Daily Archives: May 15, 2014

NSA gave Canada at least $300,000 to develop spy program

Posted: May 15, 2014 at 12:47 am

Canada is among the top beneficiaries of a U.S. National Security Agency program meant to build intelligence relationships with Americas allies by paying for improvements to their electronic-eavesdropping capabilities.

A newly published leak about the NSAs funding shows that in 2012 at least $300,000 was sent to Canada fourth place after Pakistan, Jordan and Ethiopia among the 15 countries that benefited from this program. The chart appears in No Place to Hide, the new book based on leaks from former NSA contractor Edward Snowden and written by U.S. journalist Glenn Greenwald.

The contribution is a pittance in the multibillion-dollar world of government surveillance. Over the past decade, the Canadian government has doubled the staff and budget of Communications Security Establishment Canada, the countrys counterpart organization to NSA.

But the disclosure is significant because CSEC does not acknowledge its partnerships with the NSA, including financial support.

The U.S. spy agency has fallen into global notoriety over the past year, after being caught covertly recording the communications of allied world leaders and amassing data about U.S. citizens.

In Ottawa on Tuesday, NDP defence critic Jack Harris questioned why U.S. money is heading north. This is one more piece of the puzzle that we dont understand, as to what exactly is the relationship between what Canada, the Americans and others are doing, he said.

For the past 70 years, the NSA and CSEC have been working together to spy on foreigners messages, while safeguarding their own governments messages from snooping adversaries.

For this, they use cryptology the art of code making and code breaking. To develop this capacity, CSEC has often relied on the much-larger NSA for know-how, technology and raw intelligence. But like many countries, Canada safeguards its NSA relationship by never speaking about it.

The Canadian blogger Bill Robinson, who tracks CSECs budget lines closely, has pointed out that Canada has been on the receiving end at least $11-million in research funding from unspecified foreign partners in just over a decade.

When The Globe inquired last fall about whether this money came from the NSA, the official reply was that it came from the Five Eyes partnership the wider alliance of U.S., British, Canadian, Australian and New Zealand intelligence agencies. Canada works closely with its allied counterparts to pursue the latest cryptological research, a spokeswoman said.

Read more here:

NSA gave Canada at least $300,000 to develop spy program

Posted in NSA | Comments Off on NSA gave Canada at least $300,000 to develop spy program

NSA backdoors my open networks to new threats, report says

Posted: at 12:47 am

IDG News Service - Allegations that the NSA installed surveillance tools in U.S.-made network equipment, if true, could mean enterprises have more to worry about than just government spying.

While the U.S. government warned router buyers that the Chinese government might spy on them through networking gear made in China, the U.S. National Security Agency was doing that very thing, according to a report in the Guardian newspaper Monday.

The NSA physically intercepted routers, servers and other network equipment and installed surveillance tools before slapping on a factory seal and sending the products on to their destinations, according to the report, which is extracted from an upcoming book by Glenn Greenwald, a journalist who last year helped expose sensitive documents uncovered by former NSA contractor Edward Snowden.

With the tools it installs, the NSA can gain access to entire internal networks, the story said. For example, in a report on its use of the technology, the NSA said an embedded beacon was able to call back to the agency and "provided us access to further exploit the device and survey the network," Greenwald wrote.

The new charge vastly expands the scope of alleged NSA spying beyond the interception of traffic across the Internet, said Ranga Krishnan, a technology fellow at the Electronic Frontier Foundation. As an example, he pointed to reports from the Snowden documents that the NSA had tapped into Google's own fiber network among its data centers, where the company hadn't encrypted the traffic at all.

"That's how most organizations function," Krishnan said. "So once you're within the company's router, you have access to all that data that's unencrypted."

In addition, any security hole that a government installs could open up the network to attacks by others, he added.

"If you have made something vulnerable ... somebody else could discover that and very well use it," Krishnan said.

The House Intelligence Committee and other arms of the U.S. government have warned for years that networking equipment from vendors in China, namely Huawei Technologies and ZTE, poses a threat to U.S. service providers because of possible links between those companies and the Chinese government.

Specifically, critics have raised alarms that the government could install backdoor surveillance tools in the gear they sell, giving Chinese spies access to communications in the U.S. Those warnings reportedly have held back Huawei and ZTE's sales in the U.S. The companies have said their equipment is safe.

More here:

NSA backdoors my open networks to new threats, report says

Posted in NSA | Comments Off on NSA backdoors my open networks to new threats, report says

Photos of an NSA upgrade factory show Cisco router getting implant

Posted: at 12:47 am

NSA techs perform an unauthorized field upgrade to Cisco hardware in these 2010 photos from an NSA document.

A document included in the trove of National Security Agency files released with Glenn Greenwalds book No Place to Hide details how the agencys Tailored Access Operations (TAO) unit and other NSA employees intercept servers, routers, and other network gear being shipped to organizations targeted for surveillance and install covert implant firmware onto them before theyre delivered. These Trojan horse systems were described by an NSA manager as being some of the most productive operations in TAO because they pre-position access points into hard target networks around the world.

The document, a June 2010 internal newsletter article by the chief of the NSAs Access and Target Development department (S3261) includesphotos (above) of NSA employees opening the shipping box for a Cisco router and installing beacon firmware with a load station designed specifically for the task.

The NSA manager described the process:

Heres how it works: shipments of computer network devices (servers, routers, etc,) being delivered to our targets throughout the world are intercepted. Next, they are redirected to a secret location where Tailored Access Operations/Access Operations (AO-S326) employees, with the support of the Remote Operations Center (S321), enable the installation of beacon implants directly into our targets electronic devices. These devices are then re-packaged and placed back into transit to the original destination. All of this happens with the support of Intelligence Community partners and the technical wizards in TAO.

Sean Gallagher / Sean is Ars Technica's IT Editor. A former Navy officer, systems administrator, and network systems integrator with 20 years of IT journalism experience, he lives and works in Baltimore, Maryland.

Excerpt from:

Photos of an NSA upgrade factory show Cisco router getting implant

Posted in NSA | Comments Off on Photos of an NSA upgrade factory show Cisco router getting implant

NSA routinely tapped in-flight Internet, intercepted exported routers

Posted: at 12:47 am

NSA leaks View all

In his new book No Place to Hide, Glenn Greenwald revealed a number of additional details onthe craft and tools used by the NSA and its British counterpart, the GCHQ. While many of the capabilities and activities Greenwald details in the book were previously published in reports drawing from Edward Snowdens vast haul of NSA documents, a number of new pieces of information have come to lightincluding the NSAs and GCHQs efforts to use airlines in-flight data service to track and surveil targeted passengers in real time.

The systemscodenamed Homing Pigeon by the NSA and Thieving Magpie by the GCHQallowed the agencies to track which aircraft individuals under surveillance boarded based on their phone data.

We can confirm that targets are on board specific flights in near real time, enabling surveillance or arrest teams to be put in place in advance, a GCHQ analyst wrote in a PowerPoint slide presentation on the program. If they use data, we can also recover email addresss [sic], Facebook IDs, Skype addresses, etc.

The technology allows the NSA and GCHQ to get a geographic fix on surveilled aircraft once every two minutes in transit.

Latest batch of documents leaked shows NSA's power to pwn.

Greenwald asserts in his book that at the same time the US intelligence community and legislators were warning that Chinese networking vendors Huawei and ZTE were untrustworthy because of connections to Chinas Peoples Liberation Army, the NSA was routinely intercept[ing] routers, servers, and other computer network devices being exported from the US before they are delivered to the international customers.

Greenwald cited a June 2010 report from the head of the NSAs Access and Target Development department in which the official wrote, In one recent case, after several months a beacon implanted through supply-chain interdiction called back to the NSA covert infrastructure. This call back provided us access to further exploit the device and the network.

Read this article:

NSA routinely tapped in-flight Internet, intercepted exported routers

Posted in NSA | Comments Off on NSA routinely tapped in-flight Internet, intercepted exported routers

License reader lawsuit can be heard, appeals court rules

Posted: at 12:47 am

SFPD sued by woman pulled over in high-risk stop after vehicle mistakenly identified as stolen

A federal appeals court this week ruled that a woman's Fourth Amendment rights may have been violated when San Francisco police arrested her after an automated license plate reader mistakenly identified her car as stolen. The decision provides fodder to privacy advocates calling for restrictions on the use of the technology.

The U.S. Court of Appeals for the Ninth District Tuesday reversed a district court ruling saying the police made the arrest in good faith. A three-judge panel at the appellate court held that a reasonable jury could indeed find that the woman's Fourth Amendment rights against unreasonable search and seizure had been violated. The case was remanded back to the district court.

The case involves Denise Green, 47, who was stopped, handcuffed and detained briefly by multiple police officers with drawn guns, on a March night in 2009.

The incident was triggered when Green's car passed a police cruiser whose ALPR mistakenly determined that the vehicle was stolen. According to the appellate court's description of the incident, the photograph taken by the ALPR was blurry and illegible because of darkness.

The police officer operating the license plate reader radioed in a description of Green's vehicle and provided the incorrect license plate number from the ALPR read to dispatch. He did not confirm the tag number visually.

Dispatch quickly identified the plate as belonging to a stolen vehicle prompting a sequence of events that ended with Green being stopped by multiple police cars, handcuffed at gunpoint and detained while officers searched her car and person before letting her go.

Green filed a lawsuit against San Francisco Police Department, the city, county and the police officer in charge of the incident contending Fourth Amendment violations as well as unreasonable use of force and other charges. She asked the court for a summary judgment on her claims.

The U.S. District Court for the Northern District of California rejected Green's motion and agreed with the SFPD's assertion that they had acted under reasonable suspicion.

The judges at the appellate court rejected that argument. In an 18-page opinion, the judges noted that ALPRs have been known to make mistakes and that police should know not to make traffic stops based on an ALPR read alone.

Continued here:

License reader lawsuit can be heard, appeals court rules

Posted in Fourth Amendment | Comments Off on License reader lawsuit can be heard, appeals court rules

INFOWARS Nightly News: with David Knight Monday May 12 2014: Plus Special Reports – Video

Posted: at 12:47 am


INFOWARS Nightly News: with David Knight Monday May 12 2014: Plus Special Reports
Monday: The Infowars Nightly News. 1776 Worldwide: The Second Amendment Comes to Mexico. Plus, DHS Emails Reveal U.S. May Have Terrorist Hands Off List. -- http://www.prisonplanet.tv/ --Date:...

By: Ron Gibson

More here:

INFOWARS Nightly News: with David Knight Monday May 12 2014: Plus Special Reports - Video

Posted in Second Amendment | Comments Off on INFOWARS Nightly News: with David Knight Monday May 12 2014: Plus Special Reports – Video

DHS Says "Hands Off" VIP Terrorist – Video

Posted: at 12:47 am


DHS Says "Hands Off" VIP Terrorist
1776 Worldwide: The Second Amendment Comes to Mexico Mexico to legalize vigilantes fighting drug cartel DHS Emails Reveal U.S. May Have Terrorist "Hands Off" List As vigilantes in Mexico...

By: THElNFOWARRlOR

More here:

DHS Says "Hands Off" VIP Terrorist - Video

Posted in Second Amendment | Comments Off on DHS Says "Hands Off" VIP Terrorist – Video

Guns and Supreme Court: Is Second Amendment a Privilege, Not a Right?

Posted: at 12:47 am

The Supreme Court unwisely declined to review Drake v. Jerejian, last week, a case that challenged New Jerseys discretionary system of concealed-carry permitting.

By denying review, the Court failed to resolve a nationwide split about the meaning of the Second Amendment.

Eventually, the Court will have to face the issue and decide if it was serious when it held that the Second Amendment protects an individuals right to keep and bear arms.

Both Heller and McDonald made it clear that the government cannot ban or effectively ban guns, but lower courts are still struggling to define what restrictions are allowed under those rulings.

In 2008, in the landmark case of D.C. v. Heller, the Supreme Court held that the Second Amendment protects the individual right to keep and bear arms.

Eventually, the Court will have decide if it was serious when it held that the Second Amendment protects an individuals right to keep and bear arms.

Later, in 2010s McDonald v. Chicago, the Court held that the Second Amendment protects citizens from not just federal prohibitions, as Heller said, but also from state and municipal prohibitions.

Since that time, the Court has not heard another Second Amendment case. Both Hellerand McDonald made it clear that the government cannot ban or effectively ban guns, but lower courts are still struggling to define what restrictions are allowed under those rulings. The Supreme Court needs to clear up the uncertainty.

Gun controllers in cities and states across the country are taking advantage of that uncertainty to test the limits of gun control. After McDonald struck down Chicagos de factogun ban, the city created a restrictive permit system requiring one hour of range training. But the city also banned gun ranges. The Seventh Circuit struck down the ban on ranges.

More recently, a judge struck down Chicagos ban on virtually all sales and transfers within the city because the Second Amendment right must also include the right toacquirea firearm.

Visit link:

Guns and Supreme Court: Is Second Amendment a Privilege, Not a Right?

Posted in Second Amendment | Comments Off on Guns and Supreme Court: Is Second Amendment a Privilege, Not a Right?

Guns to be focus of rally

Posted: at 12:47 am

REXBURG A man who was instrumental in overturning a Second Amendment-based law is coming to Rexburg.

Dick Heller, who was the central figure in the District of Columbia v. Heller case, will be making an appearance at a rally this coming Saturday.

The Second Amendment Idaho Tour will make a stop at 3 p.m. at the Rexburg Tabernacle.

The event is free and open to the public.

The state is sovereign, not the federal government, said Heller in a telephone interview on Monday from his Washington home.

Heller believes every citizen has the right to bear arms and wants as little government intrusion as possible.

The Second Amendment is an incorporated right, said Heller, that takes the power out of the hands of the state to implement gun control.

Heller also believes that gun rights preceded the democracy, which he said means no government should have any control over gun regulations.

Asked if he is advocating no regulations, Heller said, As close to none as you can get as far as the government is concerned.

Heller said responsible gun owners have rigid rules in place, with basic concepts like not pointing a gun at another person.

See the original post:

Guns to be focus of rally

Posted in Second Amendment | Comments Off on Guns to be focus of rally

Facebook SUCKS! – Video

Posted: at 12:46 am


Facebook SUCKS!
Facebook shall not infringe upon the First Amendment Rights of American citizens while they enjoy all the perks and privileges of being a PUBLIC American com...

By: Sandra Booker

Read more:

Facebook SUCKS! - Video

Posted in First Amendment | Comments Off on Facebook SUCKS! – Video