Archive for the ‘NSA’ Category

CIA’s secret spy tool helps agency steal data from NSA & FBI, WikiLeaks reveals – RT

Published time: 24 Aug, 2017 11:29 Edited time: 24 Aug, 2017 17:15

Details of an alleged CIA project that allows the agency to secretly extract biometric data from liaison services such as the NSA, the DHS and the FBI have been published by WikiLeaks.

Documents from the CIAs ExpressLane project were released by the whistleblowing organization as part of its ongoing Vault 7 series on the intelligence agencys alleged hacking capabilities.

Abranchwithin the CIA known as Office of Technical Services (OTS) provides a biometric collection system to liaison services around the world with the expectation for sharing of the biometric takes collected on the systems, according to afilereleased by WikiLeaks.

ExpressLane, however, suggests the system has inadequacies as it was developed as a covert information collection tool to secretly exfiltrate data collections from such systems provided to liaison services.

The user guide for the tool states that it was developed to support the branch in its efforts to verify that this data is also being shared with the agency.

ExpressLane v3.1.1 provides an ability to disable the biometric software if liaison doesnt provide the Agency with continued access.

ExpressLane is installed and run under the guise of upgrading the biometric software by OTS agents that visit the liaison sites.

OTS/i2c plans to revisit these sites with the cover of upgrading the biometric software to perform a collection against the biometric takes, a CIA document outlining test procedures for the project states.

Liaison officers overseeing this procedure will remain unsuspicious, as the data exfiltration is disguised behind a Windows installation splash screen.

ExpressLane was intended to remain secret until 2034, according to the files which originate from 2009.

The core components of the OTS system are based on products from Cross Match a US company specializing in biometric software for law enforcement and the Intelligence Community.

In 2011, it was reported that the US military used one of the companys products to identify Osama bin Laden during the assassination operation in Pakistan.

The White House and Department of Defense said facial recognition technology was one of the techniques used to identify Bin Laden but Cross Matchs involvement was not confirmed.

READ MORE: CIA CouchPotato tool captures video stream images remotely WikiLeaks

More:
CIA's secret spy tool helps agency steal data from NSA & FBI, WikiLeaks reveals - RT

After Cyber Command Elevation, Split From NSA Could Be Next – Morning Consult

President Donald Trumps elevation of U.S. Cyber Command to a full Unified Combatant Command amps up the powers of a national security unit that has taken center stage amid widening questions about Russian meddling in the 2016 elections.

This new Unified Combatant Command will strengthen our cyberspace operations and create more opportunities to improve our Nations defense, Trump announced in a statementon Friday.

Thepresidents move makes Cyber Command formerly a subordinate command unit under U.S. Strategic Command the 10th unified command in the U.S. military.Cyber Command was first established in 2009 on the orders of then-Defense Secretary Robert Gates to handle the U.S. militarys cyber operations.

Currently, both the National Security Agency and Cyber Command are overseen by Adm. Mike Rogers in a dual-hat role. As part of Trumps announcement, Secretary of Defense James Mattis is conducting a review to determine whether Cyber Command should be separated from the NSA.

The move aims to expand Americas war-fighting strategy: U.S. officials say cyberattacks are part of the military doctrine for Russia, whose interference in the 2016 elections is a focus of House and Senate intelligence committee probes, among other investigations.

But some critics say that removing CYBERCOM from the oversight of the NSA director could lead to information-sharing concerns.

Jamil Jaffer, founder of the National Security Institute at George Mason Universitys Antonin Scalia Law School and a visiting fellow at the Hoover Institution, said that there is little opposition to a unified Cyber Command. But Jaffer added that there has been an ongoing debate over whether and how CYBERCOM should be split off from the NSA.

Ive always thought it made sense to dual-hat the NSA director and the Cyber Command commander because then they can appropriately balance the intelligence gains and losses, Jaffer said in a phone interview Friday. I think when you separate them, then you have competing equities.

Jaffer said a split could have the unintended consequence of slowing down the efficiency of both operations.

I do think its important to have the offensive and defensive cyber capabilities that Cyber Command has, while also ensuring we preserve NSAs signals intelligence capabilities, Jaffer added.

There is bipartisan support in Congress for Cyber Command to receive more independent operational authority, and lawmakers on both sides of the aisle offered support for the decision.

Sen. John McCain, chairman of the Senate Armed Services Committee, praised the announcement. But the Arizona Republican added there is much more to be done to prepare our nation and our military to meet our cybersecurity challenges.

While Cyber Command and the National Security Agency should eventually be able to operate independent of one another, the administration must work closely with the Congress to take the necessary steps that will make this separation of responsibilities successful, and to ensure that each agency will emerge more effective and more capable as a result, McCain said in a statement Friday.

Rep. Adam Schiff (D-Calif.), ranking member of the House Intelligence Committee, echoed McCains statement and said in his own Friday statement that the elevation of Cyber Command should also facilitate the eventual division of CYBERCOM from the NSA, a step that I believe is in the interests of both entities.

Trumps announcement fulfills a mandate in the National Defense Authorization Act of 2017 to promote Cyber Command and place it on equal footing with the other combatant commands.

Go here to read the rest:
After Cyber Command Elevation, Split From NSA Could Be Next - Morning Consult

EXCLUSIVE NSA Whistleblower: Russia ‘Hack’ of DNC Server an ‘Outright Lie’ – Breitbart News

Utilizing recently unlocked information from data that purportedly originated on the DNCs servers, Binney claimed that he is something like 99% sure that the DNC servers were not hacked from the outside. He urged the U.S. Intelligence Community to immediately release any evidence utilized to draw the conclusion that Russia may have been associated with the breach of the DNC servers.

Binney was an architect of the NSAs surveillance program. He is a former NSA technical director who helped to modernize the agencys worldwide eavesdropping network, co-founding a unit on automating NSA signals intelligence. He became a famed whistleblower when he resigned on October 31, 2001, after spending more than 30 years with the agency.

He is also a senior leader of Veteran Intelligence Professionals for Sanity (VIPS), a group of former officers of the United States Intelligence Community founded in 2003. During the interview, Binney repeatedly referred to a forensic analysis conducted by VIPS members on DNC files posted online by the hacker known as Guccifer 2.0. The VIPS analysis highlighted data that purportedly indicated the DNC server was most likely not hacked from the outside.

Binneys findings are not without detractors, however, with some experts saying the VIPS report is flawed and ignores other explanations for the metadata. Binney pushed back against the criticism, charging the detractors have no evidence for their claims. He squarely placed the onus on the U.S. government to prove any hack.

He was speaking on this reporters Sunday radio program, Aaron Klein Investigative Radio, broadcast on New Yorks AM 970 The Answer and Philadelphias NewsTalk 990 AM.

The VIPS analysis was made possible after an independent researcher who goes by the online name of Forensicator found a way to unlock metadata from Guccifer 2.0s files.

The unlocked metadata shows that on July 5, 2016 a total of 1,976 megabytes of data were quickly downloaded into a file. A key finding is that the file downloads took only 87 seconds in total, which suggests a transfer rate of 22.7 megabytes per second.

A hack of the DNC server would have most likely used an Internet service provider. However, the analysts noted, in mid-2016 U.S. Internet service providers for residential clients did not have speeds capable of downloading data at that rate. The data upload is consistent with a regular transfer to a flash device like a thumb drive.

Yet, the VIPS report seemingly overlooked the fact that some corporate and cloud networks do have upload rates technically capable of transferring at that speed. The DNC has not commented on its own network speeds.

Speaking to this reporter, Binney stated, It is almost absolutely not possible to do it from outside. I mean you have to have some access to the DNC network and some access from there that would allow you to take that rate in. That meant you had to be on the DNC network or some very high-speed network connected to it.

Binney stated that if the data were transferred via the Internet, outside entities would have recordings of the transfer. The network managers would monitor the network log for the Internet, for example, he said. Basically, the people who manage the fiber optic lines. Like AT&T. If they saw a bulge in traffic being passed down one line they could see that maybe we need to offload to another line and reroute. Its like load-leveling across the entire network to make sure that it functions and it doesnt go down for being overloaded on one line only.

Binney, who helped build the NSAs surveillance program, alleged that the NSA would have picked up on any outside hack of the DNC.

They would know exactly where the package went if it were transferred. I would also add that, on the other end, NSA and GCHQ (Government Communications Headquarters), the British equivalent, are watching [WikiLeaks founder] Julian Assange in the embassy and all of the people who are related to him or are contacting him or having any kind of data transfer to or from him.

Theyre watching them all thats Wikileaks, basically they are watching them 24 hours a day cast iron. So, if anybody passed data to them across the network they would know. And be reporting it. Thats the whole problem. They didnt come out and say here is where the data came from that came to Wikileaks. And he is where it came from the DNC server to that point that is related to Wikileaks.

The Hill, however, quoted experts saying the VIP report overlooked other scenarios that could explain the quick transfer rate. This theory assumes that the hacker downloaded the files to a computer and then leaked it from that computer, Rich Barger, director of security research at Splunk, told the publication.

The Hill report continued:

But, said Barger and other experts, that overlooks the possibility the files were copied multiple times before being released, something that may be more probable than not in a bureaucracy like Russian intelligence.

A hacker might have downloaded it to one computer, then shared it by USB to an air gapped [off the internet] network for translation, then copied by a different person for analysis, then brought a new USB to an entirely different air gapped computer to determine a strategy all before it was packaged for Guccifer 2.0 to leak, said Barger.

Speaking to this reporter, Binney allowed that the files may have been copied multiple times before being posted by Guccifer 2.0. But he stated there is no proof that that was the case one way or the other. We should never infer anything without at least one fact to indicate its true, he replied.I would say again, if anything happened like these suggested events then NSA would have a trace on at least most of it. They have produced no information at all.

Besides the rate of transfer, here are some other findings from the unlock metadata included in the VIPS report:

The July date, however, is actually months after the DNC said they first registered a breach in April.Binney stated that it was possible the date and timestamp could have been changed.

The Nation related that possibility in a 4,500-word story on the VIPS analysis:

In addition, there is the adulteration of the documents Guccifer 2.0 posted on June 15, when he made his first appearance. This came to light when researchers penetrated what Folden calls Guccifers top layer of metadata and analyzed what was in the layers beneath. They found that the first five files Guccifer made public had each been run, via ordinary cut-and-paste, through a single template that effectively immersed them in what could plausibly be cast as Russian fingerprints. They were not: The Russian markings were artificially inserted prior to posting. Its clear, another forensics investigator self-identified as HET, wrote in a report on this question, that metadata was deliberately altered and documents were deliberately pasted into a Russianified Word document with Russian language settings and style headings.

The magazine points out that the CIAs cyber-tools would have allowed such an encoding. WikiLeaks began to release in March and labeled Vault 7 includes one called Marble that is capable of obfuscating the origin of documents in false-flag operations and leaving markings that point to whatever the CIA wants to point to.

The Nation story on the VIPS report is reportedly being reviewed by the publication. Were doing the review as we speak, and I dont want to rush to say anything, Katrina vanden Heuvel, the Nations editor and publisher, told the Washington Post earlier this month. The Post reported that the Nations review will include the technical feasibility of the article detailing the VIPS report.

The Gufficer 2.0 files are a key part of the Russia hacking narrative. AJanuary 6, 2017 U.S. Intelligence Communityreport alleging Russian government interference in the 2016 presidential campaign states this of the Gufficer 2.0 files:

We assess with high confidence that Russian military intelligence (General Staff Main Intelligence Directorate or GRU) used the Guccifer 2.0 persona and DCLeaks.com to release US victim data obtained in cyber operations publicly and in exclusives to media outlets and relayed material to WikiLeaks.

The U.S. Intelligence Community has not publicly released any evidence to back up its charges. Despite false media characterizations of 17 intelligence agencies, the January 6 report was authored by three U.S. agencies the NSA, the FBI and the CIA.TheWashington Post,in its extensive June 23article, reported on details of the compartmentalized operation that indicates a high degree of secrecy involving top Obama administration officials.

A Bloomberg opinion piece by Leonid Bershidsky asserted that Binneys information should get more attention.

Bershidsky wrote:

Unlike the current and former intelligence officials anonymously quoted in stories about the Trump-Russia scandal, VIPS members actually have names. But their findings and doubts are only being aired bynon-mainstreampublicationsthat are easy to accuse of being channels for Russian disinformation. The Nation, Consortium News, ZeroHedge and other outlets have pointed totheir findings that at least some of the DNC files were taken by an insider rather than by hackers, Russian or otherwise.

In response to the Nation report, the DNC released the following statement:

U.S. intelligence agencies have concluded the Russian government hacked the DNC in an attempt to interfere in the election. Any suggestion otherwise is false and is just another conspiracy theory like those pushed by Trump and his administration. Its unfortunate that the Nation has decided to join the conspiracy theorists to push this narrative.

During the radio interview, Binney pushed back against the DNC conspiracy theory charge.

They are joining the lie, Binney stated. I mean, it is an outright lie. All they are saying is they are claiming something. Where is any substance from anybody to prove any of that? There isnt any. They havent given any proof whatsoever.

The intelligence community has said it is highly likely. Well, they should absolutely know with all of the taps they have on the fiber lines in the U.S. and around the world. They should have no question whatsoever. Saying high confidence that means that they dont know. Thats really what they are saying. If they have anything else to say, let them produce any evidence that they have so that we can all look at it. So far, they have produced nothing but opinion and speculation and a lie to keep this Cold War going.

In a move that has raised eyebrows, the DNC did not allow the FBI to inspect its servers.

In Januarytestimonybefore the Senate Intelligence Committee, then-FBI Director James Comey confirmed that the FBI registered multiple requests at different levels to review the DNCs hacked servers. Ultimately, the DNC and FBI came to an agreement in which a highly respected private company would carry out forensics on the servers and share any information that it discovered with the FBI, Comey testified.

A senior law enforcement officialstressedthe importance of the FBI gaining direct access to the servers, a request that was denied by the DNC.

The FBI repeatedly stressed to DNC officials the necessity of obtaining direct access to servers and data, only to be rebuffed until well after the initial compromise had been mitigated, the official was quoted by the news media as saying.

This left the FBI no choice but to rely upon a third party for information. These actions caused significant delays and inhibited the FBI from addressing the intrusion earlier.

Comeys statement about a highly respected private company gaining access to the DNC servers was a reference to CrowdStrike, the third-party company ultimately relied upon by the FBI to make its assessment about alleged Russian hacking into the DNC.

As this reporterdocumented, CrowdStrike was financed to the tune of $100 millionfrom a funding drive last year led by Google Capital.

Google Capital, which now goes by the name of CapitalG, is an arm of Alphabet Inc., Googles parent company. Eric Schmidt, the chairman of Alphabet, has been a staunch and active supporter of Hillary Clinton and is a longtime donor to the Democratic Party.

CrowdStrikeis a California-based cybersecurity technology company co-founded by experts George Kurtz and Dmitri Alperovitch.

Alperovitch is anonresident seniorfellow of the Cyber Statecraft Initiative at the Atlantic Council. The Council takes a hawkish approach toward Russia and has releasednumerous reportsand briefs about Russian aggression.

The Council isfundedby the Rockefeller Brothers Fund, Inc., the U.S. State Department and NATO ACT.

Another Councilfunderis the Ploughshares Fund, which in turn has received financing from billionaire George Soros Open Society Foundations.

Aaron Klein is Breitbarts Jerusalem bureau chief and senior investigative reporter. He is a New York Times bestselling author and hosts the popular weekend talk radio program, Aaron Klein Investigative Radio. Follow him onTwitter @AaronKleinShow.Follow him onFacebook.

Read this article:
EXCLUSIVE NSA Whistleblower: Russia 'Hack' of DNC Server an 'Outright Lie' - Breitbart News

NSA launches national geographic portal – Namibian

Business | 2017-08-23Page no: 13

THE LAUNCH ... (From left) The deputy director for spatial data and national spatial data infrastructure Namibia, Alex Mudabeti, Khomas police regional crime investigations coordinator, commissioner Silvanus Nghishidimbwa, Information minister Tjekero Tweya, Land reform minister Utoni Nujoma, economic planning minister Tom Alweendo, Florette Nakusera, NSA board chairperson, NSA surveyor general Ndilipunye Shanyangana and statistician general Alex Shimuafeni at the launch of the national geograph

THE Namibia Statistics Agency (NSA) on Monday launched the online national geographic portal (geoportal), which will help citizens to search and evaluate data from different government institutions.

The portal will also help citizens link map browsers through Digital Namibia, which is found within the platform that permits the visualisation and analysis of core data.

The platform can be accessed at Geofind.nsa.org.na.

Speaking during the launch, land reform minister Utoni Nujoma said Namibia is committed to building soft infrastructure of government spatial data which will reflect a digital Namibia.

Together, as a network of government institutions, we can heighten a culture of evidence-based development planning, decision-making and policy formulation.

Spatial data, also known as geospatial data or geographic information, is data or information that identifies the geographic location, features and boundaries on earth, such as natural or constructed features and oceans.

Nujoma said launching the national geographic portal shows that all government ministries will live up to their mandate in maintaining and providing data to avoid promoting a redundant system that is populated with outdated information which does not live up to the government's mandate.

He applauded the Namibia Spatial Data Infrastructure team under the NSA, as well as economic planning minister and director general of the National Planning Commission, Tom Alweendo, and information minister Tjekero Tweya for their commitment towards the realisation of the platform.

This high level of commitment should serve as a pillar of hope and source of motivation to all of us to continue working in the best interests of our country, said Nujoma.

Speaking at the same event, Alweendo encouraged various government ministries and agencies to partner NSA to have full access to the portal.

He also urged citizens to be concerned with the quality of data that the portal will provide, adding that people and government ministries and agencies should make the best use of the platform. Nampa

Original post:
NSA launches national geographic portal - Namibian

Before NSA’s slides were made with PowerPoint, they looked like this – MuckRock

August 23, 2017

YOU GOTTA BE KIDDING ME! I GOT BOXES FULL OF PARAP!

Included in the release of the NSAs psychic research program is a document labeled Chart Depicting Interaction/Dependencies Acting on Parapsychology. The hand-drawn chart is the only thing in the document, and it looks awfully familiar

At first glance, one might think that the chart is a flow chart - a closer look shows that while many of the boxes are linked by lines, almost none clarify the relationship or the flow of the information. Only the relationship between Parap[sychological] facility] and image maker includes an arrow to show a flow of information from the facility to the image maker.

Several other boxes are completely isolated. Apparently decision maker, motor control and action neither interact with or are dependent on parapsychology. Other boxes, like rational logical adding, symbol marker and formulating abstracting are connected to each other, but never connect to the main chart.

All in all, a perfect addition to your next game of FOIA Karaoke. Read the NSAs (significantly more straightforward) guideline for the STARGATE program embedded below:

Like Emma Bests work? Support her on Patreon.

Image via FX

Read the original post:
Before NSA's slides were made with PowerPoint, they looked like this - MuckRock