Jump to content
Guests can now reply in ALL forum topics (No registration required!) ×
Guests can now reply in ALL forum topics (No registration required!)
In the Name of God بسم الله

The Snowden Revelations

Rate this topic


Recommended Posts

  • Veteran Member

(salam)  

 

A "Good Read" for a Good Laugh

 

KARMA POLICE  -LoL  :lol:

 

http://theintercept.com/2015/09/25/gchq-radio-porn-spies-track-web-users-online-identities/

 

When you look at the charts, and remember this is only one little program, raises the question: "How can anyone conceptualize this, much less understand it?"

 

-- Are you listening to some hysteric's "politically incorrect radio station" online?

 

-- "cookie collection" of other sources of cookies and then inserting more of GCHQ own cookies

 

It is a Mad House inside these "Puzzle Palaces"

 

So, How do we push these hysterical profiteers 'over the edge'?

 

Premise: as Muslims, we are already PCT (politically convenient targets)

Action Points:

Make nsa.gov your "homepage" and then click-on from there. I did and my computer started running better.

Maybe Change your Avatars to something provocative: like,Nasrullah, Khomeni, Sam Melville, Marx, Hugo Chavez ...

Tune-in to Iraqi or Iranian online radio a few minutes every day at the same time.

Visit Google Maps and view provocative sites, such as Langley, Pentagon, Wall Street, Downing Street,

Go to recipe sites.

Wear subtle facial-recognition-defeating paraphernalia.

Read the headlines at RT.com

 

And keep your critical communication links open. Passing Notes -like we did in school- is not an "online observable".

 

:wacko:  :wacko:  :wacko:

Link to post
Share on other sites
  • Replies 212
  • Created
  • Last Reply

Top Posters In This Topic

Top Posters In This Topic

Popular Posts

This was already known, though I suppose having it confirmed is something. 

POST 1   (salam)   I has been about a year since Ed Snowden's Documents -allegedly 1.7 million of them- has been moving into the public domain.   What portion so far has had the most significant ?  

Salam. I read the WashingtonPost article on that. Your other links were entertaining, too.

  • Veteran Member

2nd post for 27Sept15:

 

For a creepy read, like how WebMD collects your searches ...

 

http://www.goodreads.com/book/show/22253747-data-and-goliath

 

Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World, by Bruce Schnieder

 

You can read the Preview

 

Example, verint.com sells "security" software, such as to target individuals or groups, and is a subsidiary of Comverse Technology an Israeli Corporation.

Link to post
Share on other sites
  • Veteran Member

2nd post for 27Sept15:

 

For a creepy read, like how WebMD collects your searches ...

 

http://www.goodreads.com/book/show/22253747-data-and-goliath

 

Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World, by Bruce Schnieder

 

You can read the Preview

 

Example, verint.com sells "security" software, such as to target individuals or groups, and is a subsidiary of Comverse Technology an Israeli Corporation.

it is very evident.

I dont log into my instgram but in the few weeks now that I'm active on FB and browsing twitter, i've received emails from instigram, google plus and maybe other sites giving me suggestions of following my FB contacts and similar pages like my FB liked pages.

They are nuts! and bad sellers at that.

Why would i use multiple platforms to read the same silly stuff?

Link to post
Share on other sites
  • 3 weeks later...
  • Veteran Member

(salam)

 

An article to warm your heart:  "VMware CEO credits Edward Snowden with transforming enterprise cloud attitudes"

 

http://www.computerweekly.com/news/4500255407/VMware-CEO-credits-Edward-Snowden-with-transforming-enterprise-cloud-attitudes

 

"the 'professional era' of cloud has been shaped by Edward Snowden's NSA revelations"

 

Snowden "... changed the face of IT on a global basis"

 

Snowden is the most important IT development of the decade

 

business people are "demanding" "...locally grown and governed environments" and no "single cloud environment"

 

.

Relatedly, there is an online film, Zero Days, available at Technology Watch Free of this year (although most of the filming was in 2014).

49 minutes and 'slow' at a couple of points, it does have info about what people are trying to do about the digital vulnerabilities threatening society's "life lines".

One example of how we, as consumers and citizens, are played for as 'suckers', there are programs that detect and auto-plug zero-day holes in software which are for gov't use (only) while the rest of US pay for anti-viral services. So the holes --as I have mentioned in my icon, sic 'Backdoors'-- remain for gov't peeping-Tom use while companies, other gov't agencies, and individuals are repeatedly hacked by criminals (like in the OPM super-fiasco, nearly fatally damaging the FBI, DEA, etc) all so some security-paranoid-nutcase can "monitor" what goes on (like girls and boys in their bedrooms unaware their Skype is watching them). Opine: there is a hole-in-the-national-security-head!   For a description of such programs, see TotalADS' site.

Depending on how much we know, this film will vary for you in new information.

Edited by hasanhh
Link to post
Share on other sites
  • 2 weeks later...
  • Veteran Member

(salam)

 

Chancellor Merkel's office had "stealthy" spyware.

 

http://www.telegraph.co.uk/news/worldnews/europe/germany/11956338/Germany-investigates-alleged-GCHQ-spying-in-Angela-Merkels-office.html

 

-by Jason Huggler in Berlin, 26Oct15  1951 GMT

 

--this was found inside Merkel's office on an aide's laptop

 

-called Regin malware which was identified by Symantec and Kapersky last year and announced in Nov2014. A search for Regin will bring up several descriptions of this malware.

 

-Regin is also described as "stealthy" as its design allows it to be scanned and missed by many anti-viral algorithms.

 

-This latest in a series of espionage discoveries follows a recent (last week) disclosure that the US was paying for information bought from German intell employees. (Not just the BND)

 

Opine w/factoid: Because Germany, among other responses, is limiting some "cooperation" with the US and UK over this and previous intrusions --some approaching the proctological level-- domestic political pressure is being mounted against Merkel, et alia, with "encouragement" of the recent and continuing anti-refugee rallies. A standard tactic used by the US as also seen by the use of union riots in Australia and some-of-the-same people brought into Maidan Square, Kiev in the current "rallies". All paid for.

Germany is a key ally and a major economic influence, plus has good relations with Russia and China.

What are US control-freak stew-pee-does imagine they're accomplishing?

Link to post
Share on other sites
  • 2 weeks later...
  • Veteran Member

(salam)

 

Spying on Americans

 

Under the individual national laws on surveillance prohibiting "spying" on their own citizens, the 5 peeping-Tom eyes with 5 eavesdropping Ears have arrangements whereby they spy and invade other country's citizens.

 

So, in pursuing invasive activities, one country peeps into another country's lives of their subjects and then reports to the host 'target' country.

 

to wit:  "Internet firms to be banned from offering unbreakable encryption under new laws", by Tom Whitehead, 02Nov15, 1516GMT

 

http://www.telegraph.co.uk/news/uknews/terrorism-in-the-uk/11970391/Internet-firms-to-be-banned-from-offering-out-of-reach-communications-under-new-laws.html

 

As the article mentions, American companies like Apple and Google are singled out for compliance. HHmmmmmmm

 

And as usual, terrorists, pedophiles and criminals are the excuse. Of course, if you are a 'drug lord', your are using multi-layered encryption and code words to begin with.

 

For further reading on this new UK law,  the link above, and search   .  "Investigatory Powers Bill"

Edited by hasanhh
Link to post
Share on other sites
  • 2 weeks later...
  • Veteran Member

(salam)

 

1] Wired, "Yes, The NSA Worried About Whether Spying Would Backfire", 13Nov15

 

Note: the time of the article is 1446 hrs which is 1946GMT

-the time of the Paris Attacks is 2120GMT at Gate D, Stade de France where the massacres began with this first attack.

 

 

http://wired.com/2015/11/yes-the-nsa-worried-about-whether-spying-would-backfire/

 

Saying that the Snowden Revelations are the cause, the forum said, "We saw people ... stop using communication ... and go to different service providers."

 

 

 

2] International Business Times, "Paris ISlS attacks spur calls to renew NSA spy program as Americans again weigh Privacy vs Security", by Paul McDougall, 16Nov15, 1540EST

http://www.ibtimes.com/paris-isis-attacks-spur-calls-renew-nsa-spy-program-americans-again-weigh-privacy-vs-2186861

 

--Section 215 -after an extension- is set to expire 30Nov15. These functions/programs are continued by the NSA's interpretation of Section 702 of FISA

 

--Despite post Charlie Hebdo "black box" storage, the French "fail to detect" anything. See PBS below.

 

--the NSA stores 5+ Billion calls per day, which "makes it more difficult" to find anything.

 

Opine: Why "renew" a program that obviously had no effect on detection. Before 9-11, the NSA budget was $60Billion every year. Post 9-11, NSA budget ranged from $80Billion to $120+Billion. Times ( x ) 14 years is well in excess of $1 Trillion and has about nothing to show for it. Every time something happened the NSA found it ex post facto, even on domestic incidents.

 

3A]  PBS News Hour, Mon16Nov15, Judy Woodruff reporting. Even Friday morning, the day of the attack, the US warned France that "chatter" was saying there was an impending attack "in Europe" but no "specificity" to say where. France was aware of activities in Belgium.

And: gov't activities and procedures and are ineffective; that suspects are using different means of communication that are "undetectable".

Opine: But gov't wants more of the same. :wacko:

To Wit:

3B] PBS Nightly Business Report, Mon16Nov15, reported on the Paris Attacks also, saying that the French were "completely off-guard".

---showed a good example of how criminals and terrorists are bypassing surveillance: texting on encrypted, invitation-only  Play Station .

 

Opine: Which is a simple example of how Big Mother Gov't peeping-Tom garbage is a totalitarian waste of money and debt.

 

 

NOW for some GOOD NEWS:

 

4] TVNZ et alia,

http://www.tvnz.co.nz/one-news/world/hacktivist-group-anonymous-vows-retribution-against-isis

Link to post
Share on other sites
  • Veteran Member

Assalamallikum,

 

Curious about how internet games could be used for terrorist communications, I found this:

 

http://www.networkworld.com/article/3005364/security/how-isis-uses-video-games-playstation-4-messaging-apps-to-evade-surveillance.html

 

Note paragraph 2 and the quote following para3.

 

The article has a link to the Buzzfeed article.

 

This 2nd article has an interesting subtitle:

 

 --    "But the larger problem, according to intelligence officials, is  what happens when ISlS stops using technology at all".

 

What happens is: back to the pre-tech era. Duh.

 

So be careful when you pass notes like we did in school.

Link to post
Share on other sites
  • 2 months later...
  • Veteran Member

OPINE: When you know that hacking has become a "mature industry"; id est It's "down hill" from now on.

 

Tech Times: "NSA Hacker-jinn-Chief: No Need for Zero Days to Hack You, Just Persistence & Focus"

by Anu Passary, 30Jan16 11:21 PM

--Rob Joyce, NSA's Chief of Tailored Access Operations ( TAO )

--speaking at USENIX Enigma security conference on Wed, 27Jan16

--gov't hackers do not need "security lapses"  (the classic case: the German radioman who opened every morning with the same message using a 5 rotor Enigma machine). The Reason:

APT: Advanced Persistent Threats- the automation that keeps trying to login/goin into a network and at the same time keeps waiting for that "free ride" into a network -like on a data or software update.

http://www.techtimes.com/articles/129262/20160130/nsa-hacker-in-chief-no-need-for-zero-days-to-hack-you-just-persistence-and-focus.htm 

 

OPINE Question: OK TAO, you have divine capabilities,:einstein:,  ... but can you read Rukn ?  :hahaha:

Edited by hasanhh
the link
Link to post
Share on other sites
  • 3 weeks later...
  • Veteran Member

16Feb16

"Judge: Apple Must Help US Hack San Bernardino Killer's Phone" -AP, 16Feb16 2227EST by Tami Abdulllah and Eric Tucker

http://abcnews.go.com/Technology/wireStory/judge-apple-us-hack-san-bernardino-killers-phone-36990684 

The Judge, a former prosecutor, has ordered Apple to provide bypass capability to the FBI for the iPhone of Syed Farook.

Farook's iPhone was discovered in a search and has self-destruct capability if an improper/incorrect password is used too many times. Why this info is not available from Google, Facebook or from the local server is not explained by Big Mother gov't.

The Obama administration has policies in place to encourage strong encryption in order to promote Internet and personal security.

Farook had left his iPhone behind -whether deliberately or not- and was later discovered in a search. The harddrive of the other shooters' has still not been discovered and they had smashed their phones beyond recoverable information.

Apple has yet to respond and has 5 days to do so.

Link to post
Share on other sites
  • 2 weeks later...
  • Veteran Member

Update: IRS hacked (ref May 2015)

http://www.theatlantic.com/technology/archive/2016/02/the-irs-hack-was-twice-as-bad-as-we-thought/471255/ 

Individual tax records were stolen at a level previously not known. Reason: the IRS didn't cover a long enough period of time, but the IRS Inspector General did.

First reported that 114,000 individuals had their personal info stolen plus 111,000 "failed attempts".

In a search back to January 2014 the IG found 724,000 stolen and 570,000 attempts.

The hackers used the "Get Transcript" feature and impersonated people with identity theft material.

Opine: Isn't the "Internet of Things" 'wonderful' ?

Link to post
Share on other sites
  • 2 weeks later...
  • Veteran Member

FBI "Lies"  :

11March2016: from a few court documents in the Apple vs. FBI/DoJ

http://www.wired.com/2016/03/new-documents-solve-mysteries-apple-fbi-saga/ 

--Farook's county-owned phone was retrieved from a Lexus with a Search Warrant.

--the last iCloud back-up was 19Oct, the shooting/murders were 22Oct; less than 3 days/72hours

--the iForgot feature was activated (see below)

--the County owns the phone and the password was changed because the FBI asked the County to do so.

--a test by Wired magazine's "Gadget Lab" conducted a test and can open a phone:clap:

:hahaha:  for more laughs, read the article. You younger folks will understand it better than l.

 Opine:  Maybe Wired should bid on a consulting contract to the FBI and DoJ :einstein:

 

Link to post
Share on other sites
  • 2 weeks later...
  • Veteran Member

On Sunday the 20th, the FBI announced a 3rd party had demonstrated a technique to open Farook's phone.

An NPR interview, 22 March 2016, a write for Slate magazine said the NSA released its findings on Farook's metadata and said there are no foreign phone calls or connections.

The court order requiring Apple to develop software as per the Writs Act has been stayed for now.

For some techniques for cracking an iPhone:

http://gizmodo.com/4-theories-about-how-the-fbi-is-cracking-the-san-bernad-1766346763 

Edited by hasanhh
Link to post
Share on other sites
  • Veteran Member

Mon28March2016  Apple, Inc. vs. FBI & DoJ

lt is "...unclear who helped the FBI access the phone and what was stored on the device. But some news reports have said the FBI may have sought assistance from an Israeli forensics company."

Opine: Which means that one Apple defense --the demands from foreign countries-- is no longer applicable. (no pun intended) Countries, some anyway, can already do it. But not the US and its $1+Trillion spent on electronic surveillance.:party:

http://www.business-standard.com/article/pti-stories/fbi-hacks-attacker-s-iphone-drops-apple-suit-116032900103_1.html 

Link to post
Share on other sites
  • Veteran Member

29March16

PBS News Hour guest said that retirees from Israeli MI Unit 822 did the hacking.

It was also said that the FBI "had to drop" its suit against Apple because Apple's assistance was no longer needed.

As to the above "iphone cracking ...challenge", a guest said 'probably a hundred thousand' hackers thought they'd take a look at doing this.

For a partial description of how this hack-in was done:

http://google.com/patents/US20130067056 

which involves "mixed communication" devices and "different access technologies"

Edited by hasanhh
Link to post
Share on other sites
  • Veteran Member

 The Apple iPhone Hack

Who did the hack,   who owns who,    and the Feds already used them:

http://www.independent.ie/business/irish/firm-that-hacked-isis-phone-for-fbi-was-used-by-gardai-in-graham-dwyer-case-34593190.html 

gardai = Garda Siochana, the Irish Nat'l Police Service

Note: headline perpetuates the myth  that the San Bernardino murderers were members of lSlL. (As if l pledge allegiance to NASA that makes me a spaceman.)

Link to post
Share on other sites
  • 2 weeks later...
  • 2 weeks later...
  • Veteran Member

Computer Security:

Alert:  Apple Quicktime is no longer sending updates, delete this. Source: DHS US-CERT program and Microsoft

Good News:  Prison Time

2 people are "going in" for writing malware http://krebsonsecurity.com/2016/04/spyeye-makers-get-24-years-in-prison/

Link to post
Share on other sites
  • Veteran Member

Our Money --safe?

http://nbr.com/2016/04/28/how-80b-moving-through-ny-fed-daily-could-be-vulnerable-to-hackers/ 

-there is no reporting requirement if money is stolen

-malware maybe in the SWIFT

-$81B got out in an $240B attempt

OPINE: "Car NSA Where Are You?" (Parody of "Car 54, Where Are You? --1950s police comedy, q.v.)

hmmmm, maybe "NSA Where Are You?" sounds better.

Link to post
Share on other sites
  • Veteran Member

http://blogs.voanews.com/techtronics/2016/04/28/cisco-12-million-pcs-have-backdoors-iots-privacy-dilemma/  <<<----taken down see below

A result of NSA mandated "backdoors" into systems.

Added:

http://www.securityweek.com/cisco-finds-backdoor-installed-12-million-pcs

Edited by hasanhh
Link to post
Share on other sites
  • 3 weeks later...
  • Veteran Member
On ‎4‎/‎29‎/‎2016 at 7:19 AM, hasanhh said:

Our Money --safe?

http://nbr.com/2016/04/28/how-80b-moving-through-ny-fed-daily-could-be-vulnerable-to-hackers/ 

-there is no reporting requirement if money is stolen

-malware maybe in the SWIFT

-$81B got out in an $240B attempt

OPINE: "Car NSA Where Are You?" (Parody of "Car 54, Where Are You? --1950s police comedy, q.v.)

hmmmm, maybe "NSA Where Are You?" sounds better.

GozNym is attacking the SWIFT system and your PC

This is a good introductory piece:

http://securityintelligence.com/time-is-money-goznym-launches-redirection-attacks-in-poland/ 

Here is more:

Victims are "redirected" to Look-Alike sites. If you check you bank account then everything -including the balance- looks fine, but your account has been cleaned out.

Other info at FS-ISAC & grahamcluley.com

This is a Tian Virus integrated into sorena mapping function with andft. This combination has multi-level morphing capability.

@Darth Vader --can you add more or comment?

Link to post
Share on other sites
  • Forum Administrators
1 hour ago, hasanhh said:

Victims are "redirected" to Look-Alike sites. If you check you bank account then everything -including the balance- looks fine, but your account has been cleaned out.

When I registered with my bank for an online account, I was given a group of images to choose from and I picked one and created a clue word that displays under the image. So when I log on, after I type in my username, my bank shows me my special image and the clue word that I created. If the image or text is not correct or if I don't see my image, I should NOT type in my password. Don't all banks have extra security beyond username and password? 
 

Link to post
Share on other sites
  • Veteran Member

^^^^^ @hameedeh  l was always leery of doing anything online. A hold-over from the party-line telephone system. So l have never banked online.

Like the old telephone system, unless you don't care the whole world knows it, never say it on the phone -or online

Link to post
Share on other sites
  • Veteran Member

29April to this date 28May16

Update: Nightly Business Report does not keep some of its broadcasts' transcripts in the correct or 'current' date.

For the Malware noted above: http://nbr.com/2016/05/27/serpent-like-malware-targets-your-bank-account/ 

For the next report from NBR, on 27May reported by E.Javers that North Korea had in his report that "several different entities inside the Bangladesh's server". http://archive.org/details/KQED_20160528_020000_Nightly_Business_Report  which are sitting there like observers watching. This element from Javers is in addition to:

http://www.voanews.com/content/north-korea-bank-cyberattacks/3350209.html

http://www.npr.org/2016/05/27/479764874/north-korea-linked-to-cyber-attacks-on-asian-banks 

which explain North Korea as a suspect and probable "link".

Link to post
Share on other sites
  • Veteran Member

1Memorial Day - Remembering Edward Snowden: The Political Climate is Changing.

Former Attorney General of the United States,Eric Holder, says Snowden did a public service;

http://www.forbes.com/sites/johnmcquaid/2016/05/30/eric-holder-makes-a-small-crack-in-the-wall-of-official-hostility-towards-edward-snowden/ 

Snowden is cautious;

http://www.ibtimes.com/edward-snowden-responds-eric-holders-public-service-comment-about-leaking-nsa-secrets-2375903 

And Snowden makes an app warning because Google disables "end-to-end encryption by default in its new All Chat app is dangerous."

http://www.dnaindia.com/scitech/report-google-s-upcoming-allo-messaging-app-is-dangerous-claims-edward-snowden-2218000 

From this past week, a new whistleblower scandal, 23May16

http://theintercept.com/2016/05/23/vindication-for-edward-snowden-from-a-new-player-in-nsa-whistleblowing-saga/ 

Edited by hasanhh
This is the 101st post
Link to post
Share on other sites
  • 2 weeks later...
  • Veteran Member

This post could also be under "Clinton Campaign Corruption", but it also has to do with all our security.

http://nbr.com/2016/06/13/smartphone-hacking  Running time: 3:18

At ~ 2:00 minutes, it is said that phones are "very difficult to secure".

 

As to Hillar: http://www.cnbc.com/2016/06/10/   Use title: "Iconic Clinton Blackberry photo prompted State Department question" for the search.

A Dept of State employee saw this infamous picture of Hillar and checked on Hillar's account/non-account with State.

Note: she traveled with this using foreign communication infrastructure. And on 14June16, press stories circulating say that Hillar used her phone because "she doesn't know how to use email". And while at the State Department she would leave her office --because use of private phones are prohibited inside the building-- and go out to use her phone. Such as calling the White House.

Edited by hasanhh
addition
Link to post
Share on other sites
  • 2 weeks later...
  • Veteran Member

02July16 Current Issues:

For CIOs http://www.csoonline.com/article/3089889/security/why-cios-should-care-about-click-fraud.html?google_editors_picks=true      This is "awareness" about how clicking is used for hacking and industrial espionage.

 

The EW Battle Space:  http://www.pcworld.com/article/3089463/security/wormable-flaws-in-symantec-products-expose-millions-of-computers-to-hacking.html   It is not just the NSA that  has made things vulnerable. These flaws were found by Goggle's "Zero Team"

 

WARNING: No Warrant Needed

http://www.eweek.com/security/home-computers-connected-to-the-internet-arent-private-court-rules.html 

Opine: Personally, l am not surprised at this Court ruling because the Internet is similar to broadcasting: anything broadcasted is in the public domain.  A good read.  Now, what I do wonder about is whether voice  can be made separate from other functions as it is similar to and functions like telephone.

Edited by hasanhh
link correction
Link to post
Share on other sites

Join the conversation

You are posting as a guest. If you have an account, sign in now to post with your account.
Note: Your post will require moderator approval before it will be visible.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.


×
×
  • Create New...