©ALL CONTENT OF THIS WEBSITE IS COPYRIGHTED AND CANNOT BE REPRODUCED WITHOUT THE ADMINISTRATORS CONSENT 2003-2020



National Security and Fbi tapping in!!

Bull_Nuts

Registered User
Jul 26, 2013
648
0
16
People are naive if the think they are not doing every single thing they feel like doing....
 

AnaSCI

ADMINISTRATOR
Sep 17, 2003
8,625
18
38
NSA bugged UN Offices

NSA reportedly bugged UN offices, hacked into video conferencing feeds | The Verge

The NSA bugged offices in the UN's New York headquarters as part of a comprehensive surveillance program, says Der Spiegel. According to files leaked by Edward Snowden, the agency has bugged more than 80 embassies and consulates under a program called the "Special Collection Service." The program is "intensive and well organized and has little or nothing to do with warding off terrorists." In New York, that included tapping into video conference calls, which the NSA managed to do in the summer of 2012. "The data traffic gives us internal video teleconferences of the United Nations (yay!)," reads one document, which also says that the number of communications that were decoded rose from 12 to 458 in three weeks.

Der Spiegel also reports that besides the UN's headquarters, the European Union and International Atomic Energy Agency were bugged — Snowden's documents allegedly include IT infrastructure and server information from the EU's New York delegation. Previous documents have already pointed towards a wide-ranging effort to surveil the EU across several countries, prompting European backlash against the US.

It was already suspected that the NSA had routinely bugged UN offices for decades before 2012. In his exposé The Shadow Factory, journalist James Bamford reported that the agency spied heavily on UN officials in the lead-up to the war in Iraq, looking for ways to sway them into supporting the invasion. "From the first day I entered my office they said, ‘Beware, your office is bugged, your residence is bugged, and it is a tradition that the member states who have the technical capacity to bug will do it without any hesitation,'" said former UN Secretary-General Boutros Boutros-Ghali. In 2004, UK member of parliament Claire Short revealed that she had seen transcripts of confidential conversations involving Kofi Annan — who led the UN during the Iraq war — and implicated British spies in the bugging effort. The recent firestorm of anti-NSA and anti-GCHQ sentiment, however, could put more force behind these latest allegations.
 

AnaSCI

ADMINISTRATOR
Sep 17, 2003
8,625
18
38
US "Black Budget"

Unprecedented 'black budget' leak reveals the scope of $52 billion US spy complex | The Verge

Former NSA contractor Edward Snowden has leaked documents that map out a $52.6 billion budget for the NSA, CIA, and other security agencies in unprecedented detail. The Washington Post, which reviewed the documents, describes a detailed list of objectives, failures, technologies, recruiting, and other information; the apparently 178-page summary itself has not been published. An interactive chart of some of the data, however, accompanies the piece.

The Post reveals that CIA and NSA budgets have increased by over 50 percent each since 2004, with the CIA reaching $14.7 billion in 2013. Though budgets fell from 2012 levels, total funding is still almost twice what it was in 2001. The overall number is revealed each year, but these breakdowns are not included for security reasons. Among other things, the budget lays out "gaps" in counterterrorism efforts regarding Hezbollah, China's fighter planes, and Pakistan's nuclear program. One chart apparently shows several goals for addressing biological and chemical weapons questions, with dismal results: intelligence agencies hoped to make progress on at least five "gaps" a year, but they managed to work on only two in 2011 and none in 2010.

Here is a link to the Washington Post's 52.6 billion dollar Black Budget breakdown:

http://www.washingtonpost.com/wp-srv/special/national/black-budget/
 

AnaSCI

ADMINISTRATOR
Sep 17, 2003
8,625
18
38
Most common encryption protocols are useless against NSA surveillance, new leak reveals

Most common encryption protocols are useless against NSA surveillance, new leak reveals | The Verge

A new leak appearing in The Guardian and The New York Times today details the NSA and GHCQ efforts to circumvent, undermine, and crack various forms of web encryption, based on documents leaked by Edward Snowden. If the details in the document are accurate, the HTTPS and SSL encryption used by most email and banking services offers little to no protection against NSA surveillance.

The articles detail a decade-long NSA project to attack encryption standards from every angle, employing server farms for brute-force decryption, using malware to intercept messages before encryption could take place, and working from within the tech industry to ensure the adoption of protocols that would be easier to circumvent. In one 2006 incident, the NSA even became sole editor of an encryption standard, able to insert backdoors and workarounds at will. The resulting code was often suspected of government tampering, but never proven until now.

As a result, a 2010 GHCQ memo says, "Vast amounts of encrypted internet data which have up till now been discarded are now exploitable." The decryption effort was particularly important to the UK's surveillance efforts, as it allowed them to make sense of the torrents of encrypted data they collected from tapping into undersea web cables. Without some method of decoding the data, collection would have been useless.

The leak also show an aggressive effort to collect and store decryption keys for the NSA's Key Provisioning Service, which the documents say is capable of decrypting many messages outright. The keys are reportedly gathered through both legal and extra-legal means, although experts told the Times it was likely the agency was hacking into corporate servers to obtain many of them.

It also answers many of the questions raised by the NSA's PRISM program. After the details of the program leaked, companies lined up to deny bulk decryption of user data, leading many to wonder how the NSA was able to access the data without the companies' help. While today's leaks don't answer the question definitively, they help explain many of the contradictions involved, and raise troubling new questions about the encryption standards protecting everything from private emails to credit card transactions.
 

srd1

AnaSCI VET / Donating Member
Feb 19, 2013
2,311
0
36
midwest usa
Jesus this shit is out of control when does it stop and what exactly is going to be the breaking point when we as american citizens say fuck this. ...enough is enough!!!! I swear to god this just pushes me closer and closer to buying property in the mountains and going completely off grid.