Former NSA Chief: More Terrorist Attacks On The Way, Be Prepared For A False Flag – Episode 373 – Video


Former NSA Chief: More Terrorist Attacks On The Way, Be Prepared For A False Flag - Episode 373
Get economic collapse news throughout the day visit http://x22report.com More news visit http://thepeoplesnewz.com Report date: 5.23.2014 Gold manipulation actually exists, Barclay #39;s has now...

By: X22Report

Visit link:

Former NSA Chief: More Terrorist Attacks On The Way, Be Prepared For A False Flag - Episode 373 - Video

Posted in NSA

Assange names country targeted by NSA's MYSTIC mass phone tapping program

The U.S. National Security Agency (NSA) has been recording and storing nearly all domestic and international phone calls from Afghanistan, according to Wikileaks front man Julian Assange.

Wikileaks revealed the name of the country after The Intercept reported Monday that the NSA was actively recording and archiving virtually every cellphone call in the Bahamas and one other country under a program called SOMALGET. The Intercept said it did not name the second country because of concerns that doing so could lead to increased violence.

The voice interception program is part of a broader program called MYSTIC revealed in March when the Washington Post published documents provided by former NSA contractor Edward Snowden.

MYSTIC is used to collect phonecall metadata and is used in Mexico, Kenya and the Philippines, according to The Intercept. SOMALGET enables the NSA to gather and store the contents of every conversation in an entire country, it said.

The program gives the NSA the capability to record and store the phone calls of an entire nation for up to 30 days, according to the Washington Post. The paper decided not to identify the countries affected on request of the U.S. government.

While The Intercept revealed the identity of five of the Mystic target countries, Assange said the decision not to name Afghanistan was censorship.

Such censorship strips a nation of its right to self-determination on a matter which affects its whole population, ="https://wikileaks.org/WikiLeaks-statement-on-the-mass.html">he said on Wikileaks site. By denying an entire population the knowledge of its own victimization, this act of censorship denies each individual in that country the opportunity to seek an effective remedy, whether in international courts, or elsewhere, he said.

To protect his source, Assange did not disclose how Wikileaks confirmed the identity of the second country. However, he said, it can also be independently verified through forensic scrutiny of imperfectly applied censorship on related documents released to date, and through correlations with other NSA programs.

The censorship of a victim states identity directly assists the killing of innocent people, Assange said. The U.S. has been using mass interception programs as a key component in its drone targeting program that has killed thousands of people and hundreds of women and children in Afghanistan, Pakistan, Yemen and Somalia in violation of international law, he added.

We do not believe it is the place of media to aid and abet a state in escaping detection and prosecution for a serious crime against a population. Consequently Wikileaks cannot be complicit in the censorship of victim state X. The country in question is Afghanistan, he said.

See more here:

Assange names country targeted by NSA's MYSTIC mass phone tapping program

Posted in NSA

NSA guy who made Obama's BlackBerry

President Obama's BlackBerry was more difficult to create than you'd think.

NEW YORK (CNNMoney)

"It just really bothered a lot of people -- nobody wanted to put anything out there that wasn't completely secure," said retired NSA technical director Richard "Dickie" George in an interview with CNNMoney.

George's role was to review the BlackBerry's algorithms and write and engineer diagrams for the phone.

In response to Obama's request, the NSA set up a lab where dozens of experts performed surgery for several months on a high-profile patient: the soon-to-be presidential BlackBerry. The course of treatment was to manipulate the device's innards to weed out potential threats to secure communication.

In the end, that meant taking most of the fun out of the phone: the president can't play Angry Birds, for example.

"You try to get rid of any functionality that's not really required. Every piece of functionality is an opportunity for the adversary," George says.

According to George, the president simply wanted a phone that enabled him to communicate with his advisers. Though the president was a well known BlackBerry (BBRY) addict at the time, the choice of smartphone model was the NSA's, not Obama's, George explained.

What functionality the president's phone actually possesses is secret -- and the NSA won't even confirm that he can use it to send a text or write an email (but it's a pretty safe bet it isn't used for Oval Office selfies).

Related: Let's talk about text, baby

Continue reading here:

NSA guy who made Obama's BlackBerry

Posted in NSA

House Committee Puts NSA on Notice Over Encryption Standards

13 Twitter Facebook Email

Amendment would remove requirement that the National Institute of Standards and Technology consult with the NSA on encryption standards

Amendment would remove requirement that the National Institute of Standards and Technology consult with the NSA on encryption standards

by Justin Elliott ProPublica, May 23, 2014, 4:55 p.m.

Enable Social Reading

An amendment adopted by a House committee would, if enacted, take a step toward removing the National Security Agency from the business of meddling with encryption standards that protect security on the Internet.

As we reported with the Guardian and the New York Times last year, the NSA has for years engaged in a multi-front war on encryption, in many cases cracking the technology that is used to protect the confidentiality of intercepted communications. Part of the NSAs efforts centered on the development of encryption standards by the National Institute of Standards and Technology, which sets standards that are adopted by government and industry.

Documents provided by Edward Snowden suggest that the NSA inserted a backdoor into one popular encryption standard, prompting NIST to launch an ongoing review of all its existing standards.

The amendment adopted this week by the House Committee on Science, Space, and Technology would remove an existing requirement in the law that NIST consult with the NSA on encryption standards.

In a Dear Colleague letter, the amendments sponsor, Rep. Alan Grayson (D-FL), quoted our story on the NSA from last year.

Visit link:

House Committee Puts NSA on Notice Over Encryption Standards

Posted in NSA

Edward Snowden's legacy? House passes curbs on NSA surveillance

Edward Snowden disclosed the massivecollection and storage of US calling data by the NSA last year. Now mostHouse members can now say they voted to end what many critics consider the most troubling practiceSnowdendisclosed.

The House has moved the U.S. closer to ending the National Security Agency's bulk collection of Americans' phone records, the most significant demonstration to date of leakerEdwardSnowden'simpact on the debate over privacy versus security.

Subscribe Today to the Monitor

Click Here for your FREE 30 DAYS of The Christian Science Monitor Weekly Digital Edition

But the final version of the legislation, "watered down" in the words of one supporter, also showed the limits of that impact. The bill was severely weakened to mollify U.S. intelligence agencies, which insisted that the surveillance programs that shocked many Americans are a critical bulwark against terror plots.

The bill was approved 303-121, which means that most House members can now say they voted to end what many critics consider the most troubling practiceSnowdendisclosed the collection and storage of U.S. calling data by the secretive intelligence agency. But almost no other major provision designed to restrict NSA surveillance, including limits on the secret court that grants warrants to search the data, survived the negotiations to get the bill to the House floor.

And even the prohibition on bulk collection of Americans' communications records has been called into question by some activists who say a last-minute change in wording diminished what was sold as a ban.

"People will say, 'We did something, and isn't something enough,'" said Steven Aftergood, who tracks intelligence issues for the Federation of American Scientists. "But this bill doesn't fundamentally resolve the uncertainties that generated the whole controversy."

Though some privacy activists continued to back the bill, others withdrew support, as did technology companies such as Google and Facebook.

Rep. Mike Rogers of Michigan, the Republican chairman of the House Intelligence Committee, said, "I believe this is a workable compromise that protects the core function of a counterterrorism program we know has saved lives around the world."

Read the original here:

Edward Snowden's legacy? House passes curbs on NSA surveillance

Posted in NSA

The NSA records every call made in the Bahamas – Including Oprah – Video


The NSA records every call made in the Bahamas - Including Oprah
Wikileaks recently released documents showing the National Security Agency records every single phone call made in the Bahamas. This includes every personal phone call made from Oprah Winfrey,...

By: NextNewsNetwork

View original post here:

The NSA records every call made in the Bahamas - Including Oprah - Video

Posted in NSA

How the NSA is Using The Bahamas as a Model for Total Control | Big Brother Watch – Video


How the NSA is Using The Bahamas as a Model for Total Control | Big Brother Watch
Abby Martin highlights a new report by The Intercept showing that the NSA is collecting and recording virtually every single phone call made on the island nation of the Bahamas and how this...

By: breakingtheset

Go here to see the original:

How the NSA is Using The Bahamas as a Model for Total Control | Big Brother Watch - Video

Posted in NSA

The NSA guy who made Obama's BlackBerry

President Obama's BlackBerry was more difficult to create than you'd think.

NEW YORK (CNNMoney)

"It just really bothered a lot of people -- nobody wanted to put anything out there that wasn't completely secure," said retired NSA technical director Richard "Dickie" George in an interview with CNNMoney.

George's role was to review the BlackBerry's algorithms and write and engineer diagrams for the phone.

In response to Obama's request, the NSA set up a lab where dozens of experts performed surgery for several months on a high-profile patient: the soon-to-be presidential BlackBerry. The course of treatment was to manipulate the device's innards to weed out potential threats to secure communication.

In the end, that meant taking most of the fun out of the phone: the president can't play Angry Birds, for example.

"You try to get rid of any functionality that's not really required. Every piece of functionality is an opportunity for the adversary," George says.

According to George, the president simply wanted a phone that enabled him to communicate with his advisers. Though the president was a well known BlackBerry (BBRY) addict at the time, the choice of smartphone model was the NSA's, not Obama's, George explained.

What functionality the president's phone actually possesses is secret -- and the NSA won't even confirm that he can use it to send a text or write an email (but it's a pretty safe bet it isn't used for Oval Office selfies).

Related: Let's talk about text, baby

Read the original here:

The NSA guy who made Obama's BlackBerry

Posted in NSA