USAHitman | Conspiracy News |
- How the NSA Plans to Infect ‘Millions’ of Computers with Malware
- How The FBI Has Been Working Hard To Deport Friends Of Guy They Killed During Interview About Boston Bombing
- Missing Malaysia Airline passengers’ phones still active?
Posted: 12 Mar 2014 06:40 PM PDT
Yet more previously secret surveillance operations waged by the United States National Security Agency were made public Wednesday morning thanks to leaked documents supplied by former NSA contractor Edward Snowden. The files — published first by The Intercept this week and dissected over the course of a 3,000-word article attributed to journalists Glenn Greenwald and Ryan Gallagher — bring to light a number of previously unreported programs undertaken by the secretive US spy agency, including operations that have given the NSA the potential to infect millions of computers around the world by relying on malicious software that’s sent to targets through surreptitious means. In recent years, however, the NSA has reportedly made adjustments to these operations that enable them to by carried out automatically without the direct aid of human spies — a decision that experts say is undermining the internet as it is known today, “Top-secret documents reveal that the National Security Agency is dramatically expanding its ability to covertly hack into computers on a mass scale by using automated systems that reduce the level of human oversight in the process,” the journalists wrote. That automated system named “TURBINE,” they said later, is designed to “allow the current implant network to scale to large size (millions of implants) by creating a system that does automated control implants by groups instead of individually.” According to The Intercept, the NSA has escalated offensive cyber operations significantly since 2004 in order to spy on targets, and has used an array of tactics and “implants” that were previously undisclosed in order to carry out these missions. The website reported that the agency’s British counterpart, the GCHQ, “appears to have played an integral role” with regards to developing these implants, which have grown in number exponentially in recent years from only 100 or so to tens-of-thousands, according to the report. These implants, the journalists wrote, allow the NSA “to break into targeted computers and to siphon out data from foreign Internet and phone networks.” They can also be combined with a number of specialized plugins to provide analysts with additional surveillance options, the likes of which could likely leave many thinking staying secure on the Web seem impossible after reading the Greenwald and Gallagher report. In one example cited by The Intercept, the NSA disguised itself as a fake Facebook server in order to intercept connections attempted to be made between account holders and the social networking site’s real computers. Instead, however, the NSA sends those unsuspecting Facebook users to a real site embedded with malware that then has the ability to infect that target’s computer. That program — QUANTUMHAND — became operational in October 2010, The Intercept reported, after it successfully allowed the NSA to gain access to “about a dozen targets.” A spokesperson for Facebook told The Intercept he had “no evidence of this alleged activity,” but QUANTUMHAND is far from the only program that, thanks to Edward Snowden, have linked the NSA to relying on already established websites and programs to pry into the communications of targets. In another example, The Intercept included images from an internal NSA slideshow presentation that indicates surveillance missions can be waged by the agency against targeted email addresses, IP addresses and the “cookies” created by websites like Google, Yahoo, YouTube and countless others to track visitors, often for advertisement and user experience purposes. Ashkan Soltani, a DC-based independent security researcher, remarked on Twitter that the information in that presentation “looks a lot like a catalog of ad tracking tech.” Instead of being used by the likes of Google to give YouTube users a more “personalized” browsing experience, however, the NSA and GCHQ can use these selectors to spy on the habits of unknowing subjects of investigation. Other programs disclosed by Mr. Snowden and described by The Intercept include CAPTIVATEDAUDIENCE (“used to take over a targeted computer’s microphone and record conversations”, GUMFISH (“can covertly take over a computer’s webcam and snap photographs”), FOGGYBOTTOM (“records logs of Internet browsing histories and collects login details and passwords”), GROK (“used to log keystrokes”) and SALVAGERABBIT to exfiltrate data from removable flash drives connected to a target’s computer. To infect computers with these implants, The Intercept said, the NSA can avoid trying to trick targets into going to fake websites by instead spamming them with unsolicited email containing links to malware. “If we can get the target to visit us in some sort of web browser, we can probably own them,” an NSA employee wrote in one of the previously secret documents. “The only limitation is the ‘how.’” The Intercept’s latest report was published only two days after Snowden spoke remotely to the audience of the SXSW Interactive tech conference in Austin, Texas and urged attendees to use encryption — a tactic, he said, that is still relatively successful with regards to thwarting snooping like the kind carried out by the NSA. Encryption, Snowden said on Monday, makes it“very difficult for any sort of mass surveillance”to occur. If The Intercept’s report is anywhere close to representative of the NSA’s actual capabilities though, then the agency’s operations are expanding regardless and relying on new tricks and techniques to track down and monitor persons of interest in the name of national security. “When they deploy malware on systems,” malware expert Mikko Hypponen told The Intercept, “they potentially create new vulnerabilities in these systems, making them more vulnerable for attacks by third parties.” =”http://rt.com/usa/nsa- |
Posted: 12 Mar 2014 05:07 PM PDT
by Mike Masnick
This week’s This American Life is an entire hour devoted to investigating the FBI’s killing of Ibragim Todashev along with a companion piece in Boston Magazine. You probably heard about the basics of the Todashev story. Todashev was a friend of Tamerlan Tsarnaev, the older of the two brothers implicated in the Boston Marathon bombings (and the one who was killed when law enforcement tried to capture them), who was being interviewed by the FBI and was then shot multiple times and killed — with a whole variety of conflicting stories coming out soon after as to what he did to lead to his death. One of the key stories was that Todashev had just admitted to participating, with Tsarnaev, in a grisly triple homicide outside of Boston a year and half earlier, and then supposedly lunged at the FBI agents (there were a variety of different reports, each claiming he had some kind of weapon, but each time the report differed on what kind of weapon). But reporter Susan Zalkind, who had been friendly with one of the 3 men killed back in 2011, which Todashev supposedly confessed to taking part in, decided to explore the story more deeply, and found a variety of oddities at every turn, nearly all of which involve strange moves by the FBI. It’s also impossible to listen to this story, without connecting it to some of the recent Snowden revelations concerning how the NSA and FBI act. While the various chapters of the story are all interesting (including Todashev’s girlfriend who agreed to be interviewed by Zalkind, and a month or so later was deported, almost certainly because of the interview), perhaps the most striking is the story of Ashurmamad Miraliev, profiled in Act 2 of This American Life and written up in more detail by Zalkind last fall. Miraliev was someone who lived in Florida and had become an acquaintance, but not a close friend, of Todashev. Months after Todashev was killed, Miraliev was pulled over and arrested, supposedly for having an expired license (it had expired a week or so earlier). He was then interrogated for six hours by the FBI (without a lawyer) — almost all about Todashev, asking specific questions about the triple homicide and Todashev’s involvement (remember, this is supposedly well after the FBI claims Todashev confessed to those murders). Miraliev pointed out that he wasn’t that close to Todashev, that he’d never been to Massachusetts, and that all of that happened well before he’d ever met Todashev. He then asked to be let go, and was told that he was being thrown in jail based on absolutely ridiculous trumped up charges that are way too convoluted to fully cover here, but the short version is that a year earlier, Miraliev had apparently gotten into a yelling altercation with a guy who Todashev had fought with, and the feds (a year later) had pressured the guy Todashev fought with to press charges, and then claimed that Miraliev was “witness tampering” for that screaming match. The charges were later dropped after a judge pointed out how ridiculous they were — but the whole thing still got Miraliev put on a terrorist watch list, caused him to miss a court date for his student visa, and got him kicked out of the country: So the FBI had been matchmaking: They had helped the sheriff’s department go fishing on a long-closed case to find a victim and a charge with which they could pressure or detain first Ibragim, and later Ashurmamad. The witness-tampering charge the FBI brought against Ashurmamad was so flimsy that it was dropped in just a month. And yet it didn’t matter. Although he had never been to Boston and never met the Tsarnaevs, Ashurmamad was nonetheless flagged—according to a note on the booking sheet—“ON TERRORIST WATCH LIST/PLACED PROTECTIVE CUSTODY AND HIGH RISK. HOUSE ALONE.” Ashurmamad was taken from the Orlando Police Department to the Osceola County jail, where he was kept alone in an 8-by-10 room. To meet with his lawyers, he had to have his hands and wrists shackled and be chained to the ground. Ashurmamad told me there were no windows, the light was always on, and he was always cold. He was there for a month until the tampering case was dropped. But he wasn’t released. His student visa had expired, and he’d missed a court date while he was in jail. So he was moved directly to an immigration detention facility, and on November 4, he was ordered to be deported back to Tajikistan. Hearing the original story, and reading through the details, I’m further reminded of the stories of how the NSA, FBI and others in the federal government use “parallel construction” to build questionable cases against individuals they want dealt with. The whole story highlights, yet again, why anyone who claims “if you’ve done nothing wrong, you have nothing to fear,” are simply wrong. Miraliev did not appear to do anything “wrong” other than failing to reregister his driver’s license on time. But, because the FBI wanted to pressure and then punish him, to give them information they didn’t have supposedly to confirm a murder which the FBI itself claims they had already solved, suddenly he got kicked out of the country entirely, losing everything he had (he lost his home, his money and car, which were all left in the US when he got sent back to Tajikistan). Read More Here |
Posted: 11 Mar 2014 05:02 PM PDT
By Jack Pickell
With no answers to the question of what happened to Malaysia Airlines flight MH370, some relatives of the missing passengers are claiming to have made contact with devices belonging to their loved ones. Relatives claim some passengers’ cellphones are ringing when called, and one instant messaging service is showing passengers’ phones still online, the Washington Post reported. One of the most eerie rumors came after a few relatives said they were able to call the cellphones of their loved ones or find them on a Chinese instant messenger service called QQ that indicated that their phones were still somehow online. A migrant worker in the room said that several other workers from his company were on the plane, including his brother-in-law. Among them, the QQ accounts of three still showed that they were online, he said Sunday afternoon. Source |