Gene's Footnotes

I have never been impressed by the messenger and always inspect the message, which I now understand is not the norm. People prefer to filter out discordant information. As such, I am frequently confronted with, "Where did you hear that...." Well, here you go. If you want an email version, send me an email.

March 20, 2014

NSA: Hits Keep Comin'



Mystic: records all phone calls from foreign nation (according to what Snowden knows)

Criminal Act In Most Nations

The Edward Snowden leaks keep coming, this time with the accusation that an NSA program called MYSTIC culls 100 percent of an unnamed nation’s phone calls, which can then be retrieved any time during the course of 30 days.


Such a program would be a first time that an entire nation’s phone calls were netted by an NSA program, National Journal reported.




An NSA spokesman contacted National Journal and asserted that “all of NSA’s operations must be strictly conducted under the rule of law,” while also acknowledging that individuals “have legitimate privacy interests in the handling of their personal information.”
MYSTIC and its “retrospective retrieval” capabilities has been in existence since 2009, with one unnamed official telling The Washington Post that the program’s “RETRO” system operated like a “time machine […] into the past.”
Quantumhand: Invasion of Privacy/Theft By Spoofing Facebook
Cybercrime
News of MYSTIC comes just one week after NSA leaker Edward Snowden alleged that the spy agency also uses fake Facebook pages to trick individuals into giving up information. The program, called QUANTUMHAND, transmits malicious data packets that fool the target’s computer into thinking they are legitimately from Facebook, enabling the NSA to access the target’s computer and the data from its hard drive.
Facebook denied having any knowledge of the NSA program to National Journal  [From Washington Times.]

Of course, Facebook also is a friend of the state.  The fascist answer to any complaints, here, is the this information is secret because it is sensitive by the NSA in its mission to protect the people. Personally, I feel great warmth knowing the Facebook is a major source of monitoring everyone.
FOGGYBOTTOM records logs of Internet browsing histories and collects login details and passwords used to access websites and email accounts
From Abovetopsecret.com, we learn of a few of dozens of programs:

One implant, codenamed UNITEDRAKE, can be used with a variety of “plug-ins” that enable the agency to gain total control of an infected computer. An implant plug-in named CAPTIVATEDAUDIENCE, for example, is used to take over a targeted computer’s microphone and record conversations taking place near the device. Another, GUMFISH, can covertly take over a computer’s webcam and snap photographs. FOGGYBOTTOM records logs of Internet browsing histories and collects login details and passwords used to access websites and email accounts. GROK is used to log keystrokes. And SALVAGERABBIT exfiltrates data from removable flash drives that connect to an infected computer.
I am sure there are people figuring out how to create a new net or systems not readily observable by B Brother. For those interested, security is a great area for a new business.

Labels: , ,

0 Comments:

Post a Comment

Subscribe to Post Comments [Atom]

<< Home