FAQ   Search   Memberlist   Usergroups   Register   Profile   Log in to check your private messages   Log in 
The NDAA police state
Goto page Previous  1, 2, 3 ... 10, 11, 12 ... 19, 20, 21  Next
 
Post new topic   Reply to topic    The Next Level Forum Index -> General Discussion
  ::  Previous topic :: Next topic  
Author Message
Fintan
Site Admin


Joined: 18 Jan 2006
Posts: 7990

PostPosted: Mon Jun 10, 2013 7:22 pm    Post subject: Reply with quote



Well, Daniel Ellsberg thinks it's the straight dope.
So that's good enough for me: it stinks.

Timing stinks too.
They may be bringing this issue to the
fore now - to win hands down on it.

Coming in the wake of the Boston bombings - that context
can be now used as justification for certain bending of normal
constitutional rights.

Alteration of cultural zeitgeist now under way.

Even more abnormal dis-service will soon resume.

_________________
Minds are like parachutes.
They only function when open.
Back to top
View user's profile Send private message Send e-mail Visit poster's website
Fintan
Site Admin


Joined: 18 Jan 2006
Posts: 7990

PostPosted: Mon Jun 10, 2013 7:24 pm    Post subject: Reply with quote

Quote:

_________________
Minds are like parachutes.
They only function when open.
Back to top
View user's profile Send private message Send e-mail Visit poster's website
Rumpl4skn



Joined: 11 Feb 2006
Posts: 2950
Location: 36� 3'N x 86�40'W

PostPosted: Mon Jun 10, 2013 7:36 pm    Post subject: Reply with quote

Love that one. Very Happy
_________________
"No matter what happens, ever... there's ALWAYS at least one reason. And the top reason is ALWAYS money."
Back to top
View user's profile Send private message Visit poster's website AIM Address Yahoo Messenger
Fintan
Site Admin


Joined: 18 Jan 2006
Posts: 7990

PostPosted: Tue Jun 11, 2013 9:05 am    Post subject: Reply with quote

Quote:
Must-read 2007 Salon article by Tim Shorrock on
Snowden's NSA contract employer Booz Allen

(h/t Richard Smith, Yves):

Quote:
With revenues of $3.7 billion in 2005, Booz Allen is one of the nations
biggest defense and intelligence contractors
. Under [J.Michael] McConnells
watch, Booz Allen has been deeply involved in some of the most
controversial counterterrorism programs the Bush administration has run,
including the infamous Total Information Awareness data-mining scheme.

As a key contractor and advisor to the NSA, Booz Allen is almost certainly
participating in the agencys warrantless surveillance of the telephone calls
and e-mails of American citizens

U.S. intelligence budgets are classified, as are nearly all intelligence
contracts. But the overall budget is generally understood to be running
about $45 billion a year. Based on interviews Ive done for an upcoming
book, I estimate that about 50 percent of this spending goes directly to
private companies.

This is big business: The accumulated spending on intelligence since 2002
is much higher than the total of $33 billion the Bush administration paid to
Bechtel, Halliburton and other large corporations for reconstruction
projects in Iraq

Shortly after the 9/11 terrorist attacks, Booz Allen was hired by the CIA to
audit the agencys monitoring of trillions of dollars in international financial
transactions moving through a European cooperative called SWIFT
.

The ACLU and Privacy International, an organization that monitors
government intrusion, jointly issued a scathing report on the issue last
September. Though Booz Allens role is to verify that the access to the
SWIFT data is not abused, its relationship with the US government calls its
objectivity significantly into question, the two organizations said.

Booz Allen served as the NSAs chief advisor on one of its most significant
outsourcing projects. Called Groundbreaker, this huge project was
launched shortly before the 9/11 attacks to overhaul the NSAs internal
I.T. systems. Booz Allens work on this project was outlined in a Booz Allen
magazine piece on Government Clients. Working with the NSA, the
article states, Booz Allen helped create a new model of managed
competition that outsourced key pieces of the agencys IT infrastructure
services. Its work on Groundbreaker included source selection support
and evaluating vendor proposals.

Last year, however, the Baltimore Sun investigated the project and
concluded it was a failure. Over the course of the project, Groundbreakers
$2 billion price tag had doubled, and the problems with the system,
according to insiders who spoke to the Sun, were legion. Some analysts
and managers have said their productivity is half of what it used to be
because the new system requires them to perform many more steps to
accomplish what a few keystrokes used to, the paper reported.

Another NSA program that Booz Allen was involved in, Trailblazer, which
was designed to overhaul the NSAs signals intelligence system, is widely
considered an even worse failure.


Oh, and guess who the majority owner of Booz is? Carlyle Group, the
long-time DC heavyweight private equity firm with deep connections to
the Bush family
.

http://rlu.ru/u9f


And with that key Bush connection, we know that
whatever the truth is, we ARE in the big league.

_________________
Minds are like parachutes.
They only function when open.
Back to top
View user's profile Send private message Send e-mail Visit poster's website
Southpark Fan



Joined: 24 Nov 2011
Posts: 1413
Location: The Caribbean of Canada

PostPosted: Wed Jun 12, 2013 9:25 am    Post subject: Reply with quote

The NSAs Word Games Explained: How the Government Deceived Congress in the Debate over Surveillance Powers
Kurt Opsahl and Trevor Timm | June 11, 2013 | EFF



Related: 86 Civil Liberties Groups and Internet Companies Demand an End to NSA Spying

Related: Connecting the Dots on PRISM, Phone Surveillance, and the NSAs Massive Spy Center

Related: What Is the National Security Agency?

Related: International Customers: It's Time to Call on US Internet Companies to Demand Accountability and Transparency

_________________
"Now water can flow or it can crash. Be water, my friend." - Bruce Lee
"Three things cannot be long hidden: the sun, the moon, and the truth." - Buddha
Back to top
View user's profile Send private message
duaneh



Joined: 26 Feb 2011
Posts: 262
Location: west, pa, usa

PostPosted: Wed Jun 12, 2013 11:53 am    Post subject: Reply with quote

Pepe has your answers

http://www.opednews.com/articles/Digital-Blackwater-Rules-by-Pepe-Escobar-130611-509.html

Digital Blackwater Rules
By Pepe Escobar

......

"Here is a decent round-up of key questions still not answered about the black hole. But when it comes to how a 29-year old IT wizard with little formal education has been able to access a batch of ultra-sensitive secrets of the US intelligence-national security complex, that's a no-brainer; it's all about the gung-ho privatization of spying -- referred to by a mountain of euphemisms of the "contractor reliance" kind. In fact the bulk of the hardware and software used by the dizzying network of 16 US intelligence agencies is privatized.

A Washington Post investigation found out that US homeland security, counter-terror and spy agencies do business with over 1,900 companies.[2] An obvious consequence of this contractor tsunami -- hordes of "knowledge" high-tech proletarians in taupe cubicles -- is their indiscriminate access to ultra-sensitive security. A systems administrator like Snowden can have access to practically everything.

"Revolving door" does not even begin to explain the system. Snowden was one of 25,000 employees of Booz Allen Hamilton ("We are visionaries") for the past three months.[3] Over 70% of these employees, according to the company, have a government security clearance; 49% are top secret (as in Snowden's case), or higher. The former director of national intelligence Mike McConnell is now a Booz Allen vice president. The new director of national intelligence, the sinister-looking retired general James Clapper, is a former Booz Allen executive. "

_________________
formerly known as duane in a previous registration
Back to top
View user's profile Send private message
Fintan
Site Admin


Joined: 18 Jan 2006
Posts: 7990

PostPosted: Wed Jun 12, 2013 9:02 pm    Post subject: Reply with quote

From a couple of months ago.
Now even more lol-ish:
Quote:
CIA's "Facebook" Program Dramatically Cut Agency's Costs

_________________
Minds are like parachutes.
They only function when open.
Back to top
View user's profile Send private message Send e-mail Visit poster's website
duaneh



Joined: 26 Feb 2011
Posts: 262
Location: west, pa, usa

PostPosted: Thu Jun 13, 2013 8:41 am    Post subject: Reply with quote

OR

http://jonrappoport.wordpress.com/2013/06/13/did-the-cia-give-the-nsa-documents-to-ed-snowden/

Did the CIA give the NSA documents to Ed Snowden?

by Jon Rappoport

June 13, 2013

_________________
formerly known as duane in a previous registration
Back to top
View user's profile Send private message
Southpark Fan



Joined: 24 Nov 2011
Posts: 1413
Location: The Caribbean of Canada

PostPosted: Thu Jun 13, 2013 6:41 pm    Post subject: Reply with quote

Forget the NSA: Your Tech Gadgets Are Spying on You
Elizabeth Palermo | 13 2013 | Tech News Daily


Recent headlines about PRISM the US government program that allows security officials to spy on peoples Internet activity confirm what conspiracy theorists have long been foretelling: Big Brother is watching. But is the government the only one keeping tabs on what you search for, watch and discuss with friends? The truth is, there are others out there businesses, advertisers, scammers hoping to line their pockets by collecting your personal data. And they have a variety of tools at their disposal to gather the information they need tools you might even have with you right now. That's right everything from the smartphone in your pocket to the television in your bedroom can potentially be used to spy on you.

Here are some ordinary gadgets with serious spy potential:
    - Smartphones

    - Tablets

    - Smart TVs

    - Cable boxes

    - Gaming consoles

    - Smart meters


Related: 8 Hidden Smartphone Threats to Watch For

Related: 5 Places to Look for Your Digital Footprint

Related: 13 Security and Privacy Tips for the Truly Paranoid

_________________
"Now water can flow or it can crash. Be water, my friend." - Bruce Lee
"Three things cannot be long hidden: the sun, the moon, and the truth." - Buddha
Back to top
View user's profile Send private message
Fintan
Site Admin


Joined: 18 Jan 2006
Posts: 7990

PostPosted: Thu Jun 13, 2013 9:19 pm    Post subject: Reply with quote

duaneh wrote:
OR

http://jonrappoport.wordpress.com/2013/06/13/did-the-cia-give-the-nsa-documents-to-ed-snowden/

Did the CIA give the NSA documents to Ed Snowden?

by Jon Rappoport June 13, 2013

Thanks for posting.
A variation of the old "our good friends in the CIA" angle.

Yeah, I considered it for a microsecond - as you do-
but it died a quick death as a viable idea, because:

Inter-agency rivalry is a smokescreen.
Nothing gets in the way of business.
Meanwhile....


Operation SnowJob and the NSA's Internet Routers

by Fintan Dunne - 13th June, 2013 @ 10:30pmEST

By way of introduction to this delicate topic, here's the
latest exclusive revelations from Agent SnowJob:

Quote:
Edward Snowden:
US government has been hacking
Hong Kong and China for years


Former CIA operative makes more explosive claims and
says Washington is bullying Hong Kong to extradite him


Snowden said that according to unverified documents seen by the Post,
the NSA had been hacking computers in Hong Kong and on the mainland
since 2009.....

More: http://rlu.ru/uhm


Gosh!
US has Hacked into China and Hong Kong! Whoud'a thunk.
(Poor defenseless China would never do stuff like that. Smile )

Besides being rather tame, this latest SnowJob revelation --on the face
of it-- seems to be a play to get Hong Kong courts on his side in any US
extradition bid.

But, for me, it raises this key question, I think:

Why flee to Hong Kong?

Answer that and we're a lot closer to figuring out Operation SnowJob.
I'm kicking it around - without drawing any kneejerk conclusions yet.

It will be interesting, to say the least to see how official China responds
to this latest Snowden revelation in the South China Morning Post. That
response may help answer the "Why Hong Kong" question.

Meanwhile, in the same article SnowJob also revealed exactly
how the NSA has been hacking into IT systems worldwide:

We hack network backbones like huge internet routers,
basically that give us access to the communications of hundreds
of thousands of computers without having to hack every single one,
he said.


Gosh!
NSA hacks into routers!
Whoud'a thunk.

I'm kidding, because anyone up to speed in these matters
knows very well that the NSA uses router back-doors
to create duplicates of interent backbone streams and route
them on to their own archive servers. So that's hardly news.

But in a mainstream way, it IS news.

I mean, that for the last week, everybody had been pussyfooting around
the question of whether the NSA had "direct access" to Google, FB, etc....
and the nature of this access still remains murky.

But if the NSA is camped out where these firms systems meet the
backbone routers --then the NSA may as well be in the office.

That's as "direct access" as anyone needs.

An interesting follow-up question is: why would the NSA need to hack
a backbone router, when they can simply use the back-door access
they previously got the manufacturers to quietly include?

Another interesting follow-up question is: are the Silicon Valley super-
geeks in Google and FB and Twitter, etc. supposed to be so dumb that
they don't know this NSA router issue exists?!

If I know. They know.

"Do no Evil?"
Nah.

More like: "See no Evil, Hear No Evil" Wink

_________________
Minds are like parachutes.
They only function when open.


Last edited by Fintan on Fri Jun 14, 2013 3:21 pm; edited 1 time in total
Back to top
View user's profile Send private message Send e-mail Visit poster's website
2000.s



Joined: 08 May 2013
Posts: 20

PostPosted: Fri Jun 14, 2013 3:29 am    Post subject: Reply with quote

Or, fallback position: Snowden was under surveillance and allowed to access planted files.

Quote:
NSA Deception Operation? Questions Surround Leaked PRISM Documents Authenticity

http://www.globalresearch.ca/nsa-deception-operation-questions-surround-leaked-prism-documents-authenticity/5338673

... Numerous questions cast doubt on the authenticity of the Power Point slide show describing PRISM, but the UK Guardian has not seen fit to release it to the public. Perhaps Glenn Greenwald should anonymously leak this file: In the words of Snowden himself, The public needs to decide.

Was Edward Snowden under surveillance at intelligence contractor Booz Allen in advance of releasing the PRISM document?

... By his own account, Snowden often discussed perceived Agency wrongdoing with his co-workers, which suggests that he should have been profiled and flagged as a potential leaker by the NSAs internal surveillance process.

... The logos of major U.S. IT and communication service providers are splashed across the top of PRISM power point slides like sponsor patches on a NASCAR drivers jacket. Vendor logos often do appear next to product illustrations in DoD briefing documents, and are sometimes used to indicate a vendors position in process or procurement flow charts. But the ad banner format present in the leaked PRISM slides is very unusual and apparently unique to the PRISM document.

... The UK Guardian released the PRISM story on the opening day of PFC Bradley Mannings court martial. The leaked PRISM document will certainly influence public debate on both whistleblower protections and State surveillance and influence is one of our intelligence communitys regular daily chores. Some commentators have been very quick to present forceful talking points in favor of free and unrestrained State surveillance[11], and there is growing consensus that reports depicting PRISM as a mass domestic surveillance dragnet were a false alarm. The Washington Post, which broke the story at the same time as the UK Guardian, has walked back its position on the civil rights implications of the PRISM materials.[12] Meanwhile, it seems that everyone has forgotten about Romas/COIN.
Back to top
View user's profile Send private message
Southpark Fan



Joined: 24 Nov 2011
Posts: 1413
Location: The Caribbean of Canada

PostPosted: Fri Jun 14, 2013 9:15 am    Post subject: Reply with quote

I think the term hack conjures up in the mind of the masses a room full of geeks pounding out code to achieve some end. A mystical knowledge base known to few. Justifies dollars/budgets, methods, gives the impression of something above most peoples knowledge (like legalese and quack speak), implies a criminal element, implies to beat the criminals we have to be like criminals (not unlike the torture excuses used)...

When in actuality, they can just boot-up. logon and their in.

Romas/COIN: A sinister cyber-surveillance scheme exposed

Hack In The Box: researcher reveals ease of Huawei router access

TP-Link Routers have the Backdoor

Treacherous backdoor found in TP-Link routers

Groundhog day for routers

Wireless Routers have a Backdoor

Cisco's Backdoor For Hackers

Cisco Security Advisory: A Default Username and Password in WLSE and HSE Devices

Creating Backdoors in Cisco IOS using Tcl

Backdoors: Who Owns Your Network?

Backdoor passwords in 3com switches,routers,smart hubs

Telecom Italia Alice Pirelli routers Backdoor from internal LAN/WAN

TM Unifi installs a Backdoor on every single Unifi router

VERIZON FiOS SECURITY FLAW?

Verizon Accessed My Router - Port 4567 - TR-069

Networking Vendors Leave Open Backdoors in Products: Security Experts

D-Link DSL and wireless routers administration backdoor access

Backdoor instructions for Allied Telesyn (Telesis) Switches

Hardware Vendor Offers Backdoor with Every Product

Cisco reveals its "backdoor"

Gaping Hole in DD-WRT: Router Software with Back Door

Cisco 'Backdoors' Under Fire at Black Hat Security Conference

Eircom Netopia Router Backdoor

FBI: A Backdoor in Every Router Bending CALEA to their will


Ad nauseam...

_________________
"Now water can flow or it can crash. Be water, my friend." - Bruce Lee
"Three things cannot be long hidden: the sun, the moon, and the truth." - Buddha
Back to top
View user's profile Send private message
Display posts from previous:   
Post new topic   Reply to topic    The Next Level Forum Index -> General Discussion All times are GMT - 5 Hours
Goto page Previous  1, 2, 3 ... 10, 11, 12 ... 19, 20, 21  Next
Page 11 of 21

 
Jump to:  
You cannot post new topics in this forum
You cannot reply to topics in this forum
You cannot edit your posts in this forum
You cannot delete your posts in this forum
You cannot vote in polls in this forum


Powered by phpBB © 2001, 2005 phpBB Group

Theme xand created by spleen.