Hacker Explains the NSA Global Surveillance System to the European Parliament

Le hacker Jacob Appelbaum explique le système de surveillance au Parlement européen
Septembre 2013

Traduction : Simon Lapointe (dont le compte YouTube vient d’être supprimé).

Source: Égalité et Réconciliation

“Secret” 3G Intel Chip Gives Snoops Backdoor PC Access

vPro processors allow remote access even when computer is turned off

By Paul Joseph Watson, Infowars.com

Intel Core vPro processors contain a “secret” 3G chip that allows remote disabling and backdoor access to any computer even when it is turned off.

20130927-125352.jpg
Image: Intel Core vPro.

Although the technology has actually been around for a while, the attendant privacy concerns are only just being aired. The “secret” 3G chip that Intel added to its processors in 2011 caused little consternation until the NSA spying issue exploded earlier this year as a result of Edward Snowden’s revelations.

In a promotional video for the technology, Intel brags that the chips actually offer enhanced security because they don’t require computers to be “powered on” and allow problems to be fixed remotely. The promo also highlights the ability for an administrator to shut down PCs remotely “even if the PC is not connected to the network,” as well as the ability to bypass hard drive encryption.

“Intel actually embedded the 3G radio chip in order to enable its Anti Theft 3.0 technology. And since that technology is found on every Core i3/i5/i7 CPU after Sandy Bridge, that means a lot of CPUs, not just new vPro, might have a secret 3G connection nobody knew about until now,” reports Softpedia.

Jeff Marek, director of business client engineering for Intel, acknowledged that the company’s Sandy Bridge” microprocessor, which was released in 2011, had “the ability to remotely kill and restore a lost or stolen PC via 3G.”

“Core vPro processors contain a second physical processor embedded within the main processor which has it’s own operating system embedded on the chip itself,” writes Jim Stone. “As long as the power supply is available and in working condition, it can be woken up by the Core vPro processor, which runs on the system’s phantom power and is able to quietly turn individual hardware components on and access anything on them.”

Continue reading

Bush advisor: Hastings crash ‘consistent with a car cyberattack

20130627-083515.jpg
Michael Hastings (DC. Paul Morigi/Getty Images for The Guardian/AFP)

RT

A former cybersecurity advisor to President George W. Bush says a sophisticated computer hack could have been the cause of the automobile accident that claimed the life of journalist Michael Hastings last week in Los Angeles.

Richard Clarke, a State Department official-turned-special advisor to several United States presidents, said the early morning auto crash last Tuesday was “consistent with a car cyberattack,” raising new questions about the death of the award-winning journalist.

Hastings died last week when his 2013 Mercedes C250 coupe collided with a tree in Los Angeles, California on the morning of June 18. He was reportedly traveling at a high rate of speed and failed to stop at a red light moments before the single-car crash. He was only 33.

Speaking to Huffington Post this week, Clarke said that a cyberattack waged at the vehicle could have caused the fatal collision.

“What has been revealed as a result of some research at universities is that it’s relatively easy to hack your way into the control system of a car, and to do such things as cause acceleration when the driver doesn’t want acceleration, to throw on the brakes when the driver doesn’t want the brakes on, to launch an air bag,” Clarke told The Huffington Post. “You can do some really highly destructive things now, through hacking a car, and it’s not that hard.”

“So if there were a cyberattack on the car — and I’m not saying there was,” Clarke continued, “I think whoever did it would probably get away with it.”

Continue reading

HOW TO IDENTIFY CIA LIMITED HANG OUT OP ?

20130619-075507.jpg

By Webster Griffin TARPLEY, for PressTV

The operations of secret intelligence agencies aiming at the manipulation of public opinion generally involve a combination of cynical deception with the pathetic gullibility of the targeted populations.

There is ample reason to believe that the case of Edward Joseph Snowden fits into this pattern. We are likely dealing here with a limited hangout operation, in which carefully selected and falsified documents and other materials are deliberately revealed by an insider who pretends to be a fugitive rebelling against the excesses of some oppressive or dangerous government agency.

But the revelations turn out to have been prepared with a view to shaping the public consciousness in a way which is advantageous to the intelligence agency involved. At the same time, gullible young people can be duped into supporting a personality cult of the leaker, more commonly referred to as a “whistleblower.” A further variation on the theme can be the attempt of the sponsoring intelligence agency to introduce their chosen conduit, now posing as a defector, into the intelligence apparatus of a targeted foreign government. In this case, the leaker or whistleblower attains the status of a triple agent.

Any attempt to educate public opinion about the dynamics of limited hangout operations inevitably collides with the residue left in the minds of millions by recent successful examples of this technique. It will be hard for many to understand Snowden, precisely because they will insist on seeing him as the latest courageous example in a line of development which includes Daniel Ellsberg and Julian Assange, both still viewed by large swaths of naïve opinion as authentic challengers of oppressive government.

This is because the landmark limited hangout operation at the beginning of the current post-Cold War era was that of Daniel Ellsberg and the Pentagon papers, which laid the groundwork for the CIA’s Watergate attack on the Nixon administration, and more broadly, on the office of the presidency itself. More recently, we have had the case of Assange and Wikileaks. Using these two cases primarily, we can develop a simple typology of the limited hangout operation which can be of significant value to those striving to avoid the role of useful idiots amidst the current cascade of whistleblowers and limited hangout artists.

In this analysis, we should also recall that limited hangouts have been around for a very long time. In 1620 Fra Paolo Sarpi, the dominant figure of the Venetian intelligence establishment of his time, advised the Venetian senate that the best way to defeat anti-Venetian propaganda was indirectly. He recommended the method of saying something good about a person or institution while pretending to say something bad. An example might be criticizing a bloody dictator for beating his dog – the real dimensions of his crimes are thus totally underplayed.

Limited hangout artists are instant media darlings

The most obvious characteristic of the limited hangout operative is that he or she immediately becomes the darling of the controlled corporate media. In the case of Daniel Ellsberg, his doctored set of Pentagon papers were published by the New York Times, the Washington Post, the Boston Globe, and eventually by a consortium totaling seventeen corporate newspapers. These press organs successfully argued the case for publication all the way to the United States Supreme Court, where they prevailed against the Nixon administration.

Needless to say, surviving critics of the Warren Commission, and more recent veterans of the 9/11 truth movement, and know very well that this is emphatically not the treatment reserved for messengers whose revelations are genuinely unwelcome to the Wall Street centered US ruling class. These latter are more likely to be slandered, vilified and dragged through the mud, or, even more likely, passed over in complete silence and blacked out. In extreme cases, they can be kidnapped, renditioned or liquidated.

Continue reading

How NSA access was built into Windows

20130615-211506.jpg

[EDITOR’S NOTE: This article was originally published in 1999. It created a big controversy at the time and despite Microsoft denials, they never came clean on the subject. At the end the Presstitutes and the Puppy Press presented it as another “Conspiracy Theory”. And today it seems that nobody cares to continue using Bill Gates’s Operating System: Microsoft Windows.]

Careless mistake reveals subversion of Windows by NSA.

By Duncan Campbell, TELEPOLIS

The first discovery of the new NSA access system was made two years ago by British researcher Dr Nicko van Someren. But it was only a few weeks ago when a second researcher rediscovered the access system. With it, he found the evidence linking it to NSA.

Computer security specialists have been aware for two years that unusual features are contained inside a standard Windows software “driver” used for security and encryption functions. The driver, called ADVAPI.DLL, enables and controls a range of security functions. If you use Windows, you will find it in the C:\Windows\system directory of your computer.

ADVAPI.DLL works closely with Microsoft Internet Explorer, but will only run cryptographic functions that the US governments allows Microsoft to export. That information is bad enough news, from a European point of view. Now, it turns out that ADVAPI will run special programmes inserted and controlled by NSA. As yet, no-one knows what these programmes are, or what they do.

Dr Nicko van Someren reported at last year’s Crypto 98 conference that he had disassembled the ADVADPI driver. He found it contained two different keys. One was used by Microsoft to control the cryptographic functions enabled in Windows, in compliance with US export regulations. But the reason for building in a second key, or who owned it, remained a mystery.

A second key

Two weeks ago, a US security company came up with conclusive evidence that the second key belongs to NSA. Like Dr van Someren, Andrew Fernandez, chief scientist with Cryptonym of Morrisville, North Carolina, had been probing the presence and significance of the two keys. Then he checked the latest Service Pack release for Windows NT4, Service Pack 5. He found that Microsoft’s developers had failed to remove or “strip” the debugging symbols used to test this software before they released it. Inside the code were the labels for the two keys. One was called “KEY”. The other was called “NSAKEY”.

Fernandes reported his re-discovery of the two CAPI keys, and their secret meaning, to “Advances in Cryptology, Crypto’99” conference held in Santa Barbara. According to those present at the conference, Windows developers attending the conference did not deny that the “NSA” key was built into their software. But they refused to talk about what the key did, or why it had been put there without users’ knowledge.

A third key?!

But according to two witnesses attending the conference, even Microsoft’s top crypto programmers were astonished to learn that the version of ADVAPI.DLL shipping with Windows 2000 contains not two, but three keys.

Continue reading

27 Edward Snowden Quotes About U.S. Government Spying That Should Send A Chill Up Your Spine

20130612-083008.jpg

By Michael Snyder, the economic collapse

Would you be willing to give up what Edward Snowden has given up? He has given up his high paying job, his home, his girlfriend, his family, his future and his freedom just to expose the monolithic spy machinery that the U.S. government has been secretly building to the world. He says that he does not want to live in a world where there isn’t any privacy. He says that he does not want to live in a world where everything that he says and does is recorded. Thanks to Snowden, we now know that the U.S. government has been spying on us to a degree that most people would have never even dared to imagine. Up until now, the general public has known very little about the U.S. government spy grid that knows almost everything about us.

But making this information public is going to cost Edward Snowden everything. Essentially, his previous life is now totally over. And if the U.S. government gets their hands on him, he will be very fortunate if he only has to spend the next several decades rotting in some horrible prison somewhere. There is a reason why government whistleblowers are so rare. And most Americans are so apathetic that they wouldn’t even give up watching their favorite television show for a single evening to do something good for society. Most Americans never even try to make a difference because they do not believe that it will benefit them personally. Meanwhile, our society continues to fall apart all around us. Hopefully the great sacrifice that Edward Snowden has made will not be in vain. Hopefully people will carefully consider what he has tried to share with the world. The following are 27 quotes from Edward Snowden about U.S. government spying that should send a chill up your spine…

#1 “The majority of people in developed countries spend at least some time interacting with the Internet, and Governments are abusing that necessity in secret to extend their powers beyond what is necessary and appropriate.”

#2 “…I believe that at this point in history, the greatest danger to our freedom and way of life comes from the reasonable fear of omniscient State powers kept in check by nothing more than policy documents.”

#3 “The government has granted itself power it is not entitled to. There is no public oversight. The result is people like myself have the latitude to go further than they are allowed to.”

#4 “…I can’t in good conscience allow the US government to destroy privacy, internet freedom and basic liberties for people around the world with this massive surveillance machine they’re secretly building.”

#5 “The NSA has built an infrastructure that allows it to intercept almost everything.”

#6 “With this capability, the vast majority of human communications are automatically ingested without targeting. If I wanted to see your e-mails or your wife’s phone, all I have to do is use intercepts. I can get your e-mails, passwords, phone records, credit cards.”

#7 “Any analyst at any time can target anyone. Any selector, anywhere… I, sitting at my desk, certainly had the authorities to wiretap anyone, from you or your accountant, to a federal judge, to even the President…”

#8 “To do that, the NSA specifically targets the communications of everyone. It ingests them by default. It collects them in its system and it filters them and it analyzes them and it measures them and it stores them for periods of time simply because that’s the easiest, most efficient and most valuable way to achieve these ends. So while they may be intending to target someone associated with a foreign government, or someone that they suspect of terrorism, they are collecting YOUR communications to do so.”

Continue reading

Fliqués par Internet… et contents de l’être !

20130611-094546.jpg

Par Marie Delarue, Boulevard Voltaire

Changement d’époque, changement de paradigmes, tiraillements entre désirs et nécessités, revendications libertaires et désir fou de protection tous azimuts. Chacun se « facebookise », se met en scène, « tweete » à tout va. Croit se planquer derrière des pseudos pour balancer sur la Toile tout ce qui lui passe par la tête, ses coups de cœur comme ses humeurs. Il y a là-dedans du plaisant et du déplaisant, du zélateur et de la délation, de l’info et de la désinfo…

On s’angoisse parce que la Toile, comme celle de l’araignée – son modèle -, est une extraordinaire machine à piéger. Plus efficace encore, elle ne se contente pas de retenir dans ses rets ceux qui s’y précipitent, mais elle remonte le fil jusqu’à sa source. Nous tenons là, sans même souvent en avoir conscience, la véritable machine à remonter le temps.

Les États-Unis excellent en cette matière. Piégeurs en chef, on sait qu’ils sont désormais planqués à l’entrée et à la sortie de tous les réseaux, avec leurs gigantesques oreilles intergalactiques et leurs filets à papillons intersidéraux. Le jeune informaticien qui, la semaine dernière, a révélé au monde les dessous du programme PRISM autorisant la NSA et la CIA à fliquer toutes nos connections, vient de révéler son identité au Guardian. Il s’appelle Edward Snowden, a 29 ans, et est parti se réfugier à Hong Kong. Petit frère du soldat Bradley Manning, le fournisseur des données à WikiLeaks dont le procès se tient actuellement, Snowden pense lui aussi avoir rendu service à la planète. Il avoue : « Je n’ai aucune idée de ce que sera mon avenir”, espérant simplement ne pas être extradé vers les États-Unis. Nul doute que pour avoir dénoncé la surveillance, ses faits et gestes seront les premiers surveillés. Il va être – il est déjà – l’homme le plus traqué, physiquement et virtuellement. Au nom de la sûreté nationale, il sera attrapé, même si, comme il le dit, il envisage de demander l’asile à l’Islande. Mais à quel titre, au fait ? Réfugié politique ? Réfugié numérique ?

Continue reading