In March 2011, two weeks before the Western intervention in Libya, a secret message was delivered to the National Security Agency. An intelligence unit within the U.S. military’s Africa Command needed help to hack into Libya’s cellphone networks and monitor text messages.
For the NSA, the task was easy. The agency had already obtained technical information about the cellphone carriers’ internal systems by spying on documents sent among company employees, and these details would provide the perfect blueprint to help the military break into the networks.
The NSA’s assistance in the Libya operation, however, was not an isolated case. It was part of a much larger surveillance program—global in its scope and ramifications—targeted not just at hostile countries.
According to documents contained in the archive of material provided to The Intercept by whistleblower Edward Snowden, the NSA has spied on hundreds of companies and organizations internationally, including in countries closely allied to the United States, in an effort to find security weaknesses in cellphone technology that it can exploit for surveillance.
The documents also reveal how the NSA plans to secretly introduce new flaws into communication systems so that they can be tapped into—a controversial tactic that security experts say could be exposing the general population to criminal hackers.
Codenamed AURORAGOLD, the covert operation has monitored the content of messages sent and received by more than 1,200 email accounts associated with major cellphone network operators, intercepting confidential company planning papers that help the NSA hack into phone networks.
One high-profile surveillance target is the GSM Association, an influential U.K.-headquartered trade group that works closely with large U.S.-based firms including Microsoft, Facebook, AT&T, and Cisco, and is currently being funded by the U.S. government to develop privacy-enhancing technologies.
Karsten Nohl, a leading cellphone security expert and cryptographer who was consulted by The Intercept about details contained in the AURORAGOLD documents, said that the broad scope of information swept up in the operation appears aimed at ensuring virtually every cellphone network in the world is NSA accessible.
The operation appears aimed at ensuring virtually every cellphone network in the world is NSA accessible.
“Collecting an inventory [like this] on world networks has big ramifications,” Nohl said, because it allows the NSA to track and circumvent upgrades in encryption technology used by cellphone companies to shield calls and texts from eavesdropping. Evidence that the agency has deliberately plotted to weaken the security of communication infrastructure, he added, was particularly alarming.
“Even if you love the NSA and you say you have nothing to hide, you should be against a policy that introduces security vulnerabilities,” Nohl said, “because once NSA introduces a weakness, a vulnerability, it’s not only the NSA that can exploit it.”
NSA spokeswoman Vanee’ Vines told The Intercept in a statement that the agency “works to identify and report on the communications of valid foreign targets” to anticipate threats to the United States and its allies.
Vines said: “NSA collects only those communications that it is authorized by law to collect in response to valid foreign intelligence and counterintelligence requirements—regardless of the technical means used by foreign targets, or the means by which those targets attempt to hide their communications.”
The AURORAGOLD operation is carried out by specialist NSA surveillance units whose existence has not been publicly disclosed: the Wireless Portfolio Management Office, which defines and carries out the NSA’s strategy for exploiting wireless communications, and the Target Technology Trends Center, which monitors the development of new communication technology to ensure that the NSA isn’t blindsided by innovations that could evade its surveillance reach. The center’s logo is a picture of the Earth overshadowed by a large telescope; its motto is “Predict – Plan – Prevent.”
The information collected from the companies is passed onto NSA “signals development” teams that focus on infiltrating communication networks. It is also shared with other U.S. Intelligence Community agencies and with the NSA’s counterparts in countries that are part of the so-called “Five Eyes” surveillance alliance—the United Kingdom, Canada, Australia, and New Zealand.
Aside from mentions of a handful of operators in Libya, China, and Iran, names of the targeted companies are not disclosed in the NSA’s documents. However, a top-secret world map featured in a June 2012 presentation on AURORAGOLD suggests that the NSA has some degree of “network coverage” in almost all countries on every continent, including in the United States and in closely allied countries such as the United Kingdom, Australia, New Zealand, Germany, and France.
One of the prime targets monitored under the AURORAGOLD program is the London-headquartered trade group, the GSM Association, or the GSMA, which represents the interests of more than 800 major cellphone, software, and internet companies from 220 countries.
The GSMA’s members include U.S.-based companies such as Verizon, AT&T, Sprint, Microsoft, Facebook, Intel, Cisco, and Oracle, as well as large international firms including Sony, Nokia, Samsung, Ericsson, and Vodafone.
The trade organization brings together its members for regular meetings at which new technologies and policies are discussed among various “working groups.” The Snowden files reveal that the NSA specifically targeted the GSMA’s working groups for surveillance.
Claire Cranton, a spokeswoman for the GSMA, said that the group would not respond to details uncovered by The Intercept until its lawyers had studied the documents related to the spying.
“If there is something there that is illegal then they will take it up with the police,” Cranton said.
By covertly monitoring GSMA working groups in a bid to identify and exploit security vulnerabilities, the NSA has placed itself into direct conflict with the mission of the National Institute for Standards and Technology, or NIST, the U.S. government agency responsible for recommending cybersecurity standards in the United States. NIST recently handed out a grant of more than $800,000 to GSMA so that the organization could research ways to address “security and privacy challenges” faced by users of mobile devices.
The revelation that the trade group has been targeted for surveillance may reignite deep-seated tensions between NIST and NSA that came to the fore following earlier Snowden disclosures. Last year, NIST was forced to urge people not to use an encryption standard it had previously approved after it emerged NSA had apparently covertly worked to deliberately weaken it.
Jennifer Huergo, a NIST spokewoman, told The Intercept that the agency was “not aware of any activities by NSA related to the GSMA.” Huergo said that NIST would continue to work towards “bringing industry together with privacy and consumer advocates to jointly create a robust marketplace of more secure, easy-to-use, privacy-enhancing solutions.”
GSMA headquarters in London (left)
The NSA focuses on intercepting obscure but important technical documents circulated among the GSMA’s members known as “IR.21s.”
Most cellphone network operators share IR.21 documents among each other as part of agreements that allow their customers to connect to foreign networks when they are “roaming” overseas on a vacation or a business trip. An IR.21, according to the NSA documents, contains information “necessary for targeting and exploitation.”
The details in the IR.21s serve as a “warning mechanism” that flag new technology used by network operators, the NSA’s documents state. This allows the agency to identify security vulnerabilities in the latest communication systems that can be exploited, and helps efforts to introduce new vulnerabilities “where they do not yet exist.”
The IR.21s also contain details about the encryption used by cellphone companies to protect the privacy of their customers’ communications as they are transmitted across networks. These details are highly sought after by the NSA, as they can aid its efforts to crack the encryption and eavesdrop on conversations.
Last year, the Washington Post reported that the NSA had already managed to break the most commonly used cellphone encryption algorithm in the world, known as A5/1. But the information collected under AURORAGOLD allows the agency to focus on circumventing newer and stronger versions of A5 cellphone encryption, such as A5/3.
The documents note that the agency intercepts information from cellphone operators about “the type of A5 cipher algorithm version” they use, and monitors the development of new algorithms in order to find ways to bypass the encryption.
In 2009, the British surveillance agency Government Communications Headquarters conducted a similar effort to subvert phone encryption under a project called OPULENT PUP, using powerful computers to perform a “crypt attack” to penetrate the A5/3 algorithm, secret memos reveal. By 2011, GCHQ was collaborating with the NSA on another operation, called WOLFRAMITE, to attack A5/3 encryption. (GCHQ declined to comment for this story, other than to say that it operates within legal parameters.)
The extensive attempts to attack cellphone encryption have been replicated across the Five Eyes surveillance alliance. Australia’s top spy agency, for instance, infiltrated an Indonesian cellphone company and stole nearly 1.8 million encryption keys used to protect communications, the New York Times reported in February.
The NSA’s documents show that it focuses on collecting details about virtually all technical standards used by cellphone operators, and the agency’s efforts to stay ahead of the technology curve occasionally yield significant results. In early 2010, for instance, its operatives had already found ways to penetrate a variant of the newest “fourth generation” smartphone-era technology for surveillance, years before it became widely adopted by millions of people in dozens of countries.
The NSA says that its efforts are targeted at terrorists, weapons proliferators, and other foreign targets, not “ordinary people.” But the methods used by the agency and its partners to gain access to cellphone communications risk significant blowback.
According to Mikko Hypponen, a security expert at Finland-based F-Secure, criminal hackers and foreign government adversaries could be among the inadvertent beneficiaries of any security vulnerabilities or encryption weaknesses inserted by the NSA into communication systems using data collected by the AURORAGOLD project.
“If there are vulnerabilities on those systems known to the NSA that are not being patched on purpose, it’s quite likely they are being misused by completely other kinds of attackers,” said Hypponen. “When they start to introduce new vulnerabilities, it affects everybody who uses that technology; it makes all of us less secure.”
“It affects everybody who uses that technology; it makes all of us less secure.”
In December, a surveillance review panel convened by President Obama concluded that the NSA should not “in any way subvert, undermine, weaken, or make vulnerable generally available commercial software.” The panel also recommended that the NSA should notify companies if it discovers previously unknown security vulnerabilities in their software or systems—known as “zero days” because developers have been given zero days to fix them—except in rare cases involving “high priority intelligence collection.”
In April, White House officials confirmed that Obama had ordered NSA to disclose vulnerabilities it finds, though qualified that with a loophole allowing the flaws to be secretly exploited so long as there is deemed to be “a clear national security or law enforcement” use.
Vines, the NSA spokeswoman, told The Intercept that the agency was committed to ensuring an “open, interoperable, and secure global internet.”
“NSA deeply values these principles and takes great care to honor them in the performance of its lawful foreign-intelligence mission,” Vines said.
She declined to discuss the tactics used as part of AURORAGOLD, or comment on whether the operation remains active.
———
Documents published with this article:
———
Photo: Cell tower: Justin Sullivan/Getty Images; GSMA headquarters: Google Maps
Young trolls, I suggest you quit your job. If you are a bright unemployed 22-24 year old college graduate, live in your parent’s basement and wait it out…
When the balloon goes up…you don’t want to be a participant. Any which way it goes…
Peace, from the older generation. We’re on your side.
The vulnerability of the cellular operator: Therefore, the exposure and vulnerability of the cellular operator is clearly in the engineering (GSM/UMTS/LTE) core infrastructure that lack security measures. This core is the sole system responsible for the operator’s service provision ability, and thus for its revenue. Security exposure causes vulnerability and significant risks that threaten the cellular operator, including decline in revenue, loss of physical and intellectual property (IP), damage to business processes, threats to continuous operation, damaged reputation, and exposure to legal claims, increased insurance premiums, decline in share value, churn etc.
Damages may be expressed in various ways and possibilities, e.g.:
Change (delete/add ) customers’ billing records
Wiretapping calls, SMS contents, MMS, data and web surfing
Various DOS attacks that may bring operations to a halt
Damage to components’ codes and services shutdown as a result
Extraction of customers’ call details and location, means of payment etc.
Who can cause the damage?
The number of potential causers of damage to the cellular operators is large and may include
Disgruntled employees / customers / suppliers
Ideological or freak hackers
Political, ethnic or other enemies of the country in which the company is operated
The tools, means and skills
required for causing damage have also become accessible and cheap so using a laptop, internet connection, and time that varies between half an hour to one day’s work, a cellular operator may be damaged with relative ease, sustaining grave, immediate damage
The three dimension of risk potential model
Severity: from slight risk as malfunction “fun tone” service to grave risk as provisioning shutting down
Duration: from short (hours) to lengthy (weeks)
Effect: from marginal loss of income to substantial: damage to share value, churn.
Challenges
“Holistic” examination of the matrix composed of types of risk (severity, duration and influence) types of attackers (tools, methods, motives) and types of attacked aspects (revenue, browsing content, privacy etc.) by understanding the total picture of business processes taking into consideration all components and risks involved
Finding a simple, efficient, available and easy solution for a complex, multi-layer challenge with enormous risk potential.
Enforcing application of the solution, ongoing permanent monitoring, constant search for the next breaches etc.
The Cellular operators’ information security concept paradox – all the true is here: http://bit.ly/1s9dgOJ
https://firstlook.org/theintercept/2014/12/04/nsa-auroragold-hack-cellphones/
> I’m under a microscope
We ALL are anyway
http://ipsoscustodes.wordpress.com/2010/10/16/quis-custodiet-ipsos-custodes/
> They had a quota to fill
They also have quotas and “categories” in “‘the’ land of ‘the’ ‘free’ …”
http://en.wikipedia.org/wiki/List_of_countries_by_incarceration_rate
They just don’t call it a quota, but “protecting ‘Freedom’ in the Universe for the rest of ‘us'” ™, “defending democracy” ™, …
> These things were provided in the Eastern block, IF you didn’t offend the authorities
It wasn’t exactly as mechanical as that and you should know very well how hard will it be for you to find a job if you talk truth to power in the U.S. “Things” will start “happening” to you East-Germany style, the USG has snitching cells in -every- kind of business (not only your neighborhood’s barbershop and building superintendent, but community churches and every University department as well), which they use to harass their “targets” (The USG is using even school children to harass their teachers). They call it “nexus”.
> I am also reminded of Aleksandr Solzhenitsyn …
Solzhenitsyn who said:
“You only have power over people so long as you don’t take everything away from them. But when you’ve robbed a man of everything, he’s no longer in your power – he’s free again.”
“Literature transmits incontrovertible condensed experience… from generation to generation. In this way literature becomes the living memory of a nation.”
“For a country to have a great writer is like having another government. That’s why no régime has ever loved great writers, only minor ones.”
also told us how he wrote and smuggled out his great books and why we shouldn’t believe in “the West”. He actually said Russians, but we are all niggas to the NSA anyway
At the very least in those times they had what I think you meant when you were talking about “privacy”. Provided writers in the US
http://www.theguardian.com/books/2013/dec/20/nsa-surveillance-programme-get-worse
http://www.theguardian.com/books/2013/dec/23/book-bannings-rise-us-censorship
had the balls and intellectual prowess of Solzhenitsyn, Zamyatin, … they would find virtually impossible to actually write because the NSA will know every single character they type (if they are naive) you can also write at least your main ideas on paper. Again, the most lethal weapon against the NSA is making them actually think, listen to conversations to try to figure out things intelligently … This is why they went crazy about Snowden’s leaks (he, in an uncontroverted way, raised to public consciousness what was going on) and they need to “monitor” all of us/all the data because they want to “play God” “safely”, they don’t want to have to think/make sense
“It wasn’t exactly as mechanical as that and you should know very well how hard will it be for you to find a job if you talk truth to power in the U.S. “Things” will start “happening” to you East-Germany style, the USG has snitching cells in -every- kind of business (not only your neighborhood’s barbershop and building superintendent, but community churches and every University department as well), which they use to harass their “targets” (The USG is using even school children to harass their teachers). They call it “nexus”.”
So you know something about my situation Giovanni…Yes, I am more or less already blacklisted in multiple occupations. But the “nexus” is being lied to and PAID. No one is “Johnny on the Spot”, like the stalkers, unless they are paid very well or in fear for their lives. I’ve worked with volunteers, they’re not that reliable.
How many people and businesses would participate if they knew that the person they were “targeting” was completely innocent and in fact, they were engaging in multiple felonies? Did you know, in addition to jail time, everyone from a doctor, to a lawyer, to a hairdresser can lose their license if they commit a felony? Not only do you go to jail, you’re next job is bagging groceries at Walmart.
Another question…are people running around showing fake IDs. People when in doubt, get the card and call the office or show up to the office to speak to the agent.
I’ll give you an example, I was cornered in the pasta isle at a local supermarket by some “operatives”, who proceeded to harass me. The 6′ 2″ male identified himself as working for the NSA. Just so we are all on the same page, it is illegal to identify yourself as a Federal Officer, if you are not a Federal Officer. Now in reality what happens is that DIA will do something and say we’re FBI, or another fed agency will fuck up and say we’re FBI as they walk out the door. It’s not a crime to claim you are a Federal Officer…if you are a Federal Officer, DIA, CIA, DEA, FBI. However, if you are just some trained psycho stalker that even the teamsters wouldn’t employ…it is a crime.
This same “NSA Agent”, later assaulted me under a video camera. I’m thinking he wasn’t trained by any of the various USG agencies, because they are just not that stupid. People with security clearances do not announce who they are (or supposedly work for) in the pasta isle and then assault a target under video cameras. Meaning, this man in addition to assault, just committed a very serious crime, claiming he was a Federal Officer.
Anyone confused about what “life in prison” is like, should contact Christopher Hedges, former New York Times reporter. Both he and his wife teach prisoners. We have the largest prison population in the world, which consists of mostly of the poor, but some are hardcore criminals. God help you if you ever get thrown in with that group…you won’t be too popular, right up there with child rapists.
“You only have power over people so long as you don’t take everything away from them. But when you’ve robbed a man of everything, he’s no longer in your power – he’s free again.”
That’s already been done, everything has been taken from me and here I am. My last job was at an Investment Bank, there was a very well known accounting firm above us, a German investment bank and a major television network in the building. Those people have a lot to lose. They have families, they have jobs that pay very well, mortgages, debts, student loans…yet as Stasi-like stalkers they knowingly commit felonies everyday. They are not high enough up to have protection…if it all goes sideways.
They were paid “extra” for their participation. I heard the conversations, 2nd homes with construction, exotic vacations, expensive dinners, massages, acupuncture. We live in a very materialistic society. The easiest way to get someone’s cooperation is to pay them well. How much you pay them, depends on their status and the price for their soul. The lower classes are so desperate, they will take $100 gift cards just to eat and have clothing.
What do I have to lose…nothing? Yeah, I’m still alive, so what.
All that glitters is not gold.
All we are told is bought and sold.
A means to an end
An end to the errand.
We think but are fore thought
That the prize of that game fought.
Yet we strive but are still caught,
We do strive but are out thought.
We retreat to seek what’s sought.
Such is life for all without comfort.
We try but all are held by the retort
“Defeat all who would be stalwart”.
No man, who would speak the truth
Will be heard by words deemed uncouth,
For the state will make him mute.
Speak nothing do not refute
The state has silenced all dispute.
We ponder what to contribute.
Hey, tombrown –
Glad to see you back here.
`JAMMER!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!..
Snowden gave the wiser/smarter advice ever: Take the batteries OUT when you don’t use your cellphone.
Watch out folks big brother is watching you!
https://www.youtube.com/watch?v=UrOZllbNarw
http://www.nytimes.com/2014/12/04/opinion/julian-assange-on-living-in-a-surveillance-society.html?_r=1
Both links already given further down…
Enjoy & have fun btw ;=)
I think that there is a lot that “we, the people” can do. From keeping our cell phones in tin boxes (effectively in a Faraday cage) when are not using them (they collect vasts amounts of GPS data tracking and correlating our whereabouts) to airing to comm satellites wrong coordinates (that can be done with software), noising our communications (computers will never be good enough at totally and automatically filtering truly random noise and “paired” noises (quasi noises in the back ground using patterns with phonemes of the language you speak …))
Neither the NSA, nor the USG, nor their 9 eye @ssh0l3ss, nor their f#ck the EU fiefdoms live in a different physical reality nor are they standing on a higher moral “legal” ground.
We would do much better (they are into “data collection” you know ;-)) if instead of using a blunt denial-of-service attacks we would use some sort of semantic corruption attack. Using corpora there are very simple ways you can bait their “systems” by making it seem like there are “networks of people” actually “communicating” … (once in a while you should mention an US based airline, the the base chemical used in some explosive, or words such as “fly path” … and hey, you aren’t doing anything criminal. Isn’t data what they want, are experts at? Well, give them “data” ;-))
RC, yes keeping your cell phones and computers in Faraday cages, while having dinner with friends and family is a very good idea. Welcome to East Germany on Steroids 2014. The situation is, unfortunately, a good deal more complicated than that. If only people who are suffering could also protect themselves in Faraday cages.
Please don’t urge anyone, however jokingly, to use code words to clog the system. Apparently, it is no joke. I was warned today. I am passing that warning on…use encryption, anything you say online can be used against you (or in private).
> RC, yes keeping your cell phones and computers in Faraday cages, while having dinner with friends and family is a very good idea.
Not only while “having dinner” … I remember once I heard Poitras say they would put their cell phones in the refrigerators in hotels … Do they know that every person who entered that room left a GPS trace? Do they know that with a directional microphone pointing perpendicular to one of the windows they will easily listen to what they were talking about? (heavy curtains bearing weights make a difference)
Of course, you could also stop using your cell phones, but that would not be a “reasonable” solution for most people. I myself, don’t even own one
> Welcome to East Germany on Steroids 2014.
Actually, East Germany was a joke compared to “‘the’ land of ‘the’ ‘free’ …”. I know well, I lived in East Germany in those times
// __ The dark secrets of a surveillance state
http://www.ted.com/talks/hubertus_knabe_the_dark_secrets_of_a_surveillance_state
> The situation is, unfortunately, a good deal more complicated than that
…
> Please don’t urge anyone, however jokingly, to use code words to clog the system.
I am not joking at all. In fact, I am amazed people haven’t started to do that. “Hackers” could device worms that replicate the kinds of messages that NSA loves or you could just leave your phone close to a device locally playing out some speech or whatever. People in Cuba do that (they love music you know) and people in East Germany did that too (they knew “walls listened”). Why shouldn’t people do it in the US and all those other “freedom-loving” countries?
The thing is that those NSA people are brainless so trying to argue with them about morality doesn’t make any sense whatsoever. They love to keep their rear ends screwed to their chairs and click on their snitching applications. Making them having to think will make them go berserk.
We don’t have to willingly acquiesce with the fact that we live in a police state. When Nazi’s used to bring people to extermination chambers, some people would wait for their death quietly, some other would curse them. We should at least curse them. Don’t you think?
> I am passing that warning on
to whom “warning passer”?
> … use encryption
… encryption marketed by a US-based company or any of their friends? What a joke!
> anything you say online can be used against you (or in private)
and this is exactly why we should use “their strengths” as they do in martial arts. Make them think and they will explode from within in pain. Also, can’t people now use regular English words such as “fly path” or chemical terms when they talk? What will be next? We “sinners” can’t even think?
Also, what is that thing you called “private”?
You smelled, meowed, walked, … like the many snitching @ssh0less they use to post messages here.
I also spent time in East Germany under the Stasi with Russians on the corners with machine guns. I honestly more free there than I do now, people would look over both shoulders to make sure they were clear, outside before talking. And you could slip the Stasi…I did it. I haven’t had a private conversation in years, a very sad commentary on America.
I get your point, in that everyone can simply overwhelm the system, rather than be afraid. Ultimately, that is what happened in East Germany, no one believed in the system, everyone was just going through the motions…and ultimately it collapsed.
We’re just not quite there in America yet. Part of the problem is the news. Stories about the NSA aren’t even being reported. The other problem is that so many people in America are struggling just to survive, a job, shelter, food, health care, education…These things were provided in the Eastern block, IF you didn’t offend the authorities. So the struggle is a little bit different.
It’s difficult to know what path to take under the current circumstances, we’ll only know later. But hey ,”crap flood” may be the way to go. I’m under a microscope, but if you’re not and feeling ballsy…what the hell.
The joke is that soon there are going to be 7 billion people on that LIST or 6.9 billion. Anyway, you get my point :)
I am also reminded of Aleksandr Solzhenitsyn recalling a woman who went to the NKVD asking them what was to be done with a nursing infant, whose mother had been taken away in the middle of the night. They had a quota to fill and all of their men were out, so they imprisoned her. Once the machine gets rolling, it’s that simple. But Americans do not understand that, they take their freedom for granted.
AG,
Zersetzung annihilates trust and respect for others. If you are tortured you know this. That said, assuming you are indeed harassed and tortured, you have my sincere sympathies. In Brazil we say “estou torcendo para voce”. But I still want to know why you think they attacked you. Can you briefly tell me? If you have explained elsewhere, how about a link to that speculation? (People who claim to be targets without explaining why they think so exude a certain rodent smell.)
Now I want to respectfully respond to your remark: “…We’re just not quite there in America yet. Part of the problem is the news. Stories about the NSA aren’t even being reported. The other problem is that so many people in America are struggling just to survive, a job, shelter, food, health care, education…”
You’re way too easy on the Great American People. Only they could have coerced reform, but consciously chose not to; they scared too easily and have comfortably embraced totalitarianism. Those not preoccupied with dodging police bullets, pepper spray, and choke-holds — or standing up for them — did have sufficient time to do more than realize Snowden’s worst fear, as he put it. This was expected; there is no precedent justifying expectations of any other outcome. I’m sure those cashing in on the power point docs vehemently disagree, but the Church Committee — held up as THE precedent — resulted in no reform. Zilch. (And I am certain Apple and Google will not ride to the rescue — a laughable idea.) But I confess to a similar delusion: I hoped publication of enough relevant NSA power point docs would curtail some of their customers’ stalking/harassment/torture activities against myself, but nothing came out about what happens to people on the lists — reporting on five people who did not even know they were being surveilled until someone told them did not help. What a fucking idiot (me).
On the bright side — as a “Non-Reclaimable” in Stasi jargon — I did not curl up and die, and got a taste of self-respect. I’ll never go back. It’s motivated me to begin work on a book describing, in a measured tone, the similarities between the GDR’s and USA’s Stasi tactics, comparing some of the GDR targets’ experiences to my own. Very cathartic. Of course the NSA’s customers know what I’m doing because it is not possible to write a book in privacy. Fuck them. I might as well start my own, noob’s marketing campaign while I’m still doing the research.
Some patriots have unwittingly provided me with quite a bit of ammo, figuratively speaking. One of them, John O. Koehler, published a book called “STASI — THE UNTOLD STORY OF THE EAST GERMAN SECRET POLICE”; it has a gem of a blurb on its back cover. General William E. Odom (former assistant chief of staff for intelligence, US Army, and former director of the NSA) gurgles: “Koehler takes the reader through the labyrinth of East German espionage, prisons, repressions, and politics, making spy novels look tame and Western intelligence incompetent. The book does more than entertain — it exposes a painful historical legacy that both Germany and the United States must not ignore.” One can now confidently infer the NSA’s interpretation of the phrase “must not ignore” == “must imitate and improve”. I’m sure there’s plenty more where that came from, starting with the East German Stasi’s core mission statement: “know everything about everyone”. Patriot red baiters are going to hate that shit.
Zersetzung was supposed shut me up at best, destroy me at worst. But they never get anything right.
Take care of yourself, AG. I can’t do pollyanna, but hope you and other undeserving Stasi targets get some relief soon.
3-4 things might have placed me on the list for targeting. Perhaps it was my last film or maybe I pissed someone off in “the organization”. Even Laura Poitras isn’t exactly sure what she did that got her placed on the surveillance list, although her targeting took a more overt form.
I can’t post a link or reveal my identity for several reasons. I do not have sufficient funds to survive. Many targets end up homeless, because they become unemployable. I also made a complaint to the FBI, within a week off the full scale harassment teams being deployed. The initial surveillance teams the first week were military or ex-military, which is what I reported. I have enormous amount of proof showing these operations, but I want to give the feds more time. Maybe that is foolish choice and maybe my faith is totally misplaced. But I am sure they are aware, that if I can be targeted, anyone can…no one is safe. I can’t fight an army alone and that is the difficult decision I made the first week I was targeted, which I have lived with now for 2 1/2 years.
The day I decide to go public, it will be epic. They will have a lot of trouble disproving my claims.
Apparently a fact-free assertion.
It is not a fact free assertion. I have already given people proof, just not to you…some stranger on the internet.
“cell phones in tin boxes (effectively in a Faraday cage) when are not using them”
How about just turn them off!
” South African Pierre Korkie was just a day from freedom, after being held captive for 18 months by Al Qaeda in the Arabian Peninsula, or AQAP, in Yemen, when he was killed in a U.S. rescue attempt Saturday, according to the non-governmental group Gift of the Givers.”
It seems that NSA is not interested in unencrypted information.
Pop Song 89 by REM. I would encourage the staff of the Intercept to listen to it a few times and think long and hard about whether they have been as aggressive as they should be in exposing illegal and unconstitutional behavior of the government.
You are basing the ramifications of this article on a pop song?
The situation in a press room is in many ways analogous to what happens in a secrete court like the FISA court. In the FISA court, the government gets to tell the judge why they should agree to something in secret without the person whose rights are being infringed upon having an opportunity to explain to the judge why this is an unfair violation of their constitutional rights. There is only one side to the argument presented to the court.
The press room when deciding what stories to publish doesn’t hear from the people whose constitutional rights were violated. They only get to hear the government’s answer about why publishing a given story would be a risk to national security.
Michael Heroux said [email protected]
http://michaelandingridheroux.wordpress.com
https://plus.google.com/109414718225592332058/about
The Privacy Commissioner Of Canada finally got back to us after ignoring us for quite some time now. When we first contacted her office they wanted more specific information from us to prove to them that the 30-08 warrants Judge Richard Mosley issued were actually for us. We know they have the security clearance to find out and we know they know the warrants were for us but they keep saying prove it. We sent them the names of the first 2 agents they sent to investigate us in 2008 and they didn’t even acknowledge the agents in any way. They didn’t comment on the agents, they didn’t ask questions about the agents or nothing. They are just ignoring anything we tell them even though they keep asking for more information. The first 2 agents they sent to investigate us in 2008 were our daughters. Our 2 daughters came back home to live with us in 2008 and told us they were working for Canadian Intelligence. They told us the agent that they were working for wanted them to set us up. It has got us worried. We don’t know whether Canadian Intelligence is playing some sort of sick game with us but a stranger approached us out of the blue last year and told us our daughters have been murdered. We have not heard from our 2 daughters since they were sent back home to investigate us for Canadian Intelligence. All The Privacy Commissioner Of Canada is saying to us is prove it. They want us to name names of the Intelligence agents we met in 2008-2009 but they won’t offer us any protection against further assasination attempts against my wife and kids and I even though they know about the previous attempts. We are still being monitored as I write this and we have reason to believe they are using foreign spies from their international coalition. The last thing The Privacy Commissioner Of Canada did was refer us to the recommendations that she made to Parliament on our behalf. The same thing is going on with The Justice Department Of Canada, all they want from us is more information to prove the 30-08 warrants were for us but even though they know about our daughters working as agents for Canadian Intelligence and they know about the poisonings and assasination attempts against us and they know the 30-08 warrants were for us all they are saying now is they don’t have control over the 30-08 warrant information we are looking for against us and they are saying Canadian Intelligence has the information we are looking for. Both agencies have security clearance and they know everything but they are playing dumb but they still want us to name names of the agents we met between 2008-2009 and neither of them are willing to offer us protection against further assasination attemtps against us.
After our daughters left our home when they were done investigating us in 2008 many agents were contacting us in the beginning of 2009 offering us large sums of money if we left Canada for a while. We knew they were trying to get us to leave Canada but not until Judge Richard Mosley decision did we realize why. They were offering us luxury vacations in the sun and basically anything we wanted just to leave Canda for a while. Now we realize it was just a ploy to get their International Coalition involved, we probably would never have been heard from again. They also wanted us to bring our kids along. The good agents were warning us that our life was in danger and they were telling us to move back to British Columbia for our own safety. The local police force would escort us home late at night when we left the downtown area and we always wondered why we were so special. We decided to listen to the good agents and move back to British Columbia for our safety. Just as we were getting ready to move a few agents approached us and offered us $250,000 dollars if we stayed in Ontario. We couldn’t believe it. But we left anyways. Thanks for reading.
What I am saying is, write technical documents and be as intelligent as you want. We laugh, that’s the secret. The secret is we can see through your bullshit, and no amount of “brilliance” will protect you from peers who can see through your bullshit of having a false premise in the first place. We return to the concept of ” “, if you in fact think that was encryption, then So Be it. It is He. GFY, and yeah these idiots really read the article. Closed sermon, Danny Brown is an MC and he has good flows. ?
http://www.glarysoft.com/
Yeah, a few clicks. It is he. But wait, maybe they wanted us to drone over technical documents for 5000 years while hiding the fact that they lied to us in the first place? Who would have thought that covering up heinous felonies would rub the universe the wrong way? Yeah, well the web site is helpful. For people that want a computer to work. But wait, maybe these geniuses had a better idea. Let’s laugh at their mother. Seems appropriate, considering their insult level. Karma.
Good collection of documents on a touchy topic. The CLASSIFIED attachments to the article are pretty straightforward in the goals and plans to understand how cellular networks work from a technical point of view. The attachments focus on the IR.21 documents released by the GSMA, not as much on the HACK any particular network, Libya in this report.
Thanks for this technically informative report.
Tell us about the history, formation and goals of the 5 eyes. Is this the new exclusive Global “good old boys club” for Anglos only?
Excellent work, Ryan G.!!!
This was enough to take my mind off grand juries and make my blood boil about something else.
I can’t add too much except to echo what some of you have already said:
I decry their hubris, am outraged that basically all of us are so targeted and have no idea how such (insert expletive here) can live with themselves.
And I don’t know WHY more of us “plebes” aren’t raising the roof about this.
Why should Americans be “raising the roof”? This is the NSA’s mission after all – intelligence collection. Did you think they’d just say “well golly, we can’t bypass this cellular encryption so I suppose we just stop pursuing this criminal or cyber threat!”
In the US? I do not think so. On the other hand doing the same in foreign countries is a violation of their laws. What would we do if the Chinese built back doors into all our communications?
The U.S. doesn’t follow foreign countries’ laws just like they don’t follow ours. In response to what would we do, the Chinese ARE infiltrating our systems and my expectation is that the U.S. respond by establishing defenses against it.
Nate –
Well, if you can’t see why Americans (and everyone else) should be raising the roof about mass surveillance – after Snowden’s eloquent defenses of privacy, after the excellent (you concurred about this, I believe) TI article detailing the effects of surveillance on those five tasked gentlemen – then you’re welcome to have them task you. I prefer for my private data to stay private, thank you. And I don’t think I’m the only one. I just wish we had more of a popular outrage to force some real reforms. And I wish the tech companies would grow spines and stop allowing backdoors, etc.. I also wish lawmakers (if we can call them that) would also grow spines and exercise some REAL oversight. Certain lawmakers were sooo up in arms about The President’s “executive overreach” regarding immigration policy; but for the most part the legislative branch is letting the NSA and other alphabet soup agencies in the intelligence community operate with no effective Congressional oversight and not a peep about executive overreach in this area.
“Criminal cyber threat”? Gee, Nate, how about what is says about them trying to break or weaken encryption makes us ALL less cyvbersafe. Think about *that* the next time you order something online. Have you heard of a think called “probable cause”? How about they show that and get a warrant before they start spying? And they certainly don’t have to spy on everyone to do that!
At least, Nate, you gave me a good chance to vent.
“…I suppose we just stop pursuing this criminal or cyber threat…”
The primary threat comes from the US. Patriot-filth like you are the real enemy, Nate.
Well, I have to congratulate The Intercept. With the help of leaked documents ladled out of Snowden’s dusty old secret trove, you actually managed to make the Google News front page for the first time I can remember! Well, alright, _you_ didn’t make Google News, somebody named “VPN creative” made it ( https://vpncreative.net/2014/12/05/nsa-program-auroragold-designed-crack-carrier-networks/ ) but at least they actually link to you. Sometimes less-familiar news sites seem to buckle under the load of a Google News featuring, but their page still loads about 20 times faster than this one for me; I don’t know if that’s the new face of net neutrality or just penny-pinching on your end.
I don’t really know what’s going on here. I don’t know why the best journalist in the world suddenly left The Guardian to work at a blog half full of snarky in-joke stories and wild rants. I don’t know why a billionaire’s media empire turned into this. I don’t know why the freest free speech people in the world can barely see clear to slip us one little tidbit out of a pool of unseen secrets every few months, and are treated like radicals for doing that much. I just know that many a civilization has fallen because it couldn’t dream of moving forward past its worst injustices, and ours is just the latest entry on the list.
In its defense (as one who doesn’t appreciate the ‘snark’ or rants either), I feel The Intercept is still deciding what it wants to be when it grows up. It has good intentions but needs some mentoring by longterm journalists. Maybe they can steal Risen away from the Times. Or hire Jill Abramson. Or Time’s Jim Kelly. Someone with a vision and seasoning.
Know what I want for Christmas? I mean, in addition to the bottle of extra virgin olive oil my husband usually gets me. I want Pierre Omidyar to buy Mondoweiss and fold it into the Firstlook family. Then it wouldn’t be like Israel is always getting such short shrift around here. And you guys could raise each others’ Q. Is that too much to ask?
Well written article. What baffled me recently is how the North Koreans, a country with no internet, was able to hack Sony and download all their movies. They perhaps know more about the vulnerabilities of the communications on the net than most of us do. Would be fun if Sony sued NSA, but that they won’t.
Who is is that says they did? Why would you believe them?
North Korea has a fake internet: http://en.wikipedia.org/wiki/Internet_in_North_Korea … The “government” (haha) probably has very shoddy security, lost control of some servers and made it possible to relay an attack against Sony. I don’t buy Sony products, because I think they are pretty evil (and I had a publishing deal with them once), but their DRM and other security products have probably been undermined heavily by NSA disinformation campaigns. Campaigns like the one that has convinced even smart cryptographers that PRNG’s are good enough to base whole security systems on rather than use real entropy to to feed crypto systems.
Does anyone here, other than coram nobis, know who penned this extraordinary insight?
It is now a journalistic cliché to remark that George Orwell’s “1984” was “prophetic.” The novel was so prophetic that its prophecies have become modern-day prosaisms. Reading it now is a tedious experience. Against the omniscient marvels of today’s surveillance state, Big Brother’s fixtures — the watchful televisions and hidden microphones — seem quaint, even reassuring.
Everything about the world Orwell envisioned has become so obvious that one keeps running up against the novel’s narrative shortcomings.
I am more impressed with another of his oracles: the 1945 essay “You and the Atomic Bomb,” in which Orwell more or less anticipates the geopolitical shape of the world for the next half-century. “Ages in which the dominant weapon is expensive or difficult to make,” he explains, “will tend to be ages of despotism, whereas when the dominant weapon is cheap and simple, the common people have a chance … A complex weapon makes the strong stronger, while a simple weapon — so long as there is no answer to it — gives claws to the weak.”
Describing the atomic bomb (which had only two months before been used to flatten Hiroshima and Nagasaki) as an “inherently tyrannical weapon,” he predicts that it will concentrate power in the hands of the “two or three monstrous super-states” that have the advanced industrial and research bases necessary to produce it. Suppose, he asks, “that the surviving great nations make a tacit agreement never to use the atomic bomb against one another? Suppose they only use it, or the threat of it, against people who are unable to retaliate?”
The likely result, he concludes, will be “an epoch as horribly stable as the slave empires of antiquity.” Inventing the term, he predicts “a permanent state of ‘cold war,”’ a “peace that is no peace,” in which “the outlook for subject peoples and oppressed classes is still more hopeless.”
There are parallels between Orwell’s time and ours. For one, there has been a lot of talk about the importance of “protecting privacy” in recent months, but little about why it is important. It is not, as we are asked to believe, that privacy is inherently valuable. It is not.
The real reason lies in the calculus of power: the destruction of privacy widens the existing power imbalance between the ruling factions and everyone else, leaving “the outlook for subject peoples and oppressed classes,” as Orwell wrote, “still more hopeless.”
The second parallel is even more serious, and even less well understood. At present even those leading the charge against the surveillance state continue to treat the issue as if it were a political scandal that can be blamed on the corrupt policies of a few bad men who must be held accountable. It is widely hoped that all our societies need to do to fix our problems is to pass a few laws.
The cancer is much deeper than this. We live not only in a surveillance state, but in a surveillance society. Totalitarian surveillance is not only embodied in our governments; it is embedded in our economy, in our mundane uses of technology and in our everyday interactions.
The very concept of the Internet — a single, global, homogenous network that enmeshes the world — is the essence of a surveillance state. The Internet was built in a surveillance-friendly way because governments and serious players in the commercial Internet wanted it that way. There were alternatives at every step of the way. They were ignored.
At their core, companies like Google and Facebook are in the same business as the U.S. government’s National Security Agency. They collect a vast amount of information about people, store it, integrate it and use it to predict individual and group behavior, which they then sell to advertisers and others. This similarity made them natural partners for the NSA, and that’s why they were approached to be part of PRISM, the secret Internet surveillance program.
Unlike intelligence agencies, which eavesdrop on international telecommunications lines, the commercial surveillance complex lures billions of human beings with the promise of “free services.” Their business model is the industrial destruction of privacy. And yet even the more strident critics of NSA surveillance do not appear to be calling for an end to Google and Facebook.
Technical and technological advances brought about the dawn of human civilization.
Recalling Orwell’s remarks, there is an undeniable “tyrannical” side to the Internet. But the Internet is too complex to be unequivocally categorized as a “tyrannical” or a “democratic” phenomenon.
When people first gathered in cities, they were able to coordinate in large groups for the first time, and to exchange ideas quickly, at scale. The consequent technical and technological advances brought about the dawn of human civilization.
Something similar has been happening in our epoch. It is possible for more people to communicate and trade with others in more places in a single instant than it ever has been in history. The same developments that make our civilization easier to surveil make it harder to predict. They have made it easier for the larger part of humanity to educate itself, to race to consensus, and to compete with entrenched power groups.
This is encouraging, but unless it is nurtured, it may be short-lived.
If there is a modern analogue to Orwell’s “simple” and “democratic weapon,” which “gives claws to the weak” it is cryptography, the basis for the mathematics behind Bitcoin and the best secure communications programs. It is cheap to produce: cryptographic software can be written on a home computer. It is even cheaper to spread: software can be copied in a way that physical objects cannot. But it is also insuperable — the mathematics at the heart of modern cryptography are sound, and can withstand the might of a superpower. The same technologies that allowed the Allies to encrypt their radio communications against Axis intercepts can now be downloaded over a dial-up Internet connection and deployed with a cheap laptop.
Humanity cannot now reject the Internet, but clearly we cannot surrender it either.
Whereas in 1945, much of the world faced a half-century of tyranny as a result of the atomic bomb, in 2015, we face the inexorable spread of invasive mass surveillance and the attendant transfer of power to those connected to its superstructures. It is too early to say whether the “democratizing” or the “tyrannical” side of the Internet will eventually win out. But acknowledging them — and perceiving them as the field of struggle — is the first step toward acting effectively.
Humanity cannot now reject the Internet, but clearly we cannot surrender it either. Instead, we have to fight for it. Just as the dawn of atomic weapons inaugurated the Cold War, the manifold logic of the Internet is the key to understanding the approaching war for the intellectual center of our civilization.
“Work is love made visible.” KG
As Usual,
EA
And as I listen to Danny Brown, Resevor Dogs. We agree. Leave it at that. Who would have thought that being falsely corrected would be an incorrect offense. Long live the king. Long live the king. Yeah, EFF is not all fluff and games when they mix the NSA war games into the inconvenient nonencrypted thangs that disguise themselves as Tor like protection. D-O-G-S. What I am saying is that you are a hypocrite, and anyone with a non deception pattern would find you to be living a lie. Next time, smartness does not result in not seeing through a straight line of bullshit. From, Todd.
Re: Todd Bjorlo 05 Dec 2014 at 10:54 pm
Who or what is your comment replying to Todd?
As Usual,
EA
But that describes the situation up to about two decades after H and N. After that, the dominant problem for the superpowers was to stop everyone else from making the bomb, a very different situation. So his prediction was not, in fact, worth very much; the technology changed too quickly.
mike Sulzer 06 Dec 2014 at 12:03 pm
So, the most important take-away you gleaned from this piece of writing is that Orwell’s prescient analysis, by not divining the exact time-frame of technological development, “…was not, in fact, worth very much;”.
Do you not really understand what the author is saying, with or without the reference to Orwell, or are you just being obtuse?
“Work is love made visible.” KG
As Usual,
EA
Nonsense. Let’s not take his predictions and claim they were something they were not. Obviously he had no idea how fast technology would develop; few did. A very difficult engineering problem became a lot less difficult in twenty years, and the global situation changed significantly. Ignoring the truth is stupid.
After reading this article and the supporting documents(my head hurts a lot), the only good thing I can say about the NSA is their pretty logos on their letterhead. I wonder if they have a different one for each working group. Setting inane musings aside I was struck by the giddy current that ran through the entire lot of documents. The NSA appears to be advertising itself proudly for being well on it’s way to circumventing any resistance to its diabolical obsession with collecting it all. Why is the NSA bragging about its capabilities, and to whom is it doing so? Who are these “customers” so frequently mentioned in the docs? Are they paying customers? If so, who gets the money? If not, then why call them customers? Enquiring minds want to know. How can presumably intelligent people intentionally inject vulnerabilities into the system and expect nothing to go badly? Wow! My head still hurts, but I feel better after venting. Speak up people.
“Customers” refers to the various intelligence agencies, people in the Executive branch and law enforcement. It can also refer to a foreign country (Although I’m not sure about this). Anyone with a better understanding, please clarify the structure.
It is still unclear to me who has access to what data. Is there any group other than the NSA that has direct access to raw data, if so, under what conditions? Are for-profit contractors (Snowden worked at Booz Allen) writing the reports that are then sent to intelligence agencies and the executive branch? Do they have a vested interest in skewing the reports in a certain direction? Do the executives at the various NSA military defense contractors (or their parent companies) also have access to the database? Do any of the third parties who created software for the NSA have backdoor access to the database?
I think someone needs to define who exactly has access to raw intelligence and under what conditions, who is receiving reports and from whom and also who might have access to the system that might have ulterior motives. Once you create this massive collection database of worldwide communications, it is wide open to abuse and not necessarily from the young NSA employees we saw sitting at their desks in military uniforms on 60 minutes.
I am questioning these tactics not only for myself, but for other people. I watched Laura Poitras’s documentary, shot in Iraq. I meticulously searched for anything in that film that could have possibly made her a target. I saw nothing, in fact, she portrayed the on the ground U.S. military very sympathetically and they allowed her to stay in their quarters. So who put her on the “hit list”, meaning a five on the scale of five as she crossed borders? NSA or someone at Booz Allen Hamilton or their parent company…the Carlyle Group.
A note about the Carlyle Group, I worked for an heiress during the 2008 financial meltdown. She was Jewish Orthodox and her father was the best friend of the Israeli point man for Iran-Contra. Oh yes, the Israelis were involved, but they sold the Iranians such crap, that it was un unusable. Anyway, my drugged up (many wealthy people, regardless of religion, have very serious problems) Orthodox heiress thought the Carlyle Group was the scariest group on the face of the planet. Hmmm…and she wasn’t a candidate for Sainthood. She tried to do good. As is the case with many people, she had her good side and bad side. In 2008, when the food banks were desperate for money, she donated a large sums of money, so that average desperate New Yorkers could be fed. It’s difficult to judge people, they are complicated with many different motivations. Personally, I know that even the ultra-wealthy are unaware of their own motivations.
When we look for villains, we need to look for people with the whole picture, who organized this horror. Cheney et al.
Oops, was that not common knowledge? How’s this? Stop targeting me, I stop talking. Seems like a good deal.
Obama’s exception is “a clear national security or law enforcement”?
————————–
That’s everything! They stuck the same language in the Patriot Act. You might as well have done nothing if you’re going to give them authority that broad.
I think NSA is spending a lot of resources collecting information about all useless stuff that people would like to, in any case, share with all others including strangers, powered by a desire to advertise themselves. Those who don’t want to share their secrets with NSA would have been using alternative means of communication that NSA cannot intercept. So this whole exercise is a huge and ill-advised waste of public money. A few minor criminals may have been caught, some drug lords may have been lured into making indiscretionary calls, but by and large its really been a futile expenditure. Chancellor Merkel must have been ROFLing in private when newspapers carried articles of her cellphone being tracked – all that her cellphones which are accessible to NSA must be used for would have been conspiratorial messages to Obama and maybe some selfies.
It’s all so ridiculous that we are being taken for a ride. Obama has done a pretty creditable job fooling all of the people all of the time – well, almost all of the time had it not been for this inconvenience called Snowden.
Well, National Security Agency. Step it to the fucking plate, then. You want to serve your country? Then point out obvious facts, and relate them to felonies of a legal nature. Yeah, you are serving the United States of America. Sincerely, fat lazy private citizen with heavy demands on the American military. Well, from my angle, I didn’t sign the document to send you to the war. Yeah. I’m not mad about it.
note to self..file under:
Observations of narcississtic compulsions to talk on an iphone, when you know you’re selling out your grandchildrens greatgrandchildrens privacy…and..by virtue of the 16th amendment..you are paying for it. Congratulations. You are hereby nominated for this years Big Bang of Stupity award.
This is exactly what the NSA should be doing. Publishing an entire map showing all of the cell networks the NSA has compromised is extremely reckless, and there’s no way for any us to know what ramifications it will have. If we can’t stop the next Assad from using sarin gas because of this, are the author and editors of this story going to accept responsibility for that? How many people will this story get killed?
A cell phone can be stopped from tracking or bugging if it is placed in a Faraday Cage. A Faraday cage is a metal or conductive envelope that completely surrounds the electronic device and stops signals from going into or out of the cage. Two or more wraps of aluminum foil with the edges wrapped over will work. Snowden requested people to use the refrigerator as a Faraday cage for their cell phones. This can also be accomplished by making a pouch out of a metallized ie conductive fabric. Search youtube for Detracktor for a demonstration.
It’s fun to witness the sheer delight of the NSA at the ever growing cornucopia of digital information. They’re like kids in a candy shop; they want it all, regardless of what they can actually eat. Yes, once they’ve overdosed on information, they’ll be left with a stomach ache. But why not let them gorge a bit and enjoy themselves.
Eventually the NSA will realize you need only enough information to make a decision – additional information often produces indecision rather than better decisions. Just witness the present US administration – with more information at its disposal than any previous administration – utterly adrift on a sea of indecision.
What the US needs is someone who can make a decision, based on absolutely no information. In other words: a low information leader.
“Just witness the present US administration – with more information at its disposal than any previous administration – utterly adrift on a sea of indecision.
Brilliant. Et tu, Congress.
The name: “Aurora Gold.” Sounds like those little gold-foil-wrapped pats of butter the restaurants put out.
Sounds like a variety of marijuana.
Ahhh Those were the days. Bud was named after where it was grown. Colombian Gold, Cambodian Red, Thai Stick, and everyone’s favorite, Mexican dirt weed(not)
`jg..
re: Mexican dirt weed(not)
Classic! Nowadays we refer to it as the ‘Tex/Mex’.. Speaking of strains, my third-cousin’s, aunt’s, boyfriend’s, nephew has a west/east hybrid affectionately known as the ‘Humboldt Foggy-Bottom Crumbler’..
Yes, Benito. Because the one thing the world needs more is theft of souls and crushing of eternal Spirits. Leave it to the National Security Agency to harness this unique talent, oppress the general public and well-meaning people in particular, and then brand it as a constitutional Republic of a democracy. Only in the United States of America could the obvious be more amusing, and yeah, the Internet is a great resource for open licensing, creative competition, and releasing hilarious psychological analyses of where the elite went wrong (with compassion from Satanic elements and demonic totalities), who all clearly just want to point out that they are being more human than these people who think they are human beings themselves. While the death threats are amusing, and keep you entertained for the night, they may disturb your sleep and bring you newfound opportunities. Including rekindling old loving relationships and restoring them into true friendships, and threatening my overall lack of physical health with the prospects of compliant beautiful women who will cooperate for free. Good thing I met Beyonce, because I take blood pressure medicine now. I will leave it at that. I’m mad about it.
I think you are totally confused. Excess information does not get used in making decisions; it just sits there, never even looked at. The danger is what the collection process does to the privacy of the rest of us.
After reading your comment, yes.
‘Excess’ information is the information you consider during the decision making process which is not relevant to the decision itself. Information paralysis is a well known phenomenon which impedes decision making. Information which is not looked at is ‘extraneous’ information.
You get to define what excess information is? No. Excess information is all that stuff sitting on disk that they never can analyze.
Nor am I undermining my argument; the danger is exactly what I said: in the collection process. For example, the destruction of communication security for all because the NSA has made it possible for it to collect the info. You know, kind of what this article is about.
Of course there are other dangers as well. For example, someone will mine the data, in some very simple way, for personal gain, something having nothing to do with national security.
Your idea that anything but a tiny fraction of what they collect gets processed and used in decision making, some how confusing the issue, is absurd.
Agreed, but since they collect billions of pieces of information a day, even a tiny fraction is a huge amount of information to be processed by human beings. Suppose we only look at the task of identifying terrorism suspects (which admittedly is only a small component of this global information collection system). It will potentially generate a thousand false positives for every genuine threat. Someone has to decide how to allocate resources to deal with these potential threats. An enormous machinery has been put in place to accomplish this. Even the President, in his Terror Tuesday meetings is involved in the process of vetting targets. This is an enormous waste of a president’s time – he should be formulating strategic goals, not making tactical decisions. The root causes of terrorism and longer term ways of dealing with the problem are basically ignored because of the daily need to act on the new information generated every day by the vast collection system.
If I may use an analogy, it is a bit like working at a stressful job and being overwhelmed by daily requests to do things. Then you take a week off, and with nothing to do and no information to process, you reflect on your priorities. You return to work the next day and quit your job. In other words, the ‘excess’ information you were bombarded with daily was interfering with your ability to make the right decision.
Yes, yes, but now you are talking about something completely different from what you begin with:
In your most recent message you are discussing a situation in which it is necessary to go through a huge amount of information. In the first message in this discussion from which I have quoted just above, you are referring to paring down the amount of information used in the decision making process to just that which is useful. Those are two independent situations.
The motto (as shown in the image) is “Predict Plan Prevent”. I don’t think most Americans have any problem with the first 2 P’s. It is the third P that is disturbing. That third P (prevent) seems to imply that measures are being taken to leave holes in future encryption that is under development by private companies. Congress should pass laws banning the NSA from putting holes in encryption. As the article points out, if the NSA can access the holes then so can hackers and thieves.
I would suggest more P’s, please. As in: “Proper Prior Planning Prevents Piss-Poor Performance.”
They had a good plan, which was to collect “just enough” – but they silenced the Bill Binney’s, the Thomas Drakes, the Jesselyn Radack’s, the Snowden’s, the Assange’s, et .al who told them that “Collecting It All™” was wasteful, unlawful, and counter-productive.
And as you point out – poking “unseen” holes in our security with “hidden back-doors” makes as much sense for keeping us afloat in a sea of security as does filling the SS Security up with every data in the world.
Both tactics ends up with us being drowned. Piss-poor performance indeed.
While collecting it all can possibly have the adverse affect of making it harder to find the proverbial needle in the haystack, that is not my problem with “Collecting it All”. My problem with “Collecting it All” is the following:
The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.
Absolutely the paramount reason – as I said:”wasteful, unlawful, and counter-productive”.
This article is a JOKE. All traffic is UNENCRYPTED on the network. NSA do not intercept like that. Better instead of putting incorrect information, read more about security.
Julian Assange above the fold at NYT’s website, in a perhaps apropos commentary.
http://www.nytimes.com/2014/12/04/opinion/julian-assange-on-living-in-a-surveillance-society.html
Re: coram nobis 04 DEC 2014 at 3:40PM
A resounding THANK YOU for referencing this excellent piece of writing by Julian Assange. He conveys a very needed thoughtful and concise foundational understanding of this important topic, one that transcends mere informed reporting on the relative issues.
Every concerned critical thinking person needs to read and incorporate his astute reasoning!
“Work is love made visible.” KG
As Usual,
EA
My support of Assange may have made me the target I am, but I cannot disavow his elegant, eloquent writings on these important issues. Can a narcissist have such a wide world view? I suspect not.
Why is Afghanistan described on the map as having 67 percent “network coverage” by the NSA (ie 2 out of 3 network operators, presumably), when we know from previous leaks that Afghanistan’s telecoms are being 100 percent recorded and archived by US intelligence? Or am I wrong about that?
OFF the Taps!
I’d echo Lyra’s comment that no cellular network is secure. The A5 algorithm was never meant to be totally secure, it’s a weak algorithm with an obvious hole – your calls, messages etc. are in no way private as far as the network is concerned. Corporations and standards bodies like GSMA will bend over backwards to comply with government requests for access, in fact they demand it. So the question really is, why does the NSA want to undermine communications protocols covertly when the cellphone operators will do whatever the US gov. asks ? Two possible reasons: because some countries, even allies, may not be as willing to cooperate in the spying of their citizens as the US would like; and secondly there may be some instances – like spying on the GSMA – that are so unjustifiable that even the US government is embarrassed to request officially.
http://en.wikipedia.org/wiki/Jonathan_Wild
Precisely.
Jonathan Wilde (whah?) There’s a reason you bring that up?
Re: Jonathan Wild – Read the damn thing, Dabney – it’s multitudinously analogous to the current paradigm of entrenched self-sanctioned criminality running rampant worldwide amongst the powerful elite. You’ll love it – really. If not, your money back, I promise.
http://en.wikipedia.org/wiki/Jonathan_Wild
I know it, I have read screenplay adaptions. I just didn’t understand the reference last night because I was impaired. I love Henry Fielding. I have read Tom Jones many times. I still have the copy my mother’s English teacher Richard Dillard (Annie’s husband) at Hollins gave her when she got pregnant with me and had to drop out freshman year to have a baby. He gave her the book and an “A” anyway and said she deserved it because she was the only one who had done anything creative all year.
Can you hear the trumpets blow, Fernando? Only twelve episodes, but US needs two seasons just to get half way through the first UK one. Geesh, what slow burn.
Don’t be a button hole, get in the loop, Ryan. Newsroom is poop, but UK House of Cards is well ahead of you boys by two decades.
Watch your backs! FU’s already read the files. He’s not above manufacturing dissent to cover for his own flaws, especially if they are taking advantage of exclusive oil surveys while investing for his retirement. He thinks people prefer him when he’s murdering Greeks to cover for his sins Faulkland’s style, or do they only fear him? It matters not, just as long as we call him DADDY.
“How does those targets communicate?” Not very well, apparently…
What a bunch of gangsters pretending to be Templars! This will end in crocodile tears.
“I never knew my charitable foundation was invested in Auroragold. You might think so, but GCHQ couldn’t possibly confirm it. National security and all that dry rot.”
I do wonder how many of those security vulnerabilities introduced by the NSA, et al. have already been exploited by hackers intent on harming others. Ordinary people need to be made aware that they most likely have been or potentially could be harmed by these actions of the NSA.
According to @War: The Rise of the Military-Internet Complex by Shane Harris, the players in this game may be creating and maintaining these zero-day weapons, more than defending against them.
So all those gov officials whining about Apple and other firms new “encryption” was exactly as many suspected, carrying PR water for the tech giants. They (the gov officials including the head of the FBI) went on and on about how the terrorists were going to kill us all tomorrow because of the new encryption). Now we see how they work with their “partners” to protect their profits and still get everything they want. Apple Google and the rest had to have known all along that their “encryption” was flawed and purposely.
It is partially obscured on the slide, but am I correct in seeing that Canada is in red? Zero penetration? Canada is one of the five eyes. The Canadian government is one of the most extreme right wing allies of Obama. Is Canada in red because Canadian cell phone companies are populated by security geniuses, or is Canada so compliant in its handing over trade secrets, that this AURORAGOLD program is unnecessary there?
Room 641A… enough said.
Phone tapping is nothing new, what does the CIA use the cellular networks for?
Oh, I meant naval, iceholes, you know you are the leaky vessels.
Which division uses the big magnifying glass with their naval in the middle of it for a patch? Asscratch!
So, no one has looked into “Auroragold?”
http://aurora-gold.com
http://www.guygold.com/s/Aurora_Project.asp
http://en.wikipedia.org/wiki/Aurora_gold_mine
Manipulate gold prices, much, Five Eyes?
What permeates every single story like this one is the utter hubris of the NSA and its associates. The problem with their activity is simple: introducing vulnerabilities to allow their access makes everyone less secure/less safe. And, the only way not to see that obvious problem is to believe the NSA is populated with the smartest people on the planet. And, to believe they are only individuals in the whole world who can find and exploit these vulnerabilities. That level of demonstrated arrogance, on the part of the NSA, and wilful wishfulness, on the part of its defenders, is well and truly something to behold. Even if you wanted to believe that what the NSA/GCHQ/etc are doing is necessary and essential, and even if you wanted to believe they’d never abused/never betrayed their access, and never would, and even if you wanted to believe it was all “legal,” violated no citizens’ rights in any country, you cannot escape the notion that someone or some entity that is malevolent can’t find and exploit those vulnerabilities, as well.
It is absurd to imagine that the secrecy of their efforts, activities and program – somehow – protects the vulnerabilities they use to conduct their “mission.” Anyone who thinks that needs to read Medium/Back Channel piece on What Is a Hacker.** That mode of thinking, view of the world, way of going is not thwarted by what they don’t know. They don’t need the exposure of these circumstances to be able to imagine them. And, despite the NSA’s recruiting carrot (You can do here what is illegal to do anywhere else), the NSA cannot find and hire them all. New meaning to the “collect it all” mantra, eh? They may feel need to collect the whole world’s communications, but they’d better collect all the people who hacking skills and associated psychological architecture would find and use those vulnerabilities, as well. If that’s what they think they are doing and are able to do, then they’re mad. It’s an agency that is totally psychotic; it’s divorced from reality and fully ignorant of human nature. We are nearly to the level of a psychotic Dunning-Kruger.
The more I – as a plebeian – learn about these programs, the more lunatic I imagine the agencies that deploy them. And, the more I resent their blatant, and fully erroneous, view of themselves.
**https://medium.com/backchannel/what-is-a-hacker-51257cad8b54
I assume that once they have created a vulnerability, they ensure that Chinese and Russian spies get a copy. Without bad actors exploiting vulnerabilities, how would the NSA justify an increase in their operating budget? Everyone has to make a living.
These guys are making killings.
quote”Everyone has to make a living.”unquote
Yes they do. Including scumbags who sell their soul to the history of tyrannts for the sake of using one tyrant’s name to increase his visibility as a satirist weapon of reverse propaganda. In reality schmuck.. you will eventually disappear into the Milprop cyberspace too. The only question left..is how you are going to live with your self when you reach the realization that humanity doesn’t give a shit what came out of your mouth.
Thanks Chronicle…and Benito – it’s so hilarious. Can we have some more please? Because it’s so funny. Thanks so much. More please. You two are so brilliant, so genius, so please, just a little more? Not that we deserve it….or are smart enough to understand it it, but please, just a little more of your genius….please, for all us stupid plebs here… please…just a little more….
The Benito and chronicle show is getting a bit stale; it’s probably time to shake up the formula. I’ll make an innocuous comment, Chronicle can rant about how I’m the world’s most evil dictator since Barack Obama and then you can wade in with some over the top sarcasm. We’ll call it the B-C-D Show. Currently I take 80% of the profits and chronicle gets 20%. But I’m willing to cut chronicle’s share to 15% and give you 5%. Deal?
@Benito. That offer sounds a little stingy but I’ll run it past my agent. Sorry for the sarcasm.
Meanwhile, there is a lot of important news coming out of Israel, and I want to know why The Intercept is ignoring it. Has Craig finally succeeded in imposing his will on The Intercept’s editorial policies?
OK. I’ll cut chronicle to 10% and you get 10%. Final offer.
The Intercept is US centric, but that is understandable since most of its reporters are American.
The problem with reporting on your own country is that you lack perspective. The problem with reporting on another country is that you lack knowledge. It therefore appears that reporters are destined to fail, one way or another.
The problem with their activity is simple: introducing vulnerabilities to allow their access makes everyone less secure/less safe. And, the only way not to see that obvious problem is to believe the NSA is populated with the smartest people on the planet. And, to believe they are only individuals in the whole world who can find and exploit these vulnerabilities. That level of demonstrated arrogance, on the part of the NSA, and wilful wishfulness, on the part of its defenders, is well and truly something to behold.
I think they’re well-aware of that problem and choose not to give a shit what happens to the plebs as long as they get the information necessary to propagate their version of what they think the world should be. The alternatives that you lay out so well above, TallyHo, exist to some extent in the lower echelons I’m sure, but by the time one ascends to the top levels of this perniciousness, all that shiny rationalization has been worn off like the cheap gold paint on a bubble gum machine ring that’s been worn too many times, leaving bare the ugliness that is the base nature of control authoritarians everywhere. And people who willfully remain ignorant of the abuses that have already occurred and the huge potential for more are, as you noted, skewing what should be the norm for psychosis into some really bad places indeed.
And thanks for the link re: hackers. Very enlightening. That’s a term, like terrorist, that can be mis/used according to ones own agenda and so has a very fluid meaning.
Why shouldn’t I work for the NSA? https://www.youtube.com/watch?v=UrOZllbNarw
*(circa 1997) predicting gasoline @ $2.50/gal. was off a little bit.
bahhummingbug – Thanks for sharing that link; I remember that dialog and it’s frighteningly apropos. We don’t need pre-cogs to figure this shit out, just real-time cognition using data that we already have on hand – and the willingness to truly use that data to benefit the most of us.
Bottom line advice to the citizens of Planet Earth.
The only cell phone that is truly safe and encrypted is one without a battery.
Did not Mr. Snowden teach us that?
I see no longer see a reason to believe that blanket net encryption will diminish the problem of blanket surveillance either. Obviously the encryption has been specifically tailored -with the full collusion of the network providers and equipment manufacturers – to meet the needs of the government agencies which are performing the surveillance as opposed to those who are being electronically raped (those citizens of the Planet who are not completely owned by the government puppet masters of the elite).
What is needed is a few good men to cut the damn eye out of the triangle and rip the pyramid to the ground. End this evil nonsense once and for all.
Radical times call for radical countermeasures.
quote”Vines, the NSA spokeswoman, told The Intercept that the agency was committed to ensuring an “open, interoperable, and secure global internet.”“NSA deeply values these principles and takes great care to honor them in the performance of its lawful foreign-intelligence mission,” Vines said.”unquote
Bwahahahahahahahahahahahaha…hohohohohohohohohohohoh…hehehehehehehehehehehehe…hahahahahahahahahahahahahaha!
Living proof that spokespersons for the NSA get advanced training in lying through their teeth while keeping a straight face. Too bad they haven’t figured out how to hide their stench.
She says the same thing over and over, so only required skill seems to be memory. Don’t know how these people can live with themselves.
quote”The AURORAGOLD operation is carried out by specialist NSA surveillance units whose existence has not been publicly disclosed: the Wireless Portfolio Management Office, which defines and carries out the NSA’s strategy for exploiting wireless communications, and the Target Technology Trends Center, which monitors the development of new communication technology to ensure that the NSA isn’t blindsided by innovations that could evade its surveillance reach.”unquote
To ensure that the NSA isn’t blindsided. right. Living proof James Comey’s fear of Apple is a ruse. For any one who thinks the NSA hasn’t already compromised Apple’s “new” iphone encryption…I’ve got a bridge in Brooklyn for sale for a buck.