You are missing trading opportunities:
- Free trading apps
- Over 8,000 signals for copying
- Economic news for exploring financial markets
Registration
Log in
You agree to website policy and terms of use
If you do not have an account, please register
The United States Of Secrets
Hardly a day goes by without some new revelation regarding the US surveillance leviathan's reach. In the following (part 1 of a 2-part series), PBS' FrontLine reveals the dramatic inside story of how the U.S. government came to monitor and collect the communications of millions of people around the world - and the lengths they went to trying to hide the massive surveillance program from the public. From 9/11 to Edward Snowden and on to NSA reform - what must be done... a must-watch for all US citizens (if they can spare some time away from The Voice or Flappy Birds).
source
NSA Whistleblower Speaks: "The Ultimate Goal is Total Population Control"
At least 80% of fibre-optic cables globally go via the U.S. This is no accident and allows the US to view all communication coming in. At least 80% of all audio calls, not just metadata, are recorded and stored in the US. The NSA lies about what it stores.
- NSA Whistleblower Bill Binney
Long-time readers of Liberty Blitzkrieg will be no strangers to Bill Binney, one of the earliest NSA whistleblowers. Well before anyone had ever heard of Edward Snowden, in July 2012, I posted the following: NSA Whistleblower: U.S. Government Creating Dossiers on Millions of Citizens. In it, I noted:
Bill Binney is no joke. He worked for the NSA for 30 years before resigning because of concerns he had regarding illegal spying on U.S. citizens in 2001. It seems that the claim I and many others have made for years, that the “War on Terror” is a gigantic fraud used to instill fear and further the creation of an unconstitutional surveillance state in America is absolutely true. The “terrorists” they have declared war on are the American people themselves.
Mr. Binney thankfully has never stopped fighting for The Constitution that he swore to defend, unlike most other government officials who happily stomp all over the basic civil liberties enshrined in our founding document. He had some very choice words recently and it would be wise for all of us on planet earth to pay very close attention. We learn from the Guardian that:
William Binney is one of the highest-level whistleblowers to ever emerge from the NSA. He was a leading code-breaker against the Soviet Union during the Cold War but resigned soon after September 11, disgusted by Washington’s move towards mass surveillance.
“At least 80% of fibre-optic cables globally go via the US”, Binney said. “This is no accident and allows the US to view all communication coming in. At least 80% of all audio calls, not just metadata, are recorded and stored in the US. The NSA lies about what it stores.”
The NSA will soon be able to collect 966 exabytes a year, the total of internet traffic annually. Former Google head Eric Schmidt once argued that the entire amount of knowledge from the beginning of humankind until 2003 amount to only five exabytes.
He praised the revelations and bravery of former NSA contractor Edward Snowden and told me that he had indirect contact with a number of other NSA employees who felt disgusted with the agency’s work. They’re keen to speak out but fear retribution and exile, not unlike Snowden himself, who is likely to remain there for some time.
It shows that the NSA is not just pursuing terrorism, as it claims, but ordinary citizens going about their daily communications. “The NSA is mass-collecting on everyone”, Binney said, “and it’s said to be about terrorism but inside the US it has stopped zero attacks.”
Yep, as noted in the post: NSA Chief Admits “Only One or Perhaps Two” Terror Plots Stopped by Spy Program. Now back to the Guardian article.
“The Fisa court has only the government’s point of view”, he argued. “There are no other views for the judges to consider. There have been at least 15-20 trillion constitutional violations for US domestic audiences and you can double that globally.”
Binney recently told the German NSA inquiry committee that his former employer had a “totalitarian mentality” that was the “greatest threat” to US society since that country’s US Civil War in the 19th century. Despite this remarkable power, Binney still mocked the NSA’s failures, including missing this year’s Russian intervention in Ukraine and the Islamic State’s take-over of Iraq.
Well, I question the entire ISIS story and personally wonder if the U.S. is not perfectly fine with what is happening over there as a justification to future crackdown on civil liberties in the name of “fighting ISIS.”
With evidence that there could be a second NSA leaker, the time for more aggressive reporting is now. As Binney said: “I call people who are covering up NSA crimes traitors”.
Now watch this interview of Bill Binney from 2012:
It’s Not Just Spying – How The NSA Has Turned Into A Giant Profit Center For Corrupt
__________________________
If the above sounds like a joke, unfortunately it is not. Last week, two very important stories came out; one from Reuters and the other from Buzzfeed. They both zero in on how current NSA employees are using their expertise and connections to make big money in the private sector while still working at the NSA. Let’s start with the Reuters story, which covers former NSA-head Keith Alexander’s business relationship with the NSA’s current Chief Technical Officer, Patrick Dowd.
Before we get into the meat of this story, I want to set the stage with a little background. In case you forgot, Keith Alexander launched his own cyber-security firm, IronNet Cybersecurity Inc., earlier this year. I highlighted this development in the post, Ex-NSA Chief Keith Alexander is Now Pimping Advice to Wall Street Banks for $1 Million a Month, in which I noted:
Reuters reports that:
read more
Computer spying malware uncovered with 'stealth' features: Symantec
An advanced malicious software application has been uncovered that since 2008 was used to spy on private companies, governments, research institutes and individuals in 10 countries, anti virus software maker Symantec Corp said in a report on Sunday.
The Mountain View, California-based maker of Norton anti virus products said its research showed that a "nation state" was likely the developer of the malware called Regin, or Backdoor. Regin, but Symantec did not identify any countries or victims.
Symantec said Regin's design "makes it highly suited for persistent, long-term surveillance operations against targets," and was withdrawn in 2011 but resurfaced from 2013 onward.
The malware uses several "stealth" features "and even when its presence is detected, it is very difficult to ascertain what it is doing," according to Symantec. It said "many components of Regin remain undiscovered and additional functionality and versions may exist."
Almost half of all infections occurred at addresses of Internet service providers, the report said. It said the targets were customers of the companies rather than the companies themselves. About 28 percent of targets were in telecoms while other victims were in the energy, airline, hospitality and research sectors, Symantec said.
Symantec described the malware as having five stages, each "hidden and encrypted, with the exception of the first stage." It said "each individual stage provides little information on the complete package. Only by acquiring all five stages is it possible to analyze and understand the threat."
Regin also uses what is called a modular approach that allows it to load custom features tailored to targets, the same method applied in other malware, such as Flamer and Weevil (The Mask), the anti virus company said. Some of its features were also similar to Duqu malware, uncovered in September 2011 and related to a computer worm called Stuxnet, discovered the previous year.
Cybersecurity is a sensitive topic for businesses in the United States, where there have been several breaches of major companies and customer information. The U.S. government and private cyber intelligence firms have said they suspect state-backed hackers in China or Russia may be responsible.
Symantec said Russia and Saudi Arabia accounted for about half of the confirmed infections of the Regin malware and the other countries were Mexico, Ireland, India, Iran, Afghanistan, Belgium, Austria and Pakistan.
source
"many components of Regin remain undiscovered and additional functionality and versions may exist."
That is a work of professionals - not some part time hackers. NSA working again
This has been known for many years by the Android custom ROM community. Surprised that it hadn't become common public knowledge before this. Custom ROMming also involves tearing down a ROM to see whats in it. And things like these were found EONS ago.
This has been known for many years by the Android custom ROM community. Surprised that it hadn't become common public knowledge before this. Custom ROMming also involves tearing down a ROM to see whats in it. And things like these were found EONS ago.
You men ECHELONs ago