Archive for NSA

Can the NSA lock you out of your home?

Posted in NSA, Spying with tags , , , , on December 31, 2013 by saynsumthn

According to the Magazine Spiegel, In January 2010, numerous homeowners in San Antonio, Texas, stood baffled in front of their closed garage doors. They wanted to drive to work or head off to do their grocery shopping, but their garage door openers had gone dead, leaving them stranded. No matter how many times they pressed the buttons, the doors didn’t budge. The problem primarily affected residents in the western part of the city, around Military Drive and the interstate highway known as Loop 410.

In the United States, a country of cars and commuters, the mysterious garage door problem quickly became an issue for local politicians. Ultimately, the municipal government solved the riddle. Fault for the error lay with the United States’ foreign intelligence service, the National Security Agency, which has offices in San Antonio. Officials at the agency were forced to admit that one of the NSA’s radio antennas was broadcasting at the same frequency as the garage door openers. Embarrassed officials at the intelligence agency promised to resolve the issue as quickly as possible, and soon the doors began opening again.

It was thanks to the garage door opener episode that Texans learned just how far the NSA’s work had encroached upon their daily lives. For quite some time now, the intelligence agency has maintained a branch with around 2,000 employees at Lackland Air Force Base, also in San Antonio. In 2005, the agency took over a former Sony computer chip plant in the western part of the city. A brisk pace of construction commenced inside this enormous compound. The acquisition of the former chip factory at Sony Place was part of a massive expansion the agency began after the events of Sept. 11, 2001.

More here

Report: NSA Intercepts Computer Deliveries read here

Big Brother NSA is spying on you thru your IPhone and computers

Posted in Big Brother, biometrics, NSA, Spying with tags , , , , , , , , , , , , , on December 31, 2013 by saynsumthn

nsa-iphone-hack-2008-document-1
Almost no communication shared by users of Apple’s iPhone is sacred or hidden from the U.S. National Security Agency (NSA), thanks to a spyware program called DROPOUTJEEP that allows the agency to intercept SMS messages, access contacts, locate, and even activate the device’s camera and microphone.

Leaked documents made public by security researcher Jacob Appelbaum and Der Spiegel, a German news magazine, report that iOS devices implanted with DROPOUTJEEP have been successfully breached in 100 percent of the cases, according to a report in The Daily Dot.

“DROPOUTJEEP is a software implant for the Apple iPhone that utilizes modular mission applications to provide specific SIGINT functionality. This functionality includes the ability to remotely push/pull files from the device, SMS retrieval, contact list retrieval, voicemail, geolocation, hot mic, camera capture, cell tower location, etc. Command, control, and data exfiltration can occur over SMS messaging or a GPRS data connection. All communications with the implant will be covert and encrypted,” noted the report.

The National Security Agency (NSA) has apparently able to hack the iPhone since 2008, according to a Der Spiegel interactive report that looks at the NSA’s various tools used for spying purposes. One particularly interesting tool, codenamed “DROPOUTJEEP,” is an implant that was first used to compromise the first-generation iPhone and was able to send various data stored on the phone to the agency, including text messages, address book contacts, geolocation and voicemail. Furthermore, the software could activate the microphone of the iPhone, turn on the camera and take pictures and retrieve cell tower location.

The leaked materials show that the NSA had various other mobile-related spying “products” that worked with other smart devices:

GOPHERSET – an implant for GSM SIM cards to pull phone book, SMS and log files for incoming and outgoing calls
MONKEYCALENDAR – attack software that forces a SIM card to transmit geolocation data via covert SMS messages
TOTECHASER – an implant hidden in a satellite phone running Windows CE that transmits data via hidden SMS messages
TOTEGHOSTLY – an implant that enables full remote control on Windows Mobile phones offering data download and upload capabilities
PICASSO – modified GSM handsets that collect user data, audio data while also tracking the location of the handset

NSA Interception: Spy malware installed on laptops bought online

NSA Spies on Pope

Posted in NSA with tags , , , , on October 30, 2013 by saynsumthn

According to IBTimes, US secret services allegedly monitored the phone calls of Pope Benedict XVI, as well as those of his successor.

Italian magazine Panorama claims that among the 46 million phone calls intercepted by the NSA in December 2012 and January 2013 were communications to and from the Vatican.

The NSA allegedly eavesdropped on cardinals before the conclave in March 2013 to elect the new Pope, including calls between them and Cardinal Bergoglio, who became Pope Francis, succeeding Benedict.

“In any case, we have no concerns about the matter,” a Vatican spokesman told IBTimes UK.

According to the magazine — which is owned by former Italian prime minister Silvio Berlusconi — the calls had been classified by the NSA under four categories: “leadership intentions”; “threats to financial system”; “foreign policy objectives”; and “human rights”.

READ MORE here

NSA spying on American citizens deepens to internet traffic

Posted in Big Brother, Internet, NSA with tags , , , , , on August 21, 2013 by saynsumthn

The Wall Street Journal peels back another layer of the NSA surveillance onion with an exclusive report:

The National Security Agency—which possesses only limited legal authority to spy on U.S. citizens—has built a surveillance network that covers more Americans’ Internet communications than officials have publicly disclosed, current and former officials say. The system has the capacity to reach roughly 75% of all U.S. Internet traffic in the hunt for foreign intelligence, including a wide array of communications by foreigners and Americans. In some cases, it retains the written content of emails sent between citizens within the U.S. and also filters domestic phone calls made with Internet technology, these people say.

More details on “filtering” capabilities and processes. Note well the bits about content interception and data storage:

The NSA’s filtering, carried out with telecom companies, is designed to look for communications that either originate or end abroad, or are entirely foreign but happen to be passing through the U.S. But officials say the system’s broad reach makes it more likely that purely domestic communications will be incidentally intercepted and collected in the hunt for foreign ones…This filtering takes place at more than a dozen locations at major Internet junctions in the U.S., officials say. Previously, any NSA filtering of this kind was largely believed to be happening near points where undersea or other foreign cables enter the country….The NSA is focused on collecting foreign intelligence, but the streams of data it monitors include both foreign and domestic communications. Inevitably, officials say, some U.S. Internet communications are scanned and intercepted, including both “metadata” about communications, such as the “to” and “from” lines in an email, and the contents of the communications themselves. Much, but not all, of the data is discarded, meaning some communications between Americans are stored in the NSA’s databases, officials say. Some lawmakers and civil libertarians say that, given the volumes of data NSA is examining, privacy protections are insufficient.

MORE at TownHall

NSA and DEA collaboration on spying on Americans

Posted in DEA, Homeland Security, NSA, Special Operations Division with tags , , , , , , , , , on August 7, 2013 by saynsumthn

A secretive U.S. Drug Enforcement Administration unit is funneling information from intelligence intercepts, wiretaps, informants and a massive database of telephone records to authorities across the nation to help them launch criminal investigations of Americans.

Although these cases rarely involve national security issues, documents reviewed by Reuters show that law enforcement agents have been directed to conceal how such investigations truly begin – not only from defense lawyers but also sometimes from prosecutors and judges.

The undated documents show that federal agents are trained to “recreate” the investigative trail to effectively cover up where the information originated, a practice that some experts say violates a defendant’s Constitutional right to a fair trial. If defendants don’t know how an investigation began, they cannot know to ask to review potential sources of exculpatory evidence – information that could reveal entrapment, mistakes or biased witnesses.

“I have never heard of anything like this at all,” said Nancy Gertner, a Harvard Law School professor who served as a federal judge from 1994 to 2011. Gertner and other legal experts said the program sounds more troubling than recent disclosures that the National Security Agency has been collecting domestic phone records. The NSA effort is geared toward stopping terrorists; the DEA program targets common criminals, primarily drug dealers.

“It is one thing to create special rules for national security,” Gertner said. “Ordinary crime is entirely different. It sounds like they are phonying up investigations.”

Read more at Reuters

OBAMA and NIXON AGREE ON NSA:

Posted in NSA, Richard Nixon with tags , , , , , on July 3, 2013 by saynsumthn

FROM THE NYT:

In the Oval Office on May 16, 1973, Mr. Buzhardt told Nixon about his discussions with the deputy director of the National Security Agency, Louis W. Tordella, about the Huston plan. The N.S.A. conducts international electronic eavesdropping, but like the C.I.A., it is not supposed to spy on Americans at home.

”Anything the N.S.A. did is totally defensible,” Nixon said, referring to the Huston plan.

Mr. Buzhardt replied: ”They move into a broader category with respect to domestic affairs” — an illegal realm.

”What do you mean?” Nixon asked. ”Electronic surveillance?”

Mr. Buzhardt replied, ”Yes, sir, targeting U.S. citizens’ conversations.”
In the Oval Office on May 16, 1973, Mr. Buzhardt told Nixon about his discussions with the deputy director of the National Security Agency, Louis W. Tordella, about the Huston plan. The N.S.A. conducts international electronic eavesdropping, but like the C.I.A., it is not supposed to spy on Americans at home.

”Anything the N.S.A. did is totally defensible,” Nixon said, referring to the Huston plan.

Mr. Buzhardt replied: ”They move into a broader category with respect to domestic affairs” — an illegal realm.

”What do you mean?” Nixon asked. ”Electronic surveillance?”

Mr. Buzhardt replied, ”Yes, sir, targeting U.S. citizens’ conversations.”

David Gregory accused of wanting journalists prosecuted for covering whistleblowers of Secret Court and NSA

Posted in Media Bias, NSA with tags , , , , , , , , , , , on June 24, 2013 by saynsumthn

NBC “Meet the Press” host David Gregory got a rise out of Glenn Greenwald on Sunday by asking the Guardian reporter why he shouldn’t be charged with a crime for having “aided and abetted” former National Security Agency analyst Edward Snowden.Greenwald replied on the show Sunday that it was “pretty extraordinary that anybody who would call themselves a journalist would publicly muse about whether or not other journalists should be charged with felonies.”

Greenwald replied on the show Sunday that it was “pretty extraordinary that anybody who would call themselves a journalist would publicly muse about whether or not other journalists should be charged with felonies.”

Don’t look for this portion of the interview on NBC’s Meet the Press website- its not there – wonder why?

GGreenwald

NY Times on Snowden