Jump to content
Guests can now reply in ALL forum topics (No registration required!) ×
Guests can now reply in ALL forum topics (No registration required!)
In the Name of God بسم الله

The Snowden Revelations

Rate this topic


Recommended Posts

  • Veteran Member

2+ items

Sauron's Spies are Everywhere-   <---beginning of title, go to 2nd article

http://now.howstuffworks.com/2016/08/10/slowmotion-video-makes-people-look-guiltier-study-shows 

Sauron is only one name for a malware of a highly malleable nature that has gone undetected for 5 years. Must have had a gov't sponsor.

At "More to Explore" there is a link to: "...Computer Fans into Snitches"  --what this article describes is the minute variations in your computer fan's behavior by keystroke is equivalent to the old tapping an electric typewriter by reading the back emf --or audible variations with manual typewriters before that.

 

"How machines are learning to read your mood", PBS News Hour, Wed,10August2016 transcript and interesting video story.

http://www.pbs.org/newshour/bb/machines-learning-read-mood/  

Link to post
Share on other sites
  • Replies 212
  • Created
  • Last Reply

Top Posters In This Topic

Top Posters In This Topic

Popular Posts

This was already known, though I suppose having it confirmed is something. 

POST 1   (salam)   I has been about a year since Ed Snowden's Documents -allegedly 1.7 million of them- has been moving into the public domain.   What portion so far has had the most significant ?  

Salam. I read the WashingtonPost article on that. Your other links were entertaining, too.

  • Veteran Member

Who is 'impressed' now? <--from the hashtag

In this thread l have often referred to the "holes" in programming that the NSA et alia have insisted that companies provide to the gov't "for reasons of national security" -to use the old Watergate cover story emotional phrasing. All the while, these agencies have used this to front-run the stock market, for personal vendettas, to spy on sex-friends, and so forth.

Now, the NSA has apparently been cyber-raped  -to coin a term. On Monday the 16th to remove a virus l tried to log-on the NSA site and then run a virus program (makes the program more effective) yet l was repeatedly blocked. The reason was except for the title page the site was taken off-line as explained in one of the following articles.

Personally, l suspect drug-money paid for all this.

Now, to use ancient Roman religious idiom, the "gods" of the electronic spying universe must face the Fates and Furies themselves. Or in Hinduism, the karma of their making the lives of US and our companies miserable.

http://www.politico.com/story/2016/08/nsa-website-hacking-rumors-227088 

For some intro-level technical:  http://www.kaspersky.com/about/news/virus/2015/equation-group-the-crown-creator-of-cyber-espionage 

For skepticism:  http://nordic.businessinsider.com/nsa-shadow-brokers-hack-weird-2016-8/ 

ls it saleable? http://www.wired.com/2016/08/no-one-wants-buy-stolen-nsa-linked-cyberweapons/ 

Why l suspect drug-money:  http://www.computerworld.com/article/3108586/security/spycraft-not-hacktivism-suspected-around-alleged-nsa-hack.html 

Wiki:  http://www.washingtontimes.com/news/2016/aug/16/wikileaks-unveils-plans-publish-cyber-weapons-stol/ 

Link to post
Share on other sites
  • Veteran Member

:furious::ranting:  "furious ranting", but this won't do any good.

Those :einstein:s in the US gov't no longer have the "internet information superhighway" but an "information super catastrophe".

We are all now cyber-raped because 300 megabytes of see-what-we-have-for-free hacking tools.

This 300 megabytes includes -but no limited to- "exploits", how-to control firewalls, control of networks, information modification both in situ and when transmitted.

http://www.washingtonpost.com/world/national-security/powerful-nsa-hacking-tools-have-been-revealed-online/2016/08/16/bce4f974-63c7-11e6-96c0-37533479f3f5_story.html 

Now, every company, financial institution, gov't portal are open targets without cover.

#%&*^#@@*******

Solution: the Putin Program: when Vladimir Putin first became aware of the contents in the Snowden Revelations he ordered out every computer and had typewriters brought in. We have to do the same for anything private, corporate or important. lt is back to the 1970s folks.

Link to post
Share on other sites
  • Veteran Member

UPDATE:  EquationGroup, et alia, VULNERABILITIES

http://www.pbs.org/newshour/bb/analyzing-nsa-code-breach-context-recent-cybersecurity-events/ 

--one guest is Paul Vixie (Hall of Famer) cofounder FarSight Security (one of several), (goto a bio)

-----these files are about 3 years old, but CISCO's equipment will be broken into until patched(see below)

-----the tool loss appears to be "inadvertently" done when unknowingly uploaded to a 'staging server'

-----people, companies and gov'ts cannot afford constant upgrades

----Vixie guesstimated that 1/10th to 1/2 of 'the market' is exposed as he has not seen "an estimate"

http://fedscoop.com/tech-vendors-admit-stolen-nsa-cyber-weapons-are-effective-warn-customers 

---CISCO on Wed the 17th announced they will build the patches are ship out for "free"

http://federalnewsradio.com/cybersecurity/2016/08/commerce-ciso-looks-evolve-beyond-castle-metaphor-cybersecurity/ 

---the Dept of Commerce is in the "early 2000s" in cybersecurity which adversely affects the Census Bureau and the Patent and Trademark Offic

 

Elsewhere: the Clinton Foundation hired FireEye this past Spring after indications it had been hacked

Link to post
Share on other sites
  • 2 weeks later...
  • Veteran Member

Dumb Phones

Sunday, 4th of Sept 2016, CBS 60 Minutes rebroadcasted their past April's report on wireless hacking and how all "smart" phones are vulnerable even with fixes and downloaded apps. {Maybe we should start calling them "dumb phones" --you're dumb for using one believing it is secure in anyway --ed.} The hack-feature in this program is about using a vulnerability in the communication companies interoperability features.

http://www.modernreaders.com/nso-group-spying-tools/51048/lorenzo-tanos notes a NYT article about an lsraeli company selling spyware to Gulf States and Mexico.

This tracking system is named Pegasus and is somewhat described in the aforementioned referral here: http://www.nytimes.com/2016/09/03/technology/nso-group-how-spy-tech-firms-let-governments-see-everything-on-a-smartphone.html?_r=0   Note the original article by Nicole Perlroth date is 02Sept16. It also reports that Apple,lnc sent out fixes. {l guess Apple,lnc didn't see 60 Minutes this past April -ed.}

 

Edited by hasanhh
author's name
Link to post
Share on other sites
  • 4 weeks later...
  • Veteran Member

Info:

There was a 620 Gbps attackhttp://krebsonsecurity.com/2016/09/the-democratization-of-censorship/  where an Hack-Attack for hire firm allegedly in Israel is doing nation-state levels of business. Krebs, he writes, was attacked for this post: http://krebsonsecurity.com/2016/09/israeli-online-attack-service-vdos-earned-600000-in-two-years/ 

Other:

Does your license plate say "rob me"????  http://krebsonsecurity.com/2016/09/location-privacy-the-purview-of-the-rich-and-indigent/ 

Cause of Death: Murder by "new" phone:  http://krebsonsecurity.com/2016/08/a-life-or-death-case-of-identity-theft/ 

Link to post
Share on other sites
  • Veteran Member

Recommended:

Yahoo, Inc secretly scans your incoming email for the Stasi. The "target" is certain keystrokes and words.

Reuters Broke this story -source for statement, DeutscheWelle, 04Oct16, 2000EDT

http://www.reuters.com/article/us-yahoo-nsa-exclusive-idUSKCN1241Yt 

--the Yahoo, Inc written program searchs all incoming emails

-this is the first, publically known case of this

Link to post
Share on other sites
  • Veteran Member

Yahoo + NSA

Apparently, there was an attempt to sell NSA information in early August

http://www.eff.org/deeplinks/2016/09/shadow-brokers-publish-powerful-nsa-spy-tools-demonstrating-flaws-nsas-approach    --Ed Snowden said this problem is probably from NSA failing to "clean up" their equipment

Other articles -Shadow Brokers "rant"s nobody wants to "buy" this stuff; Harold Thomas Martin III 51 who was immediately fired upon arrest by Booz-Allen-Hamilton [which has lucrative enriching contracts with NSA et alia] is a suspected member or associate with S.B.

Recommended: http://fedscoop.com/nsa-yahoo-deny-mass-email-surveillance   NSA and Yahoo(soon to be bought up by Verison) deny the Reuters and other stories, calling them "a little speculative". The New York Times reported that Yahoo was searching for "digital signatures" used by alleged terrorists. This article has a good discussion of this event and related law and activities.

Edited by hasanhh
link correction
Link to post
Share on other sites
  • 2 weeks later...
  • Veteran Member

Recriminations always come later  --as the saying goes...

http://www.collective-evolution.com/2016/10/17/u-k-allegedly-freezes-rt-news-bank-accounts-severs-julian-assanges-internet-access/ 

I am guessing these are the new "sanctions" against Russia who is taking the blame -in a politically convenient way- for the A-dorable Hillar email hacks.

And as for Assange? Well, he is the poster boy for 'governmental embarrassment'

Edited by hasanhh
link correction
Link to post
Share on other sites
  • Veteran Member

:shock: OMG, hasanhh sees something "good" about Big Mother Gov't ?

Well, if NSA et alii act on these:

http://www.nsa.gov/news-features/press-room/press-releases/2016/2016-cybersecurity-research-paper-winner.shtml   dated 17Oct16, entitled "Annual Cyber Research Papers"

--this paper won on the subject of preventing cloud(computing) extractions

OpEd: l personally wondered about cloud-computing, that off-site storage in a 'cloud'. l saw it as a dream, a pie-in-the-sky cost savings scheme to make sales by corporations to corporations and businesses. These "extractions" have changed the 'Cloud' into a 'Bulletin Board'. Hey, Paranoia Pays.

2]Meanwhile, after maliciously 'dumped' on the Internet, criminal gangs are now using a Mirai Code which is being used as a DDoS .  http://www.reuters.com/article/us-usa-cyber-idUSKCN12L1ME   PayPal and others got his this past week.

Link to post
Share on other sites
  • Veteran Member
1 hour ago, hasanhh said:

:shock: OMG, hasanhh sees something ...

2]Meanwhile, after maliciously 'dumped' on the Internet, criminal gangs are now using a Mirai Code which is being used as a DDoS .  http://www.reuters.com/article/us-usa-cyber-idUSKCN12L1ME   PayPal and others got his this past week.

Follow-Up: This is being called "internet vandalism". State sponsorship, as in the first report, is now discounted.

http://www.nbcnews.com/news/us-news/who-shut-down-u-s-internet-friday-n671011  -Friday, 21Oct16

http://www.cnbc.com/2016/10/21/major-websites-across-east-coast-knocked-out-in-apparent-ddos-attack.html 

The conduit for these attacks was the Internet of Things -toasters, bots, and anything connected to the lnternet.

OpEd: What are 'we' doing to ourselves? Too many people have their heads in the Cloud as if we are all on hallucinogenics.  :scarerun:"Back to the Analogue" World.

Link to post
Share on other sites
  • Veteran Member

More -from previous two posts

1] These 3 attacks are a prelude: http://www.thedailybeast.com/articles/2016/10/21/why-today-s-attacks-on-the-internet-are-just-the-start.html 

2] Krebs on Security --article mentioned in 1]: http://krebsonsecurity.com/2016/10/hacked-cameras-dvrs-powered-todays-massive-internet-outage/

3] Some of the attacks effects: http://krebsonsecurity.com/2016/10/ddos-on-dyn-impacts-twitter-spotify-reddit/ 

4] Where Mirai came from: http://krebsonsecurity.com/2016/10/spreading-the-ddos-disease-and-selling-the-cure/  Cloudflare

5] Internet of Things, date of article is Sat,08Oct16: http://krebsonsecurity.com/2016/10/europe-to-push-new-security-rules-amid-iot-mess/

6] The week before that -3 weeks ago, now- loT attacks were predicted, Sat 01Oct16, http://krebsonsecurity.com/2016/10/source-code-for-iot-botnet-mirai-released/ ;released by "Anna-Senpai"

Link to post
Share on other sites
  • 4 weeks later...
  • Veteran Member
Link to post
Share on other sites
  • Veteran Member

6876

New PIA selection is a "foe of S.V. and We"

Trump's choice for DCIA views the job as a proctological level of busy-body mandate. That is why l called it "PIA". He doesn't 'like' Silicon Valley's attitude, either.

http://www.computerworld.com/article/3143169/it-industry/with-choice-for-cia-chief-trump-picks-a-foe-of-silicon-valleys-encryption-stance.html   

 

Link to post
Share on other sites
  • 2 weeks later...
  • Veteran Member

Remember this from earlier in this year?

On ‎2‎/‎16‎/‎2016 at 11:39 PM, hasanhh said:

16Feb16

"Judge: Apple Must Help US Hack San Bernardino Killer's Phone" -AP, 16Feb16 2227EST by Tami Abdulllah and Eric Tucker

http://abcnews.go.com/Technology/wireStory/judge-apple-us-hack-san-bernardino-killers-phone-36990684 

The Judge, a former prosecutor, has ordered Apple to provide bypass capability to the FBI for the iPhone of Syed Farook.

Farook's iPhone was discovered in a search and has self-destruct capability if an improper/incorrect password is used too many times. Why this info is not available from Google, Facebook or from the local server is not explained by Big Mother gov't.

The Obama administration has policies in place to encourage strong encryption in order to promote Internet and personal security.

Farook had left his iPhone behind -whether deliberately or not- and was later discovered in a search. The harddrive of the other shooters' has still not been discovered and they had smashed their phones beyond recoverable information.

Apple has yet to respond and has 5 days to do so.

l found this by accident, which explains how all that hype-was-hokey:

1] Thurs,10Feb2011  --notice the 5 year lead?   Fraunhofer Institute -Secure Information Technology (SlT) can decrypt passwords from iPhone keychain -and a lot of other things- in about 6 minutes "using existing known exploits" {initial source, katak101}

2] Munich based, search "Fraunhofer Institute + SlT"; for intro-to-institute info see: http://www.sit.fraunhofer.de/en/offers/projekte/lost-iphone-lost-passwords/ 

Link to post
Share on other sites
  • Veteran Member

7005

Back to the Past

Just like cable television 50 years ago, almost, now it is digital and WiFi-equivalent

SPEAKE(a)R

http://wallstreetpit.com/112382-music-speakers-headphones-listening/ 

Your ear pieces are now a surveillance device.

Usability: To create and confirm personality profiles, listening-to-conversations, usw

Link to post
Share on other sites
  • 4 weeks later...
  • Veteran Member

7180

""ln 2017, mobile and artificial intelligence ... " 25Dec16 http://www.kentucky.com/news/business/article122915889.html 

The purpose of the article is to notify businesses that new means of advertising will be made available in 2017 from the intelligence profiling  of mobile phone users as mobile phone searches are now the leading search devices far out numbering desktop and other search platforms.

Excerpts:  1]   GOOGLE "...is making mobile the primary search" for receptive audiences to your advertising by this profiling.

2]  "Artificial lntelligence can be helpful with generation of insights" ... "allowing Al to adapt to market behavior changes"

As l posted in "what have you been watching?" (title correct?) the tech film What makes You Click? , also said these Al profiles are used to alter not only an altered website by a legitimate host, but also how and what political advertising you receive -even in the wording.

Partial Counter-Al = use library platforms for some searches; share-switch mobile devices with trusted associates; search "not you" sites; ...

 

Link to post
Share on other sites
  • Veteran Member

7203

In response to "the Russians did it" theme of the Clinton Campaign strategy (declared Feb 2016 source Podesta emails) President 0bama has sanctioned the Russians.

ln a supporting action, there has been a Homeland Security Dept. publication that purports to show this. lt only has a quick mention of what is already publically known and a list of Russian intelligence programs the Russians know the US knows about.

http://www.us-cert.gov/sites/default/files/publications/JAR_16-20296A_GRIZZLY STEPPE-2016-1229.pdf 

The pub has a list of security actions --even SC users may like to read and use.

Link to post
Share on other sites
  • Veteran Member

7226

The Snowden movie is out on DVD, yet l still haven't seen it. What brings this to mind is the US House report that made the news just before Christmas (interesting timing as 'who' paid any attention). One of the "errors" in the report is that Snowden was discharged from the Army for "shin splints", when he was actually crippled-on-crutches. Well, in gov't idiom l guess you could say his shins were damaged.

The movie reviews for the last six months have been partisan. So has the comments. For instance:

http://www.gizmodo.co.uk/2016/12/the-snowden-movie-illustrates-why-im-so-pessimistic-about-the-future-2/   The enabling of gov't peeping-Toms makes misuse of the capabilities by future leaders inevitable, says the article. [[ OpEd: Can you imagine the Stasi having had these capabilities???? ]]  The article also makes these points:

--"turnkey tyranny" --who is in-charge? who is elected?

--with these capabilities "dissent becomes impossible"

--the article prophesizes that Donald Trump is a threat --which despite some indicators is way pre-mature,

--the UK's bulk intelligence programs were retroactively "voted into legitimacy by MPs"

"advised" -A character assassination word: http://www.film-news.co.uk/news/UK/42811/Vladimir-Putin-advised-Oliver-Stone-on-Snowden-film ,yet when you read the article itself, Stone only talked to Putin to clarify-for-accuracy the granting of Snowden's asylum status.

Oliver Stone, reported here: http://qz.com/770904/russian-spy-novels-and-secret-meetings-how-oliver-stone-made-the-snowden-film/  that Stone bought the rights to Snowden's lawyer novel for $1million to gain access to Snowden. [[OpEd: not all lawyers do pro bono ]

One hokey puff-piece -which reads like it is ghost written by the gov't- is by germanesque named Rebeccah Heinrichs dated 22Oct16 of the Hudson Institute and worked for Rep. Trent Franks (R-AZ) as a deterrence, missile defense and arms control specialist, suddenly 'penning' a counter-intelligence character assassination article on "myths" about Edward Snowden.  http://thefederalist.com/2016/10/22/5-myths-edward-snowden-movie-reinforces/   :party:

OpEd: So, we all have to watch the movie and make our own judgments and decisions --no matter how much the peeping-Tom gov't despises this.

Edited by hasanhh
link correction
Link to post
Share on other sites
  • 1 month later...
  • Forum Administrators
On 11/30/2016 at 5:22 AM, hasanhh said:

SPEAKE[a]R

http://wallstreetpit.com/112382-music-speakers-headphones-listening/ 

Your ear pieces are now a surveillance device.

Finally read the article. Very interesting. :censored: Thank you, @hasanhh

Link to post
Share on other sites
  • Veteran Member
9 hours ago, hameedeh said:

Finally read the article. Very interesting. :censored: Thank you, @hasanhh

Afwan. As a factoid -which is easy to remember because it is so counter-intuitive-- is that it is 1943 technology to track a receiver. Another; it is circa 1980 technology to tap a phone line at two miles (it is unshielded so it emanates process-able signals).

Link to post
Share on other sites
  • Veteran Member

:ranting:  :helpsos: <----ALERT

http://venturebeat.com/2017/02/10/remote-control-how-tech-companies-blur-lines-over-who-owns-your-devices/    a Reuters article

Companies are changing your phone, acquiring your personal devices, and charging you fees while still collecting your personal data.

Edited by hasanhh
7465 Turkey
Link to post
Share on other sites
  • Veteran Member

7543

1] Microsoft calls for a Cyber Geneva Convention, a Digital Geneva Convention

http://www.computerworld.com/article/3169682/security/microsofts-president-wants-a-geneva-convention-for-cyberwar.html

2] YOUR Home Security Camera is "online"

ABC Video, "Home security cameras being hacked into and streamed live online"

DO NOT USE the DEFAULT PASSWORD

 

Link to post
Share on other sites
  • 3 weeks later...
  • Veteran Member

7611

This time, it is the CIA:

Vault 7   Wikileaks release,  "Vault 7" is the contractor's code name. 07March17   http://wikileaks.org/ciav7p1/   A summary of the Leak

-using the loT to spy on YOU, including YOUR car.

What makes this leak significant is not the modus operandi and targets for surveillance, but the lines of code used to accomplish these objectives.

Being "compared to the "Snowden Revelations" --a comment by Scott Pelly, CBS News, same date.

CBS: Wikileaks is saying it has more info than Edward Snowden had.

56% of Households have at least 1 TV connected to the Internet --PBS NewsHour factoid, same date.

Elsewhere:

Protecting Yourself from losing your Tax Refund:   http://krebsonsecurity.com/2017/01/shopping-for-w2s-tax-data-on-the-dark-web/ 

 

 Email Fraud:   http://krebsonsecurity.com/agari/ 

 

Edited by hasanhh
Links
Link to post
Share on other sites
  • Veteran Member

7637

Wednesday's the 8th's Evening News said that Central Intelligence "knew last year" about the loss known now as "Vault 7".  CIA told Reuters this today [search: CIA + Reuters + "knew last year"].

ln an irresponsible but not malicious manner, a contractor too widely shared information with other departments and agencies. Both FBI and ClA are investigating trying to find who gave it to Wikileaks -and whomever else.   http://theintercept.com/2017/03/08/cias-new-digital-innovation-division-cant-seem-to-keep-its-own-secrets/ 

Link to post
Share on other sites
  • Veteran Member

7667

lnside Russia's Creepy, lnnovative lnternet   <44minutes

http://topdocumentaryfilms.com/russia-creepy-innovative-internet/ 

A nice, different beginning segments. Then a review of Akademgorodok in Siberia.

As the last third of the begins, "creepy" is not a subjective assessment.

PoIice surveiIIance and terrorism are also described.

"And yes, Edward Snowden is out there. Somewhere." -quote from film.

Edited by hasanhh
Link to post
Share on other sites
  • 5 weeks later...
  • Veteran Member

7874

NSA  Hacked   OMG

http://money.cnn.com/2017/04/14/technology/windows-exploits-shadow-brokers/ 

For a damage assessment: http://www.endgadget.com/2017/04/14/shadow-brokers-dump-windows-zero-day/ 

Endgadget says Windows 10 does not appear to be vulnerable. Otherwise, every Windows system is "zeroed" on a global scale.

Opine -as a parody-: Meanwhile back at the White House, someone asks, "How did they know this?"

Link to post
Share on other sites
  • 2 weeks later...
  • Veteran Member

7952

NSA says it has a "policy change"  :confused:<--"Uh, really ?"

In another late-Friday-to-miss-press-cycle announcement, the NSA has released this statement:

https://www.nsa.gov/news-features/press-room/statements/2017-04-28-702-statement.shtml  

Supposedly, for a few reasons and "technical" problems the NSA is now limiting its collection of emails and other postings.

0pine: APPARENTLY, Algorithms based on cryptotype and linguistic relativity are not as effective as traditionally imagined.

The most optimistic reporting is from Wired magazine: https://www.wired.com/2017/04/big-change-nsa-spying-marks-win-american-privacy/ 

Link to post
Share on other sites

Join the conversation

You are posting as a guest. If you have an account, sign in now to post with your account.
Note: Your post will require moderator approval before it will be visible.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.


×
×
  • Create New...