Skip to main content

Home/ Socialism and the End of the American Dream/ Group items tagged NSA-debunking

Rss Feed Group items tagged

Gary Edwards

The Empire Takes a Hit: NSA Update - 2 views

........................................................................................ NSA Conversation with retired lawyer and Open Source legal expert, "Marbux". ...........................

Federal-Reserve-Bankster-Cartel NSA

started by Gary Edwards on 15 Jun 13 no follow-up yet
Paul Merrell

The Top 5 Claims That Defenders of the NSA Have to Stop Making to Remain Credible | Ele... - 0 views

  • Over the past year, as the Snowden revelations have rolled out, the government and its apologists have developed a set of talking points about mass spying that the public has now heard over and over again. From the President, to Hilary Clinton to Rep. Mike Rogers, Sen. Dianne Feinstein and many others, the arguments are often eerily similar. But as we approach the one year anniversary, it’s time to call out the key claims that have been thoroughly debunked and insist that the NSA apologists retire them.  So if you hear any one of these in the future, you can tell yourself straight up: “this person isn’t credible,” and look elsewhere for current information about the NSA spying. And if these are still in your talking points (you know who you are) it’s time to retire them if you want to remain credible. And next time, the talking points should stand the test of time.
Paul Merrell

US Intel Vets Dispute Russia Hacking Claims - Consortiumnews - 0 views

  • As the hysteria about Russia’s alleged interference in the U.S. election grows, a key mystery is why U.S. intelligence would rely on “circumstantial evidence” when it has the capability for hard evidence, say U.S. intelligence veterans. Veteran Intelligence Professionals for Sanity MEMORANDUM Allegations of Hacking Election Are Baseless A New York Times report on Monday alluding to “overwhelming circumstantial evidence” leading the CIA to believe that Russian President Vladimir Putin “deployed computer hackers with the goal of tipping the election to Donald J. Trump” is, sadly, evidence-free. This is no surprise, because harder evidence of a technical nature points to an inside leak, not hacking – by Russians or anyone else.
  • We have gone through the various claims about hacking. For us, it is child’s play to dismiss them. The email disclosures in question are the result of a leak, not a hack. Here’s the difference between leaking and hacking: Leak: When someone physically takes data out of an organization and gives it to some other person or organization, as Edward Snowden and Chelsea Manning did. Hack: When someone in a remote location electronically penetrates operating systems, firewalls or any other cyber-protection system and then extracts data. All signs point to leaking, not hacking. If hacking were involved, the National Security Agency would know it – and know both sender and recipient. In short, since leaking requires physically removing data – on a thumb drive, for example – the only way such data can be copied and removed, with no electronic trace of what has left the server, is via a physical storage device.
  • These collection resources are extensive [see attached NSA slides 1, 2, 3, 4, 5]; they include hundreds of trace route programs that trace the path of packets going across the network and tens of thousands of hardware and software implants in switches and servers that manage the network. Any emails being extracted from one server going to another would be, at least in part, recognizable and traceable by all these resources. The bottom line is that the NSA would know where and how any “hacked” emails from the DNC, HRC or any other servers were routed through the network. This process can sometimes require a closer look into the routing to sort out intermediate clients, but in the end sender and recipient can be traced across the network. The various ways in which usually anonymous spokespeople for U.S. intelligence agencies are equivocating – saying things like “our best guess” or “our opinion” or “our estimate” etc. – shows that the emails alleged to have been “hacked” cannot be traced across the network. Given NSA’s extensive trace capability, we conclude that DNC and HRC servers alleged to have been hacked were, in fact, not hacked. The evidence that should be there is absent; otherwise, it would surely be brought forward, since this could be done without any danger to sources and methods. Thus, we conclude that the emails were leaked by an insider – as was the case with Edward Snowden and Chelsea Manning. Such an insider could be anyone in a government department or agency with access to NSA databases, or perhaps someone within the DNC.
  • ...1 more annotation...
  • As for the comments to the media as to what the CIA believes, the reality is that CIA is almost totally dependent on NSA for ground truth in the communications arena. Thus, it remains something of a mystery why the media is being fed strange stories about hacking that have no basis in fact. In sum, given what we know of NSA’s existing capabilities, it beggars belief that NSA would be unable to identify anyone – Russian or not – attempting to interfere in a U.S. election by hacking. For the Steering Group, Veteran Intelligence Professionals for Sanity (VIPS)
Paul Merrell

Asia Times Online :: See you on the dark side - 0 views

  • But then there's the mantra PRISM has been essential to foil major terrorist plots; that has been thoroughly debunked. [4] What is never acknowledged is that PRISM is TIA in action. Anyone - with the right clearance - may use TIA to amass serious inside financial information and make staggering profits. So yes, follow the money.
  • Snowden is surfing the PR tsunami as a master - and controlling it all the way. Yes, you do learn a thing or two at the CIA. The timing of the disclosure was a beauty; it handed Beijing the ultimate gift just as President Obama was corralling President Xi Jinping in the California summit about cyber war. As David Lindorff nailed it, [5] now Beijing simply cannot let Snowden hang dry. It's culture; it's a matter of not losing face. And then Snowden even doubled down - revealing the obvious; as much as Beijing, if not more, Washington hacks as hell. [6] Following the money, the security privatization racket and Snowden's moves - all at the same time - allows for a wealth of savory scenarios ... starting with selected players embedded in the NSA-centric Matrix node making a financial killing with inside information. Snowden did not expose anything that was not already known - or at least suspected - since 2002. So it's business as usual for those running the game. The only difference is the (Digital Blackwater) Big Brother is Watching You ethos is now in the open. TIA, a bunch of wealthy investors and a sound business plan - privatized Full Spectrum Dominance - all remain in play. From now on, it's just a matter of carefully, gradually guiding US public opinion to fully "normalize" TIA. After all, we're making all these sacrifices to protect you.
Paul Merrell

Data Shows Little Evidence for FBI's Concerns About Criminals 'Going Dark' | Motherboard - 0 views

  • In the last few months, several government officials, led by the FBI’s Director James Comey, have been complaining that the rise of encryption technologies would lead to a “very dark place” where cops and feds can’t fight and stop criminals. But new numbers released by the US government seem to contradict this doomsday scenario. In 2014, encryption thwarted four wiretaps out of 3,554, according to an annual report published on Wednesday by the US agency that oversees federal courts. The report reveals that state law enforcement agencies encountered encryption in 22 wiretaps last year. Out of those, cops were foiled on only two occasions. As for the feds, they encountered encryption in just three wiretaps, and could not decipher the intercepted communications in two of them.
  • In fact, cops found less encryption last year than in the year prior. In 2013, state authorities encountered encryption in 41 cases, versus 22 in 2014. At the federal level, there were three cases of encryption in 2014, against none in 2013. (The report also refers to five federal wiretaps conducted in “previous years” but only reported in 2014. Of those, the feds were able to crack the communications in four of the five.)
  • So far, the FBI has yet to put forth a valid example where encryption really thwarted an investigation. In fact, some of the examples cited by Comey have been debunked in media reports.
  • ...1 more annotation...
  • he Wiretap Report contains other interesting information that shed a light on government surveillance practices. Out of the more than 3,554 wiretaps authorized by judges, the vast majority of them (3,409 or 89 percent) were for drug related offenses. Homicide, in turn, was the reason behind only 4 percent of the the wiretaps. And virtually all of them (96%) were for “portable devices,” such as cellphones.Even if the Wiretap Report is just small a peek behind the scenes of government surveillance, it shows that for now, at least when it comes to wiretapping, the FBI’s isn’t really going dark.
Paul Merrell

San Bernardino Incident Has the Earmarks of a False Flag. Testimony of Eyewitnesses | G... - 1 views

  • Justifiable suspicions about what happened surfaced straightaway after the incident. The alleged perpetrators, Syed Rizwan Farook and Tashfeen Malik, appear to have been used as convenient patsies – the same way April 2013 Boston Marathon bombing suspects Dzhokhar and Tamerlan Dzhokhar were unjustly framed for a crime they didn’t commit. False flag attacks are used to stoke fear, to enlist public support for planned domestic and foreign horrors. Events post-9/11 are well-documented. What’s unfolding now looks like more of the same – the phony pretext of combating ISIS, state-sponsored high crimes at home and abroad. Eyewitnesses to the San Bernardino shooting said three white gunmen in black military attire, armed with assault rifles, were responsible. Sally Abdelmageed working at the Inland Regional Center described them this way, saying “(a)s soon as they opened up the doors to building three…one of them (began) shoot(ing) into the room.”
  • “I couldn’t see a face. He had a black hat on…black cargo pants, the kind with the big puffy pockets on the side…long sleeve shirt…gloves…huge assault rifle…six magazines…I just saw three dressed exactly the same.” “It looked like their skin color was white. They look like they were athletic(ally) buil(t), and they appeared to be tall” – clearly professionals, carrying out a well-planned attack, the way all false flags are conducted. Abdelmageed and other eyewitnesses gave similar accounts, debunking the official narrative – a Big Lie, framing two innocent Muslim patsies, killed by police to tell no tales, given no chance to explain their innocence. Their bodies were found handcuffed, indicating they were apprehended and likely extrajudicially executed to be unable to refute the official narrative. Former NSA/CIA contractor Steven D. Kelley told Press TV intimated that hired guns allegedly from Craft International (a Blackwater type paramilitary group, the same one responsible for the Boston Marathon bombings) could have been behind the San Bernardino shootings. (see below)
  • The incident “is just one in a long string of false flag events that I am afraid to say are not over,” he said. “We’ll probably be seeing several more before the end of the year, because of the events that are going on in the world, specifically with NATO implicated in the buying of (stolen Iraqi and Syrian oil complicit with) Daesh and other events.” “(W)hen these things happen, they need to have a rapid response which requires a false flag attack. This was very obvious that this was going to happen” – with lots more to come, Kelly believes, part of Washington’s well-orchestrated fear-mongering campaign. The early stages of its dirty aftermath are playing out, most Americans mindless about how they’re being duped.
  •  
    There's a long quote omitted from the highlighting because Diigo wouldn't allow its highlighting.
1 - 6 of 6
Showing 20 items per page