting is that Polish troops in Afghanistan also got one DRT interception device and there's also a BOUNDLESSINFORMANT chart showing that in one month time they collected some 71 million cellphone metadata. But despite this effort, Poland did not become a member of the Afghanistan SIGINT Coalition.

Poland was also not a member of the SIGINT Seniors Europe, so it seems the AFSC was only meant for countries that were already part of the SSEUR. The slide at the top of this blog post shows that, together with several other NATO countries, Poland is listed in red as a "National SIGINT Partner".

Except for Slovenia, these National SIGINT Partners appear to be identical with the so-called 3rd Party partners, which are the (signals) intelligence agencies of over 30 countries with which NSA has a formal relationship. They are one level below the 2nd Party partners, or Five Eyes, who have a fully integrated signals intelligence cooperation.

> See also: NSA's Foreign Partnerships

Quid pro quo

The operations in Afghanistan show how many different levels of cooperation there can be: there were 3rd Party partners who did nothing more or less than ordinary NATO members. Among them, information is only shared up to the classification level SECRET.

Then there was Poland which collected and shared telephone metadata, but did not participate in the CENTER ICE platform through which the countries of the SIGINT Seniors Europe communicated and exchanged threat information at the level TOP SECRET/SI.

The closest cooperation for 3rd Party partners was in the AFSC, where they fed telephone metadata directly into the NSA's RT-RG system. Because cooperation between intelligence agencies is always based upon the principle of quid pro quo, these partners also got things in return, equal to their input.

For the members of the AFSC these returns included real-time data access, unique linguistic resources and joint counter insurgency operations - things that could have been crucial for the success of their operations or the safety of their troops, but which the Five Eyes did not make available to the (initially broader group of the) SIGINT Seniors Europe.

Epilogue

The latest document in which the Afghanistan SIGINT Coalition was mentioned is an NSA paper from April 2013. One month later there was an AFSC conference in Denmark at which would be discussed what to do after the ISAF mission would be disbanded in December 2014. It's not known whether there was any kind of continuation.

The Real-Time Regional Gateway proved to be so successful that already in 2012, NSA deployed the system at 11 locations around the world, including at its regional center in Texas to combat Mexican drug trafficking, as well as on board of the nuclear submarine USS Georgia, which collected mobile phone metadata around the Horn of Africa.

New NSA/MOSSAD Cyber Operations Infrastructure Exposed

May 02, 2019 - SIPERNET, PRISM and dozens of other programs were long ago exposed and made public so with the recent public announcements that the NSA was giving up a program they had allowed to be outed in a Limited Hangout Operation whose public face was the infamous CIA Avatar Edward Greenberg (Snowden) Black Hats and others who continue to operate in the Shadows began investigating as the CIA, the NSA or any other Intelligence Agency never gives up a program unless there is something better to replace it. The incestuous relationship that exists between the US Intelligence Community and the Corporations they use as Fronts, while being an evil key ingredient of Fascism and the creation of a Full SPectrum Dominance Total Surveillance Fascist Police State, one which they are trying to bring about worldwide, is a Godsend for Counter Intelligence Operations and those who wish to expose the evil that the US "Intelligence" Community is trying to spread worldwide in their drive for global domination.

Lies within lies, within enigmas, inside puzzles and obfuscated and covered up with disinformation, misinformations and carefully calculated obfuscation are almost useless when one knows what to look for and nine times out of ten the devil is in the money. Earlier we exposed and reported on Amazon's marriage to the CIA and thus their buy in into the Washington Post and as with that revelation this one is very similiar in that private individuals and corporations are being used to attempt to covertly install infrastructire worldwide. Unlike the CIA, which leaks like a boat made of Swiss cheese, the NSA is much more devious and this time not only have we caught the NSA but also MOSSAD as the connections to the owners of the bodies in question shows.

Exposing the evildoers is getting more and more dangerous and in some countries actually impossible with the almost complete taekover and control of the Internet by Western Intelligence Agencies but leaks and exposure are still possible as the following information is a testament to. 

We would like to express our gratitude to our sources who have taken huge risks in getting this information and related documentation to us and pray that they are safe and that their risks are properly appreciated and valued by all of our dear readers. 

Meet AS53667 ~ PONYNET, Level(3) LLC, CenturyLink uCommand (Kosher), MOSSAD Security Analyst Lawrence (Larry) Goldstein, Wayback Machine (Where ASIS and WikiLeaks stored the Podesta files), American Locker Group Inc., Star Struck Inc., Horizon Kinetics LLC and many more

MOSSAD uses the Kosher sign in an at symbol for those in the know. Unfortunately for them this was not a very clever thing to do, but thanks! Their logo literally means Kosher Command.

https://www.bgpview.io/asn/53667#graph

Level 3 Parent, LLC
AS3549 ~ LVLT-3549

https://bgpview.io/asn/3549#info

https://bgpview.io/asn/3549#peers-v4

ASNumber: 3549
ASName: LVLT-3549
ASHandle: AS3549
RegDate: 2000-03-21
Updated: 2018-02-20
Ref: https://rdap.arin.net/registry/autnum/3549

OrgName: Level 3 Parent, LLC
OrgId: LPL-141
Address: 100 CenturyLink Drive
City: Monroe
StateProv: LA
PostalCode: 71203
Country: US
RegDate: 2018-02-06
Updated: 2018-02-22
Ref: https://rdap.arin.net/registry/entity/LPL-141

OrgTechHandle: IPADD5-ARIN
OrgTechName: ipaddressing
OrgTechPhone: +1-877-453-8353
OrgTechEmail: ipaddressing@level3.com
OrgTechRef: https://rdap.arin.net/registry/entity/IPADD5-ARIN

OrgAbuseHandle: IPADD5-ARIN
OrgAbuseName: ipaddressing
OrgAbusePhone: +1-877-453-8353
OrgAbuseEmail: ipaddressing@level3.com
OrgAbuseRef: https://rdap.arin.net/registry/entity/IPADD5-ARIN

 

Operations

Level 3 Communications operates a large network Internet. This includes 46 states in the continental United States,[20][21] South America, Western Europe,[4][22] and some cities in Asia. It uses transatlantic cables,[23] including "Yellow" /AC-2 (on which it owned two of the four fiber pairs after Viatel's 2001 bankruptcy).[24]

Level 3 Communications has also purchased 300 Gbit/s of capacity on the Apollo (cable system).[25]

It is the current owner of AS1[26] (following the acquisition of Genuity, from BBN Technologies), but it uses AS3356 for operations. AS3356 as of 2007 consistently had one of the highest ranked connectivity degrees on the Internet.[27][28] It also operates the former Global Crossing network (AS3549) following the company acquisition in 2011.

Level 3 Communications delivers Netflix and Apple music and video content over the Internet.[29]

The company runs a content delivery network which it acquired from Savvis in 2006.[30]
In 2006, Level 3 Communications announced with Internet2, an academic network, that they would deploy a next generation nationwide research network.[31]

 

Sales organization

Level 3 distributes and sells its services through a mix of six independent sales channels: large enterprise, wholesale, federal, content and media, midmarket, and indirect. All six sales channels report to the president of sales Andrew Crouch.[32] The top performing Level 3 indirect sales agencies in 2010 include Intelisys, Microcorp, CDW/AVANT Communications, PlanetOne, Advantage Communications Group, Telarus, and Presidio.[33]

https://www.bgpview.io/asn/53667#graph

https://bgpview.io/asn/3549#peers-v4

 

Level 3 Communications, Inc.
http://www.level3.com

 

Aliases

IRS EIN 47-0210602, Kiewit Diversified Group Inc, Level 3 Communications

https://web.archive.org/web/20190501132514/https://littlesis.org/org/531-Level_3_Communications,_Inc.

 

Parent

Phlcorp Holding LLC

Aliases Baldwin United Corp., Phlcorp, Inc.
https://web.archive.org/web/20190501132748/https://littlesis.org/org/116886-Phlcorp_Holding_LLC

 

Parent

Leucadia National Corporation

Aliases IRS EIN 13 -2615557, Leucadia National Corp

https://web.archive.org/web/20190501133409/https://littlesis.org/org/119172-Leucadia_National_Corporation

 

Owner

Horizon Kinetics LLC
http://www.hamincny.com/

https://web.archive.org/web/20171108113729/https://littlesis.org/entities/87084-Horizon_Kinetics_LLC/references

https://web.archive.org/web/20170910193516/http://www.littlesis.org/org/87084-Horizon_Kinetics_LLC

 

Trump linked via Icahn Enterprises L.P. A diversified holding company
https://web.archive.org/web/20190501184109/https://horizonkinetics.com/research-reports/

 

Owner

FRMO Corporation
https://web.archive.org/web/20190501133945/https://littlesis.org/org/139374-FRMO_Corporation
https://web.archive.org/web/20190501183628/https://frmocorp.com/

 

Owned by

Lawrence J Goldstein

https://archive.is/nBEbH

https://web.archive.org/web/20190501134847/https://littlesis.org/person/139382-Lawrence_J_Goldstein

https://web.archive.org/web/20190501135627/https://littlesis.org/person/148492/Lawrence_Goldstein

https://web.archive.org/web/20190501135817/https://littlesis.org/person/148492-Lawrence_Goldstein/giving

https://web.archive.org/web/20190501134847/https://littlesis.org/person/139382-Lawrence_J_Goldstein

 

Donation/Grant Recipients

AIPAC

https://web.archive.org/web/20190501141451/https://littlesis.org/relationships/759774

above list deleted from archive (Wayback machine is owned by level 3)

 

Other Affiliations*

American Locker Group Inc.

SMP Asset Management, LLC

Santa Monica Partners, L.P.

Fromex Equity Corp.

Vice President, Treasurer, Director and Vice President - Star Struck Inc.

Star Struck, Ltd.

 

Dual Israeli/US Citizen and MOSSAD Asset/Officer Lawrence Goldstein

Mr. Lawrence J. Goldstein, also known as Larry, is the Founding General Partner at Santa Monica Partners, L.P. He founded the firm in 1982.

Mr. Goldstein is the President at Santa Monica Partners Asset Management LLC, since January 2003.

He has been a Vice President, Treasurer, and Director of Star Struck Ltd., since 1985 and serves as a Vice President at Star Struck Inc.

Previously, Mr. Goldstein also managed the University of Michigan Business School Growth Fund for the twelve years of its existence.

Prior to founding Santa Monica Partners, he was the First Vice President at Drexel Burnham Lambert and a General Partner (Security Analyst and Fund Manager) of its predecessor Burnham & Company for 23 years. Mr. Goldstein is a Member of Advisory Board of Tudog Consulting, Inc.

He served as a Director of FRMO Corp until March 11, 2005.

Mr. Goldstein was also a Director of American Locker Group Inc., from February 2003 to March 19, 2004.

 

Google cache of Donation and Grant Recipients. The archived cache was also archived.
it maybe usefull

https://webcache.googleusercontent.com/search?q=cache:http%3A%2F%2Fwww.masterplanneronline.com%2Fnewyork%2Forganization%2FAmerican_Israel_Public_Affairs_Committee_-_AIPAC_27908

https://web.archive.org/web/20190501145210/http://www.masterplanneronline.com/newyork/organization/American_Israel_Public_Affairs_Committee_-_AIPAC_27908

 

The announcement below is like a literal "Who's Who" of Corporate Deep State Intelligence Connected Bodies 

CenturyLink to acquire Level 3 Communications

The combined company will have the ability to offer CenturyLink's larger enterprise customer base the benefits of Level 3's global footprint with a combined presence in more than 60 countries. In addition, the combined company will be positioned to further invest in the reach and speeds of its broadband infrastructure for small businesses and consumers.

Highly Complementary Businesses with Expanded Fiber Networks: This transaction increases CenturyLink's network by 200,000 route miles of fiber, which includes 64,000 route miles in 350 metropolitan areas and 33,000 subsea route miles connecting multiple continents. Accounting for those served by both companies, CenturyLink's on-net buildings are expected to increase by nearly 75 percent to approximately 75,000, including 10,000 buildings in EMEA and Latin America.

Overall, the BofA Merrill Lynch and Morgan Stanley & Co. LLC acted as CenturyLink's financial advisors, and Evercore provided a fairness opinion. Wachtell, Lipton, Rosen & Katz and Jones Walker are acting as CenturyLink's legal advisors. Citigroup acted as financial advisor to Level 3, and Lazard provided a fairness opinion. Willkie Farr & Gallagher LLP acted as legal advisor to Level 3. Latham & Watkins acted as legal advisor and Credit Suisse acted as financial advisor to ST Telemedia.

https://web.archive.org/web/20190429012046/https://www.centurylink.com/

 

www.level3.com Redirect to the location below
https://web.archive.org/web/20190428173140/https://www.centurylink.com/business.html?rid=lvltmigration

https://web.archive.org/save/https://www.credit-suisse.com/fr/fr.html

 

A reference to PHAROAH

https://web.archive.org/web/20190501211900/http://news.centurylink.com/CenturyLink-to-acquire-Level-3-Communications

 

Supporting links of interest to investigators

https://portout.level3.com/Login.aspx?ReturnUrl=%2fCsrSubmit.aspx

https://account.level3.com/login

https://gsaportal.level3.com/login.jsp

https://vfoprod-level3.activationnow.com/

https://onestop.level3.com/

https://webmail.level3-hosting.com/

https://voiceconfig.level3.com/auth/login/

https://mediaportal.level3.com/ui/auth

https://ham.level3.com/Uberservices/WorkOrder/Index

https://level3-hosting.com/

https://portout.level3.com/CreateNewUser.aspx

https://myportal.level3.com/Login.aspx?ReturnUrl=%2fMyChangeRequests%2fMyChangeRequests.aspx

https://eisgsaportal.level3.com/

https://tokenreg.level3.com/selfEnrollment/Enrollment.aspx?tokenLoaded=true

http://your.level3.com/TheStateofTexas

https://gsaportal.level3.com/forgotPassword.jsp

https://ecd.level3.com/

https://www.2-spyware.com/remove-searchguide-level3-com-virus.html

http://irthnet.level3.com/IRTHNet/Logon.aspx

https://leaportal.level3.net/

https://www.2-spyware.com/remove-searchguide-level3-com-virus.html

http://irthnet.level3.com/IRTHNet/Logon.aspx

https://leaportal.level3.net/

Shadow Brokers EQGRP Lost in Translation Resources

https://gist.github.com/iam1980/0155d277b03ec535291a1b0a788b3812

https://labs.nettitude.com/blog/a-quick-analysis-of-the-latest-shadow-brokers-dump/

Snow Den Op PRISM Leak Orchestrated by USMC/CIA Clinton, Obama and Neo Cons

http://www.jar2.com/Topics/Snowden.html

Jar2

NSA/Google Operation Enduring Security Framework - E-Mails NSA/Google

NSA/Google Operation Enduring Security Framework

NSA/CARNIVORE/PRISM/Et Al: Library Computer Keyword Lists

http://www.jar2.com/2/NSA/NSA_KEYWORDS.html

NSA Black Budget: TOP SECRET

Budget reveals black operations, programs and much more about the US' most secret agency

NSA Post Hypnotic Subliminal Scripts - MKULTRA/MOCKINGBIRD on Steroids

http://jar2.com/2/Intel/NSA/Scary.htm

The NSA Tools: THIS HUGE RELEASE IS DEDICATED TO VITALY CHURKIN AND ALL THE GOOD PEOPLE KILLED BY THE NSA/CIA/MOSSAD AND THEIR AGENTS

http://www.jar2.biz/Files/NSA_TOOLS/EQGRP-master.zip

UNENCRYPTED ZIPPED FILE: DOWNLOAD AT YOUR OWN RISK

http://www.jar2.biz/Files/NSA_TOOLS/EQGRP-master.zip

SOURCE of FILES: The Shadow Brokers, Analysis by GITHUB, HOSTING by JAR2 BIZ

MESSAGE FROM SHADOW BROKERS:

https://github.com/x0rz/EQGRP/blob/master/README.md

http://www.zerohedge.com/news/2017-04-08/hacker-group-releases-password-nsas-top-secret-arsenal-protest-trump-betrayal

Unknown

COTTONAXE

EBBISLAND related rce

STOICSURGEON

INCISION

ITIME

JACKLADDER

DAMPCROWD

ELDESTMYdLE

SUAVEEYEFUL

WATCHER

YELLOWSPIRIT

Misc

DITTLELIGHT (HIDELIGHT) unhide NOPEN window to run unix oracle db scripts

DUL shellcode packer

egg_timer execution delayer (equivalent to at)

ewok snmpwalk-like?

gr Web crontab manager? wtf. NSA are webscale dude

jackladderhelper simple port binder

magicjack DES implementation in Perl

PORKSERVER inetd-based server for the PORK implant

ri equivalent to rpcinfo

uX_local Micro X server, likely for remote management

Remote Code Execution

Solaris

CATFLAP Solaris 7/8/9 (SPARC and Intel) RCE (for a LOT of versions)

EASYSTREET/CMSEX and cmsd Solaris rpc.cmsd remote root

EBBISLAND/ELVISCICADA/snmpXdmid and frown: CVE-2001-0236, Solaris 2.6-2.9 - snmpXdmid Buffer Overflow

sneer: mibissa (Sun snmpd) RCE, with DWARF symbols :D

dtspcdx_sparc dtspcd RCE for SunOS 5. -5.8. what a useless exploit

TOOLTALK DEC, IRIX, or Sol2.6 or earlier Tooltalk buffer overflow RCE

VIOLENTSPIRIT RCE for ttsession daemon in CDE on Solaris 2.6-2.9 on SPARC and x86

Netscape Server

xp_ns-httpd NetScape Server RCE

nsent RCE for NetScape Enterprise server 4.1 for Solaris

eggbasket another NetScape Enterprise RCE, this time version 3.5, likely SPARC only

FTP servers

EE proftpd 1.2.8 RCE, for RHEL 7.3+/Linux, CVE-2011-4130? another reason not to use proftpd

wuftpd likely CVE-2001-0550

Web

ESMARKCONANT exploits phpBB vulnerability (<2.0.11)

ELIDESKEW Public known vulnerablity in SquirrelMail versions 1.4.0 - 1.4.7

ELITEHAMMER Runs against RedFlag Webmail 4, yields user nobody

ENVISIONCOLLISION RCE for phpBB (derivative)

EPICHERO RCE for Avaya Media Server

Misc

calserver spooler RPC based RCE

EARLYSHOVEL RCE RHL7 using sendmail

ECHOWRECKER/sambal: samba 2.2 and 3.0.2a - 3.0.12-5 RCE (with DWARF symbols), for FreeBSD, OpenBSD 3.1, OpenBSD 3.2 (with a non-executable stack, zomg), and Linux. Likely CVE-2003-0201. There is also a Solaris version

ELECTRICSLIDE RCE (heap-overflow) in Squid, with a chinese-looking vector

EMBERSNOUT a remote exploit against Red Hat 9.0's httpd-2.0.40-21

ENGAGENAUGHTY/apache-ssl-linux Apache2 mod-ssl RCE (2008), SSLv2

ENTERSEED Postfix RCE, for 2.0.8-2.1.5

ERRGENTLE/xp-exim-3-remote-linux Exim remote root, likely CVE-2001-0690, Exim 3.22-3.35

EXPOSITTRAG exploit pcnfsd version 2.x

extinctspinash: Chili!Soft ASP stuff RCE? and Cobalt RaQ too?

KWIKEMART (km binary) RCE for SSH1 padding crc32 thingy (https://packetstormsecurity.com/files/24347/ssh1.crc32.txt.html)

prout (ab)use of pcnfs RPC program (version 2 only) (1999)

slugger: various printers RCE, looks like CVE-1999-0078looks

statdx Redhat Linux 6.0/6.1/6.2 rpc.statd remote root exploit (IA32)

telex Telnetd RCE for RHEL ? CVE-1999-0192?

toffeehammer RCE for cgiecho part of cgimail, exploits fprintf

VS-VIOLET Solaris 2.6 - 2.9, something related to XDMCP

SKIMCOUNTRY Steal mobile phone log data

SLYHERETIC_CHECKS Check if a target is ready for SLYHERETIC (not included)

EMPTYBOWL RCE for MailCenter Gateway (mcgate) - an application that comes with Asia Info Message Center mailserver; buffer overflow allows a string passed to popen() call to be controlled by an attacker; arbitraty cmd execute known to work only for AIMC Version 2.9.5.1

Anti-forensic

toast: wtmps editor/manipulator/querier

pcleans: pacctl manipulator/cleaner

DIZZYTACHOMETER: Alters RPM database when system file is changed so that RPM (>4.1) verify doesn't complain

DUBMOAT Manipulate utmp

scrubhands post-op cleanup tool?

Auditcleaner cleans up audit.log

Control

Iting HP-UX, Linux, SunOS

FUNNELOUT: database-based web-backdoor for vbulletin

hi UNIX bind shell

jackpop bind shell for SPARC

NOPEN Backdoor? A RAT or post-exploitation shell consisting of a client and a server that encrypts data using RC6 source

ORLEANSTRIDE

SAMPLEMAN / ROUTER TOUCH Clearly hits Cisco via some sort of redirection via a tool on port 2323... (thanks to @cynicalsecurity)

SECONDDATE Implant for Linux/FreeBSD/Solaris/JunOS

SHENTYSDELIGHT Linux keylogger

SIDETRACK implant used for PITCHIMPAIR

SIFT Implant for Solaris/Linux/FreeBSD

SLYHERETIC SLYHERETIC is a light-weight implant for AIX 5.1-5.2 Uses Hide-in-Plain-Sight techniques to provide stealth.

STRIFEWORLD: Network-monitoring for UNIX, needs to be launched as root. Strifeworld is a program that captures data transmitted as part of TCP connections and stores the data in a memory for analysis. Strifeworld reconstructs the actual data streams and stores each session in a file for later analysis.

SUCTIONCHAR: 32 or 64 bit OS, solaris sparc 8,9, Kernel level implant - transparent, sustained, or realtime interception of processes input/output vnode traffic, able to intercept ssh, telnet, rlogin, rsh, password, login, csh, su, …

CnC

Seconddate_CnC: CnC for SECONDDATE

ELECTRICSIDE likely a big-fat-ass CnC

NOCLIENT Seems to be the CnC for NOPEN*

DEWDROP

Privesc

Linux

h: linux kernel privesc, old-day compiled hatorihanzo.c, do-brk() in 2.4.22

CVE-2003-0961

gsh: setreuid(0,0);execl("bash","/bin/bash")

PTRACE/FORKPTY/km3: linux kernel lpe, kmod+ptrace, CVE-2003-0127, (https://mjt.nysv.org/scratch/ptrace_exploit/km3.c)

EXACTCHANGE: NULL-deref based local-root, based on various sockets protocols, compiled in 2004, made public in 2005

ghost:statmon/tooltalk privesc?

elgingamble:

ESTOPFORBADE local root gds_inet_server for, Cobalt Linux release 6.0, to be used with complexpuzzle

ENVOYTOMATO LPE through bluetooth stack(?)

ESTOPMOONLIT Linux LPE

EPOXYRESIN Linux LPE

AIX

EXCEEDSALON-AIX privesc

Others

procsuid: setuid perl (yes, it's a real thing) privesc through unsanitized environnement variables. wtf dude

elatedmonkey: cpanel privesc (0day) using /usr/local/cpanel/3rdparty/mailman/. Creates mailman mailing list: mailman config_list

estesfox: logwatch privesc, old-day

evolvingstrategy: privesc, likely for Kaspersky Anti-virus (/sbin/keepup2date is kaspersky's stuff) (what is ey_vrupdate?)

eh OpenWebMail privesc

escrowupgrade cachefsd for solaris 2.6 2.7 sparc

ENGLANDBOGY local exploit against Xorg X11R7 1.0.1, X11R7 1.0, X11R6 6.9, Includes the following distributions: MandrakeSoft Linux 10.2, Ubuntu 5.0.4, SuSE Linux 10.0, RedHat Fedora Core5, MandrakeSoft Linux 2006.0. requires a setuid Xorg

endlessdonut: Apache fastcgi privesc

Interesting stuff

default passwords list (courtesy of x0rz)

gov.ru (stoicsurgeon_ctrl__v__1.5.13.5_x86-freebsd-5.3-sassyninja-mail.aprf.gov.ru) (wow

2013 Re-Release: Why Was This Ignored by the Russian Media?

Greenberg_Appelbaum_30c3.pdf
NSA_Catalog.zip
NSA_Quantum_Tasking.pdf
NSA_Quantum_Theory.pdf
2013 NSA_Catalog_Greenberg_Appelbaum_Burn.pdf

 

Articles6802Jar2

PRISM

http://www.jar2.com/Topics/PRISM.html

Mass Protests Planned Against NSA Mass Surveillence

10 February, 2014  15:04   

Worldwide protests against NSA led mass surveillance are planned for November 11, 2014 in a protest billed by organizers as “The Day We Fight Back”. Although the protest actions are largely US based and even the countdown clock is timed to US Pacific Time, the on-line activities and protests will affect internet users worldwide as many of the world’s top sites are joining in.

The planned activities on the cyber front are being led by the Internet Defense League, a group of which led the Internet blackout that effectively killed the US Stop Online Piracy Act (SOPA) and Protect IP Act, attempts by the US Government to bring the Internet under complete censorship and control. Those protests were successful in permanently shelving SOPA and PIPA and now the hope of the organizers is that tomorrow’s actions will reign in the NSA, and by default its spying network FVEY, and shelve a new bill sponsored by US Senator Dianne Feinstein called the FISA Improvements Act, as well as garner support for what is called the USA Freedom Act and finally enact protections for non-Americans.

In a statement released by the Internet Defense League website the organizers say the new protests are planned in memory of Mr. Aaron Swartz, the creator of RSS technology, one of the founders of Reddit and an Internet activist who was persecuted for sharing taxpayer funded research material from the Massachusetts Institute of Technology (MIT) JSTOR (Journal Storage) system.

Although the research material and academic journals downloaded by Mr. Swartz were not secret in nature and publically funded, over-zealous prosecutors sought to force Mr. Swartz to pay a $1 million fine and serve 35 years in prison. Mr. Swartz, his lawyers and supporters fought the US Government’s case to no avail and after his second plea bargain offer was denied by prosecutors who sought to make him pay the maximum penalty, Mr. Swartz was found dead in his New York apartment having been persecuted into apparently committing suicide.

Aaron Swartz was instrumental in organizing the anti-SOPA/PIPA protests, which many believe was the real reason the US Government persecuted him on the trumped up charges for downloading academic journals. The US was desperate to prosecute high-profile Hacktivists and in the end, as with many of their heavy handed persecutions, they turned him into a legend and a martyr for the cause of internet freedom and the right of the people to benefit from academic work that they in fact pay for but are not allowed to openly see or use.

The participants of the Day We Fight Back protests so far include such respected organizations as the Electronic Frontier Foundation, the ACLU, the Freedom of the Press Foundation, Reddit, Mozilla and Amnesty International but it is yet to be seen if giants like Google and Wikipedia will be taking part, as of publication it is still not clear.

Two years ago the internet blackout against SOPA/PIPA included the participation of Wikipedia and Google, whose support was instrumental in bringing an end to proposed SOPA/PIPA legislation. That protest, according to SOPA Strike dot com also included the blacking out of sites such as Reddit, Wordpress, Tumblr, Drudge Report, Wired and over 115,000 other sites. The unprecedented resistance to SOPA/PIPA also gathered 10 million signatures on a petition, over 8 million phone calls to legislators, more than 4 million e-mails sent and caused over 1 billion users to be blocked from websites.

The organizers of the February 11th protests say there will not be an internet blackout but that banners will be spread all over the internet and on prominent sites calling for people in the US to call or e-mail the US Congress in protest of the FISA Improvements Act and in support of the USA Freedom Act. Internationally the organizers are asking for supporters of internet freedom to urge their proper authorities to institute privacy protections for Internet users.

In the statement released on the day we fight back dot org, organizers say: “Together we will push back against powers that seek to observe, collect, and analyze our every digital action. Together, we will make it clear that such behavior is not compatible with democratic governance. Together, if we persist, we will win this fight.”

So far there are no calls for international targeting of NSA partners by the organizers and there is no mention of protesting the intelligence organizations which make up the FVEY signals intelligence alliance which are vital for the NSA’s global reach. Realistically for the world’s Internet users protests should also include NSA partners and the signals intelligence organizations of the NSA’s FVEY alliance as well. These include Australia’s Australian Signals Directorate (ASD), Canada’s Communications Security Establishment Canada (CSEC), New Zealand’s Government Communications Security Bureau (GCSB) and the United Kingdom’s Government Communications Headquarters (GCHQ).

On a global level protesting the NSA and instituting or opposing US legislation means little or nothing when the NSA’s foreign subordinates are pulling most of the weight for the NSA on the international arena. However this may also point to the NSA’s subordination of its FVEY partners. Tellingly such intrusive surveillance as is being carried by FVEY on its own citizens is not being protested in other countries such as Russia, where the internet remains largely as free as it was at the time of its inception.

NSA: no terrorists caught, yet entangled in everything - By John Robles

31 January , 2014 12:29

There is so much missing or purposefully obfuscated in the debate about NSA/Five Eyes spying, US Government illegality, CIA collusion with al-Qaeda, Guantanamo, 9/11, torture, drones, Afghanistan, Iraq and everything that millions of people have been outraged about for over a decade, but the most striking is that almost no one is proposing closing these organizations down and few are talking about prosecuting those responsible.

The glaring problem that everyone seems to be missing or purposefully avoiding, the elephant in the room if you will, is that everything that has been revealed by Edward Snowden and debated about endlessly is completely illegal and for a government and a "secret agency" indefensible, but due America's self promoted "exceptionalism" everyone finds it more comfortable to avoid such talk. In reality the NSA must be shut down but everyone in the West and in the western controlled corporate media do not dare to even debate this issue.

The NSA, as a secret organization whose initials stood for "No Such Agency" 20 years ago, has failed to maintain its secrecy and has gone from being the most secret agency of the US Government to a common household word. This is unacceptable in the world of espionage and the fact that a large quantity of its dirty laundry is available on-line and debated on a daily basis should be reason enough for the whole agency to be shut down. From a security standpoint in allowing leak after leak culminating in the mania that has become Edward Snowden the agency has proven that it is porous, prone to leakage and unable to maintain its secrets. These words are words that should be said by someone on the US Senate Intelligence Committee in serious hearings not by a Russian journalist but we have seen that US politicians, the US President and the US mass-media are completely impotent when it comes to oversight or dealing with real threats to security and even worse than impotent but complicit when it comes to illegality committed by any government body or their security structures.

NSA/CIA etc Illegality, Ineffectiveness

In an article for Global Research by James Corbett  dealing with the choreographed media operations that the NSA is engaged in continuing its illegality and escaping oversight. In the article Mr. Corbett writes that prior to 9-11 the NSA was already spying on all Americans, was tracking Bin Laden and Al-Qaeda (the CIA's Data-Base) and then withholding that information from the CIA's Bin Laden unit. In other words the NSA could have prevented 9-11 if it was in fact carried out by Al-Qaeda but did not and then used the event, according to Mr. Corbett to say it needed more powers and to justify its illegal surveillance of Americans.

This usage of 9-11 as a blanket reason to justify all form of US Government CIA/NSA etc. illegality has grown truly tired and unbelievable. From the crimes against humanity that were the invasions of Afghanistan and Iraq, to the illegal torture prison at Guantanamo, to the illegal extra-judicial execution by drone program and finally to the blanket surveillance of all Americans 9-11 has been the justification. 9-11: events which have not even been properly explained or investigated and will never be because they were the basis for all of the other illegality.

Recently ex MI5 officer David Shayler put it this way in a VoR interview: "… if we stop funding government, it stops funding this nonsense, it stops funding things like the NSA and MI5 and MI6. And it is not like we are going to be attacked if these organizations disappear, because as I say they are causing most of the conflict on the planet in the first place."

Mr. Shayler is not alone in having the bravery to say what has to be said and the public record bears his words out that these agencies are truly the root of all evil and are not engaged in defense or protection but rather in hiding illegality and assuring their own continued funding and illegal conduct and operations.

In an article for wired dot com David Kravets recently wrote  about how the NSA's spying was illegal, ineffective and should be stopped: "Based on information provided to the Board, we have not identified a single instance involving a threat to the United States in which the telephone records program made a concrete difference in the outcome of a counterterrorism investigation," the report found. "Moreover, we are aware of no instance in which the program directly contributed to the discovery of a previously unknown terrorist plot or the disruption of a terrorist attack."

Even though one judge did find it illegal, the NSA just found another judge who it owned to say it wasn't. As for not preventing a single terrorist attack, well let the record speak for itself. If the NSA with its billion dollar budget and the supposed ability to monitor, intercept and store everything anyone says or does through any sort of electronic communication and has been doing so since before 9-11 then why are they unable to show even 1 single terrorist attack that they have prevented? And why were they not able to prevent 9-11 itself, since they could have as the record shows. Could it be that 9-11 was really an inside job?

I dare say if any such organization existed in Russia heads would roll and the whole operation would be shut down. What are they really doing in the billion dollar Puzzle Palace? Playing video games?

They answer to that is undoubtedly no. They are spying on the world and every single citizen of this planet that they can collect data on to guarantee the continuity of the illegal security state, the profits of the paper bankers and the continued existence of the US military industrial complex. Oh and according to Mr. Corbett collecting data on foreign leaders with which to blackmail them with. That used to be the domain of the CIA and the FBI but that is the subject of another discussion.

Oversight

If you are reading this think about this for a minute: why is this appearing on Russian media being written about by a Russian journalist? Is it because Russia is somehow involved or cares about the NSA? No Russia has enough of its own headaches to deal with but last summer the entire illegal US security paradigm was unwontedly dumped in Russia's lap in the form of American Patriot Edward Snowden who was not a Russian agent, had no connection to Russia nor had even ever been on the territory of the Russian Federation. Even worse for Russia is that Snowden is an unapologetic and outspoken American patriot and an agent of both the CIA and the NSA. Not the normal type of person Russia should or does protect.

Think about this as well if the US mass media was performing its function and if the US president and the government he is supposed to be leading were doing their jobs and serving the interests of the American people by holding those committing illegality accountable, most of the illegality that has been debated in the world media about the US since 9-11 would not have even come to light and all of the matters that I have written about over the years would not have been necessary. But the US is not capable of conducting proper oversight nor of hiding its own illegality, it is out there for the world to see debate and apparently to accept.

That is the key problem in the US. There is no oversight and the last instance of oversight, the president himself, is also a party to the illegality. Terror Tuesdays and Guantanamo prove this. Although it is not entirely his fault, he is afraid of being assassinated no doubt if he does not follow the instructions of the military industrial complex as the Kennedy assassination proved. It is the CIA and the military industrial complex that has the real power in the US and the people are merely an abstraction for them that must serve the state and not the other way around.

Useless US Fourth Estate

As Mr. Corbett writes the mass media in the US is completely useless in performing the function of the Fourth Estate. This has been said hundreds of times before, he is not the only one saying this, and the case of Julian Assange and WikiLeaks bears this out. The US corporate mass media is bought and paid for and is merely a propaganda tool for the US military industrial complex, bankers and the US Government which they now own.

Medea Benjamin recently put it this way in a VoR interview: "… there is not a lot of information through the mainstream channels that can educate the American people and just to circle back to the issue of Guantanamo I would think that if there would be a poll done that most Americans wouldn't even know that we still have people in Guantanamo. They probably think everybody there was let go, it has been shut down or if they thought that anybody was left it is because they have been tried and convicted and happened to be the worst of the worst which is not true at all. So, unfortunately I think that a lot of the reasons that the Administration can get away with policies like this is because the US mainstream media has not been doing its job."

Ex NSA analyst Wayne Madsen recently told me that even Ted Turner, the founder of CNN admitted that the entire mass media is "messed up" in the US. Mr. Madsen stated: "Ted Turner told me himself, at the United Nations a few years ago that if it had to do it all over again, he wouldn't have gotten into that deal with Time Warner and AOL, that destroyed the network but it is too late. So, CNN can attack me all day long. Its founder told me that 'they are screwed up', so I will take his word over Wolf Blitzer or any of those clowns at CNN, I will take Ted Turner's word over anything they have to say."This was predicted by John F Kennedy in one of his most famous speeches to the US media. The military industrial complex has taken over.

Recently Jessica Raddack, none other than a legal advisor for Edward Snowden, recently told me in an interview that Snowden did not take 1.7 million files as the world media are reporting, yet not one single media outlet picked up on that fact because it runs counter to the official US Government lie. Nor has any media taken issue with the fact that all of the Snowden revelations are approved by the US Government first. Ms. Raddack, perhaps unintentionally also let it be known that all of the journalists who are publishing Snowden's "revelations" are running them by the US Government first: "Well, in terms of 1.7 million number, I've seen that a couple of times and it is coming from the government. And as far as I know Mr. Snowden, according to the journalists who received the documents, the number is really 55,000. I'm not sure if that refers to 55,000 pages or files, but the number is far less than 1.7 million. And this is a first time I have heard that 1.7 million pertain to military documents, ongoing military operations, JSOC (Joint Special Operations Command) and things of that nature. I am not aware of the content of the remaining files and I'm not worried about any damage resulting because the documents were all given to respectable journalists here in the US who have been carefully writing these articles and running them by the government for approval before they are released."

So there you go. Even the NSA leaks are controlled.

Whistleblowers

The NSA and the US Government, rather than protecting their public from terrorists and upholding the law and the rights of its citizens (I won't even mention abiding by international law) are instead engaged in, as I have already mentioned, operations to hide and obfuscate their own illegality. This is something no doubt the American taxpayer would not agree to. This is why they have waged a war on journalists and whistleblowers.

Regardless of Mr. Snowden's real "mission" as he keeps saying he has "accomplished his mission" yet nothing much has changed, other than the entire world now thinking the NSA is capable of spying on everyone and has complete control of the internet (perhaps that was his mission?) he is seen as a whistleblower and is apparently hunted by the US Government, just the latest in a long list of enemies of the US. There has to be a point when the world and the US public wake up and say enough is enough, and that is what the NSA and FEMA and the rest of the US apparatus are truly afraid about.

How many years is poor Mr. Julian Assange going to live in an embassy room? How many years is Edward Snowden not going to be allowed to return to his beloved America? How many years is the illegal detention of the human beings at Guantanamo going to continue? How long are they going to continue to hold Bradley Manning, Jeremy Hammond and the rest? How long is the world going to have to ignore the illegal Guantanamo torture prison and the illegal wars and crimes against humanity? Forever? Unfortunately that is what they want and once the complete control of the world media is obtained (including an end to this journalist who has struggled to give a platform to whistleblowers and truth seekers) and the entire planet is within range of NATO nuclear warheads, that is what they will have. Complete impunity until the end of time and a populace plugged into their devices ogling Britney Spears and Lady Gaga.

Damage Control

The media is completely complicit and there is almost no way to fight them then they control everything

Media operations Raddack

Note from the author:

As this article deals with the NSA and the US Government and the US corporate controlled mass media with reference to globalists and big banking and monied interests it is very unlikely that it will go viral or even obtain a normal place in Google so I kindly ask: Dear reader if you are reading this you probably look for alternative sources of information because you know everything the mass media feeds you is tainted and much of it is untrue, please share with anyone you think needs to hear the truth, no matter how ugly it might be.

Thanks,

John

Free net means no NSA, HRW finally speaks out

January 21 2014

While Obama has pretended to address the issue of mass surveillance, in a recent speech which some had expected would be filled with promises to reign in the massive US spying apparatus, Obama said absolutely nothing tangible and was blasted by privacy advocates, whistleblowers and a plethora of interested parties, experts and pundits.

Now in a yearly 667 page report for 2013 released in Berlin, Human Rights Watch (HRW) is warning that the revelations of massive spying by the US will cause countries to install controls to keep their users’ data within their own countries and that this will lead to internet censorship in countries with poor human rights records (no mention of US).

In the report HRW says that NSA spying revelations may cause countries such as China or the Gulf States to:"… force user data to stay within their own borders, setting up the potential for increased internet censorship".

Of course I would say this is a no brainer, such revelations should be forcing all governments to protect their citizens’ data from intrusive NSA spying but in doing so they will be getting in the way of and interfering with the US, the NSA and their FVEY partners’ efforts to mine the data of the entire planet.

Protecting the data of their citizens is every country’s responsibility and must be done, therefore such an argument seems disingenuous and it is also interesting to note that Human Rights Watch has been all but silent to the plight of information activists and free internet proponents until now.

To date HRW has had very little to say regarding internet privacy and censorship inside the United States and has also been all but silent as to the cases of Julian Assange, Bradley Manning and Jeremy Hammond, but all of a sudden is concerned with data being unavailable or “censored” and with internet freedom and free speech.

To their credit HRW did chide the US Government for their callousness to privacy rights: "The Snowden revelations have made clear that there has been an intrusion on our right to privacy of unprecedented scope, yet the government is dismissing any complaints about our right to privacy as irrelevant."

The director of Human Rights Watch Kenneth Roth (a former prosecutor) told the Guardian that: “… one of the biggest missteps the US administration had committed was to insist that there was a difference between the content of private communication and "metadata" – information about where, when and between whom the communication takes place.”

Mr. Roth put things into perspective quite well stating: "Imagine the government putting a video camera in your bedroom and saying 'don't worry, the feed will only go into a government computer, which we won't look at unless we have reason to believe that wrongdoing is taking place.”

Finally regarding national data protection from a technical standpoint it would be possible to block NSA to a large extent and protect the user data of citizens and this has nothing to do with censorship. Arguing that firewalling a country’s internet from NSA would lead to censorship is completely absurd.

Monitoring takes place by governments regardless of what the NSA is accessing and data protection and censorship are two different animals, of course for the US and its partners in internet tyranny, spying and control, anything countries do to keep them out will have to be demonized.

NSA/GCHQ/FVEY Spying on Everything: White Sheds on Embassies are SIGINT Posts

Old building of US embassy in Moscow. You can spot 'spy box' on its roof.

US embassy in Moscow.With 'spy box' on its roof.

By John Robles, 12 November,2013  12:55   http://www.jar2.com/Topics/FVEY.html

While much of the world’s attention has been focused on NSA and US spying through the internet and electronic devices, one area that has been overlooked are advances in/and activities surrounding signals intelligence through the radio spectrum. An area which has also made huge advancements over the last 20 years.

One of the key points for collecting foreign intelligence for almost any country are the embassies and diplomatic missions of the word’s states abroad and with the revelations by Edward Snowden of NSA servers based in US Embassies worldwide, this has once again placed a focus on the sovereign territories of countries as embodied by their diplomatic missions.

If one drives by the US Embassy in Moscow and looks up one might notice a white shed-sized "box" situated prominently almost directly in the middle of the embassy’s roof. But what is it? Well the answer is most likely a camouflaged spy post.

I contacted a source with expertise in Signals Intelligence (SIGINT) about the "boxes", which appear on US and UKUSA member embassies worldwide and he/she said the white "sheds" are actually called "Secure Compartmented Intelligence Facilities" (SCIF).

The source said that there are two types of installation, some are temporary and portable and some are permanent. The temporary or portable structures are covered with a white material which is apparently a "modified Kevlar made material that allows RF through with minimal attenuation."

The permanent locations such as on the US Embassy in Moscow and the US Embassy in Berlin have "dielectric windows (a dielectric window is not made of glass but it is transparent to radio waves ) which hide the specialist antennae and amplifiers, codenamed EINSTEIN and CASTANET respectively".

The source said that the specific frequency capability is dictated by the target frequencies and the structures allow for multiple intercepts including: data, voice, and whatever else they can receive.

The innocent looking "boxes" are not only based all over the world on the roof tops of embassies worldwide but they are all part of a global spy network with the codename "STATEROOM". It is part of a "Special Collection Service" or (SCS) apparently placed with the knowledge and participation of the FiveEyes (FVEY) (UKUSA) participants or USUKCANAUSNZ.

As I have written before UKUSA is a SIGINT alliance of the same "Five Eyes" countries, United States, United Kingdom, Canada, Australia and New Zealand.

The source says that there is no evidence of such SCIFs being mounted in FVEY countries and that he/she suspects that this is due to hard connections available to the four others who then share their take with the hosting nation; meaning that no nation spies on its own, hence you have the UK’s GCHQ passing information on UK citizens to the NSA, and Australia’s DSD, Canada’s CSEC and New Zealand’s CSO doing the same, with the NSA apparently providing the other four with the same level of data on their own citizens. The relationships allow for the FVEY countries to spy on their own citizens by having a "foreign" partner do it for them, thus skirting all of their own national laws and constitutions.

The source was asked about a cylindrical shaped structure on top of the UK Embassy in Berlin and stated that he/she thought it was not part of STATEROOM .

The source speculated that it could possibly be a probe into the beamwidth of a telephone microwave link.

Although the obvious targets of such surveillance are Chancellor Merkel and her Government Offices (German High Command) the source says, the dielectric window on the UK Embassy in Berlin is 90 degrees and one pane is pointing over the top of the British Embassy towards the Russian Embassy on the Brandenburg Gate a minutes’ walk away.

On the 11th September a man by the name of Ali Mansouri, an alleged member of the Iranian Quds Force, was arrested for espionage operations in Israel.

In his possession were photographs of various sites including the US Embassy in Tel Aviv which actually showed the SCIF atop the building. The media release on his arrest was not until the 29th of September so possibly, according to the source: "… intelligence agencies such as the German BND were taking a look atop the US Embassy in the Pariser Platz."

So that takes care of the white "boxes" and other structures and designs on the roofs of FVEY Embassies, now what about the NSA servers in the basements? Kind of hard to photograph those I guess.

NSA: Users lose in Skype/PRISM spying

By John Robles, 15 October, 22:10

Free net means no NSA, HRW finally speaks out интернет общение скайп наушники компьютер девушка связь

Microsoft and its instant messaging and voice over IP provider Skype are under investigation by the Luxembourg's data protection commissioner for providing access to user data and communications to the United States National Intelligence Agency (NSA).

Although Skype, a company that has had its share of legal actions in the past, has been bought out by Microsoft Corporation, based in Redmond Washington in the USA, it is being investigated for passing information to the NSA by the European country because it has its headquarters in Luxembourg.

It is not clear exactly when Skype began passing information and allowing access to their data by US signals intelligence and spy agencies, and if it was after or before the Microsoft takeover, but it is clearly a disturbing development that a European based company has allowed itself to be used as a spy tool on European and in fact on users around the word.

A report by the UK’s Guardian points to pre Microsoft takeover spying by Skype, with a report saying that after the $8.5 billion acquisition by the computer and IT behemoth, data flow to the NSA increased by 300%. The Guardian also underlines the fact that Microsoft, one of the world’s richest corporations, which in fact produces almost nothing tangible, was the first to sign on to PRISM, a fact from which an number of conclusions can be reached.

Not only is this an incursion into the privacy of all users affected, but it is another serious incursion onto the sovereignty of yet another nation. This is not something that should be allowed to be hushed up ignored and allowed to be accepted as though it were something normal. It may seem like a minor manner due to the sheer magnitude of the NSA and CIA spying “apparati” and this is disturbing.

It is also disturbing that it appears that the fact that Skype is being investigated for allowing itself to become part of the infamous massive PRISM program is getting more attention from people around the world and the media than the revelations by Edward Snowden that they were in fact spying in the first place.

The world has grown so accustomed it would appear, to US infringement on their rights, privacy and territory that it is bigger news when someone challenges them or their proxies in any way, shape or form.

Skype (Microsoft) is facing fines, criminal and administrative sanctions and even “a temporary ban on sharing users data with US state agencies”, according to Softpedia.com, who also said that Luxembourg has vowed to protect users’ privacy unless state agencies fill in legal requests for a specific account. Softpedia cites Luxembourg’s data-protection chief, Gerard Lommel, as having confirmed an investigation is under way.

Skype, founded in 2003, was a success with users who were interested in privacy because of the encrypted peer-to-peer technology that allowed users to connect directly over the web rather than through some central server. It was so trusted that major corporations, banks and other large business players have employed it as a standard tool for holding video and audio conferencing with worldwide partners. Meeting where corporations and companies often discuss sensitive operational proprietary information that would be of interest to their competitors and of course the US if engaged in economic manipulation.

Skype cannot be trusted now, no matter how many times Microsoft says it is committed to protecting users’ privacy and the real losers of the free service are now the users.

Personally it is a real shame because I used to use Skype to talk to all sorts of people and it is a wonderful tool. I even use it to stay in touch with one of my best friends in the UK. We suspected all along that all of our communications were being monitored but thanks to Edward Snowden, we now know this to be true. We now begin every conversation with “Hello NSA analyst”, and are sympathetic that some poor guy has to listen to our conversations and can not join in even though we invite them to speak up. Even NSA analysts should have a voice.

 

 

Last Update: 09/27/2019 13:42 +0300

 

LEAKS55A

INtell ButtonJAR2 Blog ButtonARTICLES55BOOKS55A

Interview ButtonIMAGES55CRobles6802

VIDEO55A

   

 

 Please help keep us going and make a donation Thanks to all supporters!

PayPal, Yandex, Qiwi, Сбербанк Sberbank Visa 4276 3800 4543 8756

Copyright JAR2 2003-2017 All Rights Reserved

Publishing Banned Truth Since June 06, 2003