Archive for the NSA Category

Can the NSA lock you out of your home?

Posted in NSA, Spying with tags , , , , on December 31, 2013 by saynsumthn

According to the Magazine Spiegel, In January 2010, numerous homeowners in San Antonio, Texas, stood baffled in front of their closed garage doors. They wanted to drive to work or head off to do their grocery shopping, but their garage door openers had gone dead, leaving them stranded. No matter how many times they pressed the buttons, the doors didn’t budge. The problem primarily affected residents in the western part of the city, around Military Drive and the interstate highway known as Loop 410.

In the United States, a country of cars and commuters, the mysterious garage door problem quickly became an issue for local politicians. Ultimately, the municipal government solved the riddle. Fault for the error lay with the United States’ foreign intelligence service, the National Security Agency, which has offices in San Antonio. Officials at the agency were forced to admit that one of the NSA’s radio antennas was broadcasting at the same frequency as the garage door openers. Embarrassed officials at the intelligence agency promised to resolve the issue as quickly as possible, and soon the doors began opening again.

It was thanks to the garage door opener episode that Texans learned just how far the NSA’s work had encroached upon their daily lives. For quite some time now, the intelligence agency has maintained a branch with around 2,000 employees at Lackland Air Force Base, also in San Antonio. In 2005, the agency took over a former Sony computer chip plant in the western part of the city. A brisk pace of construction commenced inside this enormous compound. The acquisition of the former chip factory at Sony Place was part of a massive expansion the agency began after the events of Sept. 11, 2001.

More here

Report: NSA Intercepts Computer Deliveries read here

Big Brother NSA is spying on you thru your IPhone and computers

Posted in Big Brother, biometrics, NSA, Spying with tags , , , , , , , , , , , , , on December 31, 2013 by saynsumthn

nsa-iphone-hack-2008-document-1
Almost no communication shared by users of Apple’s iPhone is sacred or hidden from the U.S. National Security Agency (NSA), thanks to a spyware program called DROPOUTJEEP that allows the agency to intercept SMS messages, access contacts, locate, and even activate the device’s camera and microphone.

Leaked documents made public by security researcher Jacob Appelbaum and Der Spiegel, a German news magazine, report that iOS devices implanted with DROPOUTJEEP have been successfully breached in 100 percent of the cases, according to a report in The Daily Dot.

“DROPOUTJEEP is a software implant for the Apple iPhone that utilizes modular mission applications to provide specific SIGINT functionality. This functionality includes the ability to remotely push/pull files from the device, SMS retrieval, contact list retrieval, voicemail, geolocation, hot mic, camera capture, cell tower location, etc. Command, control, and data exfiltration can occur over SMS messaging or a GPRS data connection. All communications with the implant will be covert and encrypted,” noted the report.

The National Security Agency (NSA) has apparently able to hack the iPhone since 2008, according to a Der Spiegel interactive report that looks at the NSA’s various tools used for spying purposes. One particularly interesting tool, codenamed “DROPOUTJEEP,” is an implant that was first used to compromise the first-generation iPhone and was able to send various data stored on the phone to the agency, including text messages, address book contacts, geolocation and voicemail. Furthermore, the software could activate the microphone of the iPhone, turn on the camera and take pictures and retrieve cell tower location.

The leaked materials show that the NSA had various other mobile-related spying “products” that worked with other smart devices:

GOPHERSET – an implant for GSM SIM cards to pull phone book, SMS and log files for incoming and outgoing calls
MONKEYCALENDAR – attack software that forces a SIM card to transmit geolocation data via covert SMS messages
TOTECHASER – an implant hidden in a satellite phone running Windows CE that transmits data via hidden SMS messages
TOTEGHOSTLY – an implant that enables full remote control on Windows Mobile phones offering data download and upload capabilities
PICASSO – modified GSM handsets that collect user data, audio data while also tracking the location of the handset

NSA Interception: Spy malware installed on laptops bought online

NSA Spies on Pope

Posted in NSA with tags , , , , on October 30, 2013 by saynsumthn

According to IBTimes, US secret services allegedly monitored the phone calls of Pope Benedict XVI, as well as those of his successor.

Italian magazine Panorama claims that among the 46 million phone calls intercepted by the NSA in December 2012 and January 2013 were communications to and from the Vatican.

The NSA allegedly eavesdropped on cardinals before the conclave in March 2013 to elect the new Pope, including calls between them and Cardinal Bergoglio, who became Pope Francis, succeeding Benedict.

“In any case, we have no concerns about the matter,” a Vatican spokesman told IBTimes UK.

According to the magazine — which is owned by former Italian prime minister Silvio Berlusconi — the calls had been classified by the NSA under four categories: “leadership intentions”; “threats to financial system”; “foreign policy objectives”; and “human rights”.

READ MORE here

NSA spying on American citizens deepens to internet traffic

Posted in Big Brother, Internet, NSA with tags , , , , , on August 21, 2013 by saynsumthn

The Wall Street Journal peels back another layer of the NSA surveillance onion with an exclusive report:

The National Security Agency—which possesses only limited legal authority to spy on U.S. citizens—has built a surveillance network that covers more Americans’ Internet communications than officials have publicly disclosed, current and former officials say. The system has the capacity to reach roughly 75% of all U.S. Internet traffic in the hunt for foreign intelligence, including a wide array of communications by foreigners and Americans. In some cases, it retains the written content of emails sent between citizens within the U.S. and also filters domestic phone calls made with Internet technology, these people say.

More details on “filtering” capabilities and processes. Note well the bits about content interception and data storage:

The NSA’s filtering, carried out with telecom companies, is designed to look for communications that either originate or end abroad, or are entirely foreign but happen to be passing through the U.S. But officials say the system’s broad reach makes it more likely that purely domestic communications will be incidentally intercepted and collected in the hunt for foreign ones…This filtering takes place at more than a dozen locations at major Internet junctions in the U.S., officials say. Previously, any NSA filtering of this kind was largely believed to be happening near points where undersea or other foreign cables enter the country….The NSA is focused on collecting foreign intelligence, but the streams of data it monitors include both foreign and domestic communications. Inevitably, officials say, some U.S. Internet communications are scanned and intercepted, including both “metadata” about communications, such as the “to” and “from” lines in an email, and the contents of the communications themselves. Much, but not all, of the data is discarded, meaning some communications between Americans are stored in the NSA’s databases, officials say. Some lawmakers and civil libertarians say that, given the volumes of data NSA is examining, privacy protections are insufficient.

MORE at TownHall

NSA audit proves BIG BROTHER is spying on Americans

Posted in Big Brother, Constitution, NSA with tags , , , on August 16, 2013 by saynsumthn

The National Security Agency has overstepped its authority and broken privacy rules thousands of times every year since being given new surveillance powers by Congress in 2008, The Washington Post reported, citing an internal audit and other secret documents.

The documents, which the Post claims it received earlier this summer from NSA leaker Edward Snowden, detail how the controversial agency has crossed the line many times over in its collection of massive amounts of data from around the world.

Read more: http://www.foxnews.com/politics/2013/08/16/nsa-reportedly-broke-privacy-rules-thousands-times/#ixzz2c9gb6drX

The documents, provided earlier this summer to The Washington Post by former NSA contractor Edward Snowden, include a level of detail and analysis that is not routinely shared with Congress or the special court that oversees surveillance. In one of the documents, agency personnel are instructed to remove details and substitute more generic language in reports to the Justice Department and the Office of the Director of National Intelligence.

In one instance, the NSA decided that it need not report the unintended surveillance of Americans. A notable example in 2008 was the interception of a “large number” of calls placed from Washington when a programming error confused the U.S. area code 202 for 20, the international dialing code for Egypt, according to a “quality assurance” review that was not distributed to the NSA’s oversight staff.

In another case, the Foreign Intelligence Surveillance Court, which has authority over some NSA operations, did not learn about a new collection method until it had been in operation for many months. The court ruled it unconstitutional.

The NSA audit obtained by The Post, dated May 2012, counted 2,776 incidents in the preceding 12 months of unauthorized collection, storage, access to or distribution of legally protected communications. Most were unintended. Many involved failures of due diligence or violations of standard operating procedure. The most serious incidents included a violation of a court order and unauthorized use of data about more than 3,000 Americans and green-card holders.

NSA and DEA collaboration on spying on Americans

Posted in DEA, Homeland Security, NSA, Special Operations Division with tags , , , , , , , , , on August 7, 2013 by saynsumthn

A secretive U.S. Drug Enforcement Administration unit is funneling information from intelligence intercepts, wiretaps, informants and a massive database of telephone records to authorities across the nation to help them launch criminal investigations of Americans.

Although these cases rarely involve national security issues, documents reviewed by Reuters show that law enforcement agents have been directed to conceal how such investigations truly begin – not only from defense lawyers but also sometimes from prosecutors and judges.

The undated documents show that federal agents are trained to “recreate” the investigative trail to effectively cover up where the information originated, a practice that some experts say violates a defendant’s Constitutional right to a fair trial. If defendants don’t know how an investigation began, they cannot know to ask to review potential sources of exculpatory evidence – information that could reveal entrapment, mistakes or biased witnesses.

“I have never heard of anything like this at all,” said Nancy Gertner, a Harvard Law School professor who served as a federal judge from 1994 to 2011. Gertner and other legal experts said the program sounds more troubling than recent disclosures that the National Security Agency has been collecting domestic phone records. The NSA effort is geared toward stopping terrorists; the DEA program targets common criminals, primarily drug dealers.

“It is one thing to create special rules for national security,” Gertner said. “Ordinary crime is entirely different. It sounds like they are phonying up investigations.”

Read more at Reuters

OBAMA and NIXON AGREE ON NSA:

Posted in NSA, Richard Nixon with tags , , , , , on July 3, 2013 by saynsumthn

FROM THE NYT:

In the Oval Office on May 16, 1973, Mr. Buzhardt told Nixon about his discussions with the deputy director of the National Security Agency, Louis W. Tordella, about the Huston plan. The N.S.A. conducts international electronic eavesdropping, but like the C.I.A., it is not supposed to spy on Americans at home.

”Anything the N.S.A. did is totally defensible,” Nixon said, referring to the Huston plan.

Mr. Buzhardt replied: ”They move into a broader category with respect to domestic affairs” — an illegal realm.

”What do you mean?” Nixon asked. ”Electronic surveillance?”

Mr. Buzhardt replied, ”Yes, sir, targeting U.S. citizens’ conversations.”
In the Oval Office on May 16, 1973, Mr. Buzhardt told Nixon about his discussions with the deputy director of the National Security Agency, Louis W. Tordella, about the Huston plan. The N.S.A. conducts international electronic eavesdropping, but like the C.I.A., it is not supposed to spy on Americans at home.

”Anything the N.S.A. did is totally defensible,” Nixon said, referring to the Huston plan.

Mr. Buzhardt replied: ”They move into a broader category with respect to domestic affairs” — an illegal realm.

”What do you mean?” Nixon asked. ”Electronic surveillance?”

Mr. Buzhardt replied, ”Yes, sir, targeting U.S. citizens’ conversations.”