<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Government Spying Archives - Good Shepherd News - Fastest Growing Religious, Free Speech &amp; Political Content</title>
	<atom:link href="https://goodshepherdmedia.net/category/truthful-news/tech/government/feed/" rel="self" type="application/rss+xml" />
	<link>https://goodshepherdmedia.net/category/truthful-news/tech/government/</link>
	<description>Christian, Political, ‎‏‏‎Social &#38; Legal Free Speech News &#124; Ⓒ2024 Good News Media LLC &#124; Shepherd for the Herd! God 1st Programming</description>
	<lastBuildDate>Tue, 16 Sep 2025 05:51:38 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.1</generator>

<image>
	<url>https://goodshepherdmedia.net/wp-content/uploads/2023/08/Good-Shepherd-News-Logo-150x150.png</url>
	<title>Government Spying Archives - Good Shepherd News - Fastest Growing Religious, Free Speech &amp; Political Content</title>
	<link>https://goodshepherdmedia.net/category/truthful-news/tech/government/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>PATRIOT Act Author The NSA Is Actively Violating The Law</title>
		<link>https://goodshepherdmedia.net/patriot-act-author-the-nsa-is-actively-violating-the-law/</link>
		
		<dc:creator><![CDATA[The Truth News]]></dc:creator>
		<pubDate>Tue, 16 Sep 2025 05:51:38 +0000</pubDate>
				<category><![CDATA[⚠️Breaking News⚠️]]></category>
		<category><![CDATA[14th Amendment]]></category>
		<category><![CDATA[1st Amendment]]></category>
		<category><![CDATA[4th Amendment]]></category>
		<category><![CDATA[Cool Tech & Gadgets 📱⌚🎧⚡]]></category>
		<category><![CDATA[Corruption Over the Years]]></category>
		<category><![CDATA[Digital Pioneers]]></category>
		<category><![CDATA[Government Spying]]></category>
		<category><![CDATA[Hackers / Master Programmers]]></category>
		<category><![CDATA[Hardware Pioneers]]></category>
		<category><![CDATA[Legal News The Motivation]]></category>
		<category><![CDATA[Politics]]></category>
		<category><![CDATA[Rights]]></category>
		<category><![CDATA[Science & Engineering]]></category>
		<category><![CDATA[Supreme Court - SCOTUS]]></category>
		<category><![CDATA[Tech]]></category>
		<category><![CDATA[Top Stories]]></category>
		<category><![CDATA[Zee Truthful News]]></category>
		<category><![CDATA[🎖️🪖Military Tech🤖]]></category>
		<category><![CDATA[💻Tech History]]></category>
		<category><![CDATA[🔐Cybersecurity]]></category>
		<category><![CDATA[🔐Hacking Technology]]></category>
		<category><![CDATA[PATRIOT Act]]></category>
		<guid isPermaLink="false">https://goodshepherdmedia.net/?p=21927</guid>

					<description><![CDATA[PATRIOT Act Author: The NSA Is Actively Violating The Law Jim Sensenbrenner (R-WI), the author of the original USA PATRIOT Act, disagrees. In a amicus brief filed in support of the American Civil Liberties Union&#8217;s lawsuit against the National Security Agency&#8217;s bulk collection of U.S. phone records, Sensenbrenner argues that the government has gone far beyond what the legislation authorizes. [&#8230;]]]></description>
										<content:encoded><![CDATA[<h1 class="headline heading-xl ">PATRIOT Act Author: The NSA Is Actively Violating The Law</h1>
<p>Jim Sensenbrenner (R-WI), the author of the original USA PATRIOT Act, disagrees.</p>
<p>In a amicus brief filed in support of the American Civil Liberties Union&#8217;s lawsuit against the National Security Agency&#8217;s bulk collection of U.S. phone records, Sensenbrenner argues that the government has gone far beyond what the legislation authorizes.</p>
<p class="p1">Section 215, known as the business records provision, authorizes intelligence agencies to apply for information if &#8220;the records are relevant to an ongoing foreign intelligence investigation.&#8221;</p>
<p class="p1">In practice, the NSA uses section 215 to collect data pertaining to every phone call to, from, and within the U.S. in the name of combating terrorism.</p>
<p class="p1">Sensenbrenner and the other members of Congress who enacted Section 215 &#8220;did not intend to authorize the program at issue in this lawsuit or any program of a comparable scope,&#8221; according to the brief.</p>
<p class="p1">The brief goes on to propose this question (emphasis ours):</p>
<p class="p1">The NSA is gathering on a daily basis the details of every call that every American makes, as well as every call made by foreigners to or from the United States. <strong>How can every call that every American makes or receives be relevant to a specific investigation?</strong>&#8220;</p>
<p class="p1">Filed by the Electronic Frontier Foundation, the brief notes that Sensenbrenner &#8220;was not aware of the full scope of the program when he voted to reauthorize Section 215&#8221; and would have voted against it if he had known.</p>
<p class="p1">In Sensenbrenner&#8217;s words: &#8220;The suggestion that the administration can violate the law because Congress failed to object is outrageous. But let them be on notice: I am objecting right now.&#8221;  <a href="https://www.businessinsider.com/patriot-act-author-nsa-abused-its-power-2013-9">source</a></p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>DHS: Salt Typhoon hackers breached Army National Guard, exposing admin credentials and network diagrams</title>
		<link>https://goodshepherdmedia.net/dhs-salt-typhoon-hackers-breached-army-national-guard-exposing-admin-credentials-and-network-diagrams/</link>
		
		<dc:creator><![CDATA[The Truth News]]></dc:creator>
		<pubDate>Wed, 23 Jul 2025 20:16:24 +0000</pubDate>
				<category><![CDATA[⚠️Breaking News⚠️]]></category>
		<category><![CDATA[Government Spying]]></category>
		<category><![CDATA[Politics]]></category>
		<category><![CDATA[Tech]]></category>
		<category><![CDATA[Top Stories]]></category>
		<category><![CDATA[Zee Truthful News]]></category>
		<category><![CDATA[🎖️🪖Military Tech🤖]]></category>
		<category><![CDATA[🔐Cybersecurity]]></category>
		<category><![CDATA[breached Army National Guard]]></category>
		<category><![CDATA[DHS: Salt Typhoon hack]]></category>
		<category><![CDATA[Salt Typhoon hackers breach]]></category>
		<guid isPermaLink="false">https://goodshepherdmedia.net/?p=21330</guid>

					<description><![CDATA[DHS: Salt Typhoon hackers breached Army National Guard, exposing admin credentials and network diagrams Following the &#8220;Salt Typhoon&#8221; breach, which compromised U.S. Army National Guard networks, a former Air National Guard servicemember stated that all U.S. forces should now operate under the assumption that their networks are compromised and will be degraded, according to Nextgov/FCW. This reflects [&#8230;]]]></description>
										<content:encoded><![CDATA[<h1 class="single-post-title">DHS: Salt Typhoon hackers breached Army National Guard, exposing admin credentials and network diagrams</h1>
<div class="WaaZC">
<div class="RJPOee EIJn2">
<div class="rPeykc" data-hveid="CAMQAQ" data-ved="2ahUKEwihv7D_n8yOAxXPM0QIHZo6AEcQo_EKegQIAxAB"><span data-huuid="12237279190710991000"><img fetchpriority="high" decoding="async" class="alignnone size-full wp-image-21332" src="https://goodshepherdmedia.net/wp-content/uploads/2025/07/hacker.jpg" alt="" width="800" height="450" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/07/hacker.jpg 800w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/hacker-400x225.jpg 400w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/hacker-768x432.jpg 768w" sizes="(max-width: 800px) 100vw, 800px" /></span></div>
<div class="rPeykc" data-hveid="CAMQAQ" data-ved="2ahUKEwihv7D_n8yOAxXPM0QIHZo6AEcQo_EKegQIAxAB"><span data-huuid="12237279190710991000">Following the &#8220;Salt Typhoon&#8221; breach, which compromised U.S. Army National Guard networks, a former Air National Guard servicemember stated that all U.S. forces should now operate under the assumption that their networks are compromised and will be degraded, <a class="uVhVib" href="http://www.fcw.com/cybersecurity/2025/07/salt-typhoon-hacks-national-guard-systems-serious-escalation-experts-warn/406765/?oref=ng-homepage-river" target="_blank" rel="noopener">accordin</a>g to Nextgov/FCW. </span><span data-huuid="12237279190710988909">This reflects a heightened state of alert and a need for enhanced cybersecurity measures due to the severity of the breach, which has been described as the &#8220;worst telecom breach&#8221; in American history.<span class="pjBG2e" data-cid="0797aaf2-ae2f-4700-a36d-426170506124"><span class="UV3uM"> </span></span></span></p>
<div class="NPrrbc" data-cid="0797aaf2-ae2f-4700-a36d-426170506124" data-uuids="12237279190710991000,12237279190710988909">
<div class="BMebGe btku5b fCrZyc LwdV0e FR7ZSc qVhvac OJeuxf" tabindex="0" role="button" aria-label="View related links" data-hveid="CAYQAQ" data-ved="2ahUKEwihv7D_n8yOAxXPM0QIHZo6AEcQ3fYKegQIBhAB">
<div class="niO4u">
<div class="kHtcsd"></div>
</div>
</div>
</div>
</div>
</div>
</div>
<div class="WaaZC">
<div class="RJPOee EIJn2">
<div class="rPeykc" data-hveid="CAsQAQ" data-ved="2ahUKEwihv7D_n8yOAxXPM0QIHZo6AEcQo_EKegQICxAB"><span data-huuid="12237279190710988823">The Salt Typhoon breach, attributed to hackers connected to China, targeted a U.S. state&#8217;s Army National Guard network, starting in March. </span><span data-huuid="12237279190710990828">The extent of the compromise and the potential for further damage have prompted this call for a more cautious approach to network security across all U.S. forces, according to Nextgov/FCW.</span></div>
</div>
</div>
<div data-hveid="CAsQAQ" data-ved="2ahUKEwihv7D_n8yOAxXPM0QIHZo6AEcQo_EKegQICxAB"></div>
<div data-hveid="CAsQAQ" data-ved="2ahUKEwihv7D_n8yOAxXPM0QIHZo6AEcQo_EKegQICxAB">
<p><iframe title="Salt Typhoon hack targeted National Guard computer networks" width="640" height="360" src="https://www.youtube.com/embed/xHuiRx6Tw18?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
</div>
<div class="WaaZC">
<div data-hveid="CAsQAQ" data-ved="2ahUKEwihv7D_n8yOAxXPM0QIHZo6AEcQo_EKegQICxAB">
<p>Officials with both the National Guard Bureau and the Department of Homeland Security (DHS) confirmed to MeriTalk today that the China-based Salt Typhoon hacking group targeted National Guard networks for attacks between March and December 2024.</p>
<p>These attacks have potentially far-reaching implications for the security of other National Guard unit networks and critical infrastructure entities that the guard helps to protect.</p>
<p>Both agencies indicated that the attacks targeted multiple National Guard networks, and that they have been working on steps to mitigate the impact of the attacks.</p>
<p>A <strong>re</strong><strong>p</strong><strong>ort</strong> from NBC News last night broke the news of the attacks, and cited as a primary source of its reporting a June 11 <a href="https://www.documentcloud.org/documents/25998809-20250611-dhs-salt-typhoon/"><strong>memo</strong></a> from DHS’s Office of Intelligence and Analysis detailing the Salt Typhoon attacks. That memo lays out how extensive the blast radius of the attack may have been.</p>
<p>“A recent compromise of a US state’s Army National Guard network by People’s Republic of China (PRC)-associated cyber actors – publicly tracked as Salt Typhoon – likely provided Beijing with data that could facilitate the hacking of other states’ Army National Guard units, and possibly many of their state-level cybersecurity partners,” the DHS memo says.</p>
<p>“If the PRC-associated cyber actors that conducted the hack succeeded in the latter, it could hamstring state-level cybersecurity partners’ ability to defend US critical infrastructure against PRC cyber campaigns in the event of a crisis or conflict,” the DHS memo warns.</p>
<p>The memo also offers guidance to help the National Guard and state governments to detect, prevent, and mitigate against threats emanating from the Salt Typhoon attacks.</p>
<p>The DHS memo goes on to say that that the Salt Typhoon attacks “extensively compromised” the unnamed state National Guard’s network, “and, among other things, collected its network configuration and its data traffic with its counterparts’ networks in every other US state and at least four US territories, according to a DOD [Defense Department] report.”</p>
<p>“This data also included these networks’ administrator credentials and network diagrams – which could be used to facilitate follow-on Salt Typhoon hacks of these units,” the memo says.</p>
<p>“Salt Typhoon has previously used exfiltrated network configuration files to enable cyber intrusions elsewhere,” the memo says, adding, “Between January and March 2024, Salt Typhoon exfiltrated configuration files associated with other US government and critical infrastructure entities, including at least two US state government agencies. At least one of these files later informed their compromise of a vulnerable device on another US government agency’s network.”</p>
<p>“Salt Typhoon’s success in compromising states’ Army National Guard networks nationwide could undermine local cybersecurity efforts to protect critical infrastructure,” the memo warns, adding, “In some 14 states, Army National Guard units are integrated with state fusion centers responsible for sharing threat information – including cyber threats. In at least one state, the local Army National Guard unit directly provides network defense services.”</p>
<p>“DHS regularly communicates threat information with its partners and in June shared an update on the People’s Republic of China-affiliated hacking group, Salt Typhoon, targeting National Guard networks between March and December 2024,” a DHS spokesperson said today.</p>
<p>“DHS is continuing to analyze these types of attacks and is coordinating closely with the National Guard and other partners to prevent future attacks and mitigate risk,” the spokesperson said.</p>
<p>“The National Guard is aware of recent Department of Defense and Department of Homeland Security reporting regarding the Peoples Republic of China-affiliated hacking group, Salt Typhoon, and their targeting of Army National Guard networks between March and December 2024,” a spokesperson for the National Guard Bureau told MeriTalk today.</p>
<p>“While we cannot provide specific details on the attack or our response to it, we can say this attack has not prevented the National Guard from accomplishing assigned state or federal missions, and that NGB continues to investigate the intrusion to determine its full scope,” the spokesperson said.</p>
<p>“We are taking this matter extremely seriously,” the spokesperson said. “Security protocols are in place to mitigate further risk and contain any potential data compromises, and the response is ongoing. We are coordinating closely with DHS and other federal partners.”</p>
<p>At least one private sector cybersecurity expert reacted with considerable alarm to the news.</p>
<p>“Salt Typhoon’s compromise of the US National Guard is a significant event and potentially poses a serious threat to many Department of Defense systems,” said Gary Barlet, Illumio’s public sector chief technology officer.</p>
<p>“Going forward, all US forces must now assume their networks are compromised and will be degraded,” Barlet warned.</p>
<p>This isn’t the first breach of Department of Defense systems we’ve seen,” Barlet said. “There have been numerous instances across both the public and private sector where sensitive information has been compromised and critical systems accessed via lateral movement.”</p>
<p>“In fact, the <strong><a href="https://www.illumio.com/news/cost-of-ransomware-study">Ponemon Institute</a></strong> highlighted that 55% of organizations admitted a compromised device had infected other devices on the network,” he said.</p>
<p>“The ability of groups such as Salt Typhoon to move laterally across different units and systems is why government agencies must accelerate Zero Trust adoption and go even further with a breach containment strategy,” Barlet emphasized. “It is critical that services and data remain secure even when attackers have compromised a section of the network.”</p>
<p>The Salt Typhoon and related Volt Typhoon hacking groups backed by the Chinese government have emerged in recent years as sophisticated threat actors. Earlier this year, a U.S. intelligence community report <strong>said</strong> that the PRC poses the biggest cyber threat to the United States. <a href="https://www.meritalk.com/articles/dhs-national-guard-confirm-salt-typhoon-attacks-on-guard-networks/" target="_blank" rel="noopener">source</a></p>
</div>
</div>
<p id="anchor-8046ae" class="body-graf">An elite Chinese cyberspy group hacked at least one state’s National Guard network for nearly a year, the Department of Defense has found.</p>
<p id="anchor-72a2f6" class="body-graf">The hackers, already responsible for one of the most expansive cyberespionage campaigns against the U.S. to date, are alleged to have burrowed even further than previously known and may have obtained sensitive military or law enforcement information. Authorities are still working to discover the extent of the data accessed.</p>
<p id="anchor-225054" class="body-graf">A Department of Homeland Security <a href="https://www.documentcloud.org/documents/25998809-20250611-dhs-salt-typhoon/" target="_blank" rel="noopener">memo from June</a>, describing the Pentagon’s findings, said that the group, publicly known by the nickname Salt Typhoon, “extensively compromised a U.S. state’s Army National Guard network” from March 2024 through December. The memo did not say which state.</p>
<p id="anchor-e19aa3" class="body-graf">The report was provided to NBC News through the national security transparency nonprofit Property of the People, which obtained it through a freedom of information request.</p>
<p id="anchor-cb9f01" class="body-graf">The Department of Defense didn’t respond to a request for comment. A National Guard Bureau spokesperson confirmed the compromise but declined to share details.</p>
<p id="anchor-ffa686" class="body-graf">“While we cannot provide specific details on the attack or our response to it, we can say this attack has not prevented the National Guard from accomplishing assigned state or federal missions, and that NGB continues to investigate the intrusion to determine its full scope,” the spokesperson said.</p>
<p id="anchor-87fa2a" class="body-graf">A spokesperson for China’s embassy in Washington did not deny the campaign but said the U.S. has failed to prove China is behind the Salt Typhoon hacks.</p>
<p id="anchor-85c708" class="body-graf">“Cyberattacks are a common threat faced by all countries, China included,” the spokesperson said, adding that the U.S. “has been unable to produce conclusive and reliable evidence that the ‘Salt Typhoon’ is linked to the Chinese government.</p>
<p id="anchor-384df2" class="body-graf">Salt Typhoon is notorious even by the standards of China’s massive cyberspy efforts because of its ability to jump from one organization to another. Last year, U.S. authorities found that it had hacked <a href="https://www.nbcnews.com/tech/security/chinese-hackers-stole-americans-phone-data-8-telecoms-us-officials-say-rcna182942" target="_blank" rel="noopener">at least eight</a> of the country’s largest internet and phone companies, including AT&amp;T and Verizon, using access to <a href="https://www.nbcnews.com/tech/security/china-phone-target-hack-trump-vance-harris-rcna177383" target="_blank" rel="noopener">spy on the calls and text messages</a> of both the Harris and Trump presidential campaigns, as well as the office of then-Senate Majority Leader Chuck Schumer.</p>
<p id="anchor-f2148e" class="body-graf">While part of the Department of Defense, National Guard units are also under the authority of their states; some are deeply integrated with local governments or law enforcement, which may have given the Salt Typhoon hackers the ability to compromise other organizations.</p>
<p id="anchor-3b146e" class="body-graf">The hack “likely provided Beijing with data that could facilitate the hacking of other states’ Army National Guard units, and possibly many of their state-level cybersecurity partners,” the DHS report found. The National Guard in 14 U.S. states work with law enforcement “fusion centers” to share intelligence, the DHS memo notes. The hackers accessed a map of geographic locations in the targeted state, diagrams of how internal networks are set up, and personal information of service members, it said.</p>
<p id="anchor-0e3f15" class="body-graf">In January, the Treasury Department — also a recent target of alleged Chinese hacking — <a href="https://home.treasury.gov/news/press-releases/sb0042" target="_blank" rel="noopener">sanctioned a Sichuan company</a> for allegedly helping Beijing’s Ministry of State Security conduct Salt Typhoon operations.</p>
<p id="anchor-807819" class="endmark body-graf">Salt Typhoon can be pernicious and hard to root out once the hackers take hold. In the AT&amp;T case, <a href="https://www.reuters.com/technology/cybersecurity/chinese-salt-typhoon-cyberespionage-targets-att-networks-secure-carrier-says-2024-12-29/" target="_blank" rel="noopener">the company announced</a> in December that it appeared as if they were no longer being affected and <a href="https://www.verizon.com/about/news/verizon-provides-update-salt-typhoon-matter" target="_blank" rel="noopener">Verizon said in January it had “contained”</a> the incident. Both companies stopped short of saying they were fully protected from the hackers returning. A <a href="https://blog.talosintelligence.com/salt-typhoon-analysis/" target="_blank" rel="noopener">report from Cisco</a> said that, in at least one instance, Salt Typhoon hackers remained in an affected environment for up to three years. <a href="https://www.nbcnews.com/tech/security/national-guard-was-hacked-chinas-salt-typhoon-group-dhs-says-rcna218648" target="_blank" rel="noopener">source</a></p>
<hr />
<h1 class="single-post-title"><img decoding="async" class="alignnone size-full wp-image-21333" src="https://goodshepherdmedia.net/wp-content/uploads/2025/07/china-hacks-us-1-1024x585-1.jpg" alt="" width="1024" height="585" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/07/china-hacks-us-1-1024x585-1.jpg 1024w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/china-hacks-us-1-1024x585-1-400x229.jpg 400w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/china-hacks-us-1-1024x585-1-768x439.jpg 768w" sizes="(max-width: 1024px) 100vw, 1024px" /></h1>
<h1 class="single-post-title">DHS: Salt Typhoon hackers breached Army National Guard, exposing admin credentials and network diagrams</h1>
<p>A U.S. Department of Homeland Security (DHS) memo circulated in June revealed that a Chinese cyberespionage group known as Salt Typhoon ‘extensively compromised a U.S. state’s Army National Guard network over nine months in 2024. The memo, which cites findings from the Department of Defense, said the breach lasted from March through December and did not specify which state was targeted. It also revealed that the stolen data included administrator credentials and detailed network diagrams, basically information that could enable Salt Typhoon hackers to carry out follow-on attacks against the compromised installations.</p>
<p>The memo, however, <a href="https://www.documentcloud.org/documents/25998809-20250611-dhs-salt-typhoon/" target="_blank" rel="noreferrer noopener">noted that</a> “If the PRC-associated cyber actors that conducted the hack succeeded in the latter, it could hamstring state-level cybersecurity partners’ ability to defend US critical infrastructure against PRC cyber campaigns in the event of a crisis or conflict.”</p>
<p>The DHS also identified that in 2023 and 2024, Salt Typhoon also stole 1,462 network configuration files associated with approximately 70 U.S. government and critical infrastructure entities from 12 sectors, including energy, <a href="https://industrialcyber.co/critical-infrastructure/ericsson-to-lead-security-first-overhaul-of-telecom-defense-as-nation-state-cyber-threats-intensify-in-2025/">communications</a>, transportation, and water and wastewater sectors. “These configuration files could enable further computer network exploitation of other networks, including data capture, administrator account manipulation, and <a href="https://industrialcyber.co/ics-security-framework/vedere-labs-details-deep-lateral-movement-in-ot-networks-provides-mitigation-strategies/">lateral movement</a> between networks, according to CISA reporting and NSA guidance.”</p>
<p>Salt Typhoon, already tied to some of the most aggressive cyber operations against the U.S., is now believed to have gained deeper access than previously known, raising concerns that the hackers may have obtained sensitive military or law enforcement information. Federal officials are still investigating the extent of the data exposure.</p>
<p>A National Guard Bureau spokesperson <a href="https://www-nbcnews-com.cdn.ampproject.org/c/s/www.nbcnews.com/news/amp/rcna218648" target="_blank" rel="noreferrer noopener">confirmed</a> the compromise to NBC News, but declined to share details. “While we cannot provide specific details on the attack or our response to it, we can say this attack has not prevented the National Guard from accomplishing assigned state or federal missions, and that NGB continues to investigate the intrusion to determine its full scope,” the spokesperson said.</p>
<p>The DHS revealed that between January and March 2024, Salt Typhoon exfiltrated configuration files associated with other U.S. government and critical infrastructure entities, including at least two U.S. state government agencies. At least one of these files later informed them of a compromise of a vulnerable device on another U.S. government agency’s network.</p>
<p>It added that Salt Typhoon’s success in compromising states’ Army National Guard networks nationwide could undermine local cybersecurity efforts to protect critical infrastructure. “In some 14 states, Army National Guard units are integrated with state fusion centers responsible for sharing threat information—including cyber threats. In at least one state, the local Army National Guard unit directly provides network defense services.”</p>
<p>The memo also identified that Salt Typhoon access to Army National Guard networks in these states could include information on state cyber defense posture, as well as the personally identifiable information (PII) and work locations of state cybersecurity personnel data that could be used to inform future cyber-targeting efforts.</p>
<p>According to DOD reporting, in 2024, Salt Typhoon used its access to a US state’s Army National Guard network to exfiltrate administrator credentials, network traffic diagrams, a map of geographic locations throughout the state, and PII of its service members.</p>
<p>The DHS memo surfaces as senior cybersecurity officials from the National Security Agency and the FBI report progress in disrupting Chinese cyber campaigns targeting U.S. critical infrastructure.</p>
<p>Speaking Tuesday at the International Conference on Cyber Security at Fordham University in New York City, experts <a href="https://therecord.media/china-typhoon-hackers-nsa-fbi-response" target="_blank" rel="noreferrer noopener">detailed</a> Beijing’s so-called Typhoon campaigns, where coordinated efforts involving both Chinese government entities and private sector actors aimed at infiltrating U.S. government agencies and critical infrastructure installations.</p>
<p>Kristina Walter, director of the NSA’s Cybersecurity Collaboration Center, focused on <a href="https://industrialcyber.co/critical-infrastructure/uat-5918-apt-group-targets-taiwan-critical-infrastructure-possible-linkage-to-volt-typhoon/">Volt Typhoon,</a> an effort by Chinese actors to preposition themselves on U.S. critical infrastructure for disruptive or destructive cyberattacks in the event of a <a href="https://industrialcyber.co/analysis/digital-battlegrounds-evolving-hybrid-kinetic-warfare/">kinetic conflict</a> centered around Taiwan.</p>
<p>“The good news is, they really failed. They wanted to persist in domestic networks very quietly for a very long time so that if and when they needed to disrupt those networks, they could. They were not successful in that campaign,” she said.</p>
<p>“We, with private sector, with FBI, found them, understood how they were using the operating systems, how they’re using legitimate credentials to maintain persistence, and frankly, we equipped the entire private sector and U.S. government to hunt for them and detect them.”</p>
<p>Walter did not offer further details about those efforts. She said that after the NSA and other agencies released a <a href="https://industrialcyber.co/critical-infrastructure/cyber-attacks-continue-to-hit-critical-infrastructure-exposing-vulnerabilities-in-oil-water-healthcare-sectors/">public advisory in 2024</a>, owners of <a href="https://industrialcyber.co/industrial-cyber-attacks/cyble-warns-hacktivists-shift-tactics-targeting-critical-infrastructure-with-ics-attacks-data-breaches-intrusions/">critical infrastructure</a> reached out to them to confirm that they had found evidence of Volt Typhoon and ask for help.</p>
<p>Brett Leatherman, who was <a href="https://industrialcyber.co/critical-infrastructure/federal-cyber-posts-see-fresh-faces-amid-push-to-boost-national-resilience-reinforce-digital-defenses/">recently appointed</a> assistant director for cyber at the FBI, echoed those remarks and noted that Volt Typhoon was specifically focused on critical infrastructure centered around the U.S. Navy, particularly <a href="https://therecord.media/chinese-hackers-behind-guam-hack-targeting-us-for-years" target="_blank" rel="noreferrer noopener">in island communities like Guam</a>.</p>
<p>He said U.S. efforts to shine a light on the campaign forced Chinese actors to pull back, adapt their tactics, and burn previous methods they used to breach critical infrastructure systems. The publicity fostered by U.S. agencies forced Chinese groups to come up with new ways to breach organizations while also providing ways for private industry to better defend itself.</p>
<p>“Even if you’re not dismantling that network — we’re never going to dismantle the CCP hacking apparatus — but if you can bring real relief to victims, you’re also protecting national security by doing that, and that’s why public attribution is so important when it comes to PRC hacking activity,” he said.</p>
<p>Commenting on the DHS memo, Ensar Seker, CISO at SOCRadar, wrote in an emailed statement that the revelation that Salt Typhoon maintained access to a U.S. National Guard network for nearly a year is a serious escalation in the cyber domain.</p>
<p>“This isn’t just an opportunistic intrusion. It reflects deliberate, long-term espionage designed to quietly extract strategic intelligence. The group’s sustained presence suggests they were gathering more than just files, they were likely mapping infrastructure, monitoring communication flows, and identifying exploitable weak points for future use,” according to Seker. “What’s deeply concerning is that this activity went undetected for so long in a military environment. It raises questions about visibility gaps, segmentation policies, and detection capabilities in hybrid federal-state defense networks.”</p>
<p>He added that it’s another reminder that advanced persistent threat actors like Salt Typhoon are not only targeting federal agencies but also state-level components, where the security posture might be more varied.</p>
<p>“In a time where we are often fooled into thinking cybercrime means somebody telling us that we missed jury duty, or convincing our loved ones of a long-distance romantic relationship, we sometimes miss the fact that this is more than a game and is played at the nation state level,” Erich Kron, security awareness advocate at KnowBe4, wrote in an emailed statement. “Cybercrime has real dangers for real people and real governments as well. The Typhoon groups, several different alleged Chinese-backed cybercrime groups that carry the ‘Typhoon’ moniker as part of their name, have been known to be very stealthy and very effective. While this was at the state level with the National Guard, it still goes to demonstrate that even our military forces are at risk from these cybercrime groups.”</p>
<p>He added that “These criminal groups must be taken seriously, which means that everyone from senior government leadership to the average citizen needs to be at least somewhat aware of the threats, how to spot them, and who to report them to. Whether it’s stealing money from individuals to fund other operations or trying to cripple infrastructure through cyberattacks, these bad actors are a clear and present danger.” <a href="https://industrialcyber.co/critical-infrastructure/dhs-salt-typhoon-hackers-breached-army-national-guard-exposing-admin-credentials-and-network-diagrams/" target="_blank" rel="noopener">source</a></p>
<hr />
<div class="dw-term-title">
<h1>Major US telecom hack prompts security push after Salt Typhoon attack</h1>
<p><iframe title="Salt Typhoon ‘largely contained’ in telecom networks; Pentagon AI office eliminates CTO directorate" width="640" height="360" src="https://www.youtube.com/embed/R__Ikzi4HGM?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
</div>
<div class="updates-excerpt dw-content-box-p">
<p>Officials urge stronger defences after Chinese hackers infiltrated major US telecom networks.</p>
<div class="dw-term-description dw-content-box-p">
<p id="Lawmakershave">Lawmakers <a href="https://www.reuters.com/technology/cybersecurity/senators-say-us-must-boost-security-after-chinese-salt-typhoon-telecom-hacking-2024-12-11/" target="_blank" rel="noreferrer noopener nofollow">have called</a> for urgent measures to strengthen US telecommunications security following a massive cyberattack linked to China. The hacking campaign, referred to as Salt Typhoon, targeted American telecom companies, compromising vast amounts of metadata and call records. Federal agencies have briefed Congress on the incident, which officials say could be the largest telecom breach in US history.</p>
<p id="SenatorBen">Senator Ben Ray Luján described the hack as a wake-up call, urging the full implementation of federal recommendations to secure networks. Senator Ted Cruz warned of future threats, emphasising the need to close vulnerabilities in critical infrastructure. Debate also surfaced over the role of offensive cybersecurity measures, with Senator Dan Sullivan questioning whether deterrence efforts are adequate.</p>
<p id="TheWhite">The White House reported that <a href="https://dig.watch/updates/salt-typhoon-cyberespionage-operation-raises-alarm-over-us-telecommunications-security-vulnerabilities" target="_blank" rel="noreferrer noopener">at least eight telecommunications firms were affected</a>, with significant data theft. In response, Federal Communications Commission Chairwoman Jessica Rosenworcel proposed annual cybersecurity certifications for telecom companies. Efforts to replace insecure Chinese-made equipment in US networks continue, but funding shortfalls have hampered progress.</p>
<p id="Chinahas"><a href="https://dig.watch/countries/china" target="_blank" rel="noreferrer noopener">China</a> has dismissed the allegations, claiming opposition to all forms of cybercrime. However, US officials have cited evidence of data theft involving companies like Verizon, AT&amp;T, and Lumen. Congress is set to vote on a defence bill allocating $3.1 billion to remove and replace vulnerable telecom hardware. <a href="https://dig.watch/updates/major-us-telecom-hack-prompts-security-push-after-salt-typhoon-attack" target="_blank" rel="noopener">source</a></p>
</div>
</div>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Setting Up A Police Scanner With An RTL-SDR</title>
		<link>https://goodshepherdmedia.net/setting-up-a-police-scanner-with-an-rtl-sdr/</link>
		
		<dc:creator><![CDATA[The Truth News]]></dc:creator>
		<pubDate>Mon, 10 Mar 2025 00:15:19 +0000</pubDate>
				<category><![CDATA[Adult Fun]]></category>
		<category><![CDATA[Computer Hacks]]></category>
		<category><![CDATA[Cool Tech & Gadgets 📱⌚🎧⚡]]></category>
		<category><![CDATA[Corruption Over the Years]]></category>
		<category><![CDATA[Electronic Projects]]></category>
		<category><![CDATA[Entertainment]]></category>
		<category><![CDATA[Government Spying]]></category>
		<category><![CDATA[Hackers / Master Programmers]]></category>
		<category><![CDATA[Home & Garden]]></category>
		<category><![CDATA[How To]]></category>
		<category><![CDATA[Tech]]></category>
		<category><![CDATA[Tools Questions]]></category>
		<category><![CDATA[Top Stories]]></category>
		<category><![CDATA[Windows]]></category>
		<category><![CDATA[Zee Truthful News]]></category>
		<category><![CDATA[🎖️🪖Military Tech🤖]]></category>
		<category><![CDATA[🔐Hacking Technology]]></category>
		<category><![CDATA[🙂Fun Facts🙂]]></category>
		<category><![CDATA[🚨👮Cops Gone Wild 🤡💩]]></category>
		<category><![CDATA[Setting Up A Police Scanner With An RTL-SDR]]></category>
		<guid isPermaLink="false">https://goodshepherdmedia.net/?p=19248</guid>

					<description><![CDATA[Setting Up A Police Scanner With An RTL-SDR The RTL-SDR Blog V4 dongle can be used with SDRTrunk software to listen to trunked police radio and other communications. The RTL-SDR is a wide band radio scanner that can be used for a variety of purposes, including police radio scanning, listening to EMS and fire communications, and more. [&#8230;]]]></description>
										<content:encoded><![CDATA[<h1>Setting Up A Police Scanner With An RTL-SDR</h1>
<div class="WaaZC">
<div class="RJPOee EIJn2">
<div class="rPeykc" data-hveid="CAMQAQ" data-ved="2ahUKEwjfhvni-f2KAxWKJ0QIHcb2KfsQo_EKegQIAxAB">
<p><span data-huuid="7081602413228056754">The RTL-SDR Blog V4 dongle <mark class="QVRyCf">can be used with SDRTrunk software to listen to trunked police radio and other communications</mark>. </span><span data-huuid="7081602413228060523">The RTL-SDR is a wide band radio scanner that can be used for a variety of purposes, including police radio scanning, listening to EMS and fire communications, and more.</span></p>
<div class="NPrrbc" data-cid="214fe8dd-f069-4ae1-ac58-93e32083cde4" data-uuids="7081602413228056754,7081602413228060523">
<div class="BMebGe btku5b fCrZyc LwdV0e FR7ZSc OJeuxf" tabindex="0" role="button" aria-label="View related links" data-hveid="CAcQAQ" data-ved="2ahUKEwjfhvni-f2KAxWKJ0QIHcb2KfsQ3fYKegQIBxAB">
<div class="niO4u">
<div class="kHtcsd"></div>
</div>
</div>
</div>
</div>
</div>
</div>
<div data-hveid="CAMQAQ" data-ved="2ahUKEwjfhvni-f2KAxWKJ0QIHcb2KfsQo_EKegQIAxAB">
<p><iframe title="Turn your Computer into a Trunked Police Scanner for 35$ Unitrunker v2" width="640" height="360" src="https://www.youtube.com/embed/xtVNX9kv22Q?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
<p>&nbsp;</p>
<div style="width: 640px;" class="wp-video"><video class="wp-video-shortcode" id="video-19248-1" width="640" height="360" preload="metadata" controls="controls"><source type="video/mp4" src="https://goodshepherdmedia.net/wp-content/uploads/2025/01/police-scanner.mp4?_=1" /><a href="https://goodshepherdmedia.net/wp-content/uploads/2025/01/police-scanner.mp4">https://goodshepherdmedia.net/wp-content/uploads/2025/01/police-scanner.mp4</a></video></div>
</div>
<div data-hveid="CAMQAQ" data-ved="2ahUKEwjfhvni-f2KAxWKJ0QIHcb2KfsQo_EKegQIAxAB"></div>
<div data-hveid="CAMQAQ" data-ved="2ahUKEwjfhvni-f2KAxWKJ0QIHcb2KfsQo_EKegQIAxAB"></div>
<div class="WaaZC">
<div class="RJPOee EIJn2">
<div class="rPeykc uP58nb" data-hveid="CA0QAQ" data-ved="2ahUKEwjfhvni-f2KAxWKJ0QIHcb2KfsQo_EKegQIDRAB"><span data-huuid="11803490536340609537"><span role="heading" aria-level="2">How it works</span></span></div>
</div>
</div>
<div class="WaaZC">
<div class="RJPOee EIJn2">
<ul>
<li><span data-huuid="11803490536340607360">The RTL-SDR uses a control channel to listen to a frequency that changes often during a conversation.<span class="pjBG2e" data-cid="3a9a539a-1c05-4e12-aacd-b670206805d9"><span class="UV3uM"> </span></span></span></li>
<li class="NPrrbc" data-cid="3a9a539a-1c05-4e12-aacd-b670206805d9" data-uuids="11803490536340607360"><span data-huuid="11803490536340607274">The SDRTrunk software can import trunked system network data from a RadioReference subscription.<span class="pjBG2e" data-cid="7f73e306-93e1-40ce-a11a-34f49c8c5990"><span class="UV3uM"> </span></span></span></li>
<li class="NPrrbc" data-cid="7f73e306-93e1-40ce-a11a-34f49c8c5990" data-uuids="11803490536340607274"><span data-huuid="11803490536340607188">The SDRTrunk software can also blacklist unwanted talkgroups.<span class="pjBG2e" data-cid="c70aca23-8f94-414a-bbcd-7b1f6a682068"><span class="UV3uM"> </span></span></span></li>
<li class="NPrrbc" data-cid="c70aca23-8f94-414a-bbcd-7b1f6a682068" data-uuids="11803490536340607188"><span data-huuid="11803490536340607102">The SDRTrunk software can record and upload trunked radio conversations to a site like openmhz.com.<span class="pjBG2e" data-cid="7fb05838-e878-4243-a6ef-ade1face66b7"><span class="UV3uM"> </span></span></span></li>
</ul>
</div>
</div>
<div class="WaaZC">
<div class="RJPOee EIJn2">
<div class="rPeykc" data-hveid="CCAQAQ" data-ved="2ahUKEwjfhvni-f2KAxWKJ0QIHcb2KfsQo_EKegQIIBAB">
<p><span data-huuid="13536315053031529434">What you&#8217;ll need </span><span data-huuid="11510408485515957098">RTL-SDR Blog V4 dongle, SDRTrunk software, A decent antenna, and A computer with a dual core processor or more.<span class="pjBG2e" data-cid="8d3dba75-be97-4859-90e1-5255b0c54f4a"><span class="UV3uM"> </span></span></span></p>
<div class="NPrrbc" data-cid="8d3dba75-be97-4859-90e1-5255b0c54f4a" data-uuids="13536315053031529434,11510408485515957098">
<div class="BMebGe btku5b fCrZyc LwdV0e FR7ZSc OJeuxf" tabindex="0" role="button" aria-label="View related links" data-hveid="CCMQAQ" data-ved="2ahUKEwjfhvni-f2KAxWKJ0QIHcb2KfsQ3fYKegQIIxAB">
<div class="niO4u">
<div class="kHtcsd"></div>
</div>
</div>
</div>
</div>
</div>
</div>
<h2 id="shopping" tabindex="-1">shopping</h2>
<p>you&#8217;ll need <a href="https://www.rtl-sdr.com/buy-rtl-sdr-dvb-t-dongles/">an RTL-SDR unit</a>. i recommend the dipole antenna kit as well, so you don&#8217;t need to make any additional purchases. if you&#8217;re a radio enthusiast already, you might have a better antenna available, but if you&#8217;re like me you do not and it&#8217;s worth the US$10. mine took a bit over a week to arrive. if you&#8217;re extremely unlucky, you might need two of them, but i was fine with just one. <strong><span style="color: #0000ff;"><em><a style="color: #0000ff;" href="https://www.amazon.com/s?k=sdr+rtl+v4&amp;hvadid=692721048132&amp;hvdev=c&amp;hvlocphy=9031181&amp;hvnetw=g&amp;hvqmt=e&amp;hvrand=7350757278038370506&amp;hvtargid=kwd-2259975973389&amp;hydadcr=24326_13533824&amp;tag=googhydr-20&amp;ref=pd_sl_2787y6f5z8_e" target="_blank" rel="noopener">buy here</a></em></span></strong></p>
<h2 id="basic-setup" tabindex="-1">basic setup</h2>
<p>once your RTL-SDR arrives, you&#8217;ll want to put together your antenna. if you&#8217;re lucky, like i am, you can just extend the antennas arbitrarily and it&#8217;ll work fine; if you&#8217;re cursed, the RTL-SDR website has resources on how long is ideal for various frequencies.</p>
<p>connect the antenna to the RTL-SDR unit, plug it in, and follow the RTL-SDR <a href="https://www.rtl-sdr.com/rtl-sdr-quick-start-guide/">quick start guide</a>. SDRSharp will work, or any of the other Windows options. some of what we&#8217;ll need is only available on windows.</p>
<p>once your RTL-SDR&#8217;s drivers are sorted out, find the specifications for police radio in your area on <a href="https://www.radioreference.com/apps/db/">RadioReference</a>. click your state, click your county, scroll down and see if there&#8217;s a link above a frequency table for you. if you&#8217;re lucky, there is, and if you click it there&#8217;s a page with a table with System Type and System Voice entries at the top. mine has a system type of EDACS Networked Standard and a system voice of ProVoice and Analog, so the rest of this assumes that&#8217;s what you&#8217;ve got as well. if not, good luck.</p>
<p>there should be a table for System Frequencies on your RadioReference page. start up SDRSharp and tune your radio to the first frequency listed there. you&#8217;ll probably hear a bunch of static and the UI will look something like this:</p>
<p><img decoding="async" class="alignnone size-full wp-image-19253" src="https://goodshepherdmedia.net/wp-content/uploads/2025/01/2020-06-26-police-scanner-setup-1.png" alt="" width="928" height="800" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/01/2020-06-26-police-scanner-setup-1.png 928w, https://goodshepherdmedia.net/wp-content/uploads/2025/01/2020-06-26-police-scanner-setup-1-400x345.png 400w, https://goodshepherdmedia.net/wp-content/uploads/2025/01/2020-06-26-police-scanner-setup-1-768x662.png 768w" sizes="(max-width: 928px) 100vw, 928px" /></p>
<p>see how there&#8217;s one constant signal and a bunch of other signals that appear and disappear all over the place? well, that&#8217;s trunking, and the constant signal is our <em>control channel</em>. if you don&#8217;t see it, you can click and drag on the bottom axis of the top panel to change the view. once you&#8217;ve found that constant signal, click on it to get the approximate frequency, go back to your frequency table and the closest thing to that will be the exact frequency. it should sound like a series of weird beeps instead of static. remember that frequency, it&#8217;ll be important later.</p>
<p><em>update 2020-07-31</em>: that control channel can change between the frequencies listed on RadioReference. if things randomly quit working, come back to this step, and see if the control channel has moved. i&#8217;ll mark down below the places that need changing accordingly.</p>
<h2 id="specific-setup" tabindex="-1">specific setup</h2>
<p>EDACS is a trunked system, so we&#8217;re using <a href="https://www.rtl-sdr.com/rtl-sdr-tutorial-following-trunked-radio-unitrunker/">RTL-SDR&#8217;s trunked radio tutorial</a> as our guide, mostly. that guide assumes we have two RTL-SDRs, but there&#8217;s a piece at the end explaining how to do it with just one. that sucks. i&#8217;m going to paraphrase it here.</p>
<p>first, we&#8217;re going to download the software we need: <a href="http://www.unitrunker.com/">Unitrunker</a>, <a href="http://www.vb-cable.com/">VB-Cable</a>, and <a href="https://www.dsdplus.com/">DSD+</a> (extract both the regular and DLL downloads to the same folder). install unitrunker and VB-Cable and extract dsd+ somewhere convenient. you might need to reboot after installing VB-Cable because computers are bad. VB-Cable might set your default input and output devices to the wrong things when you install it, so switch them back if it does. <em><strong><a href="https://www.unitrunker.com/download.html" target="_blank" rel="noopener">https://www.unitrunker.com/download.html</a></strong></em></p>
<p>or dowmload zippped MSI file from us <a href="https://goodshepherdmedia.net/wp-content/uploads/2025/01/UniTrunker-2.1.0.108.zip" target="_blank" rel="noopener">HERE </a> <a href="https://goodshepherdmedia.net/wp-content/uploads/2025/01/UniTrunker-2.1.0.108.zip">UniTrunker-2.1.0.108</a></p>
<p>open up dsd+. it&#8217;ll open four different windows, one of them should have a list of audio input and output devices. check the number in the input list that goes with CABLE Output &#8211; for me it&#8217;s 3. pull up notepad and make a new file. since my input was number 3, i&#8217;m typing</p>
<pre class="language-batch"><strong><code class="language-batch"><span class="token command"><span class="token keyword">DSDPlus</span>.exe -i3M</span></code></strong></pre>
<p>in that file: if yours is not 3, put whatever the correct number is for you instead of 3. then, save the file, find your DSDPlus folder, make sure the type is set to &#8220;All Files&#8221;, and name the file <code>run.bat</code>. close dsd+, go to that folder, and open that <code>run.bat</code> file you just created. it should pull up dsd+ and if you&#8217;re lucky it&#8217;ll print</p>
<pre class="language-text"><strong><code class="language-text">audio input device #3 (CABLE Output (VB-Audio Virtual ) initialized</code></strong></pre>
<p>or something like that. leave that open.</p>
<p>open up unitrunker. click the <code>+</code> to add a new receiver, and click the RTL2832 button to add your RTL-SDR. set your settings around like this:</p>
<p><img loading="lazy" decoding="async" class="alignnone size-full wp-image-19252" src="https://goodshepherdmedia.net/wp-content/uploads/2025/01/2020-06-26-police-scanner-setup-2.png" alt="" width="387" height="513" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/01/2020-06-26-police-scanner-setup-2.png 387w, https://goodshepherdmedia.net/wp-content/uploads/2025/01/2020-06-26-police-scanner-setup-2-302x400.png 302w" sizes="(max-width: 387px) 100vw, 387px" /></p>
<p>the most important things are the RTL Device, the sample rate (2.56 msps), and the VCOs (2 VCOs). i do not know what a VCO is and i do not care enough to find out. we should now have two VCO tabs next to our info tab. the first one needs to look kinda like this:</p>
<p><img loading="lazy" decoding="async" class="alignnone size-full wp-image-19251" src="https://goodshepherdmedia.net/wp-content/uploads/2025/01/2020-06-26-police-scanner-setup-3.png" alt="" width="387" height="717" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/01/2020-06-26-police-scanner-setup-3.png 387w, https://goodshepherdmedia.net/wp-content/uploads/2025/01/2020-06-26-police-scanner-setup-3-216x400.png 216w" sizes="(max-width: 387px) 100vw, 387px" /></p>
<p>the important things are the Role being Signal, the Park frequency being the control channel we found earlier (mine is 851.7625), and the Mute box being checked.</p>
<p><em>update 2020-07-31</em>: if the control channel changes, this Park frequency is one of the two things you&#8217;ll need to update.</p>
<p>the second VCO should look kinda like this:</p>
<p><img loading="lazy" decoding="async" class="alignnone size-full wp-image-19250" src="https://goodshepherdmedia.net/wp-content/uploads/2025/01/2020-06-26-police-scanner-setup-4.png" alt="" width="387" height="727" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/01/2020-06-26-police-scanner-setup-4.png 387w, https://goodshepherdmedia.net/wp-content/uploads/2025/01/2020-06-26-police-scanner-setup-4-213x400.png 213w" sizes="(max-width: 387px) 100vw, 387px" /></p>
<p>the important things are the Role being Voice, the Deemphasis box being unchecked, and the Digital Output being set to your CABLE Input. this means it will connect up with dsd+ listening to our CABLE Output.</p>
<p>press Play now; it should pull up a window with a Channels tab. the Channels tab should look something like this:</p>
<p><img loading="lazy" decoding="async" class="alignnone size-full wp-image-19249" src="https://goodshepherdmedia.net/wp-content/uploads/2025/01/2020-06-26-police-scanner-setup-5.png" alt="" width="821" height="633" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/01/2020-06-26-police-scanner-setup-5.png 821w, https://goodshepherdmedia.net/wp-content/uploads/2025/01/2020-06-26-police-scanner-setup-5-400x308.png 400w, https://goodshepherdmedia.net/wp-content/uploads/2025/01/2020-06-26-police-scanner-setup-5-768x592.png 768w" sizes="(max-width: 821px) 100vw, 821px" /></p>
<p>but the Frequency column will all be zeroes except for the control frequency we found earlier. you&#8217;ll need to copy over the rest of the frequencies manually from the RadioReference site.</p>
<p><em>update 2020-07-31</em>: if the control channel changes, you&#8217;ll need to uncheck the Control box on the old control channel, and check the Control box on the new control channel.</p>
<p>press the stop button and the play button again, and everything should in theory be working. ideally, the Call History tab will be crowded and updating pretty frequently, and unitrunker will be passing things along to dsd+ which will give us the audio we want. technically, this is enough.</p>
<h2 id="groups" tabindex="-1">groups</h2>
<p>the thing, though, is we don&#8217;t have context for any of this. for now, at least. RadioReference should have a table or several of talkgroups &#8211; the &#8220;list all in one table&#8221; button may come in handy &#8211; and we can use that information to figure out who we&#8217;re hearing, and have at least some control over who takes priority if multiple people in different contexts are talking at once.</p>
<p>find the main unitrunker window &#8211; it&#8217;s titled &#8220;Universal Trunker&#8221; and if you don&#8217;t have it open just click the home button a bunch until it opens &#8211; and then open the Systems tab and double-click the one that exists. open the Groups tab in that window, and it should give you a massive list with columns for ID, Label, and a bunch of stuff we don&#8217;t care about right now. the ID matches up with the DEC column in the RadioReference table, and the Label can be either &#8220;Description&#8221; or &#8220;Alpha Tag&#8221; or something you make up yourself if you feel creative. if you pay RadioReference $15 for a Premium subscription then unitrunker can import that data automatically.</p>
<p>once you&#8217;ve filled that all in, open the Sites tab and double-click the entry you see there, then open the Call History tab. the group labels you added should now be appearing in the Audience column; the LCN and Frequency should turn green for what unitrunker is currently listening to.</p>
<p>back in the Groups tab, you can edit the Priority values to control which groups will be chosen more often &#8211; as far as i can tell, higher priority groups will interrupt lower priority groups, and equal priority groups will just play whoever started talking first.</p>
<h2 id="broadcasting" tabindex="-1">broadcasting</h2>
<p>this setup lets you listen to things locally, but what if you want your comrades with no hardware to be able to also listen? the laziest option is to just stream the Call History window on Twitch or something, but in theory there are better options. RadioReference runs Broadcastify, which is designed for hosting police scanner livestreams, but they have to manually approve your broadcast, which is annoying for short term activity. you could run an icecast server yourself or something, but that takes effort to configure. honestly all of those kinda suck but those are your options as far as i know.</p>
<p><em>update 2020-07-31</em>: you can also let your friendly neighborhood succulent run an icecast server for you; reach out to me if you need something like this. if you&#8217;ve got an icecast server, you&#8217;ll need to pay for (or otherwise obtain) <a href="https://www.vb-audio.com/Cable/index.htm#DownloadCable">VB-CABLE A+B</a>, set up VB-CABLE A, and grab <a href="https://danielnoethen.de/butt/">butt (broadcast using this tool)</a>.</p>
<p>you&#8217;ll need to set DSD+ to output to &#8220;CABLE-A Input&#8221; like how you set it to input from &#8220;CABLE Output&#8221; &#8211; Cable A is the fourth output in DSD+, so my run.bat now looks like this:</p>
<pre class="language-batch"><strong><code class="language-batch"><span class="token command"><span class="token keyword">DSDPlus</span>.exe -i3M -o4</span></code></strong></pre>
<p>run butt, pull up the settings, and under the Audio tab set the Input Device to &#8220;CABLE-A Output&#8221;. (for bonus points, set the Streaming Codec to AAC+.) under the Main tab, Add a new Server and put in whatever info your icecast server admin told you to use. now restart your DSD+ and hit butt&#8217;s play button to start streaming, and you should be running a livestream of your police scanner that is accessible over the internet. <a href="https://www.boringcactus.com/2020/06/26/police-scanner-setup.html" target="_blank" rel="noopener">source</a></p>
<p>&nbsp;</p>
<hr />
<h1>Understanding, Listening and Recording Trunked Radio Systems with an RTL-SDR and Trunk-Recorder</h1>
<div id="site-name"><a title="rtl-sdr.com" href="https://www.rtl-sdr.com/" rel="home">rtl-sdr.com</a></div>
<div id="header-message">RTL-SDR (RTL2832U) and software defined radio news and projects. Also featuring Airspy, HackRF, FCD, SDRplay and more.</div>
<div>
<div class="content">
<p>Trunked radio systems for voice communications can be easily found when browsing the spectrum with an SDR. Listening to a voice communication is easy, but actually following a conversation along is almost impossible to do manually. This is because in a trunking system the frequency in use during a conversation can change often. The frequency of the voice is dictated by a control channel that all radios listen to. This allows multiple talk groups (Police, EMS, business etc) to share one chunk of the spectrum without having to allocate fixed channels for each user.</p>
<p><img loading="lazy" decoding="async" class="alignnone size-full wp-image-19254" src="https://goodshepherdmedia.net/wp-content/uploads/2025/01/trunked_radio_andrewm.png" alt="" width="1024" height="582" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/01/trunked_radio_andrewm.png 1024w, https://goodshepherdmedia.net/wp-content/uploads/2025/01/trunked_radio_andrewm-400x227.png 400w, https://goodshepherdmedia.net/wp-content/uploads/2025/01/trunked_radio_andrewm-768x437.png 768w" sizes="(max-width: 1024px) 100vw, 1024px" /></p>
<p>Over on his blog Andrew Nohawk has <a href="https://www.andrewmohawk.com/2020/06/12/trunked-radio-a-guide/" target="_blank" rel="noopener">uploaded an excellent guide that explains trunked radio</a>, how it works, how to use radioreference to look up trunked radio frequencies in your area, and how to use an RTL-SDR to listen in. He then shows how to use a program called &#8220;trunk-recorder&#8221; which will automatically record and upload trunked radio conversations to a site like <a href="https://openmhz.com/" target="_blank" rel="noopener">openmhz.com</a> for sharing.  <a href="https://www.rtl-sdr.com/understanding-listening-and-recording-trunked-radio-systems-with-an-rtl-sdr-and-trunk-recorder/" target="_blank" rel="noopener">source</a></p>
</div>
</div>
]]></content:encoded>
					
		
		<enclosure url="https://goodshepherdmedia.net/wp-content/uploads/2025/01/police-scanner.mp4" length="0" type="video/mp4" />

			</item>
		<item>
		<title>U.S. Government Catalogue of Cellphone Surveillance Devices Used by The Military and by CIA, NSA, FBI and other Intelligence Agencies</title>
		<link>https://goodshepherdmedia.net/u-s-government-catalogue-of-cellphone-surveillance-devices-used-by-the-military-and-by-cia-nsa-fbi-and-other-intelligence-agencies/</link>
		
		<dc:creator><![CDATA[The Truth News]]></dc:creator>
		<pubDate>Mon, 27 Jan 2025 23:05:17 +0000</pubDate>
				<category><![CDATA[Corruption Over the Years]]></category>
		<category><![CDATA[Government Spying]]></category>
		<category><![CDATA[Tech]]></category>
		<category><![CDATA[Top Stories]]></category>
		<category><![CDATA[Zee Truthful News]]></category>
		<category><![CDATA[🔐Cybersecurity]]></category>
		<category><![CDATA[Cellphone]]></category>
		<category><![CDATA[Cellphone Surveillance Devices]]></category>
		<category><![CDATA[CIA]]></category>
		<category><![CDATA[does the government spy on me]]></category>
		<category><![CDATA[FBI]]></category>
		<category><![CDATA[intercept cellular]]></category>
		<category><![CDATA[Military]]></category>
		<category><![CDATA[NSA]]></category>
		<category><![CDATA[Spy Equipment]]></category>
		<category><![CDATA[spy gear]]></category>
		<category><![CDATA[stingray]]></category>
		<category><![CDATA[stingray cell phone]]></category>
		<category><![CDATA[Surveillance]]></category>
		<category><![CDATA[Surveillance Devices]]></category>
		<category><![CDATA[U.S. Government]]></category>
		<guid isPermaLink="false">https://goodshepherdmedia.net/?p=7971</guid>

					<description><![CDATA[U.S. Government Catalogue of Cellphone Surveillance Devices Used by The Military and by CIA, NSA, FBI and other Intelligence Agencies A fellow leader in the intelligence community new sources as we INTERCEPT them from the INTERCEPT which HAS OBTAINED a secret, internal U.S. government catalogue of dozens of cellphone surveillance devices used by the military and by intelligence agencies. [&#8230;]]]></description>
										<content:encoded><![CDATA[<div style="width: 640px;" class="wp-video"><video class="wp-video-shortcode" id="video-7971-2" width="640" height="400" loop autoplay preload="metadata" controls="controls"><source type="video/mp4" src="https://goodshepherdmedia.net/wp-content/uploads/2023/01/Survellance.mp4?_=2" /><a href="https://goodshepherdmedia.net/wp-content/uploads/2023/01/Survellance.mp4">https://goodshepherdmedia.net/wp-content/uploads/2023/01/Survellance.mp4</a></video></div>
<h1 style="text-align: center;"><span style="color: #0000ff;">U.S. Government Catalogue of Cellphone <span style="color: #ff0000;">Surveillance Devices</span></span><br />
<span style="color: #0000ff;">Used by The <span style="color: #ff0000;">Military</span> and by <span style="color: #ff0000;">CIA</span>, <span style="color: #ff0000;">NSA</span>, <span style="color: #ff0000;">FBI</span> and other <span style="color: #ff0000;">Intelligence Agencies</span></span></h1>
<div class="Post-feature-image-wrapper" data-reactid="101">
<div class="Post-feature-image" data-reactid="102">
<div class="JWGIF" data-reactid="103"><span class="dropcap">A fellow leader in the intelligence community new sources as we </span><u>INTERCEPT them from the INTERCEPT which HAS OBTAINED</u> a secret, internal U.S. government <a href="https://theintercept.com/surveillance-catalogue/">catalogue</a> of dozens of cellphone surveillance devices used by the military and by intelligence agencies. The document, thick with previously undisclosed information, also offers rare insight into the spying capabilities of federal law enforcement and local police inside the United States.</div>
</div>
</div>
<div class="Post-body emailwall" data-reactid="175">
<div class="Post-content-block-outer" data-reactid="176">
<div class="GridContainer Post-scroll-container" data-reactid="177">
<div class="GridRow" data-reactid="178">
<div class="Post-content-block" data-reactid="179">
<div class="Post-content-block-inner Post-content-block-inner--without-image" data-reactid="180">
<div class="PostContent" data-reactid="183">
<div data-reactid="184">
<p>The catalogue includes details on the Stingray, a well-known brand of surveillance gear, as well as Boeing “dirt boxes” and dozens of more obscure devices that can be mounted on vehicles, drones, and piloted aircraft. Some are designed to be used at static locations, while others can be discreetly carried by an individual. They have names like Cyberhawk, Yellowstone, Blackfin, Maximus, Cyclone, and Spartacus. <span class="s1">Within the catalogue, the NSA is listed as the vendor of one device, while another was developed for use by the CIA, and another was developed for a special forces requirement. Nearly a third of the entries focus on equipment that seems to have never been described in public before. Click the image below to see what they got.<br />
</span></p>
<p><iframe title="Exposed: Secret Government Surveillance Tools They DON&#039;T Want You to Know About!" width="640" height="360" src="https://www.youtube.com/embed/iRYji0Q2K30?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
<h2 class="Post-feature-subtitle" style="text-align: center;" data-reactid="112">A Secret Catalogue of Government Gear for Spying on Your Cellphone click yellow image to visit</h2>
</div>
<p><a href="https://theintercept.com/surveillance-catalogue/"><img decoding="async" class="size-article-medium wp-image-46178 aligncenter" src="https://theintercept.imgix.net/wp-uploads/sites/1/2015/12/TSSC_CatalogueCTA_01_thumb.gif" alt="" /></a></p>
</div>
</div>
<div data-reactid="187">
<p><em>The Intercept</em> obtained the catalogue from a source within the intelligence community concerned about the militarization of domestic law enforcement. (The original is <a href="https://theintercept.com/document/2015/12/17/government-cellphone-surveillance-catalogue/">here</a>.)</p>
<p>A few of the devices can house a “target list” of as many as 10,000 unique phone identifiers. Most can be used to geolocate people, but the documents indicate that some have more advanced capabilities, like eavesdropping on calls and spying on SMS messages. Two systems, apparently designed for use on captured phones, are touted as having the ability to extract media files, address books, and notes, and one can retrieve deleted text messages.</p>
<p>Above all, the catalogue represents a trove of details on surveillance devices developed for military and intelligence purposes but increasingly used by law enforcement agencies to spy on people and convict them of crimes. The mass shooting earlier this month in San Bernardino, California, which President Barack Obama has called “an act of terrorism,” prompted <a href="https://trott.house.gov/media-center/press-releases/trott-leads-effort-stand-against-obama-administration-s-weakening-local">calls</a> for state and local police forces to beef up their counterterrorism capabilities, a process that has historically involved adapting military technologies to civilian use. Meanwhile, civil liberties advocates and others are increasingly alarmed about how cellphone surveillance devices are used domestically and have called for a more open and informed debate about the trade-off between security and privacy — despite a virtual blackout by the federal government on any information about the specific capabilities of the gear.</p>
<p>“We’ve seen a trend in the years since 9/11 to bring sophisticated surveillance technologies that were originally designed for military use — like Stingrays or drones or biometrics — back home to the United States,” said Jennifer Lynch, a senior staff attorney at the Electronic Frontier Foundation, which has waged a legal battle challenging the use of cellphone surveillance devices domestically. “But using these technologies for domestic law enforcement purposes raises a host of issues that are different from a military context.”</p>
<p><span class="dropcap">M</span><u>ANY OF THE DEVICES</u> in the catalogue, including the Stingrays and dirt boxes, are cell-site simulators, which operate by mimicking the towers of major telecom companies like Verizon, AT&amp;T, and T-Mobile. When someone’s phone connects to the spoofed network, it transmits a unique identification code and, through the characteristics of its radio signals when they reach the receiver, information about the phone’s location. There are also <a href="http://www.wired.com/2015/10/stingray-government-spy-tools-can-record-calls-new-documents-confirm/">indications</a> that cell-site simulators may be able to monitor calls and text messages.</p>
<p>In the catalogue, each device is listed with guidelines about how its use must be approved; the answer is usually via the “Ground Force Commander” or under one of two titles in the U.S. code governing military and intelligence operations, including covert action.</p>
<p>But domestically the devices have been used in a way that violates the constitutional rights of citizens, including the Fourth Amendment prohibition on illegal search and seizure, critics like Lynch say. They have regularly been used without warrants, or with warrants that critics call overly broad. Judges and civil liberties groups alike have complained that the devices are used without full disclosure of how they work, even within court proceedings.</p>
<div style="width: 640px;" class="wp-video"><video class="wp-video-shortcode" id="video-7971-3" width="640" height="400" loop autoplay preload="metadata" controls="controls"><source type="video/mp4" src="https://goodshepherdmedia.net/wp-content/uploads/2023/01/Survellance-Spy-Gear.mp4?_=3" /><a href="https://goodshepherdmedia.net/wp-content/uploads/2023/01/Survellance-Spy-Gear.mp4">https://goodshepherdmedia.net/wp-content/uploads/2023/01/Survellance-Spy-Gear.mp4</a></video></div>
<p>“Every time police drive the streets with a Stingray, these dragnet devices can identify and locate dozens or hundreds of innocent bystanders’ phones,” said Nathan Wessler, a staff attorney with the Speech, Privacy, and Technology Project of the American Civil Liberties Union.</p>
<p>The controversy around cellphone surveillance illustrates the friction that comes with redeploying military combat gear into civilian life. The U.S. government has been using cell-site simulators for at least <a href="http://www.wired.com/1996/02/catching/">20 years</a>, but their use by local law enforcement is a more recent development.</p>
<p>The archetypical cell-site simulator, the Stingray, was trademarked by Harris Corp. in 2003 and initially used by the military, intelligence agencies, and federal law enforcement. Another company, Digital Receiver Technology, now owned by Boeing, developed dirt boxes — more powerful cell-site simulators — which gained favor among the NSA, CIA, and U.S. military as good tools for hunting down suspected terrorists. The devices can reportedly track more than 200 phones over a wider range than the Stingray.</p>
<p>Amid the war on terror, companies selling cell-site simulators to the federal government thrived. In addition to large corporations like Boeing and Harris, which clocked more than <a href="https://washingtontechnology.com/articles/2015/06/07/harris-top-100-profile.aspx">$2.6 billion in federal contracts</a> last year, the catalogue obtained by <em>The Intercept</em> includes products from little-known outfits like Nevada-based Ventis, which appears to have been <a href="http://nvsos.gov/sosentitysearch/corpActions.aspx?lx8nvq=kaC42PDAVuZhhwdFwAw4Fg%253d%253d&amp;CorpName=VENTIS+CORPORATION">dissolved</a>, and SR Technologies of Davie, Florida, which has a website that warns: “Due to the sensitive nature of this business, we require that all visitors be registered before accessing further information.” (The catalogue obtained by <em>The Intercept</em> is not dated, but includes information about an event that occurred in 2012.)</p>
<p>The U.S. government eventually used cell-site simulators to target people for assassination in drone strikes, <em>The Intercept</em> has <a href="https://theintercept.com/2014/02/10/the-nsas-secret-role/">reported</a>. But the CIA helped use the technology at home, too. For more than a decade, the agency worked with the U.S. Marshals Service to deploy planes with dirt boxes attached to track mobile phones across the U.S., the <em>Wall Street Journal</em> <a href="http://www.wsj.com/articles/cia-gave-justice-department-secret-phone-scanning-technology-1426009924">revealed</a>.</p>
<p>After being used by federal agencies for years, cellular surveillance devices began to make their way into the arsenals of a small number of local police agencies. By 2007, Harris sought a license from the Federal Communications Commission to widely sell its devices to local law enforcement, and police <a href="https://s3.amazonaws.com/files.cloudprivacy.net/FOIA/FCC/fcc-stingray-reply.pdf">flooded</a> the FCC with letters of support. “The text of every letter was the same. The only difference was the law enforcement logo at the top,” said Chris Soghoian, the principal technologist at the ACLU, who obtained copies of the letters from the FCC through a Freedom of Information Act request.</p>
<p>The lobbying campaign was a success. Today nearly 60 law enforcement agencies in 23 states are <a href="https://www.aclu.org/map/stingray-tracking-devices-whos-got-them">known</a> to possess a Stingray or some form of cell-site simulator, though experts believe that number likely underrepresents the real total. In some jurisdictions, police use cell-site simulators regularly. The Baltimore Police Department, for example, has used Stingrays <a href="http://www.baltimoresun.com/news/maryland/baltimore-city/bs-md-ci-stingray-case-20150408-story.html">more than</a> 4,300 times since 2007.</p>
<p>Police often cite the war on terror in acquiring such systems. Michigan State Police claimed their Stingrays would “allow the State to track the physical location of a suspected terrorist,” although the ACLU <a href="https://www.aclu.org/blog/free-future/police-citing-terrorism-buy-stingrays-used-only-ordinary-crimes">later found</a> that in 128 uses of the devices last year, none were related to terrorism. In Tacoma, Washington, police <a href="https://privacysos.org/node/1554">claimed</a> Stingrays could prevent attacks using improvised explosive devices — the roadside bombs that plagued soldiers in Iraq. “I am not aware of any case in which a police agency has used a cell-site simulator to find a terrorist,” said Lynch. Instead, “law enforcement agencies have been using cell-site simulators to solve even the most minor domestic crimes.”</p>
<p><em>The Intercept</em> is not publishing information on devices in the catalogue where the disclosure is not relevant to the debate over the extent of domestic surveillance.</p>
<p>The Office of the Director of National Intelligence declined to comment for this article. The FBI, NSA, and U.S. military did not offer any comment after acknowledging <em>The Intercept</em>’s written requests. The Department of Justice “uses technology in a manner that is consistent with the requirements and protections of the Constitution<span class="s1">, including the Fourth Amendment, and applicable statutory authorities,</span>” said Marc Raimondi, a Justice Department spokesperson who, for six years prior to working for the DOJ, worked for Harris Corp., the manufacturer of the Stingray.</p>
<p><span class="dropcap">W</span><u>HILE INTEREST FROM</u> local cops helped fuel the spread of cell-site simulators, funding from the federal government also played a role, incentivizing municipalities to buy more of the technology. In the years since 9/11, the U.S. has expanded its funding to provide military hardware to state and local law enforcement agencies via grants awarded by the Department of Homeland Security and the Justice Department. There’s been a similar pattern with Stingray-like devices.</p>
<p>“The same grant programs that paid for local law enforcement agencies across the country to buy armored personnel carriers and drones have paid for Stingrays,” said Soghoian. “Like drones, license plate readers, and biometric scanners, the Stingrays are yet another surveillance technology created by defense contractors for the military, and after years of use in war zones, it eventually trickles down to local and state agencies, paid for with DOJ and DHS money.”</p>
<p>In 2013, the Florida Department of Law Enforcement <a href="http://www.myflorida.com/apps/vbs/adoc/F13170_CopyofPUR77767dayIntendedSoleSourceSyndetix.pdf">reported</a> the purchase of two HEATR long-range surveillance devices as well as $3 million worth of Stingray devices <a href="https://www.aclu.org/florida-department-law-enforcement-stingray-purchase-order-summary?redirect=technology-and-liberty/florida-department-law-enforcement-stingray-purchase-order-summary">since 2008</a>. In California, Alameda County and police departments in Oakland and Fremont <a href="https://www.revealnews.org/article/east-bay-cellphone-surveillance-plan-gets-attorney-generals-support/">are using</a> $180,000 in Homeland Security grant money to buy Harris’ Hailstorm cell-site simulator and the hand-held Thoracic surveillance device, made by Maryland security and intelligence company Keyw. As part of Project Archangel, which is described in government contract documents as a “border radio intercept program,” the Drug Enforcement Administration has contracted with Digital Receiver Technology for over $1 million in DRT surveillance box equipment. The Department of the Interior contracted with Keyw for more than half a million dollars of “reduced signature cellular precision geolocation.”</p>
<p>Information on such purchases, like so much about cell-site simulators, has trickled out through freedom of information requests and public records. The capabilities of the devices are kept under lock and key — a secrecy that hearkens back to their military origins. When state or local police purchase the cell-site simulators, they <a href="http://www.nyclu.org/files/20120629-renondisclsure-obligations(Harris-ECSO).pdf">are routinely required</a> to sign non-disclosure agreements with the FBI that they may not reveal the “existence of and the capabilities provided by” the surveillance devices, or share “any information” about the equipment with the public.</p>
<p>Indeed, while several of the devices in the military catalogue obtained by <em>The Intercept</em> are actively deployed by federal and local law enforcement agencies, according to public records, judges have struggled to obtain details of how they work. Other products in the secret catalogue have never been publicly acknowledged and any use by state, local, and federal agencies inside the U.S. is, therefore, difficult to challenge.</p>
<p>“It can take decades for the public to learn what our police departments are doing, by which point constitutional violations may be widespread,” Wessler said. “By showing what new surveillance capabilities are coming down the pike, these documents will help lawmakers, judges, and the public know what to look out for as police departments seek ever-more powerful electronic surveillance tools.”</p>
<p>Sometimes it’s not even clear how much police are spending on Stingray-like devices because they are bought with proceeds from assets seized under federal civil forfeiture law, in drug busts and other operations. Illinois, Michigan, and Maryland police forces have all used asset forfeiture funds to pay for Stingray-type equipment.</p>
<p>“The full extent of the secrecy surrounding cell-site simulators is completely unjustified and unlawful,” said EFF’s Lynch. “No police officer or detective should be allowed to withhold information from a court or criminal defendant about how the officer conducted an investigation.”</p>
<p><span class="dropcap">J</span><u>UDGES HAVE BEEN</u> among the foremost advocates for ending the secrecy around cell-site simulators, including by pushing back on warrant requests. At times, police have attempted to hide their use of Stingrays in criminal cases, prompting at least one judge to throw out evidence obtained by the device. In 2012, a U.S. magistrate judge in Texas rejected an application by the Drug Enforcement Administration to use a cell-site simulator in an operation, saying that the agency had failed to explain “what the government would do with” the data collected from innocent people.</p>
<p>Law enforcement has responded with some limited forms of transparency. In September, the Justice Department <a href="http://www.justice.gov/opa/pr/justice-department-announces-enhanced-policy-use-cell-site-simulators">issued</a> new guidelines for the use of Stingrays and similar devices, including that federal law enforcement agencies using them must obtain a warrant based on probable cause and must delete any data intercepted from individuals not under investigation.</p>
<p>Contained within the guidelines, however, is a clause stipulating vague “exceptional circumstances” under which agents could be exempt from the requirement to get a probable cause warrant.</p>
<p>“Cell-site simulator technology has been instrumental in aiding law enforcement in a broad array of investigations, including kidnappings, fugitive investigations, and complicated narcotics cases,” said Deputy Attorney General Sally Quillian Yates.</p>
<p>Meanwhile, parallel <a href="https://oversight.house.gov/wp-content/uploads/2015/10/15-3959-S2-DHS-Signed-Policy-Directive-047-02-Use-of-Cell-Site-Simulator-Tech.pdf">guidelines</a> issued by the Department of Homeland Security in October <a href="https://www.aclu.org/blog/free-future/four-biggest-problems-dhss-new-stingray-policy">do not require warrants</a> for operations on the U.S. border, nor do the warrant requirements apply to state and local officials who purchased their Stingrays through grants from the federal government, such as those in Wisconsin, Maryland, and Florida.</p>
<p>The ACLU, EFF, and several prominent members of Congress have said the federal government’s exceptions are too broad and leave the door open for abuses.</p>
<p>“Because cell-site simulators can collect so much information from innocent people, a simple warrant for their use is not enough,” said Lynch, the EFF attorney. “Police officers should be required to limit their use of the device to a short and defined period of time. Officers also need to be clear in the probable cause affidavit supporting the warrant about the device’s capabilities.”</p>
<p>In November, a federal judge in Illinois published a legal memorandum about the government’s application to use a cell-tower spoofing technology in a drug-trafficking investigation. In his memo, Judge Iain Johnston sharply criticized the secrecy surrounding Stingrays and other surveillance devices, suggesting that it made weighing the constitutional implications of their use extremely difficult. “A cell-site simulator is simply too powerful of a device to be used and the information captured by it too vast to allow its use without specific authorization from a fully informed court,” <a href="https://www.documentcloud.org/documents/2516907-united-states-of-america-v-in-the-matter-of-the.html">he wrote</a>.</p>
<p>He added that Harris Corp. “is extremely protective about information regarding its device. In fact, Harris is so protective that it has been widely reported that prosecutors are negotiating plea deals far below what they could obtain so as to not disclose cell-site simulator information. … So where is one, including a federal judge, able to learn about cell-site simulators? A judge can ask a requesting Assistant United States Attorney or a federal agent, but they are tight-lipped about the device, too.”</p>
<p>The ACLU and EFF believe that the public has a right to review the types of devices being used to encourage an informed debate on the potentially far-reaching implications of the technology. The catalogue obtained by <em>The Intercept</em>, said Wessler, “fills an important gap in our knowledge, but it is incumbent on law enforcement agencies to proactively disclose information about what surveillance equipment they use and what steps they take to protect Fourth Amendment privacy rights.”</p>
<p><em>Written by <a class="PostByline-link" href="https://theintercept.com/staff/jeremy-scahill/" rel="author" data-reactid="165"><span data-reactid="166">Jeremy Scahill</span></a>, <a class="PostByline-link" href="https://theintercept.com/staff/margotwilliams/" rel="author" data-reactid="168"><span data-reactid="169">Margot Williams</span></a> Research: Josh Begley <a href="https://theintercept.com/2015/12/16/a-secret-catalogue-of-government-gear-for-spying-on-your-cellphone/" target="_blank" rel="noopener">source</a></em></p>
<p><iframe title="Exposing the NSA’s Mass Surveillance of Americans | Cyberwar" width="640" height="360" src="https://www.youtube.com/embed/tYVm62oEyWA?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
</div>
</div>
</div>
</div>
</div>
</div>
<p>&nbsp;</p>
<h1 class="Post-feature-title" style="text-align: center;" data-reactid="109">STINGRAYS</h1>
<h3 style="text-align: center;"><em><span style="color: #ff0000;">Learn</span><strong><span style="color: #ff0000;"> what a</span>  <span style="color: #0000ff;"><a style="color: #0000ff;" href="https://goodshepherdmedia.net/can-cops-secretly-listen-to-my-phone-how-cops-can-secretly-track-your-phone/" target="_blank" rel="noopener">Stingray is here</a></span></strong></em></h3>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<ul>
<li><a href="https://www.cryptomuseum.com/intel/nsa/index.htm#inter" target="_blank" rel="noopener">NSA-backdoored equipment info found OFF this website</a></li>
<li><a href="https://goodshepherdmedia.net/u-s-government-catalogue-of-cellphone-surveillance-devices-used-by-the-military-and-by-cia-nsa-fbi-and-other-intelligence-agencies/" target="_blank" rel="noopener">U.S. Government Catalogue of Cellphone Surveillance Devices</a></li>
<li><a href="https://en.wikipedia.org/wiki/Backdoor_(computing)" target="_blank" rel="noopener">Backdoors on Wikipedia</a></li>
<li><a href="https://goodshepherdmedia.net/nsa-national-security-agency/" target="_blank" rel="noopener">National Security Agency</a></li>
<li><a href="https://goodshepherdmedia.net/cia-central-intelligence-agency/" target="_blank" rel="noopener">Central Intelligence Agency</a></li>
<li><a href="https://nsa.gov1.info/dni/index.html" target="_blank" rel="noopener">NSA EXTRACTED INFO</a></li>
<li><a href="https://www.cryptomuseum.com/" target="_blank" rel="noopener">CRYPTO MUSEUM</a></li>
<li><a href="https://goodshepherdmedia.net/edward-snowden-nsa-whistleblower/" target="_blank" rel="noopener">Edward Snowden</a></li>
<li><a href="https://goodshepherdmedia.net/can-cops-secretly-listen-to-my-phone-how-cops-can-secretly-track-your-phone/" target="_blank" rel="noopener">Stingray</a></li>
<li><a href="https://goodshepherdmedia.net/fbi-vows-not-to-use-pegasus-spyware-after-grilling-from-capitol-hill/" target="_blank" rel="noopener">Pegasus Spyware</a></li>
<li><a href="https://goodshepherdmedia.net/x-keyscore-allows-the-nsa-and-allies-to-monitor-emails-web-browsing-internet-searches-and-social-media/" target="_blank" rel="noopener">X-Keyscore</a></li>
</ul>
]]></content:encoded>
					
		
		<enclosure url="https://goodshepherdmedia.net/wp-content/uploads/2023/01/Survellance.mp4" length="0" type="video/mp4" />
<enclosure url="https://goodshepherdmedia.net/wp-content/uploads/2023/01/Survellance-Spy-Gear.mp4" length="0" type="video/mp4" />

			</item>
		<item>
		<title>Pegasus spyware: FBI vows not to use after grilling from Capitol Hill</title>
		<link>https://goodshepherdmedia.net/fbi-vows-not-to-use-pegasus-spyware-after-grilling-from-capitol-hill/</link>
		
		<dc:creator><![CDATA[The Truth News]]></dc:creator>
		<pubDate>Sun, 26 Jan 2025 20:36:53 +0000</pubDate>
				<category><![CDATA[Corruption Over the Years]]></category>
		<category><![CDATA[Government Spying]]></category>
		<category><![CDATA[Politics]]></category>
		<category><![CDATA[Tech]]></category>
		<category><![CDATA[Top Stories]]></category>
		<category><![CDATA[Zee Truthful News]]></category>
		<category><![CDATA[🌍World Stage🌍]]></category>
		<category><![CDATA[🔐Cybersecurity]]></category>
		<category><![CDATA[exposing Pegasus]]></category>
		<category><![CDATA[FBI]]></category>
		<category><![CDATA[Frontline PBS Special]]></category>
		<category><![CDATA[Frontline Special]]></category>
		<category><![CDATA[Global Spyware]]></category>
		<category><![CDATA[NSA’s]]></category>
		<category><![CDATA[PBS Special]]></category>
		<category><![CDATA[Pegasus]]></category>
		<category><![CDATA[spyware]]></category>
		<category><![CDATA[XKeyscore]]></category>
		<guid isPermaLink="false">https://goodshepherdmedia.net/?p=6410</guid>

					<description><![CDATA[ Pegasus spyware: FBI vows not to use after grilling from Capitol Hill The FBI insisted it never planned to use the program to trhttps://www.foxnews.com/ack Americans By Anders Hagstrom , Gillian Turner &#124; Fox News Watch the latest video at foxnews.com The FBI has come under scrutiny in recent months after it purchased a license to use the highly effective [&#8230;]]]></description>
										<content:encoded><![CDATA[<h1 class="headline" style="text-align: center;"> Pegasus spyware: FBI vows not to use after grilling from Capitol Hill</h1>
<h2 class="sub-headline speakable">The FBI insisted it never planned to use the program to trhttps://www.foxnews.com/ack Americans</h2>
<div class="article-meta article-meta-lower">
<div class="author-byline">By <a href="https://www.foxnews.com/person/h/anders-hagstrom">Anders Hagstrom</a> , <a href="https://www.foxnews.com/person/t/gillian-turner">Gillian Turner</a> <span class="article-source"><a href="https://www.foxnews.com/politics/fbi-vows-not-use-pegasus-spyware-grilling-capitol-hill" target="_blank" rel="noopener">| Fox News</a></span></div>
</div>
<p><script type="text/javascript" src="https://video.foxnews.com/v/embed.js?id=6304943982001&#038;w=466&#038;h=263"></script><noscript>Watch the latest video at <a href="https://www.foxnews.com">foxnews.com</a></noscript></p>
<div>
<p class="speakable">The FBI has come under scrutiny in recent months after it purchased a license to use the highly effective spyware program. FBI officials have insisted they did not end up using the program and had intended to only use it for research. Nevertheless, internal documents suggest they had plans to expand its use&#8211;including for tracking Americans. The FBI now tells Fox News it will drop the program.</p>
<p><a href="https://www.foxnews.com/politics/fbi-agents-lost-confidence-christopher-wray-lawyer-representing-whistleblowers-says-report" target="_blank" rel="noopener">Director Wray</a> faced a grilling from members of Congress on the issue in hearings earlier this year, when he stated that his organization had never used to program.</p>
<div class="image-ct inline">
<div class="m">
<figure id="attachment_6411" aria-describedby="caption-attachment-6411" style="width: 425px" class="wp-caption aligncenter"><img loading="lazy" decoding="async" class=" wp-image-6411" src="https://goodshepherdmedia.net/wp-content/uploads/2022/12/GettyImages-813266746.webp" alt="FBI director nominee Christopher Wray testifies during his confirmation hearing before the Senate Judiciary Committee July 12, 2017 on Capitol Hill in Washington, D.C. (Photo by Alex Wong/Getty Images)" width="425" height="239" srcset="https://goodshepherdmedia.net/wp-content/uploads/2022/12/GettyImages-813266746.webp 720w, https://goodshepherdmedia.net/wp-content/uploads/2022/12/GettyImages-813266746-300x169.webp 300w" sizes="(max-width: 425px) 100vw, 425px" /><figcaption id="caption-attachment-6411" class="wp-caption-text"><span style="color: #ff6600;"><em>FBI director nominee Christopher Wray testifies during his confirmation hearing before the Senate Judiciary Committee July 12, 2017 on Capitol Hill in Washington, D.C. (Photo by Alex Wong/Getty Images)</em></span></figcaption></figure>
</div>
<div class="caption">
<p>&nbsp;</p>
</div>
</div>
<div class="image-ct inline">
<div class="m">
<figure id="attachment_6412" aria-describedby="caption-attachment-6412" style="width: 400px" class="wp-caption aligncenter"><img loading="lazy" decoding="async" class=" wp-image-6412" src="https://goodshepherdmedia.net/wp-content/uploads/2022/12/Jan.-6-Committee-Adam-Schiff.webp" alt="Rep. Adam Schiff, D-Calif., a member of the House select committee investigating the Jan. 6 attack on the U.S. Capitol, speaks with members of the press after a hearing at the Capitol in Washington, Tuesday, June 21, 2022. (AP Photo/Patrick Semansky)" width="400" height="224" srcset="https://goodshepherdmedia.net/wp-content/uploads/2022/12/Jan.-6-Committee-Adam-Schiff.webp 686w, https://goodshepherdmedia.net/wp-content/uploads/2022/12/Jan.-6-Committee-Adam-Schiff-300x168.webp 300w" sizes="(max-width: 400px) 100vw, 400px" /><figcaption id="caption-attachment-6412" class="wp-caption-text"><span style="color: #ff6600;"><em>Rep. Adam Schiff, D-Calif., a member of the House select committee investigating the Jan. 6 attack on the U.S. Capitol, speaks with members of the press after a hearing at the Capitol in Washington, Tuesday, June 21, 2022. (AP Photo/Patrick Semansky)</em></span></figcaption></figure>
</div>
<div class="caption">
<p>&#8220;The Director&#8217;s testimony was accurate when given and remains true today – there has been no operational use of the NSO product to support any FBI investigation,&#8221; the FBI told Fox.</p>
</div>
</div>
<p><a href="https://www.foxnews.com/politics/sen-wydens-son-blasts-dad-hating-american-dream" target="_blank" rel="noopener">Sen. Ron Wyden, D-OR,</a> accused Wray of essentially lying – or at least fudging the truth – in testimony earlier this year.<img loading="lazy" decoding="async" class="wp-image-6418 aligncenter" src="https://goodshepherdmedia.net/wp-content/uploads/2022/11/pegasus-mobile-spyware-featured-1.jpg" alt="" width="358" height="235" srcset="https://goodshepherdmedia.net/wp-content/uploads/2022/11/pegasus-mobile-spyware-featured-1.jpg 1460w, https://goodshepherdmedia.net/wp-content/uploads/2022/11/pegasus-mobile-spyware-featured-1-300x197.jpg 300w, https://goodshepherdmedia.net/wp-content/uploads/2022/11/pegasus-mobile-spyware-featured-1-1024x673.jpg 1024w, https://goodshepherdmedia.net/wp-content/uploads/2022/11/pegasus-mobile-spyware-featured-1-768x505.jpg 768w" sizes="(max-width: 358px) 100vw, 358px" /> Wray was asked about the FBI’s purchase of the spyware and bureau plans to use it in criminal investigations, including tracking Americans. Wray insisted the FBI would only use Pegasus for &#8220;research,&#8221; but the New York Times soon obtained internal FBI documents indicating this was not accurate – the FBI had hoped to use Pegasus more broadly.</p>
<p><img loading="lazy" decoding="async" class="wp-image-6419 aligncenter" src="https://goodshepherdmedia.net/wp-content/uploads/2022/11/279732-scaled-1.jpg" alt="" width="286" height="121" srcset="https://goodshepherdmedia.net/wp-content/uploads/2022/11/279732-scaled-1.jpg 2560w, https://goodshepherdmedia.net/wp-content/uploads/2022/11/279732-scaled-1-300x127.jpg 300w, https://goodshepherdmedia.net/wp-content/uploads/2022/11/279732-scaled-1-1024x433.jpg 1024w, https://goodshepherdmedia.net/wp-content/uploads/2022/11/279732-scaled-1-768x325.jpg 768w, https://goodshepherdmedia.net/wp-content/uploads/2022/11/279732-scaled-1-1536x649.jpg 1536w, https://goodshepherdmedia.net/wp-content/uploads/2022/11/279732-scaled-1-2048x866.jpg 2048w" sizes="(max-width: 286px) 100vw, 286px" />Pegasus has already proven capable of infiltrating the phones of U.S. officials working overseas, something Rep. Adam Schiff, D-Calif., highlighted in a spyware hearing this summer.<img loading="lazy" decoding="async" class="wp-image-6420 aligncenter" src="https://goodshepherdmedia.net/wp-content/uploads/2022/11/Pegasus.jpg" alt="" width="307" height="173" srcset="https://goodshepherdmedia.net/wp-content/uploads/2022/11/Pegasus.jpg 696w, https://goodshepherdmedia.net/wp-content/uploads/2022/11/Pegasus-300x169.jpg 300w" sizes="(max-width: 307px) 100vw, 307px" /></p>
<p>&#8220;Late last year, multiple news organizations reported that mobile phones used by U.S. diplomats in Uganda had been compromised by NASA&#8217;s Pegasus tool,&#8221; Schiff said at the time. &#8220;It is my belief that we are very likely looking at the tip of the iceberg and that other U.S. government personnel have had their devices compromised, whether by a nation state using NSA services or tools offered by one of its lesser known but equally potent competitors.&#8221;</p>
<div class="image-ct inline">
<div class="m">
<figure id="attachment_6413" aria-describedby="caption-attachment-6413" style="width: 359px" class="wp-caption aligncenter"><img loading="lazy" decoding="async" class=" wp-image-6413" src="https://goodshepherdmedia.net/wp-content/uploads/2022/12/GettyImages-1053441404.webp" alt="People hold posters picturing Saudi journalist Jamal Khashoggi and lightened candles during a gathering outside the Saudi Arabia consulate in Istanbul, on Oct. 25, 2018. Khashoggi, a Washington Post contributor, was killed on Oct. 2, 2018 after a visit to the Saudi consulate in Istanbul to obtain paperwork before marrying his Turkish fiancée. (YASIN AKGUL/AFP via Getty Images)" width="359" height="202" srcset="https://goodshepherdmedia.net/wp-content/uploads/2022/12/GettyImages-1053441404.webp 931w, https://goodshepherdmedia.net/wp-content/uploads/2022/12/GettyImages-1053441404-300x169.webp 300w, https://goodshepherdmedia.net/wp-content/uploads/2022/12/GettyImages-1053441404-768x431.webp 768w" sizes="(max-width: 359px) 100vw, 359px" /><figcaption id="caption-attachment-6413" class="wp-caption-text"><em><span style="color: #ff6600;">People hold posters picturing Saudi journalist Jamal Khashoggi and lightened candles during a gathering outside the Saudi Arabia consulate in Istanbul, on Oct. 25, 2018. Khashoggi, a Washington Post contributor, was killed on Oct. 2, 2018 after a visit to the Saudi consulate in Istanbul to obtain paperwork before marrying his Turkish fiancée. (YASIN AKGUL/AFP via Getty Images)</span></em></figcaption></figure>
</div>
</div>
</div>
<p>&nbsp;</p>
<p>Experts say the spyware has legitimate uses but is also a powerful tool for authoritarian governments. Mexico used Pegasus in its effort to track down El Chapo, and Saudi Arabia also used it to track journalist Jamal Khashoggi prior to orchestrating his murder, according to cyber defense expert Jason Blessing.</p>
<p>&nbsp;</p>
<hr />
<h1><img loading="lazy" decoding="async" class="alignnone size-full wp-image-6850" src="https://goodshepherdmedia.net/wp-content/uploads/2022/11/spying-on-americans.jpg" alt="" width="1899" height="852" srcset="https://goodshepherdmedia.net/wp-content/uploads/2022/11/spying-on-americans.jpg 1899w, https://goodshepherdmedia.net/wp-content/uploads/2022/11/spying-on-americans-300x135.jpg 300w, https://goodshepherdmedia.net/wp-content/uploads/2022/11/spying-on-americans-1024x459.jpg 1024w, https://goodshepherdmedia.net/wp-content/uploads/2022/11/spying-on-americans-768x345.jpg 768w, https://goodshepherdmedia.net/wp-content/uploads/2022/11/spying-on-americans-1536x689.jpg 1536w" sizes="(max-width: 1899px) 100vw, 1899px" /></h1>
<h1 class="article_h1" style="text-align: center;">The Spy Factories: NSA’s <a href="https://goodshepherdmedia.net/x-keyscore-allows-the-nsa-and-allies-to-monitor-emails-web-browsing-internet-searches-and-social-media/" target="_blank" rel="noopener">XKeyscore</a> Isn’t the Only Program Tracking You</h1>
<div class="article_detail_text" style="text-align: center;">BY <a class="link-14" href="https://spyscape.com/article/is-the-xkeyscore-spy-program-revealed-by-snowden-still-a-privacy-problem" target="_blank" rel="noopener">SPYSCAPE</a></div>
<p>When whistleblower Edward Snowden revealed his NSA files in 2013, one sneaky program stood out: <a href="https://goodshepherdmedia.net/x-keyscore-allows-the-nsa-and-allies-to-monitor-emails-web-browsing-internet-searches-and-social-media/" target="_blank" rel="noopener">XKeyscore, a secret system</a> that spies can use to search and analyze nearly everything you do on the internet in real-time.</p>
<p><a href="https://goodshepherdmedia.net/x-keyscore-allows-the-nsa-and-allies-to-monitor-emails-web-browsing-internet-searches-and-social-media/" target="_blank" rel="noopener">XKeyscore</a> is still hoovering up your internet searches, passwords, user names, emails, and personal messages a decade later. In fact, it’s not the only tool governments used to spy on your personal data. Here are five ways the US, Britain, Israel, Canada, and others may be spying on you right now.</p>
<figure class="w-richtext-align-fullwidth w-richtext-figure-type-image"><img loading="lazy" decoding="async" class="size-full wp-image-6845 aligncenter" src="https://goodshepherdmedia.net/wp-content/uploads/2022/11/623c3d957c351af6ea563e3d_mkYifgHWZbvH3emUDDD_6RkG0uXOAhrKosowFYn28uTW7thE_uN24hGNkqZfqx3MsGCtyTwUiOCBMyKCKBkQkDfIOW8GI2gmiV72DEO_xvs6iMPZ4sm46AbbqyY9dBwA4635fa80.jpg" alt="" width="1158" height="685" srcset="https://goodshepherdmedia.net/wp-content/uploads/2022/11/623c3d957c351af6ea563e3d_mkYifgHWZbvH3emUDDD_6RkG0uXOAhrKosowFYn28uTW7thE_uN24hGNkqZfqx3MsGCtyTwUiOCBMyKCKBkQkDfIOW8GI2gmiV72DEO_xvs6iMPZ4sm46AbbqyY9dBwA4635fa80.jpg 1158w, https://goodshepherdmedia.net/wp-content/uploads/2022/11/623c3d957c351af6ea563e3d_mkYifgHWZbvH3emUDDD_6RkG0uXOAhrKosowFYn28uTW7thE_uN24hGNkqZfqx3MsGCtyTwUiOCBMyKCKBkQkDfIOW8GI2gmiV72DEO_xvs6iMPZ4sm46AbbqyY9dBwA4635fa80-300x177.jpg 300w, https://goodshepherdmedia.net/wp-content/uploads/2022/11/623c3d957c351af6ea563e3d_mkYifgHWZbvH3emUDDD_6RkG0uXOAhrKosowFYn28uTW7thE_uN24hGNkqZfqx3MsGCtyTwUiOCBMyKCKBkQkDfIOW8GI2gmiV72DEO_xvs6iMPZ4sm46AbbqyY9dBwA4635fa80-1024x606.jpg 1024w, https://goodshepherdmedia.net/wp-content/uploads/2022/11/623c3d957c351af6ea563e3d_mkYifgHWZbvH3emUDDD_6RkG0uXOAhrKosowFYn28uTW7thE_uN24hGNkqZfqx3MsGCtyTwUiOCBMyKCKBkQkDfIOW8GI2gmiV72DEO_xvs6iMPZ4sm46AbbqyY9dBwA4635fa80-768x454.jpg 768w" sizes="(max-width: 1158px) 100vw, 1158px" /></figure>
<h3><strong>CIA snooping on Americans</strong>&#x200d;</h3>
<p>The CIA is vacuuming up <a href="https://www.wyden.senate.gov/news/press-releases/wyden-and-heinrich-newly-declassified-documents-reveal-previously-secret-cia-bulk-collection-problems-with-cia-handling-of-americans-information" target="_blank" rel="noopener">data in bulk</a> so spies can sift through it, according to two members of the US Senate Intelligence Committee.</p>
<p>If the data collec­tion happens over­seas or falls into a statutory black hole, it comes under <a href="https://dpcld.defense.gov/Portals/49/Documents/Civil/eo-12333-2008.pdf" target="_blank" rel="noopener">Exec­ut­ive Order 12333</a> which means there’s little over­sight. “What stops the CIA from poring through the data look­ing for Amer­ic­ans’ inform­a­tion? Let’s be honest: noth­ing,” according to the <a href="https://www.brennancenter.org/our-work/analysis-opinion/how-cia-acting-outside-law-spy-americans" target="_blank" rel="noopener">Brennan Center for Justice</a>.</p>
<p>Senator Ron Wyden said he is also concerned the US Defense Intelligence Agency is buying consumer smartphone location data from a third-party broker and the Department of Homeland Security is helping to <a href="https://thehill.com/policy/technology/598809-major-government-surveillance-revelations-fail-to-make-a-big-splash" target="_blank" rel="noopener">compile money transfer records</a>.</p>
<p>&nbsp;</p>
<figure class="w-richtext-align-fullwidth w-richtext-figure-type-image"><img loading="lazy" decoding="async" class="size-full wp-image-6846 aligncenter" src="https://goodshepherdmedia.net/wp-content/uploads/2022/11/623c3d95599f7076472413f7_Vmoni7_ie_9PcDGrE1J4vH3sbN8XhviV38cuSAhpsV0QySP7D7uCfPQp02xeUsAvx8XYl2WQ8bLxfs9jdIgW_11Ayd_MsN44tXurN9Ntuhws6uC_TDTWYcESjfYrFx_adL-Bt-LN.jpg" alt="" width="1122" height="736" srcset="https://goodshepherdmedia.net/wp-content/uploads/2022/11/623c3d95599f7076472413f7_Vmoni7_ie_9PcDGrE1J4vH3sbN8XhviV38cuSAhpsV0QySP7D7uCfPQp02xeUsAvx8XYl2WQ8bLxfs9jdIgW_11Ayd_MsN44tXurN9Ntuhws6uC_TDTWYcESjfYrFx_adL-Bt-LN.jpg 1122w, https://goodshepherdmedia.net/wp-content/uploads/2022/11/623c3d95599f7076472413f7_Vmoni7_ie_9PcDGrE1J4vH3sbN8XhviV38cuSAhpsV0QySP7D7uCfPQp02xeUsAvx8XYl2WQ8bLxfs9jdIgW_11Ayd_MsN44tXurN9Ntuhws6uC_TDTWYcESjfYrFx_adL-Bt-LN-300x197.jpg 300w, https://goodshepherdmedia.net/wp-content/uploads/2022/11/623c3d95599f7076472413f7_Vmoni7_ie_9PcDGrE1J4vH3sbN8XhviV38cuSAhpsV0QySP7D7uCfPQp02xeUsAvx8XYl2WQ8bLxfs9jdIgW_11Ayd_MsN44tXurN9Ntuhws6uC_TDTWYcESjfYrFx_adL-Bt-LN-1024x672.jpg 1024w, https://goodshepherdmedia.net/wp-content/uploads/2022/11/623c3d95599f7076472413f7_Vmoni7_ie_9PcDGrE1J4vH3sbN8XhviV38cuSAhpsV0QySP7D7uCfPQp02xeUsAvx8XYl2WQ8bLxfs9jdIgW_11Ayd_MsN44tXurN9Ntuhws6uC_TDTWYcESjfYrFx_adL-Bt-LN-768x504.jpg 768w" sizes="(max-width: 1122px) 100vw, 1122px" /></figure>
<p>&nbsp;</p>
<h3><strong>Pegasus software</strong>&#x200d;</h3>
<p>The Israeli company NSO Group developed Pegasus spyware to target terrorists but governments have used it to track <a href="https://forbiddenstories.org/case/the-pegasus-project/" target="_blank" rel="noopener">at least 180 journalists</a>, political dissidents, activists, and heads of state including French President <a href="https://www.amnesty.org/en/latest/news/2021/07/world-leaders-potential-targets-of-nso-group-pegasus-spyware/" target="_blank" rel="noopener">Emmanuel Macron</a>.</p>
<p>More than 50,000 phone numbers targeted for surveillance by Pegasus’ customers were leaked to Amnesty International, revealing a massive global privacy breach. Once installed, the software operator can receive text messages, contact lists, and calendar events, and can turn on the phone’s camera and microphone to capture activity in the phone’s vicinity.</p>
<p>Who uses it? The FBI ‘tested’ Pegasus spyware but said they haven’t used it in investigations. Canada’s CitizenLab linked Pegasus to operations in 45 countries including Mexico, Bahrain, Kazakhstan, Morocco, Saudi Arabia, and the UAE. <a href="https://www.calcalistech.com/ctech/articles/0,7340,L-3928830,00.html" target="_blank" rel="noopener">Israeli police used the spyware</a> to scrutinize citizens&#8217; phones. The son of ex-Israeli PM Benjamin Netanyahu was one such target. Not all countries have access to Pegasus software. <a href="https://www.theguardian.com/world/2022/mar/23/israel-ukraine-pegasus-spyware-russia" target="_blank" rel="noopener">Israel reportedly blocked Ukraine from buying a license,</a> fearing Russia would be angry if Pegasus was sold to a regional foe.</p>
<p>&nbsp;</p>
<figure class="w-richtext-align-fullwidth w-richtext-figure-type-image"><img loading="lazy" decoding="async" class="size-full wp-image-6848 aligncenter" src="https://goodshepherdmedia.net/wp-content/uploads/2022/11/623c3d959440455190bbb947_kduvBiQeD4xLlBAzWBFIfXxIEHsuM9ceMibIy7ixXDrnEJ15t4VbwOvqz9Nl3Rl8VMuVcPgc3NX6Pm71HYv6TmuEWzov3DsEEc4_Xs-2Nla7WTztyvsvMaJla0VKlnOEZ35D5rcC.jpg" alt="" width="1600" height="795" srcset="https://goodshepherdmedia.net/wp-content/uploads/2022/11/623c3d959440455190bbb947_kduvBiQeD4xLlBAzWBFIfXxIEHsuM9ceMibIy7ixXDrnEJ15t4VbwOvqz9Nl3Rl8VMuVcPgc3NX6Pm71HYv6TmuEWzov3DsEEc4_Xs-2Nla7WTztyvsvMaJla0VKlnOEZ35D5rcC.jpg 1600w, https://goodshepherdmedia.net/wp-content/uploads/2022/11/623c3d959440455190bbb947_kduvBiQeD4xLlBAzWBFIfXxIEHsuM9ceMibIy7ixXDrnEJ15t4VbwOvqz9Nl3Rl8VMuVcPgc3NX6Pm71HYv6TmuEWzov3DsEEc4_Xs-2Nla7WTztyvsvMaJla0VKlnOEZ35D5rcC-300x149.jpg 300w, https://goodshepherdmedia.net/wp-content/uploads/2022/11/623c3d959440455190bbb947_kduvBiQeD4xLlBAzWBFIfXxIEHsuM9ceMibIy7ixXDrnEJ15t4VbwOvqz9Nl3Rl8VMuVcPgc3NX6Pm71HYv6TmuEWzov3DsEEc4_Xs-2Nla7WTztyvsvMaJla0VKlnOEZ35D5rcC-1024x509.jpg 1024w, https://goodshepherdmedia.net/wp-content/uploads/2022/11/623c3d959440455190bbb947_kduvBiQeD4xLlBAzWBFIfXxIEHsuM9ceMibIy7ixXDrnEJ15t4VbwOvqz9Nl3Rl8VMuVcPgc3NX6Pm71HYv6TmuEWzov3DsEEc4_Xs-2Nla7WTztyvsvMaJla0VKlnOEZ35D5rcC-768x382.jpg 768w, https://goodshepherdmedia.net/wp-content/uploads/2022/11/623c3d959440455190bbb947_kduvBiQeD4xLlBAzWBFIfXxIEHsuM9ceMibIy7ixXDrnEJ15t4VbwOvqz9Nl3Rl8VMuVcPgc3NX6Pm71HYv6TmuEWzov3DsEEc4_Xs-2Nla7WTztyvsvMaJla0VKlnOEZ35D5rcC-1536x763.jpg 1536w" sizes="(max-width: 1600px) 100vw, 1600px" /></figure>
<h3><strong>Codename Tempora: Britain’s GCHQ cyberspies </strong>&#x200d;</h3>
<p>The <a href="https://www.bailii.org/cgi-bin/format.cgi?doc=/eu/cases/ECHR/2021/439.html&amp;query=(GCHQ.)" target="_blank" rel="noopener">European Court of Human Rights </a>ruled in 2021 that GCHQ spies were acting unlawfully when they intercepted online communications in bulk. Judges also criticized GCHQ’s regime for sharing sensitive digital intelligence with foreign governments.</p>
<p>The data included information from passports, travel records, financial data, telephone calls, emails, and open or covert sources.</p>
<p>The court case revealed that Britain’s spies had secretly collected bulk personal data since the late 1990s and gathered information on people &#8216;unlikely to be of intelligence or security interest&#8217;. UK lawyers argued that the information was needed for national security.</p>
<p>&nbsp;</p>
<figure class="w-richtext-align-fullwidth w-richtext-figure-type-image"><img loading="lazy" decoding="async" class="size-full wp-image-6849 aligncenter" src="https://goodshepherdmedia.net/wp-content/uploads/2022/11/623c424c9a5b73d5378c225f_Cyber-spies-3.jpg" alt="" width="1309" height="826" srcset="https://goodshepherdmedia.net/wp-content/uploads/2022/11/623c424c9a5b73d5378c225f_Cyber-spies-3.jpg 1309w, https://goodshepherdmedia.net/wp-content/uploads/2022/11/623c424c9a5b73d5378c225f_Cyber-spies-3-300x189.jpg 300w, https://goodshepherdmedia.net/wp-content/uploads/2022/11/623c424c9a5b73d5378c225f_Cyber-spies-3-1024x646.jpg 1024w, https://goodshepherdmedia.net/wp-content/uploads/2022/11/623c424c9a5b73d5378c225f_Cyber-spies-3-768x485.jpg 768w" sizes="(max-width: 1309px) 100vw, 1309px" /></figure>
<h3><strong>Vault 7: CIA hacking techniques</strong>&#x200d;</h3>
<p>In 2017, WikiLeaks published what it described as<a href="https://wikileaks.org/ciav7p1/" target="_blank" rel="noopener"> thousands of pages of internal CIA discussions</a> about Agency hacking techniques. CIA spies could apparently access Apple iPhones, Google Android devices, and other gadgets to capture text and voice messages before they were encrypted with software.</p>
<p>By the end of 2016, the CIA&#8217;s Center for Cyber Intelligence had more than 5,000 registered users and produced more than 1,000 hacking systems, trojans, viruses, and other ‘weaponized’ malware, creating, in effect, its own NSA with less accountability, according to WikiLeaks.</p>
<p>The House Intelligence committee was <a href="https://www.independent.co.uk/news/world/americas/us-politics/julian-assange-kidnap-cia-trump-b1942333.html" target="_blank" rel="noopener">‘looking into the report’</a> by <a href="https://uk.news.yahoo.com/kidnapping-assassination-and-a-london-shoot-out-inside-the-ci-as-secret-war-plans-against-wiki-leaks-090057786.html" target="_blank" rel="noopener"><em>Yahoo! News</em></a> in 2021 that claimed the CIA allegedly plotted revenge for the WikiLeaks revelations by targeting founder Julian Assange.</p>
<figure class="w-richtext-align-fullwidth w-richtext-figure-type-image"><img loading="lazy" decoding="async" class="wp-image-6847 aligncenter" src="https://goodshepherdmedia.net/wp-content/uploads/2022/11/623c3d952993e32845d8386c_D5xEuCQKDqtk3JHgnY7pFaVEotfS_iXv9GHL5RVt8RyUT0i0GvVkHzc3F_mypExHThWXg-Hpc__qyCLzan9-m2fjC_rg5tZCxh6WdmqX-uc-JDNq-hHQ-jiPJqkkhx6lL8cVedRv.jpg" alt="" width="989" height="444" srcset="https://goodshepherdmedia.net/wp-content/uploads/2022/11/623c3d952993e32845d8386c_D5xEuCQKDqtk3JHgnY7pFaVEotfS_iXv9GHL5RVt8RyUT0i0GvVkHzc3F_mypExHThWXg-Hpc__qyCLzan9-m2fjC_rg5tZCxh6WdmqX-uc-JDNq-hHQ-jiPJqkkhx6lL8cVedRv.jpg 646w, https://goodshepherdmedia.net/wp-content/uploads/2022/11/623c3d952993e32845d8386c_D5xEuCQKDqtk3JHgnY7pFaVEotfS_iXv9GHL5RVt8RyUT0i0GvVkHzc3F_mypExHThWXg-Hpc__qyCLzan9-m2fjC_rg5tZCxh6WdmqX-uc-JDNq-hHQ-jiPJqkkhx6lL8cVedRv-300x135.jpg 300w" sizes="(max-width: 989px) 100vw, 989px" /></figure>
<h3><strong>CSIS: Canada’s spies creep forward</strong>&#x200d;</h3>
<p>Canada&#8217;s CSE &#8211; the signals intelligence group that collects data much like the NSA does in the US &#8211; received <a href="https://www.cbc.ca/news/politics/bill-c59-national-security-passed-1.5182948" target="_blank" rel="noopener">new powers in 2019</a> under a law designed to crack down on terrorists. Privacy advocates worry the law is an invitation for mass surveillance and see potential problems.</p>
<p>Critics have long complained about CSE which, in 2012, <a href="https://www.cbc.ca/news/politics/csec-used-airport-wi-fi-to-track-canadian-travellers-edward-snowden-documents-1.2517881" target="_blank" rel="noopener">spied on Canadians using public WiFi networks</a> in Canadian airports. The agency &#8211; and its watchdog &#8211; argued that they were only collecting metadata (for example, an IP or email address and phone number) rather than the content of messages.</p>
<p>“But we (and they) know that metadata can reveal tons of private information about a person and their life: where they have been, what they believe, who they talk to, etc,” according to Canada’s <a href="https://iclmg.ca/issues/bill-c-59-the-national-security-act-of-2017/bill-c-59s-mass-surveillance-and-cyber-powers/" target="_blank" rel="noopener">International Civil Liberties Monitoring Group</a>.</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<ul>
<li><a href="https://www.cryptomuseum.com/intel/nsa/index.htm#inter" target="_blank" rel="noopener">NSA-backdoored equipment info found OFF this website</a></li>
<li><a href="https://goodshepherdmedia.net/u-s-government-catalogue-of-cellphone-surveillance-devices-used-by-the-military-and-by-cia-nsa-fbi-and-other-intelligence-agencies/" target="_blank" rel="noopener">U.S. Government Catalogue of Cellphone Surveillance Devices</a></li>
<li><a href="https://en.wikipedia.org/wiki/Backdoor_(computing)" target="_blank" rel="noopener">Backdoors on Wikipedia</a></li>
<li><a href="https://goodshepherdmedia.net/nsa-national-security-agency/" target="_blank" rel="noopener">National Security Agency</a></li>
<li><a href="https://goodshepherdmedia.net/cia-central-intelligence-agency/" target="_blank" rel="noopener">Central Intelligence Agency</a></li>
<li><a href="https://nsa.gov1.info/dni/index.html" target="_blank" rel="noopener">NSA EXTRACTED INFO</a></li>
<li><a href="https://www.cryptomuseum.com/" target="_blank" rel="noopener">CRYPTO MUSEUM</a></li>
<li><a href="https://goodshepherdmedia.net/edward-snowden-nsa-whistleblower/" target="_blank" rel="noopener">Edward Snowden</a></li>
<li><a href="https://goodshepherdmedia.net/can-cops-secretly-listen-to-my-phone-how-cops-can-secretly-track-your-phone/" target="_blank" rel="noopener">Stingray</a></li>
<li><a href="https://goodshepherdmedia.net/fbi-vows-not-to-use-pegasus-spyware-after-grilling-from-capitol-hill/" target="_blank" rel="noopener">Pegasus Spyware</a></li>
<li><a href="https://goodshepherdmedia.net/x-keyscore-allows-the-nsa-and-allies-to-monitor-emails-web-browsing-internet-searches-and-social-media/" target="_blank" rel="noopener">X-Keyscore</a></li>
</ul>
<p>&nbsp;</p>
<p><iframe title="NY Post columnist: Is the FBI unethically spying on people?" width="640" height="360" src="https://www.youtube.com/embed/slLQvXNmwNI?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
<p><iframe title="Global Spyware Scandal: Exposing Pegasus Part One (full documentary) | FRONTLINE" width="640" height="360" src="https://www.youtube.com/embed/6ZVj1_SE4Mo?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
<p><iframe title="Global Spyware Scandal: Exposing Pegasus Part Two (full documentary) | FRONTLINE" width="640" height="360" src="https://www.youtube.com/embed/xYMWTXIkANM?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
<p>&nbsp;</p>
<p><iframe title="Exposed: Secret Government Surveillance Tools They DON&#039;T Want You to Know About!" width="640" height="360" src="https://www.youtube.com/embed/iRYji0Q2K30?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
<p>&nbsp;</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>NSA Plans to Infect Millions of Computers with Malware using AI</title>
		<link>https://goodshepherdmedia.net/nsa-plans-to-infect-millions-of-computers-with-malware-using-ai/</link>
		
		<dc:creator><![CDATA[The Truth News]]></dc:creator>
		<pubDate>Sat, 25 Jan 2025 19:43:47 +0000</pubDate>
				<category><![CDATA[⚠️Breaking News⚠️]]></category>
		<category><![CDATA[Corrupt Politicians]]></category>
		<category><![CDATA[Corruption Over the Years]]></category>
		<category><![CDATA[Disaster]]></category>
		<category><![CDATA[Government Spying]]></category>
		<category><![CDATA[Hackers / Master Programmers]]></category>
		<category><![CDATA[Hardware Pioneers]]></category>
		<category><![CDATA[Legal News The Motivation]]></category>
		<category><![CDATA[Man Made]]></category>
		<category><![CDATA[North America]]></category>
		<category><![CDATA[Politics]]></category>
		<category><![CDATA[Science & Engineering]]></category>
		<category><![CDATA[Software Pioneers]]></category>
		<category><![CDATA[Tech]]></category>
		<category><![CDATA[Top Stories]]></category>
		<category><![CDATA[Tragic]]></category>
		<category><![CDATA[United States 🇺🇸]]></category>
		<category><![CDATA[Zee Truthful News]]></category>
		<category><![CDATA[🌍World Stage🌍]]></category>
		<category><![CDATA[🎖️🪖Military Tech🤖]]></category>
		<category><![CDATA[📱Mobile📱]]></category>
		<category><![CDATA[🔐Cybersecurity]]></category>
		<category><![CDATA[🔐Hacking Technology]]></category>
		<category><![CDATA[🤖 AI Artificial Intelligence]]></category>
		<category><![CDATA[hacking]]></category>
		<category><![CDATA[NSA]]></category>
		<category><![CDATA[NSA Plans to Infect Millions of Computers with Malware using AI]]></category>
		<category><![CDATA[spyware]]></category>
		<guid isPermaLink="false">https://goodshepherdmedia.net/?p=18039</guid>

					<description><![CDATA[NSA Plans to Infect Millions of Computers with Malware using AI Top-secret documents reveal that the National Security Agency is dramatically expanding its ability to covertly hack into computers on a mass scale by using automated systems that reduce the level of human oversight in the process. The classified files – provided previously by NSA [&#8230;]]]></description>
										<content:encoded><![CDATA[<h1>NSA Plans to Infect Millions of Computers with Malware using AI</h1>
<p>Top-secret documents reveal that the National Security Agency is dramatically expanding its ability to covertly hack into computers on a mass scale by using automated systems that reduce the level of human oversight in the process.</p>
<p>The classified files – provided previously by NSA whistleblower Edward Snowden – contain new details about groundbreaking surveillance technology the agency has developed to infect potentially millions of computers worldwide with malware “implants.” The clandestine initiative enables the NSA to break into targeted computers and to siphon out data from foreign Internet and phone networks.</p>
<p>The covert infrastructure that supports the hacking efforts operates from the agency’s headquarters in Fort Meade, Maryland, and from eavesdropping bases in the United Kingdom and Japan. GCHQ, the British intelligence agency, appears to have played an integral role in helping to develop the implants tactic.</p>
<p>In some cases the NSA has masqueraded as a fake Facebook server, using the social media site as a launching pad to infect a target’s computer and exfiltrate files from a hard drive. In others, it has sent out spam emails laced with the malware, which can be tailored to covertly record audio from a computer’s microphone and take snapshots with its webcam. The hacking systems have also enabled the NSA to launch cyberattacks by corrupting and disrupting file downloads or denying access to websites.</p>
<p>The implants being deployed were once reserved for a few hundred hard-to-reach targets, whose communications could not be monitored through traditional wiretaps. But the documents analyzed by <em>The Intercept</em> show how the NSA has aggressively accelerated its hacking initiatives in the past decade by computerizing some processes previously handled by humans. The automated system – codenamed TURBINE – is designed to “allow the current implant network to scale to large size (millions of implants) by creating a system that does automated control implants by groups instead of individually.”</p>
<p>In a top-secret presentation, dated August 2009, the NSA describes a pre-programmed part of the covert infrastructure called the “Expert System,” which is designed to operate “like the brain.” The system manages the applications and functions of the implants and “decides” what tools they need to best extract data from infected machines.</p>
<p>Mikko Hypponen, an expert in malware who serves as chief research officer at the Finnish security firm <a href="http://home.f-secure.com/en_US/" target="_blank" rel="noopener noreferrer" aria-describedby="targetBlankDescription">F-Secure</a>, calls the revelations “disturbing.” The NSA’s surveillance techniques, he warns, could inadvertently be undermining the security of the Internet.</p>
<p>“When they deploy malware on systems,” Hypponen says, “they potentially create new vulnerabilities in these systems, making them more vulnerable for attacks by third parties.”</p>
<p>Hypponen believes that governments could arguably justify using malware in a small number of targeted cases against adversaries. But millions of malware implants being deployed by the NSA as part of an automated process, he says, would be “out of control.”</p>
<p>“That would definitely not be proportionate,” Hypponen says. “It couldn’t possibly be targeted and named. It sounds like wholesale infection and wholesale surveillance.”</p>
<p>The NSA declined to answer questions about its deployment of implants, pointing to a new presidential policy directive announced by President Obama. “As the president made clear on 17 January,” the agency said in a statement, “signals intelligence shall be collected exclusively where there is a foreign intelligence or counterintelligence purpose to support national and departmental missions, and not for any other purposes.”</p>
<p>&nbsp;</p>
<h4>“Owning the Net”</h4>
<p>The NSA began rapidly escalating its hacking efforts a decade ago. In 2004, according to secret <a href="https://theintercept.com/document/2014/03/12/thousands-implants/">internal records</a>, the agency was managing a small network of only 100 to 150 implants. But over the next six to eight years, as an elite unit called Tailored Access Operations (TAO) recruited new hackers and developed new malware tools, the number of implants soared to tens of thousands.</p>
<p>To penetrate foreign computer networks and monitor communications that it did not have access to through other means, the NSA wanted to go beyond the limits of traditional signals intelligence, or SIGINT, the agency’s term for the interception of electronic communications. Instead, it sought to broaden “active” surveillance methods – tactics designed to directly infiltrate a target’s computers or network devices.</p>
<p>In the documents, the agency describes such techniques as “a more aggressive approach to SIGINT” and says that the TAO unit’s mission is to “aggressively scale” these operations.</p>
<p>But the NSA recognized that managing a massive network of implants is too big a job for humans alone.</p>
<p>“One of the greatest challenges for active SIGINT/attack is scale,” explains the top-secret presentation from 2009. “Human ‘drivers’ limit ability for large-scale exploitation (humans tend to operate within their own environment, not taking into account the bigger picture).”</p>
<p>The agency’s solution was TURBINE. Developed as part of TAO unit, it is described in the leaked documents as an “intelligent command and control capability” that <a href="https://theintercept.com/document/2014/03/12/industrial-scale-exploitation/">enables</a> “industrial-scale exploitation.”</p>
<p><iframe title="Exposed: Secret Government Surveillance Tools They DON&#039;T Want You to Know About!" width="640" height="360" src="https://www.youtube.com/embed/iRYji0Q2K30?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>TURBINE was designed to make deploying malware much easier for the NSA’s hackers by reducing their role in overseeing its functions. The system would “relieve the user from needing to know/care about the details,” the NSA’s Technology Directorate notes in <a href="https://theintercept.com/document/2014/03/12/nsa-technology-directorate-analysis-converged-data/">one secret document</a> from 2009. “For example, a user should be able to ask for ‘all details about application X’ and not need to know how and where the application keeps files, registry entries, user application data, etc.”</p>
<p>In practice, this meant that TURBINE would automate crucial processes that previously had to be performed manually – including the configuration of the implants as well as surveillance collection, or “tasking,” of data from infected systems. But automating these processes was about much more than a simple technicality. The move represented a major tactical shift within the NSA that was expected to have a profound impact – allowing the agency to push forward into a new frontier of surveillance operations.</p>
<p>The ramifications are starkly illustrated in one undated top-secret NSA document, which describes how the agency planned for TURBINE to “increase the current capability to deploy and manage hundreds of Computer Network Exploitation (CNE) and Computer Network Attack (CNA) implants to potentially millions of implants.” (CNE mines intelligence from computers and networks; CNA seeks to disrupt, damage or destroy them.)</p>
<p>&nbsp;</p>
<div class="default"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-18041" src="https://goodshepherdmedia.net/wp-content/uploads/2024/05/turbine-large-1024x86-1.webp" alt="" width="1024" height="86" srcset="https://goodshepherdmedia.net/wp-content/uploads/2024/05/turbine-large-1024x86-1.webp 1024w, https://goodshepherdmedia.net/wp-content/uploads/2024/05/turbine-large-1024x86-1-400x34.webp 400w, https://goodshepherdmedia.net/wp-content/uploads/2024/05/turbine-large-1024x86-1-768x65.webp 768w" sizes="(max-width: 1024px) 100vw, 1024px" /></div>
<p>&nbsp;</p>
<p>Eventually, the secret files indicate, the NSA’s plans for TURBINE came to fruition. The system has been operational in some capacity since at least July 2010, and its role has become increasingly central to NSA hacking operations.</p>
<p><a href="http://www.nytimes.com/2014/01/15/us/nsa-effort-pries-open-computers-not-connected-to-internet.html?_r=1" target="_blank" rel="noopener noreferrer" aria-describedby="targetBlankDescription">Earlier</a> <a href="http://www.washingtonpost.com/world/national-security/us-spy-agencies-mounted-231-offensive-cyber-operations-in-2011-documents-show/2013/08/30/d090a6ae-119e-11e3-b4cb-fd7ce041d814_story.html" target="_blank" rel="noopener noreferrer" aria-describedby="targetBlankDescription">reports</a> based on the Snowden files indicate that the NSA has already deployed between 85,000 and 100,000 of its implants against computers and networks <a href="http://www.nrc.nl/nieuws/2013/11/23/nsa-infected-50000-computer-networks-with-malicious-software/" target="_blank" rel="noopener noreferrer" aria-describedby="targetBlankDescription">across the world</a>, with plans to keep on scaling up those numbers.</p>
<p>The intelligence community’s top-secret “Black Budget” for 2013, obtained by Snowden, lists TURBINE as part of a broader NSA surveillance initiative named “Owning the Net.”</p>
<p>The agency sought $67.6 million in taxpayer funding for its Owning the Net program last year. Some of the money was earmarked for TURBINE, expanding the system to encompass “a wider variety” of networks and “enabling greater automation of computer network exploitation.”</p>
<h4>Circumventing Encryption</h4>
<p>The NSA has a diverse arsenal of malware tools, each highly sophisticated and customizable for different purposes.</p>
<p>One implant, codenamed UNITEDRAKE, can be used with a variety of “plug-ins” that enable the agency to gain total control of an infected computer.</p>
<p>An implant plug-in named CAPTIVATEDAUDIENCE, for example, is used to take over a targeted computer’s microphone and record conversations taking place near the device. Another, GUMFISH, can covertly take over a computer’s webcam and snap photographs. FOGGYBOTTOM records logs of Internet browsing histories and collects login details and passwords used to access websites and email accounts. GROK is used to log keystrokes. And SALVAGERABBIT exfiltrates data from removable flash drives that connect to an infected computer.</p>
<p>The implants can enable the NSA to circumvent privacy-enhancing encryption tools that are used to browse the Internet anonymously or scramble the contents of emails as they are being sent across networks. That’s because the NSA’s malware gives the agency unfettered access to a target’s computer before the user protects their communications with encryption.</p>
<p>It is unclear how many of the implants are being deployed on an annual basis or which variants of them are currently active in computer systems across the world.</p>
<p>Previous reports <a href="http://www.washingtonpost.com/world/national-security/stuxnet-was-work-of-us-and-israeli-experts-officials-say/2012/06/01/gJQAlnEy6U_story.html" target="_blank" rel="noopener noreferrer" aria-describedby="targetBlankDescription">have alleged</a> that the NSA worked with Israel to develop the Stuxnet malware, which was used to sabotage Iranian nuclear facilities. The agency also <a href="http://www.washingtonpost.com/world/national-security/us-israel-developed-computer-virus-to-slow-iranian-nuclear-efforts-officials-say/2012/06/19/gJQA6xBPoV_story.html" target="_blank" rel="noopener noreferrer" aria-describedby="targetBlankDescription">reportedly</a> worked with Israel to deploy malware called Flame to infiltrate computers and spy on communications in countries across the Middle East.</p>
<p>According to the Snowden files, the technology has been used to seek out terror suspects as well as individuals regarded by the NSA as “extremist.” But the mandate of the NSA’s hackers is not limited to invading the systems of those who pose a threat to national security.</p>
<p>In one secret post on an internal message board, an operative from the NSA’s Signals Intelligence Directorate describes using malware attacks against systems administrators who work at foreign phone and Internet service providers. By hacking an administrator’s computer, the agency can gain covert access to communications that are processed by his company. “Sys admins are a means to an end,” the NSA operative writes.</p>
<p>The internal post – titled “I hunt sys admins” – makes clear that terrorists aren’t the only targets of such NSA attacks. Compromising a systems administrator, the operative notes, makes it easier to get to other targets of interest, including any “government official that happens to be using the network some admin takes care of.”</p>
<p>Similar tactics have been adopted by Government Communications Headquarters, the NSA’s British counterpart. As the German newspaper <em>Der Spiegel</em> <a href="http://www.spiegel.de/international/europe/british-spy-agency-gchq-hacked-belgian-telecoms-firm-a-923406.html" target="_blank" rel="noopener noreferrer" aria-describedby="targetBlankDescription">reported</a> in September, GCHQ hacked computers belonging to network engineers at Belgacom, the Belgian telecommunications provider.</p>
<p>The mission, codenamed “Operation Socialist,” was designed to enable GCHQ to monitor mobile phones connected to Belgacom’s network. The secret files deem the mission a “success,” and indicate that the agency had the ability to covertly access Belgacom’s systems since at least 2010.</p>
<p>Infiltrating cellphone networks, however, is not all that the malware can be used to accomplish. The NSA has specifically tailored some of its implants to infect large-scale network routers used by Internet service providers in foreign countries. By compromising routers – the devices that connect computer networks and transport data packets across the Internet – the agency can gain covert access to monitor Internet traffic, record the browsing sessions of users, and intercept communications.</p>
<p>Two implants the NSA injects into network routers, HAMMERCHANT and HAMMERSTEIN, help the agency to intercept and perform “exploitation attacks” against data that is sent through a <a href="http://www.techterms.com/definition/vpn" target="_blank" rel="noopener noreferrer" aria-describedby="targetBlankDescription">Virtual Private Network</a>, a tool that uses encrypted “tunnels” to enhance the security and privacy of an Internet session.</p>
<div class="default"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-18042" src="https://goodshepherdmedia.net/wp-content/uploads/2024/05/hammer-vpn.webp" alt="" width="618" height="467" srcset="https://goodshepherdmedia.net/wp-content/uploads/2024/05/hammer-vpn.webp 618w, https://goodshepherdmedia.net/wp-content/uploads/2024/05/hammer-vpn-400x302.webp 400w" sizes="(max-width: 618px) 100vw, 618px" /></div>
<p>The implants also track phone calls sent across the network via Skype and other Voice Over IP software, revealing the username of the person making the call. If the audio of the VOIP conversation is sent over the Internet using unencrypted “Real-time Transport Protocol” packets, the implants can covertly record the audio data and then return it to the NSA for analysis.</p>
<div class="default"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-18043" src="https://goodshepherdmedia.net/wp-content/uploads/2024/05/hammer-voip.webp" alt="" width="621" height="469" srcset="https://goodshepherdmedia.net/wp-content/uploads/2024/05/hammer-voip.webp 621w, https://goodshepherdmedia.net/wp-content/uploads/2024/05/hammer-voip-400x302.webp 400w" sizes="(max-width: 621px) 100vw, 621px" /></div>
<p>But not all of the NSA’s implants are used to gather intelligence, the secret files show. Sometimes, the agency’s aim is disruption rather than surveillance. QUANTUMSKY, a piece of NSA malware developed in 2004, is used to block targets from accessing certain websites. QUANTUMCOPPER, first tested in 2008, corrupts a target’s file downloads. These two “attack” techniques are revealed on <a href="https://theintercept.com/document/2014/03/12/one-way-quantum/">a classified list</a> that features nine NSA hacking tools, six of which are used for intelligence gathering. Just one is used for “defensive” purposes – to protect U.S. government networks against intrusions.</p>
<p>&nbsp;</p>
<h4>“Mass exploitation potential”</h4>
<p>Before it can extract data from an implant or use it to attack a system, the NSA must first install the malware on a targeted computer or network.</p>
<p>According to <a href="https://theintercept.com/document/2014/03/12/nsa-phishing-tactics-man-middle-attacks/">one top-secret document</a> from 2012, the agency can deploy malware by sending out spam emails that trick targets into clicking a malicious link. Once activated, a “back-door implant” infects their computers within eight seconds.</p>
<p>There’s only one problem with this tactic, codenamed WILLOWVIXEN: According to the documents, the spam method has become less successful in recent years, as Internet users have become wary of unsolicited emails and less likely to click on anything that looks suspicious.</p>
<p>Consequently, the NSA has turned to new and more advanced hacking techniques. These include performing so-called “man-in-the-middle” and “man-on-the-side” attacks, which covertly force a user’s internet browser to route to NSA computer servers that try to infect them with an implant.</p>
<p>To perform a man-on-the-side attack, the NSA observes a target’s Internet traffic using its global network of covert “accesses” to data as it flows over fiber optic cables or satellites. When the target visits a website that the NSA is able to exploit, the agency’s surveillance sensors <a href="https://theintercept.com/document/2014/03/12/quantum-insert-diagrams/">alert the TURBINE system</a>, which then “shoots” data packets at the targeted computer’s IP address within a fraction of a second.</p>
<p>In one man-on-the-side technique, codenamed QUANTUMHAND, the agency disguises itself as a fake Facebook server. When a target attempts to log in to the social media site, the NSA transmits malicious data packets that trick the target’s computer into thinking they are being sent from the real Facebook. By concealing its malware within what looks like an ordinary Facebook page, the NSA is able to hack into the targeted computer and covertly siphon out data from its hard drive. A top-secret animation demonstrates the tactic in action.</p>
<p><iframe id="vimeo-3998515" class="social-iframe social-iframe--vimeo" src="https://player.vimeo.com/video/88822483?title=0&amp;byline=0&amp;portrait=0&amp;badge=0&amp;color=8280FF" width="100%" frameborder="0" allowfullscreen="allowfullscreen" data-mce-fragment="1"></iframe></p>
<p>The documents show that QUANTUMHAND became operational in October 2010, after being successfully tested by the NSA against about a dozen targets.</p>
<p>According to Matt Blaze, a surveillance and cryptography expert at the University of Pennsylvania, it appears that the QUANTUMHAND technique is aimed at targeting specific individuals. But he expresses concerns about how it has been covertly integrated within Internet networks as part of the NSA’s automated TURBINE system.</p>
<p>“As soon as you put this capability in the backbone infrastructure, the software and security engineer in me says that’s terrifying,” Blaze says.</p>
<p>“Forget about how the NSA is intending to use it. How do we know it is working correctly and only targeting who the NSA wants? And even if it does work correctly, which is itself a really dubious assumption, how is it controlled?”</p>
<p>In an email statement to <em>The Intercept</em>, Facebook spokesman Jay Nancarrow said the company had “no evidence of this alleged activity.” He added that Facebook implemented HTTPS encryption for users last year, making browsing sessions less vulnerable to malware attacks.</p>
<p>Nancarrow also pointed out that other services besides Facebook could have been compromised by the NSA. “If government agencies indeed have privileged access to network service providers,” he said, “any site running only [unencrypted] HTTP could conceivably have its traffic misdirected.”</p>
<p>A man-in-the-middle attack is a similar but slightly more aggressive method that can be used by the NSA to deploy its malware. It refers to a hacking technique in which the agency covertly places itself between computers as they are communicating with each other.</p>
<p>This allows the NSA not only to observe and redirect browsing sessions, but to modify the content of data packets that are passing between computers.</p>
<p>The man-in-the-middle tactic can be used, for instance, to covertly change the content of a message as it is being sent between two people, without either knowing that any change has been made by a third party. The same technique is <a href="https://blogs.rsa.com/man-in-the-middle-standing-between-you-and-your-cash/" target="_blank" rel="noopener noreferrer" aria-describedby="targetBlankDescription">sometimes used by criminal hackers</a> to defraud people.</p>
<p>A top-secret NSA presentation from 2012 reveals that the agency developed a man-in-the-middle capability called SECONDDATE to “influence real-time communications between client and server” and to “quietly redirect web-browsers” to NSA malware servers called FOXACID. In October, details about the FOXACID system were <a href="http://www.theguardian.com/world/2013/oct/04/tor-attacks-nsa-users-online-anonymity" target="_blank" rel="noopener noreferrer" aria-describedby="targetBlankDescription">reported by the <em>Guardian</em></a>, which revealed its links to attacks against users of the Internet anonymity service Tor.</p>
<p>But SECONDDATE is tailored not only for “surgical” surveillance attacks on individual suspects. It can also be used to launch bulk malware attacks against computers.</p>
<p>According to the 2012 presentation, the tactic has “mass exploitation potential for clients passing through network choke points.”</p>
<div class="default"><img decoding="async" title="" src="https://theintercept.com/wp-content/uploads/2014/03/tao-2-1024x768.png" alt="" /></div>
<p>Blaze, the University of Pennsylvania surveillance expert, says the potential use of man-in-the-middle attacks on such a scale “seems very disturbing.” Such an approach would involve indiscriminately monitoring entire networks as opposed to targeting individual suspects.</p>
<p>“The thing that raises a red flag for me is the reference to ‘network choke points,’” he says. “That’s the last place that we should be allowing intelligence agencies to compromise the infrastructure – because that is by definition a mass surveillance technique.”</p>
<p>To deploy some of its malware implants, the NSA exploits security vulnerabilities in commonly used Internet browsers such as Mozilla Firefox and Internet Explorer.</p>
<p>The agency’s hackers also exploit security weaknesses in network routers and in popular software plugins such as Flash and Java to deliver malicious code onto targeted machines.</p>
<p>The implants can circumvent anti-virus programs, and the NSA has gone to extreme lengths to ensure that its clandestine technology is extremely difficult to detect. An implant named VALIDATOR, used by the NSA to upload and download data to and from an infected machine, can be set to self-destruct – deleting itself from an infected computer after a set time expires.</p>
<p>In many cases, firewalls and other security measures do not appear to pose much of an obstacle to the NSA. Indeed, the agency’s hackers appear confident in their ability to circumvent any security mechanism that stands between them and compromising a computer or network. “If we can get the target to visit us in some sort of web browser, we can probably own them,” an agency hacker boasts in one secret document. “The only limitation is the ‘how.’”</p>
<p>&nbsp;</p>
<h4>Covert Infrastructure</h4>
<p>The TURBINE implants system does not operate in isolation.</p>
<p>It is linked to, and relies upon, a large network of clandestine surveillance “sensors” that the agency has <a href="https://theintercept.com/document/2014/03/12/turbine-turmoil/">installed at locations across the world</a>.</p>
<div class="default"><img decoding="async" title="" src="https://theintercept.com/wp-content/uploads/2014/03/turbine_turmoil_maps-1-1024x768.png" alt="" /></div>
<p>The NSA’s headquarters in Maryland are part of this network, as are eavesdropping bases used by the agency in Misawa, Japan and Menwith Hill, England.</p>
<p>The sensors, codenamed TURMOIL, operate as a sort of high-tech surveillance dragnet, monitoring packets of data as they are sent across the Internet.</p>
<p>When TURBINE implants exfiltrate data from infected computer systems, the TURMOIL sensors automatically identify the data and return it to the NSA for analysis. And when targets are communicating, the TURMOIL system can be used to send alerts or “tips” to TURBINE, enabling the initiation of a malware attack.</p>
<p>The NSA identifies surveillance targets based on a series of data “selectors” as they flow across Internet cables. These selectors, according to internal documents, can include email addresses, IP addresses, or the unique “cookies” containing a username or other identifying information that are sent to a user’s computer by websites such as Google, Facebook, Hotmail, Yahoo, and Twitter.</p>
<p>Other selectors the NSA uses can be gleaned from unique Google advertising cookies that track browsing habits, unique encryption key fingerprints that can be traced to a specific user, and computer IDs that are sent across the Internet when a Windows computer crashes or updates.</p>
<div class="default"><img decoding="async" title="" src="https://theintercept.com/wp-content/uploads/2014/03/selectors-1024x768.png" alt="" /></div>
<p>What’s more, the TURBINE system operates with the knowledge and support of other governments, some of which have participated in the malware attacks.</p>
<p>Classification markings on the Snowden documents indicate that NSA has shared many of its files on the use of implants with its counterparts in the so-called Five Eyes surveillance alliance – the United Kingdom, Canada, New Zealand, and Australia.</p>
<p>GCHQ, the British agency, has taken on a particularly important role in helping to develop the malware tactics. The Menwith Hill satellite eavesdropping base that is part of the TURMOIL network, located in a rural part of Northern England, is operated by the NSA in close cooperation with GCHQ.</p>
<p><a href="https://theintercept.com/document/2014/03/12/turbine-turmoil/">Top-secret documents</a> show that the British base – referred to by the NSA as “MHS” for Menwith Hill Station – is an integral component of the TURBINE malware infrastructure and has been used to <a href="https://theintercept.com/document/2014/03/12/menwith-hill-station-leverages-xkeyscore-quantum-yahoo-hotmail/">experiment</a> with implant “exploitation” attacks against users of Yahoo and Hotmail.</p>
<p>In <a href="https://theintercept.com/document/2014/03/12/nsa-gchqs-quantumtheory-hacking-tactics/">one document</a> dated 2010, at least five variants of the QUANTUM hacking method were listed as being “operational” at Menwith Hill. The same document also reveals that GCHQ helped integrate three of the QUANTUM malware capabilities – and test two others – as part of a surveillance system it operates codenamed INSENSER.</p>
<p>GCHQ cooperated with the hacking attacks despite having reservations about their legality. One of the Snowden files, <a href="https://www.documentcloud.org/documents/894386-legal-issues-uk-regarding-sweden-and-quantum.html" target="_blank" rel="noopener noreferrer" aria-describedby="targetBlankDescription">previously disclosed</a> by Swedish broadcaster SVT, revealed that as recently as April 2013, GCHQ was apparently reluctant to get involved in deploying the QUANTUM malware due to “legal/policy restrictions.” A representative from a unit of the British surveillance agency, meeting with an obscure telecommunications standards committee in 2010, separately <a href="https://www.documentcloud.org/documents/1077367-uk-perspective-on-mikey-ibake.html" target="_blank" rel="noopener noreferrer" aria-describedby="targetBlankDescription">voiced concerns</a> that performing “active” hacking attacks for surveillance “may be illegal” under British law.</p>
<p>In response to questions from <em>The Intercept</em>, GCHQ refused to comment on its involvement in the covert hacking operations. Citing its boilerplate response to inquiries, the agency said in a statement that “all of GCHQ’s work is carried out in accordance with a strict legal and policy framework which ensures that our activities are authorized, necessary and proportionate, and that there is rigorous oversight.”</p>
<p>Whatever the legalities of the United Kingdom and United States infiltrating computer networks, the Snowden files bring into sharp focus the broader implications. Under cover of secrecy and without public debate, there has been an unprecedented proliferation of aggressive surveillance techniques. One of the NSA’s primary concerns, in fact, appears to be that its clandestine tactics are now being adopted by foreign rivals, too.</p>
<p>“Hacking routers has been good business for us and our 5-eyes partners for some time,” notes one NSA analyst in <a href="https://theintercept.com/document/2014/03/12/five-eyes-hacking-large-routers/">a top-secret document</a> dated December 2012. “But it is becoming more apparent that other nation states are honing their skillz [sic] and joining the scene.” <a href="https://theintercept.com/2014/03/12/nsa-plans-infect-millions-computers-malware/" target="_blank" rel="noopener">source</a></p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>X-Keyscore: Allows the NSA and Allies to Monitor Emails, Web Browsing, Internet Searches and Social Media</title>
		<link>https://goodshepherdmedia.net/x-keyscore-allows-the-nsa-and-allies-to-monitor-emails-web-browsing-internet-searches-and-social-media/</link>
		
		<dc:creator><![CDATA[The Truth News]]></dc:creator>
		<pubDate>Fri, 24 Jan 2025 05:14:33 +0000</pubDate>
				<category><![CDATA[Corruption Over the Years]]></category>
		<category><![CDATA[Government Spying]]></category>
		<category><![CDATA[Politics]]></category>
		<category><![CDATA[Tech]]></category>
		<category><![CDATA[Top Stories]]></category>
		<category><![CDATA[Zee Truthful News]]></category>
		<category><![CDATA[🔐Cybersecurity]]></category>
		<category><![CDATA[allies]]></category>
		<category><![CDATA[how to spy]]></category>
		<category><![CDATA[Internet Searches]]></category>
		<category><![CDATA[Monitor Emails]]></category>
		<category><![CDATA[NSA]]></category>
		<category><![CDATA[Pegasus]]></category>
		<category><![CDATA[Social Media]]></category>
		<category><![CDATA[spy]]></category>
		<category><![CDATA[spy gate]]></category>
		<category><![CDATA[spygate]]></category>
		<category><![CDATA[USA spy]]></category>
		<category><![CDATA[Web Browsing]]></category>
		<category><![CDATA[web spying]]></category>
		<category><![CDATA[world spy]]></category>
		<category><![CDATA[X-Keyscore]]></category>
		<category><![CDATA[XKeyscore]]></category>
		<guid isPermaLink="false">https://goodshepherdmedia.net/?p=6808</guid>

					<description><![CDATA[XKeyscore: NSA tool collects &#8216;nearly everything a user does on the internet&#8217; written by Glenn Greenwald cited   XKeyscore gives &#8216;widest-reaching&#8217; collection of online data  NSA analysts require no prior authorization for searches  Sweeps up emails, social media activity and browsing history A top secret National Security Agency program allows analysts to search with no prior authorization through [&#8230;]]]></description>
										<content:encoded><![CDATA[<div class="dcr-1djovmt" data-gu-name="headline">
<div class="dcr-14emo0l">
<div class="dcr-1msbrj1">
<h1></h1>
<h1 class="dcr-y70mar" style="text-align: center;">XKeyscore: NSA tool collects &#8216;nearly everything a user does on the internet&#8217;</h1>
</div>
</div>
</div>
<div style="text-align: center;">written by <a href="https://www.theguardian.com/profile/glenn-greenwald" rel="author" data-link-name="auto tag link">Glenn Greenwald</a> <a href="https://www.theguardian.com/world/2013/jul/31/nsa-top-secret-program-online-data" target="_blank" rel="noopener">cited </a></div>
<div></div>
<blockquote>
<div><span style="color: #ff0000;"> XKeyscore gives &#8216;widest-reaching&#8217; collection of online data  NSA analysts require no prior authorization for searches  Sweeps up emails, social media activity and browsing history</span></div>
</blockquote>
<div></div>
<div>
<p><iframe title="Exposing the NSA’s Mass Surveillance of Americans | Cyberwar" width="640" height="360" src="https://www.youtube.com/embed/tYVm62oEyWA?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
</div>
<div class="dcr-1yi1cnj" data-gu-name="standfirst">
<div class=" dcr-iuxtqj">
<div class="dcr-1yi1cnj" data-gu-name="standfirst">
<div class=" dcr-iuxtqj"></div>
</div>
<div class="dcr-6ufhd0" data-gu-name="media">
<div class="dcr-14emo0l">
<div class="dcr-ubxqwv">
<figure id="a6b7ed7c-8cd0-451d-8171-65a3e80a5649" class="dcr-142siv7">
<div class="dcr-1t8m8f2">
<figure id="attachment_6816" aria-describedby="caption-attachment-6816" style="width: 648px" class="wp-caption alignright"><img loading="lazy" decoding="async" class=" wp-image-6816" src="https://goodshepherdmedia.net/wp-content/uploads/2022/12/XKeyscore-map-010.webp" alt="One presentation claims the XKeyscore program covers 'nearly everything a typical user does on the internet'" width="648" height="389" srcset="https://goodshepherdmedia.net/wp-content/uploads/2022/12/XKeyscore-map-010.webp 460w, https://goodshepherdmedia.net/wp-content/uploads/2022/12/XKeyscore-map-010-300x180.webp 300w" sizes="(max-width: 648px) 100vw, 648px" /><figcaption id="caption-attachment-6816" class="wp-caption-text"><em><span style="color: #ff6600;">One presentation claims the XKeyscore program covers &#8216;nearly everything a typical user does on the internet&#8217;</span></em></figcaption></figure>
</div>
</figure>
</div>
</div>
</div>
<div class="dcr-kt8blz" data-gu-name="lines">
<div class="dcr-14emo0l"></div>
</div>
<aside class="dcr-1rbr3jc" data-gu-name="meta">
<div class="dcr-14emo0l">
<div class=" dcr-c7ke56">
<div class="dcr-rnfrqq">
<div class="dcr-9dgpdq" data-print-layout="hide">
<div class=" dcr-2zv6">
<div class="dcr-16dmhab">
<div class="meta-number">
<div class="css-pbkcyu" data-testid="long-comment-count" aria-hidden="true"></div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</aside>
<div class="dcr-ch7w1w" data-gu-name="body">
<div class="dcr-i7zira">
<div id="maincontent" class="dcr-1ncmr12">
<div class="article-body-commercial-selector article-body-viewer-selector dcr-1vqv39r">
<p class="dcr-h26idz">A top secret National Security Agency program allows analysts to search with no prior authorization through vast databases containing emails, online chats and the browsing histories of millions of individuals, according to documents provided by whistleblower Edward Snowden.</p>
<p class="dcr-h26idz">The <a href="https://www.theguardian.com/us-news/nsa" data-component="auto-linked-tag" data-link-name="in body link">NSA</a> boasts in training materials that the program, called XKeyscore, is its &#8220;widest-reaching&#8221; system for developing intelligence from the internet.</p>
<div id="sign-in-gate"></div>
<p class="dcr-h26idz">The latest revelations will add to the intense public and congressional debate around the extent of NSA surveillance programs. They come as senior intelligence officials testify to the Senate judiciary committee on Wednesday, releasing classified documents in response to <a href="https://www.theguardian.com/world/the-nsa-files" data-link-name="in body link">the Guardian&#8217;s earlier stories</a> on bulk collection of phone records and Fisa surveillance court oversight.</p>
<div class="ad-slot-container ad-slot-container--im">
<div id="dfp-ad--im" class="js-ad-slot ad-slot ad-slot-- ad-slot--im" data-link-name="ad slot im" data-name="im" aria-hidden="true" data-label="false" data-refresh="false">
<div id="google_ads_iframe_/59666047/theguardian.com/us-news/article/ng_8__container__"></div>
</div>
</div>
<p class="dcr-h26idz">The files shed light on one of Snowden&#8217;s most controversial statements, made in his <a href="https://www.theguardian.com/world/video/2013/jun/09/nsa-whistleblower-edward-snowden-interview-video" data-link-name="in body link">first video interview published by the Guardian</a> on June 10.</p>
<p class="dcr-h26idz">&#8220;I, sitting at my desk,&#8221; said Snowden, could &#8220;wiretap anyone, from you or your accountant, to a federal judge or even the president, if I had a personal email&#8221;.</p>
<p class="dcr-h26idz">US officials vehemently denied this specific claim. Mike Rogers, the Republican chairman of the House intelligence committee, said of Snowden&#8217;s assertion: &#8220;He&#8217;s lying. It&#8217;s impossible for him to do what he was saying he could do.&#8221;</p>
<p class="dcr-h26idz">But training materials for XKeyscore detail how analysts can use it and other systems to mine enormous agency databases by filling in a simple on-screen form giving only a broad justification for the search. The request is not reviewed by a court or any NSA personnel before it is processed.</p>
<p>&nbsp;</p>
<div id="dfp-ad--carrot" class="js-ad-slot ad-slot ad-slot--carrot" data-link-name="ad slot carrot" data-name="carrot" aria-hidden="true" data-label="false" data-refresh="false">
<div id="google_ads_iframe_/59666047/theguardian.com/us-news/article/ng_16__container__">
<blockquote>
<h2 class="jeg_post_title" style="text-align: center;"><span style="color: #0000ff;">XKeyScore – the NSA’s secret tool that collects and reveals ‘nearly everything a user does on the internet’</span></h2>
</blockquote>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
<div class="dcr-1yi1cnj" data-gu-name="standfirst">
<div class=" dcr-iuxtqj">
<div class="dcr-ch7w1w" data-gu-name="body">
<div class="dcr-i7zira">
<div id="maincontent" class="dcr-1ncmr12">
<div class="article-body-commercial-selector article-body-viewer-selector dcr-1vqv39r">
<div id="dfp-ad--carrot" class="js-ad-slot ad-slot ad-slot--carrot" data-link-name="ad slot carrot" data-name="carrot" aria-hidden="true" data-label="false" data-refresh="false">
<div id="google_ads_iframe_/59666047/theguardian.com/us-news/article/ng_16__container__">
<blockquote>
<blockquote><p>&nbsp;</p></blockquote>
</blockquote>
<h1><img loading="lazy" decoding="async" class="size-full wp-image-6839 aligncenter" src="https://goodshepherdmedia.net/wp-content/uploads/2022/12/thumb-5.jpg" alt="" width="640" height="420" srcset="https://goodshepherdmedia.net/wp-content/uploads/2022/12/thumb-5.jpg 640w, https://goodshepherdmedia.net/wp-content/uploads/2022/12/thumb-5-300x197.jpg 300w" sizes="(max-width: 640px) 100vw, 640px" /></h1>
</div>
</div>
<p class="dcr-h26idz">XKeyscore, the documents boast, is the NSA&#8217;s &#8220;widest reaching&#8221; system developing intelligence from computer networks – what the agency calls Digital Network Intelligence (DNI). One presentation claims the program covers &#8220;nearly everything a typical user does on the internet&#8221;, including the content of emails, websites visited and searches, as well as their metadata.</p>
<p class="dcr-h26idz">Analysts can also use XKeyscore and other NSA systems to obtain ongoing &#8220;real-time&#8221; interception of an individual&#8217;s internet activity.</p>
<p class="dcr-h26idz">Under US law, the NSA is required to obtain an individualized Fisa warrant only if the target of their surveillance is a &#8216;US person&#8217;, though no such warrant is required for intercepting the communications of Americans with foreign targets. But XKeyscore provides the technological capability, if not the legal authority, to target even US persons for extensive electronic surveillance without a warrant provided that some identifying information, such as their email or IP address, is known to the analyst.</p>
<p class="dcr-h26idz">One training slide illustrates the digital activity constantly being collected by XKeyscore and the analyst&#8217;s ability to query the databases at any time.</p>
<figure id="39187de4-7a62-46be-a900-2974c4f3e73b" class=" dcr-173mewl" data-spacefinder-role="inline" data-spacefinder-type="model.dotcomrendering.pageElements.ImageBlockElement">
<div class="dcr-1t8m8f2">
<figure id="attachment_6817" aria-describedby="caption-attachment-6817" style="width: 460px" class="wp-caption alignright"><img loading="lazy" decoding="async" class="size-full wp-image-6817" src="https://goodshepherdmedia.net/wp-content/uploads/2022/12/KS1-001.webp" alt="Photograph: Guardian" width="460" height="347" srcset="https://goodshepherdmedia.net/wp-content/uploads/2022/12/KS1-001.webp 460w, https://goodshepherdmedia.net/wp-content/uploads/2022/12/KS1-001-300x226.webp 300w" sizes="(max-width: 460px) 100vw, 460px" /><figcaption id="caption-attachment-6817" class="wp-caption-text"><em><span style="color: #ff6600;">Photograph: Guardian</span></em></figcaption></figure>
</div>
</figure>
<p class="dcr-h26idz">The purpose of XKeyscore is to allow analysts to search the metadata as well as the content of emails and other internet activity, such as browser history, even when there is no known email account (a &#8220;selector&#8221; in NSA parlance) associated with the individual being targeted.</p>
<div class="ad-slot-container ">
<div id="dfp-ad--inline1" class="js-ad-slot ad-slot ad-slot--inline ad-slot--inline1" data-link-name="ad slot inline1" data-name="inline1" aria-hidden="true">
<div id="google_ads_iframe_/59666047/theguardian.com/us-news/article/ng_9__container__"></div>
</div>
</div>
<p class="dcr-h26idz">Analysts can also search by name, telephone number, IP address, keywords, the language in which the internet activity was conducted or the type of browser used.</p>
<p class="dcr-h26idz">One document notes that this is because &#8220;strong selection [search by email address] itself gives us only a very limited capability&#8221; because &#8220;a large amount of time spent on the web is performing actions that are anonymous.&#8221;</p>
<p class="dcr-h26idz">The NSA documents assert that by 2008, 300 terrorists had been captured using intelligence from XKeyscore.</p>
<p class="dcr-h26idz">Analysts are warned that searching the full database for content will yield too many results to sift through. Instead they are advised to use the metadata also stored in the databases to narrow down what to review.</p>
<p class="dcr-h26idz">A slide entitled &#8220;plug-ins&#8221; in a December 2012 document describes the various fields of information that can be searched. It includes &#8220;every email address seen in a session by both username and domain&#8221;, &#8220;every phone number seen in a session (eg address book entries or signature block)&#8221; and user activity – &#8220;the webmail and chat activity to include username, buddylist, machine specific cookies etc&#8221;.</p>
<h2 id="email-monitoring">Email monitoring</h2>
<div class="ad-slot-container ad-slot-container-2 offset-right ad-slot--offset-right ad-slot-container--offset-right">
<div id="dfp-ad--inline2" class="js-ad-slot ad-slot ad-slot--inline ad-slot--inline2" data-link-name="ad slot inline2" data-name="inline2" aria-hidden="true">
<div id="google_ads_iframe_/59666047/theguardian.com/us-news/article/ng_10__container__"></div>
</div>
</div>
<p class="dcr-h26idz">In a second Guardian interview in June, Snowden elaborated on his statement about being able to read any individual&#8217;s email if he had their email address. He said the claim was based in part on the email search capabilities of XKeyscore, which Snowden says he was authorized to use while working as a Booz Allen contractor for the NSA.</p>
<p class="dcr-h26idz">One top-secret document describes how the program &#8220;searches within bodies of emails, webpages and documents&#8221;, including the &#8220;To, From, CC, BCC lines&#8221; and the &#8216;Contact Us&#8217; pages on websites&#8221;.</p>
<p class="dcr-h26idz">To search for emails, an analyst using XKS enters the individual&#8217;s email address into a simple online search form, along with the &#8220;justification&#8221; for the search and the time period for which the emails are sought.</p>
<figure id="6f7527ef-7d35-49c9-b75f-448055cdb0bb" class=" dcr-173mewl" data-spacefinder-role="inline" data-spacefinder-type="model.dotcomrendering.pageElements.ImageBlockElement">
<div class="dcr-1t8m8f2">
<figure id="attachment_6818" aria-describedby="caption-attachment-6818" style="width: 460px" class="wp-caption alignnone"><img loading="lazy" decoding="async" class="size-full wp-image-6818" src="https://goodshepherdmedia.net/wp-content/uploads/2022/12/KS2-001.webp" alt="Photograph: Guardian" width="460" height="314" srcset="https://goodshepherdmedia.net/wp-content/uploads/2022/12/KS2-001.webp 460w, https://goodshepherdmedia.net/wp-content/uploads/2022/12/KS2-001-300x205.webp 300w" sizes="(max-width: 460px) 100vw, 460px" /><figcaption id="caption-attachment-6818" class="wp-caption-text"><em><span style="color: #ff6600;">Photograph: Guardian</span></em></figcaption></figure>
</div>
</figure>
<figure id="96e72c9e-88f5-4c5f-b2ea-daf2e6cbaadd" class=" dcr-173mewl" data-spacefinder-role="inline" data-spacefinder-type="model.dotcomrendering.pageElements.ImageBlockElement">
<div class="dcr-1t8m8f2">
<div class="mceTemp"></div>
<figure id="attachment_6819" aria-describedby="caption-attachment-6819" style="width: 460px" class="wp-caption alignnone"><img loading="lazy" decoding="async" class="size-full wp-image-6819" src="https://goodshepherdmedia.net/wp-content/uploads/2022/12/KS3edit2-001.webp" alt="Photograph: Guardian" width="460" height="345" srcset="https://goodshepherdmedia.net/wp-content/uploads/2022/12/KS3edit2-001.webp 460w, https://goodshepherdmedia.net/wp-content/uploads/2022/12/KS3edit2-001-300x225.webp 300w" sizes="(max-width: 460px) 100vw, 460px" /><figcaption id="caption-attachment-6819" class="wp-caption-text"><em><span style="color: #ff6600;">Photograph: Guardian</span></em></figcaption></figure>
</div>
</figure>
<div class="ad-slot-container ad-slot-container-3 offset-right ad-slot--offset-right ad-slot-container--offset-right">
<div id="dfp-ad--inline3" class="js-ad-slot ad-slot ad-slot--inline ad-slot--inline3" data-link-name="ad slot inline3" data-name="inline3" aria-hidden="true">
<div id="google_ads_iframe_/59666047/theguardian.com/us-news/article/ng_11__container__"></div>
</div>
</div>
<p class="dcr-h26idz">The analyst then selects which of those returned emails they want to read by opening them in NSA reading software.</p>
<p class="dcr-h26idz">The system is similar to the way in which NSA analysts generally can intercept the communications of anyone they select, including, as one NSA document put it, &#8220;communications that transit the United States and communications that terminate in the United States&#8221;.</p>
<p class="dcr-h26idz">One document, a top secret 2010 guide describing the training received by NSA analysts for general surveillance under the Fisa Amendments Act of 2008, explains that analysts can begin surveillance on anyone by clicking a few simple pull-down menus designed to provide both legal and targeting justifications. Once options on the pull-down menus are selected, their target is marked for electronic surveillance and the analyst is able to review the content of their communications:</p>
<figure id="3b5403ae-d94a-417f-9823-9a6385cd0581" class=" dcr-173mewl" data-spacefinder-role="inline" data-spacefinder-type="model.dotcomrendering.pageElements.ImageBlockElement">
<div class="dcr-1t8m8f2">
<figure id="attachment_6820" aria-describedby="caption-attachment-6820" style="width: 460px" class="wp-caption alignnone"><img loading="lazy" decoding="async" class="size-full wp-image-6820" src="https://goodshepherdmedia.net/wp-content/uploads/2022/12/KS4-001.webp" alt="Photograph: Guardian" width="460" height="353" srcset="https://goodshepherdmedia.net/wp-content/uploads/2022/12/KS4-001.webp 460w, https://goodshepherdmedia.net/wp-content/uploads/2022/12/KS4-001-300x230.webp 300w" sizes="(max-width: 460px) 100vw, 460px" /><figcaption id="caption-attachment-6820" class="wp-caption-text"><em><span style="color: #ff6600;">Photograph: Guardian</span></em></figcaption></figure>
</div>
</figure>
<h2 id="chats-browsing-history-and-other-internet-activity">Chats, browsing history and other internet activity</h2>
<p class="dcr-h26idz">Beyond emails, the XKeyscore system allows analysts to monitor a virtually unlimited array of other internet activities, including those within social media.</p>
<p class="dcr-h26idz">An NSA tool called DNI Presenter, used to read the content of stored emails, also enables an analyst using XKeyscore to read the content of Facebook chats or private messages.</p>
<figure id="f23d3d68-a7fa-4fee-a7d2-80557f73560c" class=" dcr-173mewl" data-spacefinder-role="inline" data-spacefinder-type="model.dotcomrendering.pageElements.ImageBlockElement">
<div class="dcr-1t8m8f2">
<figure id="attachment_6815" aria-describedby="caption-attachment-6815" style="width: 460px" class="wp-caption alignnone"><img loading="lazy" decoding="async" class="size-full wp-image-6815" src="https://goodshepherdmedia.net/wp-content/uploads/2022/12/KS55edit-001.webp" alt="Photograph: Guardian" width="460" height="333" srcset="https://goodshepherdmedia.net/wp-content/uploads/2022/12/KS55edit-001.webp 460w, https://goodshepherdmedia.net/wp-content/uploads/2022/12/KS55edit-001-300x217.webp 300w" sizes="(max-width: 460px) 100vw, 460px" /><figcaption id="caption-attachment-6815" class="wp-caption-text"><em><span style="color: #ff6600;">Photograph: Guardian</span></em></figcaption></figure>
</div>
</figure>
<div class="ad-slot-container ad-slot-container-4 offset-right ad-slot--offset-right ad-slot-container--offset-right">
<div id="dfp-ad--inline4" class="js-ad-slot ad-slot ad-slot--inline ad-slot--inline4" data-link-name="ad slot inline4" data-name="inline4" aria-hidden="true">
<div id="google_ads_iframe_/59666047/theguardian.com/us-news/article/ng_12__container__"></div>
</div>
</div>
<p class="dcr-h26idz">An analyst can monitor such Facebook chats by entering the Facebook user name and a date range into a simple search screen.</p>
<figure id="d930b8e7-5acf-4dda-93b2-35ec2ddeee63" class=" dcr-173mewl" data-spacefinder-role="inline" data-spacefinder-type="model.dotcomrendering.pageElements.ImageBlockElement">
<div class="dcr-1t8m8f2">
<figure id="attachment_6821" aria-describedby="caption-attachment-6821" style="width: 460px" class="wp-caption alignnone"><img loading="lazy" decoding="async" class="size-full wp-image-6821" src="https://goodshepherdmedia.net/wp-content/uploads/2022/12/KS6-001.webp" alt="Photograph: Guardian" width="460" height="314" srcset="https://goodshepherdmedia.net/wp-content/uploads/2022/12/KS6-001.webp 460w, https://goodshepherdmedia.net/wp-content/uploads/2022/12/KS6-001-300x205.webp 300w" sizes="(max-width: 460px) 100vw, 460px" /><figcaption id="caption-attachment-6821" class="wp-caption-text"><em><span style="color: #ff6600;">Photograph: Guardian</span></em></figcaption></figure>
</div>
</figure>
<p class="dcr-h26idz">Analysts can search for internet browsing activities using a wide range of information, including search terms entered by the user or the websites viewed.</p>
<figure id="e140f8b1-b46b-439d-b01c-74dc6f9f3a55" class=" dcr-173mewl" data-spacefinder-role="inline" data-spacefinder-type="model.dotcomrendering.pageElements.ImageBlockElement">
<div class="dcr-1t8m8f2">
<figure id="attachment_6822" aria-describedby="caption-attachment-6822" style="width: 460px" class="wp-caption alignnone"><img loading="lazy" decoding="async" class="size-full wp-image-6822" src="https://goodshepherdmedia.net/wp-content/uploads/2022/12/KS7-001.webp" alt="Photograph: Guardian" width="460" height="329" srcset="https://goodshepherdmedia.net/wp-content/uploads/2022/12/KS7-001.webp 460w, https://goodshepherdmedia.net/wp-content/uploads/2022/12/KS7-001-300x215.webp 300w" sizes="(max-width: 460px) 100vw, 460px" /><figcaption id="caption-attachment-6822" class="wp-caption-text"><em><span style="color: #ff6600;">Photograph: Guardian</span></em></figcaption></figure>
</div>
</figure>
<p class="dcr-h26idz">As one slide indicates, the ability to search HTTP activity by keyword permits the analyst access to what the NSA calls &#8220;nearly everything a typical user does on the internet&#8221;.</p>
<figure id="8d77ef1c-3621-40c0-bd0f-f2e05728c522" class=" dcr-173mewl" data-spacefinder-role="inline" data-spacefinder-type="model.dotcomrendering.pageElements.ImageBlockElement">
<div class="dcr-1t8m8f2">
<figure id="attachment_6823" aria-describedby="caption-attachment-6823" style="width: 460px" class="wp-caption alignnone"><img loading="lazy" decoding="async" class="size-full wp-image-6823" src="https://goodshepherdmedia.net/wp-content/uploads/2022/12/KS8-001.webp" alt="Photograph: Guardian" width="460" height="324" srcset="https://goodshepherdmedia.net/wp-content/uploads/2022/12/KS8-001.webp 460w, https://goodshepherdmedia.net/wp-content/uploads/2022/12/KS8-001-300x211.webp 300w" sizes="(max-width: 460px) 100vw, 460px" /><figcaption id="caption-attachment-6823" class="wp-caption-text"><em><span style="color: #ff6600;">Photograph: Guardian</span></em></figcaption></figure>
</div>
</figure>
<div class="ad-slot-container ad-slot-container-5 offset-right ad-slot--offset-right ad-slot-container--offset-right">
<div id="dfp-ad--inline5" class="js-ad-slot ad-slot ad-slot--inline ad-slot--inline5" data-link-name="ad slot inline5" data-name="inline5" aria-hidden="true">
<div id="google_ads_iframe_/59666047/theguardian.com/us-news/article/ng_13__container__"></div>
</div>
</div>
<p class="dcr-h26idz">The XKeyscore program also allows an analyst to learn the IP addresses of every person who visits any website the analyst specifies.</p>
<figure id="00c1e536-a688-4f21-802d-4939523a6e05" class=" dcr-173mewl" data-spacefinder-role="inline" data-spacefinder-type="model.dotcomrendering.pageElements.ImageBlockElement">
<div class="dcr-1t8m8f2">
<figure id="attachment_6811" aria-describedby="caption-attachment-6811" style="width: 460px" class="wp-caption alignnone"><img loading="lazy" decoding="async" class="size-full wp-image-6811" src="https://goodshepherdmedia.net/wp-content/uploads/2022/12/KS9-001.webp" alt="Photograph: Guardian" width="460" height="258" srcset="https://goodshepherdmedia.net/wp-content/uploads/2022/12/KS9-001.webp 460w, https://goodshepherdmedia.net/wp-content/uploads/2022/12/KS9-001-300x168.webp 300w" sizes="(max-width: 460px) 100vw, 460px" /><figcaption id="caption-attachment-6811" class="wp-caption-text"><em><span style="color: #ff6600;">Photograph: Guardian</span></em></figcaption></figure>
</div>
</figure>
<p class="dcr-h26idz">The quantity of communications accessible through programs such as XKeyscore is staggeringly large. One NSA report from 2007 estimated that there were 850bn &#8220;call events&#8221; collected and stored in the NSA databases, and close to 150bn internet records. Each day, the document says, 1-2bn records were added.</p>
<p class="dcr-h26idz">William Binney, a former NSA mathematician, said last year that the agency had &#8220;assembled on the order of 20tn transactions about US citizens with other US citizens&#8221;, an estimate, he said, that &#8220;only was involving phone calls and emails&#8221;. A 2010 Washington Post article reported that &#8220;every day, collection systems at the [NSA] intercept and store 1.7bn emails, phone calls and other type of communications.&#8221;</p>
<p class="dcr-h26idz">The XKeyscore system is continuously collecting so much internet data that it can be stored only for short periods of time. Content remains on the system for only three to five days, while metadata is stored for 30 days. One document explains: &#8220;At some sites, the amount of data we receive per day (20+ terabytes) can only be stored for as little as 24 hours.&#8221;</p>
<p class="dcr-h26idz">To solve this problem, the NSA has created a multi-tiered system that allows analysts to store &#8220;interesting&#8221; content in other databases, such as one named Pinwale which can store material for up to five years.</p>
<p class="dcr-h26idz">It is the databases of XKeyscore, one document shows, that now contain the greatest amount of communications data collected by the NSA.</p>
<figure id="7e4f1ce3-2465-4b56-b5bf-56b8682a6ede" class=" dcr-173mewl" data-spacefinder-role="inline" data-spacefinder-type="model.dotcomrendering.pageElements.ImageBlockElement">
<div class="dcr-1t8m8f2">
<figure id="attachment_6812" aria-describedby="caption-attachment-6812" style="width: 460px" class="wp-caption alignnone"><img loading="lazy" decoding="async" class="size-full wp-image-6812" src="https://goodshepherdmedia.net/wp-content/uploads/2022/12/KS10-001.webp" alt="Photograph: Guardian" width="460" height="325" srcset="https://goodshepherdmedia.net/wp-content/uploads/2022/12/KS10-001.webp 460w, https://goodshepherdmedia.net/wp-content/uploads/2022/12/KS10-001-300x212.webp 300w" sizes="(max-width: 460px) 100vw, 460px" /><figcaption id="caption-attachment-6812" class="wp-caption-text"><em><span style="color: #ff6600;">Photograph: Guardian</span></em></figcaption></figure>
</div>
</figure>
<div class="ad-slot-container ad-slot-container-6 offset-right ad-slot--offset-right ad-slot-container--offset-right">
<div id="dfp-ad--inline6" class="js-ad-slot ad-slot ad-slot--inline ad-slot--inline6" data-link-name="ad slot inline6" data-name="inline6" aria-hidden="true">
<div id="google_ads_iframe_/59666047/theguardian.com/us-news/article/ng_14__container__"></div>
</div>
</div>
<p class="dcr-h26idz">In 2012, there were at least 41 billion total records collected and stored in XKeyscore for a single 30-day period.</p>
<figure id="c1a585ad-590e-41fa-ac56-44338f6f3b94" class=" dcr-173mewl" data-spacefinder-role="inline" data-spacefinder-type="model.dotcomrendering.pageElements.ImageBlockElement">
<div class="dcr-1t8m8f2">
<figure id="attachment_6813" aria-describedby="caption-attachment-6813" style="width: 481px" class="wp-caption alignnone"><img loading="lazy" decoding="async" class=" wp-image-6813" src="https://goodshepherdmedia.net/wp-content/uploads/2022/12/KS11-002.webp" alt="Photograph: Guardian" width="481" height="409" /><figcaption id="caption-attachment-6813" class="wp-caption-text"><em><span style="color: #ff6600;">Photograph: Guardian</span></em></figcaption></figure>
</div>
</figure>
<p class="dcr-h26idz"><strong>Legal v technical restrictions</strong></p>
<p class="dcr-h26idz">While the Fisa Amendments Act of 2008 requires an individualized warrant for the targeting of US persons, NSA analysts are permitted to intercept the communications of such individuals without a warrant if they are in contact with one of the NSA&#8217;s foreign targets.</p>
<p class="dcr-h26idz">The ACLU&#8217;s deputy legal director, Jameel Jaffer, told the Guardian last month that national security officials expressly said that a primary purpose of the new law was to enable them to collect large amounts of Americans&#8217; communications without individualized warrants.</p>
<p class="dcr-h26idz">&#8220;The government doesn&#8217;t need to &#8216;target&#8217; Americans in order to collect huge volumes of their communications,&#8221; said Jaffer. &#8220;The government inevitably sweeps up the communications of many Americans&#8221; when targeting foreign nationals for surveillance.</p>
<p class="dcr-h26idz">An example is provided by one XKeyscore document showing an NSA target in Tehran communicating with people in Frankfurt, Amsterdam and New York.</p>
<figure id="ed3b735f-ff29-417c-9753-dfc157d41ab8" class=" dcr-173mewl" data-spacefinder-role="inline" data-spacefinder-type="model.dotcomrendering.pageElements.ImageBlockElement">
<div class="dcr-1t8m8f2">
<figure id="attachment_6814" aria-describedby="caption-attachment-6814" style="width: 714px" class="wp-caption alignnone"><img loading="lazy" decoding="async" class=" wp-image-6814" src="https://goodshepherdmedia.net/wp-content/uploads/2022/12/KS12-001.webp" alt="Photograph: Guardian" width="714" height="399" srcset="https://goodshepherdmedia.net/wp-content/uploads/2022/12/KS12-001.webp 460w, https://goodshepherdmedia.net/wp-content/uploads/2022/12/KS12-001-300x168.webp 300w" sizes="(max-width: 714px) 100vw, 714px" /><figcaption id="caption-attachment-6814" class="wp-caption-text"><em><span style="color: #ff6600;">Photograph: Guardian</span></em></figcaption></figure>
</div>
</figure>
<p class="dcr-h26idz">In recent years, the NSA has attempted to segregate exclusively domestic US communications in separate databases. But even NSA documents acknowledge that such efforts are imperfect, as even purely domestic communications can travel on foreign systems, and NSA tools are sometimes unable to identify the national origins of communications.</p>
<p class="dcr-h26idz">Moreover, all communications between Americans and someone on foreign soil are included in the same databases as foreign-to-foreign communications, making them readily searchable without warrants.</p>
<p class="dcr-h26idz">Some searches conducted by NSA analysts are periodically reviewed by their supervisors within the NSA. &#8220;It&#8217;s very rare to be questioned on our searches,&#8221; Snowden told the Guardian in June, &#8220;and even when we are, it&#8217;s usually along the lines of: &#8216;let&#8217;s bulk up the justification&#8217;.&#8221;</p>
<p class="dcr-h26idz">In a letter this week to senator Ron Wyden, director of national intelligence James Clapper acknowledged that NSA analysts have exceeded even legal limits as interpreted by the NSA in domestic surveillance.</p>
<p class="dcr-h26idz">Acknowledging what he called &#8220;a number of compliance problems&#8221;, Clapper attributed them to &#8220;human error&#8221; or &#8220;highly sophisticated technology issues&#8221; rather than &#8220;bad faith&#8221;.</p>
<p class="dcr-h26idz">However, Wyden said on the Senate floor on Tuesday: &#8220;These violations are more serious than those stated by the intelligence community, and are troubling.&#8221;</p>
<p class="dcr-h26idz">In a statement to the Guardian, the NSA said: &#8220;NSA&#8217;s activities are focused and specifically deployed against – and only against – legitimate foreign intelligence targets in response to requirements that our leaders need for information necessary to protect our nation and its interests.</p>
<p class="dcr-h26idz">&#8220;XKeyscore is used as a part of NSA&#8217;s lawful foreign signals intelligence collection system.</p>
<p class="dcr-h26idz">&#8220;Allegations of widespread, unchecked analyst access to NSA collection data are simply not true. Access to XKeyscore, as well as all of NSA&#8217;s analytic tools, is limited to only those personnel who require access for their assigned tasks … In addition, there are multiple technical, manual and supervisory checks and balances within the system to prevent deliberate misuse from occurring.&#8221;</p>
<p class="dcr-h26idz">&#8220;Every search by an NSA analyst is fully auditable, to ensure that they are proper and within the law.</p>
<p class="dcr-h26idz">&#8220;These types of programs allow us to collect the information that enables us to perform our missions successfully – to defend the nation and to protect US and allied troops abroad.&#8221;</p>
</div>
</div>
</div>
</div>
</div>
</div>
<h1 data-testid="headline"></h1>
<hr />
<h1 style="text-align: center;" data-testid="headline"><span style="color: #ff0000;"><span style="color: #0000ff;"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-6840" src="https://goodshepherdmedia.net/wp-content/uploads/2022/12/us-nsa-spying-germany.si_.jpg" alt="" width="690" height="388" srcset="https://goodshepherdmedia.net/wp-content/uploads/2022/12/us-nsa-spying-germany.si_.jpg 690w, https://goodshepherdmedia.net/wp-content/uploads/2022/12/us-nsa-spying-germany.si_-300x169.jpg 300w" sizes="(max-width: 690px) 100vw, 690px" /></span></span></h1>
<h1 style="text-align: center;" data-testid="headline"><span style="color: #ff0000;"><span style="color: #0000ff;">X-</span>K<span style="color: #0000ff;">e</span>y<span style="color: #0000ff;">s</span>c<span style="color: #0000ff;">o</span>r<span style="color: #0000ff;">e<span style="color: #ff0000;">:</span></span></span><br />
<span style="color: #0000ff;">Allows the</span> <span style="color: #ff0000;">NSA</span> <span style="color: #0000ff;">and</span> <span style="color: #ff0000;">Allies</span> <span style="color: #0000ff;">to</span> <span style="color: #ff0000;">Monitor Emails</span><span style="color: #0000ff;">,<br />
</span> <span style="color: #ff0000;">Web Browsing</span><span style="color: #0000ff;">,</span> <span style="color: #ff0000;">Internet Searches</span> a<span style="color: #0000ff;">n</span>d <span style="color: #ff0000;">Social Media</span></h1>
<div class="Post-feature-subtitle-container" data-reactid="111">
<h2 class="Post-feature-subtitle" style="text-align: center;" data-reactid="112"><span style="color: #ff0000;">NSA’s Google</span> for the <span style="color: #0000ff;">World’s Private Communications</span></h2>
</div>
<h1 id="firstHeading" class="firstHeading mw-first-heading"><span class="mw-page-title-main">XKeyscore </span></h1>
<p><b>XKeyscore</b> (<b>XKEYSCORE</b> or <b>XKS</b>) is a secret computer system used by the United States <a title="National Security Agency" href="https://en.wikipedia.org/wiki/National_Security_Agency">National Security Agency</a> (NSA) for searching and analyzing global Internet data, which it collects in <a title="Real-time" href="https://en.wikipedia.org/wiki/Real-time">real time</a>. The NSA has shared XKeyscore with other intelligence agencies, including the <a title="Australian Signals Directorate" href="https://en.wikipedia.org/wiki/Australian_Signals_Directorate">Australian Signals Directorate</a>, Canada&#8217;s <a title="Communications Security Establishment" href="https://en.wikipedia.org/wiki/Communications_Security_Establishment">Communications Security Establishment</a>, New Zealand&#8217;s <a title="Government Communications Security Bureau" href="https://en.wikipedia.org/wiki/Government_Communications_Security_Bureau">Government Communications Security Bureau</a>, Britain&#8217;s <a class="mw-redirect" title="Government Communications Headquarters" href="https://en.wikipedia.org/wiki/Government_Communications_Headquarters">Government Communications Headquarters</a>, Japan&#8217;s <a title="Defense Intelligence Headquarters" href="https://en.wikipedia.org/wiki/Defense_Intelligence_Headquarters">Defense Intelligence Headquarters</a>, and Germany&#8217;s <a class="mw-redirect" title="Bundesnachrichtendienst" href="https://en.wikipedia.org/wiki/Bundesnachrichtendienst">Bundesnachrichtendienst</a>.<sup id="cite_ref-Snowden_Interview_Transcript_1-0" class="reference"><a href="https://en.wikipedia.org/wiki/XKeyscore#cite_note-Snowden_Interview_Transcript-1">[1]</a></sup></p>
<p>In July 2013, <a title="Edward Snowden" href="https://en.wikipedia.org/wiki/Edward_Snowden">Edward Snowden</a> publicly revealed the program&#8217;s purpose and use by the NSA in <i><a title="The Sydney Morning Herald" href="https://en.wikipedia.org/wiki/The_Sydney_Morning_Herald">The Sydney Morning Herald</a></i> and <i><a title="O Globo" href="https://en.wikipedia.org/wiki/O_Globo">O Globo</a></i> newspapers. The code name was already public knowledge because it was mentioned in earlier articles, and, like many other code names, it appears in job postings and online <a title="Résumé" href="https://en.wikipedia.org/wiki/R%C3%A9sum%C3%A9">résumés</a> of employees.<sup id="cite_ref-Guardian3_2-0" class="reference"><a href="https://en.wikipedia.org/wiki/XKeyscore#cite_note-Guardian3-2">[2]</a></sup><sup id="cite_ref-StrangeCreatures_3-0" class="reference"><a href="https://en.wikipedia.org/wiki/XKeyscore#cite_note-StrangeCreatures-3">[3]</a></sup></p>
<p>On July 3, 2014, German <a title="Public broadcasting" href="https://en.wikipedia.org/wiki/Public_broadcasting">public broadcaster</a> <a title="Norddeutscher Rundfunk" href="https://en.wikipedia.org/wiki/Norddeutscher_Rundfunk">Norddeutscher Rundfunk</a>, a member of <a title="ARD (broadcaster)" href="https://en.wikipedia.org/wiki/ARD_(broadcaster)">ARD</a>, published excerpts of XKeyscore&#8217;s source code.<sup id="cite_ref-ARD_4-0" class="reference"><a href="https://en.wikipedia.org/wiki/XKeyscore#cite_note-ARD-4">[4]</a></sup> A team of experts analyzed the source code.<sup id="cite_ref-NDR_5-0" class="reference"><a href="https://en.wikipedia.org/wiki/XKeyscore#cite_note-NDR-5">[5]</a></sup> <a href="https://en.wikipedia.org/wiki/XKeyscore" target="_blank" rel="noopener">cited</a></p>
<div>
<hr />
<h1 style="text-align: center;" data-testid="headline"><img loading="lazy" decoding="async" class=" wp-image-6832 aligncenter" src="https://goodshepherdmedia.net/wp-content/uploads/2022/12/12225549305_1850d9c45a_b.jpg" alt="" width="541" height="415" srcset="https://goodshepherdmedia.net/wp-content/uploads/2022/12/12225549305_1850d9c45a_b.jpg 1024w, https://goodshepherdmedia.net/wp-content/uploads/2022/12/12225549305_1850d9c45a_b-300x230.jpg 300w, https://goodshepherdmedia.net/wp-content/uploads/2022/12/12225549305_1850d9c45a_b-768x590.jpg 768w" sizes="(max-width: 541px) 100vw, 541px" />X-Keyscore spy program tracks &#8216;nearly all&#8217; web use</h1>
</div>
<div>
<h5 style="text-align: center;">BY <a href="https://www.smh.com.au/technology/xkeyscore-spy-program-tracks-nearly-all-web-use-20130802-hv17w.html" target="_blank" rel="noopener"><span data-testid="byline">Philip Dorling</span></a></h5>
</div>
<div>Top-secret US intelligence documents leaked by whistleblower Edward Snowden have revealed details of a key signals intelligence program used by the Australian intelligence community to harvest internet and telecommunications traffic across the Asia-Pacific region.</div>
<div>The system known as X-Keyscore allows the US National Security Agency and international partners including Australia to monitor &#8221;nearly everything a typical user does on the internet&#8221;, according to the leaked documents published by Britain&#8217;s Guardian newspaper.</div>
<div>
<figure id="attachment_6809" aria-describedby="caption-attachment-6809" style="width: 431px" class="wp-caption alignright"><img loading="lazy" decoding="async" class=" wp-image-6809" src="https://goodshepherdmedia.net/wp-content/uploads/2022/12/c25ce7ebab9bf4296aa1be2a783b7eb495bb7d2a.webp" alt="X-Keyscore: Allows the NSA and allies to monitor emails, web browsing, internet searches and social media.CREDIT:MAYU KANAMORI/JESSICA HROMAS" width="431" height="243" srcset="https://goodshepherdmedia.net/wp-content/uploads/2022/12/c25ce7ebab9bf4296aa1be2a783b7eb495bb7d2a.webp 768w, https://goodshepherdmedia.net/wp-content/uploads/2022/12/c25ce7ebab9bf4296aa1be2a783b7eb495bb7d2a-300x169.webp 300w" sizes="(max-width: 431px) 100vw, 431px" /><figcaption id="caption-attachment-6809" class="wp-caption-text"><span style="color: #ff6600;"><em>X-Keyscore: Allows the NSA and allies to monitor emails, web browsing, internet searches and social media.CREDIT:MAYU KANAMORI/JESSICA HROMAS</em></span></figcaption></figure>
</div>
<div></div>
<div>According to classified intelligence training materials, X-Keyscore allows the NSA and its allied partners to comprehensively monitor the emails, web browsing, internet searches and social media use of targets.</div>
<div>This includes &#8221;real-time target activity [tipping]&#8221; and a &#8221;rolling buffer of three days of all unfiltered data&#8221; with the &#8221;full take&#8221; stored at collection facilities &#8211; enabling analysts to retrospectively access the communications of newly identified targets.</div>
<div>Significantly, all the secret documents are classified as available to personnel from <a href="http://www.smh.com.au/it-pro/security-it/five-eyes-spying-alliance-will-survive-edward-snowden-experts-20130718-hv0xw.html">&#8221;Five-eyes&#8221; intelligence partners</a>: the US, UK, Canada, Australia and New Zealand.</div>
<div>Australian intelligence sources recently confirmed to Fairfax Media that Australia&#8217;s electronic espionage agency, the Defence Signals Directorate, was a &#8221;full partner&#8221; in the program.</div>
<div>It is claimed that by 2008 more than 300 terrorists had been captured thanks to intelligence from X-Keyscore.</div>
<div>However, Australian intelligence sources emphasise the reach of the system for diplomatic, political and economic intelligence collection on &#8221;targets of interest across the whole Asia-Pacific&#8221; &#8211; including China, Indonesia, Malaysia, India, Sri Lanka and Pakistan.</div>
<div>Advertisement</div>
<div></div>
<div>Documents previously disclosed by Mr Snowden identified Australian signals intelligence facilities at Geraldton in Western Australia, Shoal Bay near Darwin, HMAS Harman near Canberra and the US-Australian Joint Defence Facility at Pine Gap near Alice Springs as contributors to the global collection of internet and telecoms traffic under the X-Keyscore program.</div>
<div><a href="http://www.canberratimes.com.au/it-pro/government-it/australia-gets-deluge-of-us-secret-data-prompting-a-new-data-facility-20130612-2o4kf.html">Fairfax recently reported the construction of a new data storage facility</a> at HMAS Harman to support the surge in data collection by Australian intelligence agencies.</div>
<div>Last week the US House of Representatives only narrowly voted down a proposal to defund the NSA&#8217;s ability to collect electronic information, including phone call records.</div>
<div>But President Barack Obama has been forced to <a href="http://www.smh.com.au/it-pro/security-it/us-declassifies-nsa-program-as-further-disclosure-emerges-20130801-hv177.html">declassify aspects of the surveillance programs</a>.</div>
<div>Democrat senator Dianne Feinstein &#8211; the chairwoman of the US Senate intelligence committee and a staunch supporter of the wide-ranging electronic surveillance &#8211; says she is looking into reforms including greater public reporting of phone interception and meta-data collection statistics</div>
<div>Australian diplomat cables show close consultation between US and Australian officials about Mr Snowden&#8217;s disclosures. However, most details have been redacted on the grounds they would reveal confidential discussions or &#8221;comment and analysis of any implications of Snowden&#8217;s breach for Australian communications systems&#8221;.</div>
<div>NSA director General Keith Alexander, who is also Commander of the United States Cyber Command, <a href="http://www.smh.com.au/it-pro/security-it/nsa-chief-defends-surveillance-at-black-hat-security-conference-20130801-hv174.html">defended the surveillance programs this week</a> at the annual Black Hat computer security conference in Las Vegas.</div>
<div></div>
<div>
<hr />
</div>
<div>
<hr />
</div>
<div>
<div data-reactid="192">
<div class="Post-feature-title-container" data-reactid="108">
<h1 class="Post-feature-title" style="text-align: center;" data-reactid="109">XKEYSCORE</h1>
</div>
<div class="Post-feature-subtitle-container" data-reactid="111">
<h2 class="Post-feature-subtitle" style="text-align: center;" data-reactid="112">NSA’s Google for the World’s Private Communications</h2>
<p><span class="disable-staff-detail" data-reactid="171">Morgan Marquis-Boire</span>, <a class="PostByline-link" href="https://theintercept.com/staff/glenn-greenwald/" rel="author" data-reactid="173"><span data-reactid="174">Glenn Greenwald</span></a>, <a class="PostByline-link" href="https://theintercept.com/staff/micah-lee/" rel="author" data-reactid="176"><span data-reactid="177">Micah Lee</span></a> cited <a href="https://theintercept.com/2015/07/01/nsas-google-worlds-private-communications/" target="_blank" rel="noopener">theintercept.com</a></p>
</div>
<p><u>ONE OF THE</u> National Security Agency’s most powerful tools of mass surveillance makes tracking someone’s Internet usage as easy as entering an email address, and provides no built-in technology to prevent abuse. Today, <em>The Intercept</em> is publishing 48 top-secret and other classified documents about XKEYSCORE dated up to 2013, which shed new light on the breadth, depth and functionality of this critical spy system — one of the largest releases yet of documents provided by NSA whistleblower Edward Snowden.</p>
<p>The NSA’s XKEYSCORE program, first <a href="http://www.theguardian.com/world/2013/jul/31/nsa-top-secret-program-online-data">revealed</a> by <em>The Guardian</em>, sweeps up countless people’s Internet searches, emails, documents, usernames and passwords, and other private communications. XKEYSCORE is fed a constant flow of Internet traffic from <a href="https://web.archive.org/web/20150123062050/https://www.eff.org/files/2014/06/23/report_on_the_nsas_access_to_tempora.pdf">fiber optic cables</a> that make up the backbone of the world’s communication network, among other sources, for processing. As of 2008, the surveillance system boasted approximately 150 field sites in the United States, Mexico, Brazil, United Kingdom, Spain, Russia, Nigeria, Somalia, Pakistan, Japan, Australia, as well as many other countries, consisting of over 700 servers.</p>
<p>These servers store “full-take data” at the collection sites — meaning that they captured all of the traffic collected — and, as of 2009, stored content for 3 to 5 days and metadata for 30 to 45 days. NSA documents indicate that tens of billions of records are stored in its database. “It is a fully distributed processing and query system that runs on machines around the world,” an NSA briefing on XKEYSCORE says. “At field sites, XKEYSCORE can run on multiple computers that gives it the ability to scale in both processing power and storage.”</p>
</div>
<div class="img-wrap align-center width-fixed" data-reactid="193">
<div data-reactid="194">
<figure id="attachment_6826" aria-describedby="caption-attachment-6826" style="width: 568px" class="wp-caption alignright"><img loading="lazy" decoding="async" class=" wp-image-6826" src="https://goodshepherdmedia.net/wp-content/uploads/2022/12/int-ink-2.webp" alt="Illustration: Blue Delliquanti and David Axe for The Intercept" width="568" height="465" srcset="https://goodshepherdmedia.net/wp-content/uploads/2022/12/int-ink-2.webp 1100w, https://goodshepherdmedia.net/wp-content/uploads/2022/12/int-ink-2-300x245.webp 300w, https://goodshepherdmedia.net/wp-content/uploads/2022/12/int-ink-2-1024x838.webp 1024w, https://goodshepherdmedia.net/wp-content/uploads/2022/12/int-ink-2-768x628.webp 768w" sizes="(max-width: 568px) 100vw, 568px" /><figcaption id="caption-attachment-6826" class="wp-caption-text"><em><span style="color: #ff6600;">Illustration: Blue Delliquanti and David Axe for The Intercept</span></em></figcaption></figure>
</div>
</div>
<div data-reactid="195">
<p>XKEYSCORE also collects and processes Internet traffic from Americans, though NSA analysts are taught to avoid querying the system in ways that might result in spying on U.S. data. Experts and privacy activists, however, have long doubted that such exclusions are effective in preventing large amounts of American data from being swept up. One document <em>The Intercept</em> is publishing today suggests that FISA warrants have authorized “full-take” collection of traffic from at least some U.S. web forums.</p>
<p>The system is not limited to collecting web traffic. The 2013 document, “VoIP Configuration and Forwarding Read Me,” details how to forward VoIP data from XKEYSCORE into NUCLEON, NSA’s repository for voice intercepts, facsimile, video and “pre-released transcription.” At the time, it supported more than 8,000 users globally and was made up of 75 servers absorbing 700,000 voice, fax, video and tag files per day.</p>
<p>The reach and potency of XKEYSCORE as a surveillance instrument is astonishing. The <a href="http://www.theguardian.com/world/2013/jul/31/nsa-top-secret-program-online-data"><em>Guardian</em> report</a> noted that NSA itself refers to the program as its “widest reaching” system. In February of this year, <em>The Intercept</em> <a href="https://firstlook.org/theintercept/2015/02/19/great-sim-heist/">reported</a> that NSA and GCHQ hacked into the internal network of Gemalto, the world’s largest provider of cell phone SIM cards, in order to steal millions of encryption keys used to protect the privacy of cell phone communication. XKEYSCORE played a vital role in the spies’ hacking by providing government hackers access to the email accounts of Gemalto employees.</p>
<p>Numerous key NSA partners, including Canada, New Zealand and the U.K., have access to the mass surveillance databases of XKEYSCORE. In March, the <em>New Zealand Herald</em>, in partnership with <em>The Intercept</em>, <a href="https://firstlook.org/theintercept/2015/03/22/new-zealand-gcsb-spying-wto-director-general/">revealed</a> that the New Zealand government used XKEYSCORE to spy on candidates for the position of World Trade Organization director general and also members of the <a href="https://firstlook.org/theintercept/2015/03/14/new-zealand-xkeyscore-solomon-islands-nsa-targets/">Solomon Islands government</a>.</p>
<p>These newly published documents demonstrate that collected communications not only include emails, chats and web-browsing traffic, but also pictures, documents, voice calls, webcam photos, web searches, advertising analytics traffic, social media traffic, botnet traffic, logged keystrokes, computer network exploitation (CNE) targeting, intercepted username and password pairs, file uploads to online services, Skype sessions and more.</p>
<h3>Bulk collection and population surveillance</h3>
<p>XKEYSCORE allows for incredibly broad surveillance of people based on perceived patterns of suspicious behavior. It is possible, for instance, to query the system to show the activities of people based on their location, nationality and websites visited. For instance, one slide displays the search “germansinpakistn,” showing an analyst querying XKEYSCORE for all <a href="https://www.documentcloud.org/documents/2116488-xks-targets-visiting-specific-websites.html#document/p1">individuals in Pakistan visiting specific German language message boards</a>.</p>
<p>As sites like Twitter and Facebook become increasingly significant in the world’s day-to-day communications (a Pew study <a href="http://www.pewinternet.org/fact-sheets/social-networking-fact-sheet/">shows</a> that 71 percent of online adults in the U.S. use Facebook), they become a critical source of surveillance data. Traffic from popular social media sites is described as “a great starting point” for tracking individuals, according to an XKEYSCORE <a href="https://www.documentcloud.org/documents/2116185-tracking-targets-on-online-social-networks.html#document/p19">presentation</a> titled “Tracking Targets on Online Social Networks.”</p>
<p>When intelligence agencies collect massive amounts of Internet traffic all over the world, they face the challenge of making sense of that data. The vast quantities collected make it difficult to connect the stored traffic to specific individuals.</p>
<p>Internet companies have also encountered this problem and have solved it by tracking their users with identifiers that are unique to each individual, often in the form of browser cookies. Cookies are small pieces of data that websites store in visitors’ browsers. They are used for a variety of purposes, including authenticating users (cookies make it possible to log in to websites), storing preferences, and uniquely tracking individuals even if they’re using the same IP address as many other people. Websites also embed code used by third-party services to collect analytics or host ads, which also use cookies to track users. According to <a href="https://www.documentcloud.org/documents/2115979-advanced-http-activity-analysis.html#document/p52">one slide</a>, “Almost all websites have cookies enabled.”</p>
<p>The NSA’s ability to piggyback off of private companies’ tracking of their own users is a vital instrument that allows the agency to trace the data it collects to individual users. It makes no difference if visitors switch to public Wi-Fi networks or connect to VPNs to change their IP addresses: the tracking cookie will follow them around as long as they are using the same web browser and fail to clear their cookies.</p>
</div>
<div class="img-wrap align-center width-fixed" data-reactid="196">
<div data-reactid="197">
<figure id="attachment_6827" aria-describedby="caption-attachment-6827" style="width: 532px" class="wp-caption alignleft"><img loading="lazy" decoding="async" class=" wp-image-6827" src="https://goodshepherdmedia.net/wp-content/uploads/2022/12/int-ink-3.webp" alt="Illustration: Blue Delliquanti and David Axe for The Intercept" width="532" height="435" srcset="https://goodshepherdmedia.net/wp-content/uploads/2022/12/int-ink-3.webp 1100w, https://goodshepherdmedia.net/wp-content/uploads/2022/12/int-ink-3-300x245.webp 300w, https://goodshepherdmedia.net/wp-content/uploads/2022/12/int-ink-3-1024x838.webp 1024w, https://goodshepherdmedia.net/wp-content/uploads/2022/12/int-ink-3-768x628.webp 768w" sizes="(max-width: 532px) 100vw, 532px" /><figcaption id="caption-attachment-6827" class="wp-caption-text"><em><span style="color: #ff6600;">Illustration: Blue Delliquanti and David Axe for The Intercept</span></em></figcaption></figure>
</div>
</div>
<div data-reactid="198">
<p>Apps that run on tablets and smartphones also use analytics services that uniquely track users. Almost every time a user sees an advertisement (in an app or in a web browser), the ad network is tracking users in the same way. A <a href="https://firstlook.org/theintercept/2015/01/26/secret-badass-spy-program/">secret GCHQ and CSE program called BADASS</a>, which is similar to XKEYSCORE but with a much narrower scope, mines as much valuable information from leaky smartphone apps as possible, including unique tracking identifiers that app developers use to track their own users. In May of this year, CBC, in partnership with <em>The Intercept</em>, <a href="https://firstlook.org/theintercept/2015/05/21/nsa-five-eyes-google-samsung-app-stores-spyware/">revealed</a> that XKEYSCORE was used to track smartphone connections to the app marketplaces run by Samsung and Google. Surveillance agency analysts also use other types of traffic data that gets scooped into XKEYSCORE to track people, such as <a href="http://arstechnica.com/business/2013/12/why-nsa-spied-on-inexplicably-unencrypted-windows-crash-reports/">Windows crash reports</a>.</p>
<p>In a statement to <em>The Intercept</em>, the NSA reiterated its position that such sweeping surveillance capabilities are needed to fight the War on Terror:</p>
<p>“The U.S. Government calls on its intelligence agencies to protect the United States, its citizens, and its allies from a wide array of serious threats. These threats include terrorist plots from al-Qaeda, ISIL, and others; the proliferation of weapons of mass destruction; foreign aggression against the United States and our allies; and international criminal organizations.”</p>
<p>Indeed, one of the specific examples of XKEYSCORE applications given in the documents is spying on Shaykh Atiyatallah, an al Qaeda senior leader and Osama bin Laden confidant. A few years before his death, Atiyatallah did what many people have often done: He googled himself. He searched his various aliases, an associate and the name of his book. As he did so, all of that information was captured by XKEYSCORE.</p>
<p>XKEYSCORE has, however, also been used to spy on non-terrorist targets. The April 18, 2013 issue of the internal NSA publication Special Source Operations Weekly <a href="https://firstlook.org/theintercept/document/2015/07/01/un-secretary-general-xks/">boasts</a> that analysts were successful in using XKEYSCORE to obtain U.N. Secretary General Ban Ki-moon’s talking points prior to a meeting with President Obama.</p>
</div>
<div class="img-wrap align-center width-fixed" data-reactid="199">
<div data-reactid="200">
<figure id="attachment_6828" aria-describedby="caption-attachment-6828" style="width: 649px" class="wp-caption alignright"><img loading="lazy" decoding="async" class=" wp-image-6828" src="https://goodshepherdmedia.net/wp-content/uploads/2022/12/int-ink-4.webp" alt="Illustration: Blue Delliquanti and David Axe for The Intercept" width="649" height="531" srcset="https://goodshepherdmedia.net/wp-content/uploads/2022/12/int-ink-4.webp 1100w, https://goodshepherdmedia.net/wp-content/uploads/2022/12/int-ink-4-300x245.webp 300w, https://goodshepherdmedia.net/wp-content/uploads/2022/12/int-ink-4-1024x838.webp 1024w, https://goodshepherdmedia.net/wp-content/uploads/2022/12/int-ink-4-768x628.webp 768w" sizes="(max-width: 649px) 100vw, 649px" /><figcaption id="caption-attachment-6828" class="wp-caption-text"><em><span style="color: #ff6600;">Illustration: Blue Delliquanti and David Axe for The Intercept</span></em></figcaption></figure>
</div>
</div>
<div data-reactid="201">
<h3></h3>
<h3></h3>
<h3>XKEYSCORE for hacking: Easily collecting user names, passwords and much more</h3>
<p>XKEYSCORE plays a central role in how the U.S. government and its surveillance allies hack computer networks around the world. One top-secret 2009 NSA document describes how the system is used by the NSA to gather information for the Office of Tailored Access Operations, an NSA division responsible for Computer Network Exploitation (CNE) — i.e., targeted hacking.</p>
<p>Particularly in 2009, the hacking tactics enabled by XKEYSCORE would have yielded significant returns as use of encryption was less widespread than today. Jonathan Brossard, a security researcher and the CEO of Toucan Systems, told <em>The Intercept</em>: “Anyone could be trained to do this in less than one day: they simply enter the name of the server they want to hack into XKEYSCORE, type enter, and are presented login and password pairs to connect to this machine. Done. Finito.” <a href="https://firstlook.org/theintercept/2014/03/20/inside-nsa-secret-efforts-hunt-hack-system-administrators/">Previous reporting</a> by <em>The Intercept</em> revealed that systems administrators are a popular target of the NSA. “Who better to target than the person that already has the ‘keys to the kingdom?’” <span class="s1">read a 2012 post on an internal NSA discussion board.</span></p>
<p>This system enables analysts to access web mail servers with <a href="https://www.documentcloud.org/documents/2116255-using-xks-to-enable-tao.html#document/p35">remarkable ease</a>.</p>
<p>The same methods are used to steal the credentials — user names and passwords — of individual users of <a href="https://www.documentcloud.org/documents/2116268-web-forum-exploitation-using-xks.html#document/p2">message boards</a>.</p>
<p><a href="https://www.documentcloud.org/documents/2153970-osint-fusion-project.html#document/p6">Hacker forums</a> are also monitored for people selling or using exploits and other hacking tools. While the NSA is clearly monitoring to understand the capabilities developed by its adversaries, it is also monitoring locations where such capabilities can be purchased.</p>
<p>Other information gained via XKEYSCORE facilitates the remote exploitation of target computers. By extracting browser fingerprint and operating system versions from Internet traffic, the system allows analysts to quickly assess the <a href="https://www.documentcloud.org/documents/2116373-xks-intro.html#document/p24">exploitability of a target</a>. Brossard, the security researcher, said that “NSA has built an impressively complete set of automated hacking tools for their analysts to use.”</p>
<p>Given the breadth of information collected by XKEYSCORE, accessing and exploiting a target’s online activity is a matter of a few mouse clicks. Brossard explains: “The amount of work an analyst has to perform to actually break into remote computers over the Internet seems ridiculously reduced — we are talking minutes, if not seconds. Simple. As easy as typing a few words in Google.”</p>
<p>These facts bolster one of Snowden’s most controversial statements, made in his <a href="http://www.theguardian.com/world/video/2013/jun/09/nsa-whistleblower-edward-snowden-interview-video">first video interview published by <em>The Guardian</em></a> on June 9, 2013. “I, sitting at my desk,” said Snowden, could “wiretap anyone, from you or your accountant, to a federal judge to even the president, if I had a personal email.”</p>
<p>Indeed, training documents for XKEYSCORE repeatedly highlight how user-friendly the program is: with just a few clicks, any analyst with access to it can conduct sweeping searches simply by entering a person’s email address, telephone number, name or other identifying data. There is no indication in the documents reviewed that prior approval is needed for specific searches.</p>
<p>In addition to login credentials and other target intelligence, XKEYSCORE collects <a href="https://www.documentcloud.org/documents/2116255-using-xks-to-enable-tao.html#document/p5">router configuration information</a>, which it shares with Tailored Access Operations. The office is able to exploit routers and then feed the traffic traveling through those routers into their collection infrastructure. This allows the NSA to spy on traffic from otherwise out-of-reach networks. XKEYSCORE documents reference router configurations, and <a href="http://www.spiegel.de/media/media-35672.pdf">a document previously published by <em>Der Spiegel</em></a> shows that “active implants” can be used to “cop[y] traffic and direc[t]” it past a passive collector.</p>
<h3>XKEYSCORE for counterintelligence</h3>
<p>Beyond enabling the collection, categorization, and querying of metadata and content, XKEYSCORE has also been used to monitor the surveillance and hacking actions of foreign nation states and to gather the fruits of their hacking. <em>The Intercept</em> <a href="https://firstlook.org/theintercept/2015/02/04/demonize-prosecute-hackers-nsa-gchq-rely-intel-expertise/">previously reported</a> that NSA and its allies spy on hackers in order to collect what they collect.</p>
<p>Once the hacking tools and techniques of a foreign entity (for instance, <a href="https://www.documentcloud.org/documents/2116354-xks-for-counter-cne.html#document/p16">South Korea</a>) are identified, analysts can then extract the country’s espionage targets from XKEYSCORE, and gather information that the foreign power has managed to steal.</p>
<p>Monitoring of foreign state hackers could allow the NSA to gather techniques and tools used by foreign actors, including knowledge of zero-day exploits—software bugs that allow attackers to hack into systems, and that not even the software vendor knows about—and implants. Additionally, by monitoring vulnerability reports sent to vendors such as <a href="https://firstlook.org/theintercept/2015/06/22/nsa-gchq-targeted-kaspersky/">Kaspersky</a>, the agency could learn when exploits they were actively using need to be retired because they’ve been discovered by a third party.</p>
<h3>Seizure v. searching: Oversight, audit trail and the Fourth Amendment</h3>
<p>By the nature of how it sweeps up information, XKEYSCORE gathers communications of Americans, despite the Fourth Amendment protection against “unreasonable search and seizure” — including searching data without a warrant. The NSA says it does not target U.S. citizens’ communications without a warrant, but acknowledges that it “incidentally” collects and reads some of it without one, minimizing the information that is retained or shared.</p>
<p>But that interpretation of the law is dubious at best.</p>
<p>XKEYSCORE training documents say that the “burden is on user/auditor to comply with USSID-18 or other rules,” apparently including the British Human Rights Act (HRA), which protects the rights of U.K. citizens. U.S. Signals Intelligence Directive 18 (USSID 18) is the American directive that governs “U.S. person minimization.”</p>
<p>Kurt Opsahl, the Electronic Frontier Foundation’s general counsel, describes USSID 18 as “an attempt by the intelligence community to comply with the Fourth Amendment. But it doesn’t come from a court, it comes from the executive.”</p>
<p>If, for instance, an analyst searched XKEYSCORE for all iPhone users, this query would <a href="https://www.documentcloud.org/documents/2116130-intro-to-xks-appids-and-fingerprints.html#document/p41">violate USSID 18</a> due to the inevitable American iPhone users that would be grabbed without a warrant, as the NSA’s own training materials make clear.</p>
<p>Opsahl believes that analysts are not prevented by technical means from making queries that violate USSID 18. “The document discusses whether auditors will be happy or unhappy. This indicates that compliance will be achieved by after-the-fact auditing, not by preventing the search.”</p>
<p>Screenshots of the XKEYSCORE web-based user interface included in slides show that analysts see a prominent warning message: “This system is audited for USSID 18 and Human Rights Act compliance.” When analysts log in to the system, they see a more detailed message warning that “an audit trail has been established and will be searched” in response to HRA complaints, and as part of the USSID 18 and USSID 9 audit process.</p>
<p>Because the XKEYSCORE system does not appear to prevent analysts from making queries that would be in violation of these rules, Opsahl concludes that “there’s a tremendous amount of power being placed in the hands of analysts.” And while those analysts may be subject to audits, “at least in the short term they can still obtain information that they shouldn’t have.”</p>
<p>During a <a href="http://computefest.seas.harvard.edu/symposium">symposium</a> in January 2015 hosted at Harvard University, Edward Snowden, who spoke via video call, said that NSA analysts are “completely free from any meaningful oversight.” Speaking about the people who audit NSA systems like XKEYSCORE for USSID 18 compliance, he said, “The majority of the people who are doing the auditing are the friends of the analysts. They work in the same office. They’re not full-time auditors, they’re guys who have other duties assigned. There are a few traveling auditors who go around and look at the things that are out there, but really it’s not robust.”</p>
<p>In a statement to <em>The Intercept</em>, the NSA said:</p>
<p>“The National Security Agency’s foreign intelligence operations are 1) authorized by law; 2) subject to multiple layers of stringent internal and external oversight; and 3) conducted in a manner that is designed to protect privacy and civil liberties. As provided for by Presidential Policy Directive 28 (PPD-28), all persons, regardless of their nationality, have legitimate privacy interests in the handling of their personal information. NSA goes to great lengths to narrowly tailor and focus its signals intelligence operations on the collection of communications that are most likely to contain foreign intelligence or counterintelligence information.”</p>
</div>
</div>
<div></div>
<div></div>
<div></div>
<div>
<hr />
</div>
<div>
<h1>XKeyscore presentation from 2008 – read in full</h1>
<div id="stand-first" class="stand-first-alone" data-component="Document:standfirst_cta">Training materials for the XKeyscore program detail how analysts can use it and other systems to mine enormous agency databases and develop intelligence from the web</div>
</div>
<div></div>
<div></div>
<div><iframe src="https://beta.documentcloud.org/documents/743252-nsa-pdfs-redacted-ed?sidebar=0&amp;pdf=0" width="640" height="480"><span data-mce-type="bookmark" style="display: inline-block; width: 0px; overflow: hidden; line-height: 0;" class="mce_SELRES_start">﻿</span><span data-mce-type="bookmark" style="display: inline-block; width: 1000px; overflow: hidden; line-height: 0;" class="mce_SELRES_start"><span data-mce-type="bookmark" style="display: inline-block; width: 0px; overflow: hidden; line-height: 0;" class="mce_SELRES_start">﻿</span><span data-mce-type="bookmark" style="display: inline-block; width: 0px; overflow: hidden; line-height: 0;" class="mce_SELRES_start">﻿</span>﻿</span></iframe></div>
<div></div>
<div></div>
<div></div>
<div>
<hr />
</div>
<div></div>
<h1 style="text-align: center;">XKeyscore: NSA tool collects &#8216;nearly everything a user does on the internet&#8217;</h1>
<div style="text-align: center;">written by <a href="https://www.theguardian.com/profile/glenn-greenwald" rel="author" data-link-name="auto tag link">Glenn Greenwald</a> <a href="https://www.theguardian.com/world/2013/jul/31/nsa-top-secret-program-online-data" target="_blank" rel="noopener">cited</a></div>
<ul>
<li><strong>XKeyscore gives &#8216;widest-reaching&#8217; collection of online data</strong></li>
<li><strong>NSA analysts require no prior authorization for searches</strong></li>
<li><strong>Sweeps up emails, social media activity and browsing history</strong></li>
</ul>
<div></div>
<div></div>
<div></div>
<div></div>
<div>
<figure id="attachment_6816" aria-describedby="caption-attachment-6816" style="width: 783px" class="wp-caption aligncenter"><img loading="lazy" decoding="async" class=" wp-image-6816" src="https://goodshepherdmedia.net/wp-content/uploads/2022/12/XKeyscore-map-010.webp" alt="One presentation claims the XKeyscore program covers 'nearly everything a typical user does on the internet'" width="783" height="470" srcset="https://goodshepherdmedia.net/wp-content/uploads/2022/12/XKeyscore-map-010.webp 460w, https://goodshepherdmedia.net/wp-content/uploads/2022/12/XKeyscore-map-010-300x180.webp 300w" sizes="(max-width: 783px) 100vw, 783px" /><figcaption id="caption-attachment-6816" class="wp-caption-text"><em><span style="color: #ff6600;">One presentation claims the XKeyscore program covers &#8216;nearly everything a typical user does on the internet&#8217;</span></em></figcaption></figure>
</div>
<div>
<div></div>
</div>
<div></div>
<div>A top secret National Security Agency program allows analysts to search with no prior authorization through vast databases containing emails, online chats and the browsing histories of millions of individuals, according to documents provided by whistleblower Edward Snowden.</div>
<div>The <a href="https://www.theguardian.com/us-news/nsa" data-component="auto-linked-tag" data-link-name="in body link">NSA</a> boasts in training materials that the program, called XKeyscore, is its &#8220;widest-reaching&#8221; system for developing intelligence from the internet.</div>
<div>The latest revelations will add to the intense public and congressional debate around the extent of NSA surveillance programs. They come as senior intelligence officials testify to the Senate judiciary committee on Wednesday, releasing classified documents in response to <a href="https://www.theguardian.com/world/the-nsa-files" data-link-name="in body link">the Guardian&#8217;s earlier stories</a> on bulk collection of phone records and Fisa surveillance court oversight.</div>
<div>The files shed light on one of Snowden&#8217;s most controversial statements, made in his <a href="https://www.theguardian.com/world/video/2013/jun/09/nsa-whistleblower-edward-snowden-interview-video" data-link-name="in body link">first video interview published by the Guardian</a> on June 10.</div>
<div>&#8220;I, sitting at my desk,&#8221; said Snowden, could &#8220;wiretap anyone, from you or your accountant, to a federal judge or even the president, if I had a personal email&#8221;.</div>
<div>US officials vehemently denied this specific claim. Mike Rogers, the Republican chairman of the House intelligence committee, said of Snowden&#8217;s assertion: &#8220;He&#8217;s lying. It&#8217;s impossible for him to do what he was saying he could do.&#8221;</div>
<div>But training materials for XKeyscore detail how analysts can use it and other systems to mine enormous agency databases by filling in a simple on-screen form giving only a broad justification for the search. The request is not reviewed by a court or any NSA personnel before it is processed.</div>
<div>XKeyscore, the documents boast, is the NSA&#8217;s &#8220;widest reaching&#8221; system developing intelligence from computer networks – what the agency calls Digital Network Intelligence (DNI). One presentation claims the program covers &#8220;nearly everything a typical user does on the internet&#8221;, including the content of emails, websites visited and searches, as well as their metadata.</div>
<div>Analysts can also use XKeyscore and other NSA systems to obtain ongoing &#8220;real-time&#8221; interception of an individual&#8217;s internet activity.</div>
<div>Under US law, the NSA is required to obtain an individualized Fisa warrant only if the target of their surveillance is a &#8216;US person&#8217;, though no such warrant is required for intercepting the communications of Americans with foreign targets. But XKeyscore provides the technological capability, if not the legal authority, to target even US persons for extensive electronic surveillance without a warrant provided that some identifying information, such as their email or IP address, is known to the analyst.</div>
<div>One training slide illustrates the digital activity constantly being collected by XKeyscore and the analyst&#8217;s ability to query the databases at any time.</div>
<div>
<figure id="attachment_6817" aria-describedby="caption-attachment-6817" style="width: 460px" class="wp-caption aligncenter"><img loading="lazy" decoding="async" class="size-full wp-image-6817" src="https://goodshepherdmedia.net/wp-content/uploads/2022/12/KS1-001.webp" alt="Photograph: Guardian" width="460" height="347" srcset="https://goodshepherdmedia.net/wp-content/uploads/2022/12/KS1-001.webp 460w, https://goodshepherdmedia.net/wp-content/uploads/2022/12/KS1-001-300x226.webp 300w" sizes="(max-width: 460px) 100vw, 460px" /><figcaption id="caption-attachment-6817" class="wp-caption-text"><em><span style="color: #ff6600;">Photograph: Guardian</span></em></figcaption></figure>
</div>
<div></div>
<div>The purpose of XKeyscore is to allow analysts to search the metadata as well as the content of emails and other internet activity, such as browser history, even when there is no known email account (a &#8220;selector&#8221; in NSA parlance) associated with the individual being targeted.</div>
<div>Analysts can also search by name, telephone number, IP address, keywords, the language in which the internet activity was conducted or the type of browser used.</div>
<div>One document notes that this is because &#8220;strong selection [search by email address] itself gives us only a very limited capability&#8221; because &#8220;a large amount of time spent on the web is performing actions that are anonymous.&#8221;</div>
<div>The NSA documents assert that by 2008, 300 terrorists had been captured using intelligence from XKeyscore.</div>
<div>Analysts are warned that searching the full database for content will yield too many results to sift through. Instead they are advised to use the metadata also stored in the databases to narrow down what to review.</div>
<div>A slide entitled &#8220;plug-ins&#8221; in a December 2012 document describes the various fields of information that can be searched. It includes &#8220;every email address seen in a session by both username and domain&#8221;, &#8220;every phone number seen in a session (eg address book entries or signature block)&#8221; and user activity – &#8220;the webmail and chat activity to include username, buddylist, machine specific cookies etc&#8221;.</div>
<div>Email monitoring</div>
<div>In a second Guardian interview in June, Snowden elaborated on his statement about being able to read any individual&#8217;s email if he had their email address. He said the claim was based in part on the email search capabilities of XKeyscore, which Snowden says he was authorized to use while working as a Booz Allen contractor for the NSA.</div>
<div>One top-secret document describes how the program &#8220;searches within bodies of emails, webpages and documents&#8221;, including the &#8220;To, From, CC, BCC lines&#8221; and the &#8216;Contact Us&#8217; pages on websites&#8221;.</div>
<div>To search for emails, an analyst using XKS enters the individual&#8217;s email address into a simple online search form, along with the &#8220;justification&#8221; for the search and the time period for which the emails are sought.</div>
<div></div>
<div>
<figure id="attachment_6818" aria-describedby="caption-attachment-6818" style="width: 519px" class="wp-caption aligncenter"><img loading="lazy" decoding="async" class=" wp-image-6818" src="https://goodshepherdmedia.net/wp-content/uploads/2022/12/KS2-001.webp" alt="Photograph: Guardian" width="519" height="354" srcset="https://goodshepherdmedia.net/wp-content/uploads/2022/12/KS2-001.webp 460w, https://goodshepherdmedia.net/wp-content/uploads/2022/12/KS2-001-300x205.webp 300w" sizes="(max-width: 519px) 100vw, 519px" /><figcaption id="caption-attachment-6818" class="wp-caption-text"><em><span style="color: #ff6600;">Photograph: Guardian</span></em></figcaption></figure>
</div>
<div></div>
<div>
<figure id="attachment_6819" aria-describedby="caption-attachment-6819" style="width: 460px" class="wp-caption aligncenter"><img loading="lazy" decoding="async" class="size-full wp-image-6819" src="https://goodshepherdmedia.net/wp-content/uploads/2022/12/KS3edit2-001.webp" alt="Photograph: Guardian" width="460" height="345" srcset="https://goodshepherdmedia.net/wp-content/uploads/2022/12/KS3edit2-001.webp 460w, https://goodshepherdmedia.net/wp-content/uploads/2022/12/KS3edit2-001-300x225.webp 300w" sizes="(max-width: 460px) 100vw, 460px" /><figcaption id="caption-attachment-6819" class="wp-caption-text"><em><span style="color: #ff6600;">Photograph: Guardian</span></em></figcaption></figure>
</div>
<div>The analyst then selects which of those returned emails they want to read by opening them in NSA reading software.</div>
<div>The system is similar to the way in which NSA analysts generally can intercept the communications of anyone they select, including, as one NSA document put it, &#8220;communications that transit the United States and communications that terminate in the United States&#8221;.</div>
<div>One document, a top secret 2010 guide describing the training received by NSA analysts for general surveillance under the Fisa Amendments Act of 2008, explains that analysts can begin surveillance on anyone by clicking a few simple pull-down menus designed to provide both legal and targeting justifications. Once options on the pull-down menus are selected, their target is marked for electronic surveillance and the analyst is able to review the content of their communications:</div>
<div>
<figure id="attachment_6820" aria-describedby="caption-attachment-6820" style="width: 460px" class="wp-caption aligncenter"><img loading="lazy" decoding="async" class="size-full wp-image-6820" src="https://goodshepherdmedia.net/wp-content/uploads/2022/12/KS4-001.webp" alt="Photograph: Guardian" width="460" height="353" srcset="https://goodshepherdmedia.net/wp-content/uploads/2022/12/KS4-001.webp 460w, https://goodshepherdmedia.net/wp-content/uploads/2022/12/KS4-001-300x230.webp 300w" sizes="(max-width: 460px) 100vw, 460px" /><figcaption id="caption-attachment-6820" class="wp-caption-text"><em><span style="color: #ff6600;">Photograph: Guardian</span></em></figcaption></figure>
</div>
<div></div>
<div>Chats, browsing history and other internet activity</div>
<div>Beyond emails, the XKeyscore system allows analysts to monitor a virtually unlimited array of other internet activities, including those within social media.</div>
<div>An NSA tool called DNI Presenter, used to read the content of stored emails, also enables an analyst using XKeyscore to read the content of Facebook chats or private messages.</div>
<div>
<figure id="attachment_6815" aria-describedby="caption-attachment-6815" style="width: 460px" class="wp-caption aligncenter"><img loading="lazy" decoding="async" class="size-full wp-image-6815" src="https://goodshepherdmedia.net/wp-content/uploads/2022/12/KS55edit-001.webp" alt="Photograph: Guardian" width="460" height="333" srcset="https://goodshepherdmedia.net/wp-content/uploads/2022/12/KS55edit-001.webp 460w, https://goodshepherdmedia.net/wp-content/uploads/2022/12/KS55edit-001-300x217.webp 300w" sizes="(max-width: 460px) 100vw, 460px" /><figcaption id="caption-attachment-6815" class="wp-caption-text"><em><span style="color: #ff6600;">Photograph: Guardian</span></em></figcaption></figure>
</div>
<div></div>
<div>An analyst can monitor such Facebook chats by entering the Facebook user name and a date range into a simple search screen.</div>
<div>
<figure id="attachment_6821" aria-describedby="caption-attachment-6821" style="width: 460px" class="wp-caption aligncenter"><img loading="lazy" decoding="async" class="size-full wp-image-6821" src="https://goodshepherdmedia.net/wp-content/uploads/2022/12/KS6-001.webp" alt="Photograph: Guardian" width="460" height="314" srcset="https://goodshepherdmedia.net/wp-content/uploads/2022/12/KS6-001.webp 460w, https://goodshepherdmedia.net/wp-content/uploads/2022/12/KS6-001-300x205.webp 300w" sizes="(max-width: 460px) 100vw, 460px" /><figcaption id="caption-attachment-6821" class="wp-caption-text"><em><span style="color: #ff6600;">Photograph: Guardian</span></em></figcaption></figure>
</div>
<div></div>
<div>Analysts can search for internet browsing activities using a wide range of information, including search terms entered by the user or the websites viewed.</div>
<div>
<figure id="attachment_6822" aria-describedby="caption-attachment-6822" style="width: 460px" class="wp-caption aligncenter"><img loading="lazy" decoding="async" class="size-full wp-image-6822" src="https://goodshepherdmedia.net/wp-content/uploads/2022/12/KS7-001.webp" alt="Photograph: Guardian" width="460" height="329" srcset="https://goodshepherdmedia.net/wp-content/uploads/2022/12/KS7-001.webp 460w, https://goodshepherdmedia.net/wp-content/uploads/2022/12/KS7-001-300x215.webp 300w" sizes="(max-width: 460px) 100vw, 460px" /><figcaption id="caption-attachment-6822" class="wp-caption-text"><em><span style="color: #ff6600;">Photograph: Guardian</span></em></figcaption></figure>
</div>
<div></div>
<div>As one slide indicates, the ability to search HTTP activity by keyword permits the analyst access to what the NSA calls &#8220;nearly everything a typical user does on the internet&#8221;.</div>
<div>
<figure id="attachment_6823" aria-describedby="caption-attachment-6823" style="width: 460px" class="wp-caption aligncenter"><img loading="lazy" decoding="async" class="size-full wp-image-6823" src="https://goodshepherdmedia.net/wp-content/uploads/2022/12/KS8-001.webp" alt="Photograph: Guardian" width="460" height="324" srcset="https://goodshepherdmedia.net/wp-content/uploads/2022/12/KS8-001.webp 460w, https://goodshepherdmedia.net/wp-content/uploads/2022/12/KS8-001-300x211.webp 300w" sizes="(max-width: 460px) 100vw, 460px" /><figcaption id="caption-attachment-6823" class="wp-caption-text"><em><span style="color: #ff6600;">Photograph: Guardian</span></em></figcaption></figure>
</div>
<div></div>
<div>The XKeyscore program also allows an analyst to learn the IP addresses of every person who visits any website the analyst specifies.</div>
<div>
<figure id="attachment_6811" aria-describedby="caption-attachment-6811" style="width: 460px" class="wp-caption aligncenter"><img loading="lazy" decoding="async" class="size-full wp-image-6811" src="https://goodshepherdmedia.net/wp-content/uploads/2022/12/KS9-001.webp" alt="Photograph: Guardian" width="460" height="258" srcset="https://goodshepherdmedia.net/wp-content/uploads/2022/12/KS9-001.webp 460w, https://goodshepherdmedia.net/wp-content/uploads/2022/12/KS9-001-300x168.webp 300w" sizes="(max-width: 460px) 100vw, 460px" /><figcaption id="caption-attachment-6811" class="wp-caption-text"><span style="color: #ff6600;"><em>Photograph: Guardian</em></span></figcaption></figure>
</div>
<div></div>
<div>The quantity of communications accessible through programs such as XKeyscore is staggeringly large. One NSA report from 2007 estimated that there were 850bn &#8220;call events&#8221; collected and stored in the NSA databases, and close to 150bn internet records. Each day, the document says, 1-2bn records were added.</div>
<div>William Binney, a former NSA mathematician, said last year that the agency had &#8220;assembled on the order of 20tn transactions about US citizens with other US citizens&#8221;, an estimate, he said, that &#8220;only was involving phone calls and emails&#8221;. A 2010 Washington Post article reported that &#8220;every day, collection systems at the [NSA] intercept and store 1.7bn emails, phone calls and other type of communications.&#8221;</div>
<div>The XKeyscore system is continuously collecting so much internet data that it can be stored only for short periods of time. Content remains on the system for only three to five days, while metadata is stored for 30 days. One document explains: &#8220;At some sites, the amount of data we receive per day (20+ terabytes) can only be stored for as little as 24 hours.&#8221;</div>
<div>To solve this problem, the NSA has created a multi-tiered system that allows analysts to store &#8220;interesting&#8221; content in other databases, such as one named Pinwale which can store material for up to five years.</div>
<div>It is the databases of XKeyscore, one document shows, that now contain the greatest amount of communications data collected by the NSA.</div>
<div>
<figure id="attachment_6812" aria-describedby="caption-attachment-6812" style="width: 460px" class="wp-caption alignright"><img loading="lazy" decoding="async" class="size-full wp-image-6812" src="https://goodshepherdmedia.net/wp-content/uploads/2022/12/KS10-001.webp" alt="Photograph: Guardian" width="460" height="325" srcset="https://goodshepherdmedia.net/wp-content/uploads/2022/12/KS10-001.webp 460w, https://goodshepherdmedia.net/wp-content/uploads/2022/12/KS10-001-300x212.webp 300w" sizes="(max-width: 460px) 100vw, 460px" /><figcaption id="caption-attachment-6812" class="wp-caption-text"><em><span style="color: #ff6600;">Photograph: Guardian</span></em></figcaption></figure>
</div>
<div>In 2012, there were at least 41 billion total records collected and stored in XKeyscore for a single 30-day period.</div>
<div>
<figure id="attachment_6813" aria-describedby="caption-attachment-6813" style="width: 596px" class="wp-caption alignleft"><img loading="lazy" decoding="async" class=" wp-image-6813" src="https://goodshepherdmedia.net/wp-content/uploads/2022/12/KS11-002.webp" alt="Photograph: Guardian" width="596" height="507" /><figcaption id="caption-attachment-6813" class="wp-caption-text"><em><span style="color: #ff6600;">Photograph: Guardian</span></em></figcaption></figure>
</div>
<div></div>
<div><strong>Legal v technical restrictions</strong></div>
<div>While the Fisa Amendments Act of 2008 requires an individualized warrant for the targeting of US persons, NSA analysts are permitted to intercept the communications of such individuals without a warrant if they are in contact with one of the NSA&#8217;s foreign targets.</div>
<div>The ACLU&#8217;s deputy legal director, Jameel Jaffer, told the Guardian last month that national security officials expressly said that a primary purpose of the new law was to enable them to collect large amounts of Americans&#8217; communications without individualized warrants.</div>
<div>&#8220;The government doesn&#8217;t need to &#8216;target&#8217; Americans in order to collect huge volumes of their communications,&#8221; said Jaffer. &#8220;The government inevitably sweeps up the communications of many Americans&#8221; when targeting foreign nationals for surveillance.</div>
<div>An example is provided by one XKeyscore document showing an NSA target in Tehran communicating with people in Frankfurt, Amsterdam and New York.</div>
<div>
<figure id="attachment_6814" aria-describedby="caption-attachment-6814" style="width: 460px" class="wp-caption alignright"><img loading="lazy" decoding="async" class="size-full wp-image-6814" src="https://goodshepherdmedia.net/wp-content/uploads/2022/12/KS12-001.webp" alt="Photograph: Guardian" width="460" height="257" srcset="https://goodshepherdmedia.net/wp-content/uploads/2022/12/KS12-001.webp 460w, https://goodshepherdmedia.net/wp-content/uploads/2022/12/KS12-001-300x168.webp 300w" sizes="(max-width: 460px) 100vw, 460px" /><figcaption id="caption-attachment-6814" class="wp-caption-text"><em><span style="color: #ff6600;">Photograph: Guardian</span></em></figcaption></figure>
</div>
<div></div>
<div>In recent years, the NSA has attempted to segregate exclusively domestic US communications in separate databases. But even NSA documents acknowledge that such efforts are imperfect, as even purely domestic communications can travel on foreign systems, and NSA tools are sometimes unable to identify the national origins of communications.</div>
<div>Moreover, all communications between Americans and someone on foreign soil are included in the same databases as foreign-to-foreign communications, making them readily searchable without warrants.</div>
<div>Some searches conducted by NSA analysts are periodically reviewed by their supervisors within the NSA. &#8220;It&#8217;s very rare to be questioned on our searches,&#8221; Snowden told the Guardian in June, &#8220;and even when we are, it&#8217;s usually along the lines of: &#8216;let&#8217;s bulk up the justification&#8217;.&#8221;</div>
<div>In a letter this week to senator Ron Wyden, director of national intelligence James Clapper acknowledged that NSA analysts have exceeded even legal limits as interpreted by the NSA in domestic surveillance.</div>
<div>Acknowledging what he called &#8220;a number of compliance problems&#8221;, Clapper attributed them to &#8220;human error&#8221; or &#8220;highly sophisticated technology issues&#8221; rather than &#8220;bad faith&#8221;.</div>
<div>However, Wyden said on the Senate floor on Tuesday: &#8220;These violations are more serious than those stated by the intelligence community, and are troubling.&#8221;</div>
<div>In a statement to the Guardian, the NSA said: &#8220;NSA&#8217;s activities are focused and specifically deployed against – and only against – legitimate foreign intelligence targets in response to requirements that our leaders need for information necessary to protect our nation and its interests.</div>
<div>&#8220;XKeyscore is used as a part of NSA&#8217;s lawful foreign signals intelligence collection system.</div>
<div>&#8220;Allegations of widespread, unchecked analyst access to NSA collection data are simply not true. Access to XKeyscore, as well as all of NSA&#8217;s analytic tools, is limited to only those personnel who require access for their assigned tasks … In addition, there are multiple technical, manual and supervisory checks and balances within the system to prevent deliberate misuse from occurring.&#8221;</div>
<div>&#8220;Every search by an NSA analyst is fully auditable, to ensure that they are proper and within the law.</div>
<div><iframe id="sp_message_iframe_690155" title="SP Consent Message" src="https://sourcepoint.theguardian.com/index.html?message_id=690155&amp;consentUUID=null&amp;requestUUID=fafa7c17-48b5-4fb8-8c26-3cc97bd5c5cc&amp;preload_message=true&amp;hasCsp=true&amp;version=v1" data-mce-fragment="1"></iframe></div>
<div></div>
<div></div>
<div></div>
<div>
<hr />
<h1 class="smart-header__hed smart-header__hed--size-2" style="text-align: center;">XKEYSCORE Spy Program Revealed by Snowden Still a Problem<img loading="lazy" decoding="async" class="alignnone size-full wp-image-6854" src="https://goodshepherdmedia.net/wp-content/uploads/2022/03/1625080118123-gettyimages-1185502935.webp" alt="" width="1000" height="562" srcset="https://goodshepherdmedia.net/wp-content/uploads/2022/03/1625080118123-gettyimages-1185502935.webp 1000w, https://goodshepherdmedia.net/wp-content/uploads/2022/03/1625080118123-gettyimages-1185502935-300x169.webp 300w, https://goodshepherdmedia.net/wp-content/uploads/2022/03/1625080118123-gettyimages-1185502935-768x432.webp 768w" sizes="(max-width: 1000px) 100vw, 1000px" /></h1>
<p style="text-align: center;"><span class="contributor__meta__prefix">By </span><a href="https://www.vice.com/en/contributor/radhamely-de-leon">Radhamely De Leon</a> <a href="https://www.vice.com/en/article/88nmw4/xkeyscore-spy-program-revealed-by-snowden-is-still-a-problem-watchdog-says" target="_blank" rel="noopener">cited</a></p>
<blockquote>
<p style="text-align: center;"><span style="color: #ff0000;"><em>There are still significant privacy issues with an NSA spying program years after Snowden revealed its existence.</em></span></p>
<p>A government watchdog committee is facing criticism for failing to provide sufficient oversight over XKEYSCORE, an NSA surveillance program revealed by Edward Snowden in 2013.</p>
<p>The U.S. Privacy and Civil Liberties Oversight Board (PCLOB) conducted a classified investigation into XKEYSCORE, a highly classified program that the NSA uses to analyze enormous global troves of internet data and communications. That report was delivered late last year to the NSA, Congress, and other executive branch agencies along with recommendations from individual board members. One member of the board who conducted this investigation <a href="https://documents.pclob.gov/prod/Documents/Projects/4b4f65ff-0dba-444b-9c10-7e6b3fce40[%E2%80%A6]21.06.28.Member%20LeBlanc%2012333%20Unclass%20Statement.pdf" target="_blank" rel="noopener">publicly blasted the nature of the board&#8217;s investigation</a> this week, revealing the existence of the report and also blasting it.</p>
<p>“I had hoped that the former majority of the Board would have conducted a more thorough investigation of this highly-classified surveillance program that is unlikely to be scrutinized by another independent oversight authority in the near future,” Travis LeBlanc, a member of the PCLOB wrote, adding that he had &#8220;serious reservations&#8221; with the classified report.</p>
<p>According to a <a href="https://www.theguardian.com/world/interactive/2013/jul/31/nsa-xkeyscore-program-full-presentation" target="_blank" rel="noopener">2008 presentation acquired by </a><em><a href="https://www.theguardian.com/world/interactive/2013/jul/31/nsa-xkeyscore-program-full-presentation" target="_blank" rel="noopener">The Guardian</a></em>, <a href="https://www.vice.com/en/article/d77nvj/snowden-wasnt-lying-the-nsas-xkeyscore-program-can-spy-on-everything-you-do-online-1">XKEYSCORE</a> can collect data from all of its global servers, which at the time spanned 150 locations, using a single query. It can collect metadata from users and also use data from their internet usage to locate them.</p>
<p>LeBlanc writes that, among many things, the report failed to address any algorithmic biases that XKEYSCAPE may have or whether it had the correct compliance procedures in place.</p>
<p>According to LeBlanc, the board “refused” to follow up with any compliance reports that were deemed Questionable Intelligence Activities (QIA), which the Department of Defense defines as an action that resulted in the illegal surveillance or improper review of an individual’s communications. The amount of total QIA’s reported was redacted from the statement.</p>
<p>He also noted that he found it “concerning” that the NSA appeared to not have a written legal analysis until the board requested one in 2015 since these analyses are used to create compliance policies and procedures. The legal analysis that was provided also used decades-old cases to assert that XKEYSCAPE was being used in compliance with the Fourth Amendment.</p>
<p>According to LeBlanc, the board did not do much to investigate the system’s compliance program, which already does not require that analysts receive privacy and civil liberties and compliance training.</p>
<p>The board also failed to investigate the efficacy or cost of the program, which LeBlanc notes is one of the most “basic” parts of an oversight investigation. The 2008 presentation shows that the XKEYSCAPE already had 700 servers across the world but could be scaled even further just by adding more servers. If the NSA has continued to use XKEYSCAPE since then, there’s no telling how much the system has grown or how many people have been affected by its data collection.</p>
<p>“On these points and others, the former Board’s report unfortunately reads more like a book report summary of the XKEYSCORE program than an independent oversight analysis grappling with key concerns in this evolving technological legal landscape,” LeBlanc said in his statement.</p>
<p>LeBlanc urged them to declassify the statement for the sake of transparency as “the public is rightfully worried about secret surveillance programs,” he said.</p>
<p>According to LeBlanc, the board has made no effort to declassify the report.</p></blockquote>
</div>
<hr />
<div>
<blockquote>
<h1 class="jeg_post_title" style="text-align: center;">XKeyScore –</h1>
<h1 class="jeg_post_title" style="text-align: center;">the NSA’s secret tool that collects and reveals</h1>
<h1 class="jeg_post_title" style="text-align: center;">‘nearly everything a user does on the internet’</h1>
<p style="text-align: center;"><span class="meta_text">by</span> <a href="https://www.zmescience.com/author/tibipuiu/">Tibi Puiu</a> <a href="https://www.zmescience.com/research/discoveries/xkeyscore-the-nsas-secret-tool-mass-spying-02432/" target="_blank" rel="noopener">cited</a></p>
<div class="dcr-1yi1cnj" data-gu-name="standfirst">
<div class=" dcr-iuxtqj">
<div class="dcr-ch7w1w" data-gu-name="body">
<div class="dcr-i7zira">
<div id="maincontent" class="dcr-1ncmr12">
<div class="article-body-commercial-selector article-body-viewer-selector dcr-1vqv39r">
<div id="dfp-ad--carrot" class="js-ad-slot ad-slot ad-slot--carrot" data-link-name="ad slot carrot" data-name="carrot" aria-hidden="true" data-label="false" data-refresh="false">
<div id="google_ads_iframe_/59666047/theguardian.com/us-news/article/ng_16__container__">
<blockquote><p>The waves of controversy and outrage following former CIA and NSA technical officer <a href="http://www.boomerangbeat.com/what-is-the-nsa-controversy-and-what-did-edward-snowden-leak/">Edward Snowden’s leaks</a> of details that reveal the US and British governments had been secretly deploying mass<img loading="lazy" decoding="async" class="wp-image-6849 alignright" src="https://goodshepherdmedia.net/wp-content/uploads/2022/11/623c424c9a5b73d5378c225f_Cyber-spies-3.jpg" alt="" width="555" height="350" srcset="https://goodshepherdmedia.net/wp-content/uploads/2022/11/623c424c9a5b73d5378c225f_Cyber-spies-3.jpg 1309w, https://goodshepherdmedia.net/wp-content/uploads/2022/11/623c424c9a5b73d5378c225f_Cyber-spies-3-300x189.jpg 300w, https://goodshepherdmedia.net/wp-content/uploads/2022/11/623c424c9a5b73d5378c225f_Cyber-spies-3-1024x646.jpg 1024w, https://goodshepherdmedia.net/wp-content/uploads/2022/11/623c424c9a5b73d5378c225f_Cyber-spies-3-768x485.jpg 768w" sizes="(max-width: 555px) 100vw, 555px" /> surveillance programs on their citizens are far from over. Recently further details as to the extent and reach these programs possess have been uncovered, after a top secret National Security Agency program called <strong>XKeyScore</strong> was recently presented to the general public.</p>
<blockquote><p>“I, sitting at my desk,” said Snowden, could “wiretap anyone, from you or your accountant, to a federal judge or even the president, if I had a personal email”.</p></blockquote>
<p>This statement made a lot of people at Washington unhappy, and unsurprising Snowden’s claim was quickly refuted by officials. On another note, Snowden – a whistle-blower and hero by one side, and a dangerous traitor from another – is <a href="http://www.policymic.com/articles/47673/snowden-nsa-leak-what-happens-to-edward-snowden-now">currently residing</a> in Moscow, Russia, after fleeing the US via Hong Kong.</p>
<p>Wouldn’t you know it, however, most recently training files for a secret software called XKeyScore have been leaked which show and demonstrate that any analyst has access to a user’s internet history (e-mails, phone number, browsing, chats, just about anything) WITHOUT the need for a warrant. US laws dictates that the NSA is required to obtain an individualized <a href="http://en.wikipedia.org/wiki/Foreign_Intelligence_Surveillance_Act">Fisa warrant</a> only if the target of their surveillance is a ‘US person’, however XKeyScore offers the technological capabilities (legal authority is blurry) for an analyst to perform any kind of digital surveillance on any user, US citizen or otherwise.These training files show how an analyst can easily access just about any digital history for a particular user through a simple point and click interface that can return valuable and relevant information to their queries. The request is not reviewed by a court or any NSA personnel before it is processed.XKeyScore has access to such a wealth of information that the analyst can retrieve relevant information simply by searching using one or a combination of the following: name, telephone number, IP address, keywords, the language in which the internet activity was conducted or the type of browser used. E-mail is of little interest, since much of the activity on the web is anonymous.The NSA documents assert that by 2008, 300 terrorists had been captured using intelligence from XKeyscore.The XKeyscore program also allows an analyst to learn the IP addresses of every person who visits any website the analyst specifies. As one slide indicates, the ability to search HTTP activity by keyword permits the analyst access to what the NSA calls “nearly everything a typical user does on the internet”.</p>
<p>It’s all very easy. For instance, Snowden, who was authorized to use XKeyScore, recalls that to search for emails, an analyst using XKS enters the individual’s email address into a simple online search form, along with the “justification” for the search and the time period for which the emails are sought.</p>
<p>What this means – and these latest insights come as a confirmation – is that the NSA and surrounding agencies are storing immense amounts of data. One NSA report from 2007 estimated that there were 850bn “call events” collected and stored in the NSA databases, and close to 150bn internet records. Each day, the document says, 1-2bn records were added ( emails, phone calls and other type of communications). William Binney, a former NSA mathematician, said last year that the agency had “assembled on the order of 20 trillion transactions about U.S. citizens with other U.S. citizens,” an estimate, he said, that “only was involving phone calls and emails.”</p>
<p>A few years ago, <a href="https://www.zmescience.com/research/inventions/ibm-is-building-the-largest-data-array-in-the-world-120-petabytes-of-storage/">I reported</a> on ZME Science on the matter that IBM was planning to build the largest data array in the world capable of storing 120 petabytes – 60 downloads of the entire internet or 10 times bigger than any other data center in the world at present date. The contractor is unknown, but it’s easy to guess who. ZME Science also reported how <a href="https://www.zmescience.com/other/every-six-hours-the-nsa-collects-data-the-size-of-the-library-of-congress-423434/">every six hours the NSA collects data the size of the Library of Congress</a>.</p>
<p>Still, even with these resources the NSA can’t store all your data for too long, considering the humongous amount of internet connections. Content remains on the system for only three to five days, while metadata is stored for 30 days. One document explains: “At some sites, the amount of data we receive per day (20+ terabytes) can only be stored for as little as 24 hours.” In 2012, there were at least 41 billion total records collected and stored in XKeyscore for a single 30-day period.</p>
<p>In a statement to <a href="http://www.theguardian.com/world/2013/jul/31/nsa-top-secret-program-online-data">the Guardian, </a>the NSA said:</p>
<blockquote><p>“NSA’s activities are focused and specifically deployed against – and only against – legitimate foreign intelligence targets in response to requirements that our leaders need for information necessary to protect our nation and its interests.”</p>
<p>“XKeyscore is used as a part of NSA’s lawful foreign signals intelligence collection system.</p>
<p>“Allegations of widespread, unchecked analyst access to NSA collection data are simply not true. Access to XKeyscore, as well as all of NSA’s analytic tools, is limited to only those personnel who require access for their assigned tasks … In addition, there are multiple technical, manual and supervisory checks and balances within the system to prevent deliberate misuse from occurring.”</p>
<p>“Every search by an NSA analyst is fully auditable, to ensure that they are proper and within the law.</p>
<p>“These types of programs allow us to collect the information that enables us to perform our missions successfully – to defend the nation and to protect US and allied troops abroad.”</p></blockquote>
</blockquote>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</blockquote>
</div>
<p>&nbsp;</p>
<ul>
<li><a href="https://www.cryptomuseum.com/intel/nsa/index.htm#inter" target="_blank" rel="noopener">NSA-backdoored equipment info found OFF this website</a></li>
<li><a href="https://goodshepherdmedia.net/u-s-government-catalogue-of-cellphone-surveillance-devices-used-by-the-military-and-by-cia-nsa-fbi-and-other-intelligence-agencies/" target="_blank" rel="noopener">U.S. Government Catalogue of Cellphone Surveillance Devices</a></li>
<li><a href="https://en.wikipedia.org/wiki/Backdoor_(computing)" target="_blank" rel="noopener">Backdoors on Wikipedia</a></li>
<li><a href="https://goodshepherdmedia.net/nsa-national-security-agency/" target="_blank" rel="noopener">National Security Agency</a></li>
<li><a href="https://goodshepherdmedia.net/cia-central-intelligence-agency/" target="_blank" rel="noopener">Central Intelligence Agency</a></li>
<li><a href="https://nsa.gov1.info/dni/index.html" target="_blank" rel="noopener">NSA EXTRACTED INFO</a></li>
<li><a href="https://www.cryptomuseum.com/" target="_blank" rel="noopener">CRYPTO MUSEUM</a></li>
<li><a href="https://goodshepherdmedia.net/edward-snowden-nsa-whistleblower/" target="_blank" rel="noopener">Edward Snowden</a></li>
<li><a href="https://goodshepherdmedia.net/can-cops-secretly-listen-to-my-phone-how-cops-can-secretly-track-your-phone/" target="_blank" rel="noopener">Stingray</a></li>
<li><a href="https://goodshepherdmedia.net/fbi-vows-not-to-use-pegasus-spyware-after-grilling-from-capitol-hill/" target="_blank" rel="noopener">Pegasus Spyware</a></li>
<li><a href="https://goodshepherdmedia.net/x-keyscore-allows-the-nsa-and-allies-to-monitor-emails-web-browsing-internet-searches-and-social-media/" target="_blank" rel="noopener">X-Keyscore</a></li>
</ul>
<hr />
<h3 style="text-align: center;">Check out our article on the NSA SPYING SOFTWARE for CELL PHONES called Pegasus &#8211; <a href="https://goodshepherdmedia.net/fbi-vows-not-to-use-pegasus-spyware-after-grilling-from-capitol-hill/" target="_blank" rel="noopener">Pegasus spyware: FBI vows not to use after grilling from Capitol Hill</a></h3>
<p>&nbsp;</p>
<p><iframe title="Exposed: Secret Government Surveillance Tools They DON&#039;T Want You to Know About!" width="640" height="360" src="https://www.youtube.com/embed/iRYji0Q2K30?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Trump signs executive actions on Jan. 6, TikTok, immigration and more</title>
		<link>https://goodshepherdmedia.net/trump-signs-executive-actions-on-jan-6-tiktok-immigration-and-more/</link>
		
		<dc:creator><![CDATA[The Truth News]]></dc:creator>
		<pubDate>Tue, 21 Jan 2025 01:20:07 +0000</pubDate>
				<category><![CDATA[⚠️Breaking News⚠️]]></category>
		<category><![CDATA[10th Amendment]]></category>
		<category><![CDATA[14th Amendment]]></category>
		<category><![CDATA[1st Amendment]]></category>
		<category><![CDATA[2024 Election]]></category>
		<category><![CDATA[2nd Amendment]]></category>
		<category><![CDATA[4th Amendment]]></category>
		<category><![CDATA[Appellate]]></category>
		<category><![CDATA[Biden Corruption]]></category>
		<category><![CDATA[Clearing Up Record]]></category>
		<category><![CDATA[Community Hero's]]></category>
		<category><![CDATA[Corruption Over the Years]]></category>
		<category><![CDATA[Criminal Appeal]]></category>
		<category><![CDATA[Government Spying]]></category>
		<category><![CDATA[Guilty Parties & Co-Conspirators]]></category>
		<category><![CDATA[Laws]]></category>
		<category><![CDATA[Legal News The Motivation]]></category>
		<category><![CDATA[North America]]></category>
		<category><![CDATA[Politicians]]></category>
		<category><![CDATA[Politics]]></category>
		<category><![CDATA[Presidential Elections]]></category>
		<category><![CDATA[Rights]]></category>
		<category><![CDATA[Self Help]]></category>
		<category><![CDATA[Supreme Court - SCOTUS]]></category>
		<category><![CDATA[Top Stories]]></category>
		<category><![CDATA[United States 🇺🇸]]></category>
		<category><![CDATA[Zee Truthful News]]></category>
		<category><![CDATA[🌍World Stage🌍]]></category>
		<category><![CDATA[🌞On This Day!🌞]]></category>
		<category><![CDATA[Restore the death penalty]]></category>
		<category><![CDATA[Trump signs executive actions]]></category>
		<category><![CDATA[Weaponization of government]]></category>
		<guid isPermaLink="false">https://goodshepherdmedia.net/?p=19296</guid>

					<description><![CDATA[President Donald Trump signed a series of executive orders on his first day back in office, promising swift changes while restoring the nation&#8217;s prominence in the world. During a celebration inside the Capital One Arena with supporters, Trump signed an executive order to withdraw the United States from the Paris Climate Agreement. Trump went on [&#8230;]]]></description>
										<content:encoded><![CDATA[<h1 class="EkqkG IGXmU nlgHS yuUao MvWXB TjIXL aGjvy ebVHC ">President Donald Trump signed a series of executive orders on his first day back in office, promising swift changes while restoring the nation&#8217;s prominence in the world.</h1>
<p class="EkqkG IGXmU nlgHS yuUao lqtkC TjIXL aGjvy ">During a celebration inside the Capital One Arena with supporters, Trump signed an executive order to withdraw the United States from the Paris Climate Agreement.</p>
<p class="EkqkG IGXmU nlgHS yuUao lqtkC TjIXL aGjvy ">Trump went on to declare a national emergency on the Southern Border while designating criminal cartels as terror groups.</p>
<p class="EkqkG IGXmU nlgHS yuUao lqtkC TjIXL aGjvy ">He also signed an executive order to bring an end to birthright citizenship for children born to undocumented parents.</p>
<p class="EkqkG IGXmU nlgHS yuUao lqtkC TjIXL aGjvy ">After stepping back into the Oval Office, the 47th president pardoned more than 1,500 people who were charged with storming the US Capitol on January 6, 2021.</p>
<p class="EkqkG IGXmU nlgHS yuUao lqtkC TjIXL aGjvy ">That included commuting the sentences of those convicted.</p>
<p class="EkqkG IGXmU nlgHS yuUao lqtkC TjIXL aGjvy ">Among the other orders President Trump signed on Monday was the renaming of the Gulf of Mexico to the Gulf of America.</p>
<p class="EkqkG IGXmU nlgHS yuUao lqtkC TjIXL aGjvy ">Trump also signed an executive order to delay the ban on TikTok for 75 days.</p>
<p class="EkqkG IGXmU nlgHS yuUao lqtkC TjIXL aGjvy ">The ban on the social media app went into effect on Sunday and TikTok went dark for several hours Saturday night.</p>
<p class="EkqkG IGXmU nlgHS yuUao lqtkC TjIXL aGjvy "><strong class="vtkaO "><em class=" ">You can find the full list of executive orders signed by President Trump during his first day in office, below:</em></strong></p>
<p class="EkqkG IGXmU nlgHS yuUao lqtkC TjIXL aGjvy ">&#8211; <a class="zZygg UbGlr iFzkS qdXbA WCDhQ DbOXS tqUtK GpWVU iJYzE " href="https://www.whitehouse.gov/presidential-actions/2025/01/restoring-names-that-honor-american-greatness/" data-testid="prism-linkbase">Reinstating the name Mount McKinley</a></p>
<p class="EkqkG IGXmU nlgHS yuUao lqtkC TjIXL aGjvy ">&#8211; <a class="zZygg UbGlr iFzkS qdXbA WCDhQ DbOXS tqUtK GpWVU iJYzE " href="https://www.whitehouse.gov/presidential-actions/2025/01/restoring-names-that-honor-american-greatness/" data-testid="prism-linkbase">Renaming Gulf of Mexico to Gulf of America</a></p>
<p class="EkqkG IGXmU nlgHS yuUao lqtkC TjIXL aGjvy ">&#8211; <a class="zZygg UbGlr iFzkS qdXbA WCDhQ DbOXS tqUtK GpWVU iJYzE " href="https://www.whitehouse.gov/presidential-actions/2025/01/designating-cartels-and-other-organizations-as-foreign-terrorist-organizations-and-specially-designated-global-terrorists/" data-testid="prism-linkbase">Designating Cartels as foreign terrorist organizations</a></p>
<p class="EkqkG IGXmU nlgHS yuUao lqtkC TjIXL aGjvy ">&#8211; <a class="zZygg UbGlr iFzkS qdXbA WCDhQ DbOXS tqUtK GpWVU iJYzE " href="https://www.whitehouse.gov/presidential-actions/2025/01/reforming-the-federal-hiring-process-and-restoring-merit-to-government-service/" data-testid="prism-linkbase">Ending diversity, inclusion, and equity hiring in the federal government</a></p>
<p class="EkqkG IGXmU nlgHS yuUao lqtkC TjIXL aGjvy ">&#8211; <a class="zZygg UbGlr iFzkS qdXbA WCDhQ DbOXS tqUtK GpWVU iJYzE " href="https://www.whitehouse.gov/presidential-actions/2025/01/temporary-withdrawal-of-all-areas-on-the-outer-continental-shelf-from-offshore-wind-leasing-and-review-of-the-federal-governments-leasing-and-permitting-practices-for-wind-projects/" data-testid="prism-linkbase">Temporary withdrawal of all areas on the Outer Continental Shelf from Offshore Wind Leasing\</a></p>
<p class="EkqkG IGXmU nlgHS yuUao lqtkC TjIXL aGjvy ">&#8211; <a class="zZygg UbGlr iFzkS qdXbA WCDhQ DbOXS tqUtK GpWVU iJYzE " href="https://www.whitehouse.gov/presidential-actions/2025/01/holding-former-government-officials-accountablefor-election-interference-and-improper-disclosure-of-sensitive-governmental-information/" data-testid="prism-linkbase">Revocation of any active or current security clearances held by the former intelligence officials involved with &#8220;inappropriate political coordination with the 2020 Biden presidential campaign&#8221; and John R. Bolton</a></p>
<p class="EkqkG IGXmU nlgHS yuUao lqtkC TjIXL aGjvy ">&#8211; <a class="zZygg UbGlr iFzkS qdXbA WCDhQ DbOXS tqUtK GpWVU iJYzE " href="https://www.whitehouse.gov/presidential-actions/2025/01/granting-pardons-and-commutation-of-sentences-for-certain-offenses-relating-to-the-events-at-or-near-the-united-states-capitol-on-january-6-2021/" data-testid="prism-linkbase">Granting pardons for January 6 rioters</a></p>
<p class="EkqkG IGXmU nlgHS yuUao lqtkC TjIXL aGjvy ">&#8211; <a class="zZygg UbGlr iFzkS qdXbA WCDhQ DbOXS tqUtK GpWVU iJYzE " href="https://www.whitehouse.gov/presidential-actions/2025/01/reevaluating-and-realigning-united-states-foreign-aid/" data-testid="prism-linkbase">Reevaluating United States foreign aid</a></p>
<p class="EkqkG IGXmU nlgHS yuUao lqtkC TjIXL aGjvy ">&#8211; <a class="zZygg UbGlr iFzkS qdXbA WCDhQ DbOXS tqUtK GpWVU iJYzE " href="https://www.whitehouse.gov/presidential-actions/2025/01/declaring-a-national-energy-emergency/" data-testid="prism-linkbase">Declaring a national energy emergency</a></p>
<p class="EkqkG IGXmU nlgHS yuUao lqtkC TjIXL aGjvy ">&#8211; <a class="zZygg UbGlr iFzkS qdXbA WCDhQ DbOXS tqUtK GpWVU iJYzE " href="https://www.whitehouse.gov/presidential-actions/2025/01/restoring-accountability-for-career-senior-executives/" data-testid="prism-linkbase">Restoring accountability for career senior executives</a></p>
<p class="EkqkG IGXmU nlgHS yuUao lqtkC TjIXL aGjvy ">&#8211; <a class="zZygg UbGlr iFzkS qdXbA WCDhQ DbOXS tqUtK GpWVU iJYzE " href="https://www.whitehouse.gov/presidential-actions/2025/01/promoting-beautiful-federal-civic-architecture/" data-testid="prism-linkbase">Promoting beautiful federal civic architecture</a></p>
<p class="EkqkG IGXmU nlgHS yuUao lqtkC TjIXL aGjvy ">&#8211; <a class="zZygg UbGlr iFzkS qdXbA WCDhQ DbOXS tqUtK GpWVU iJYzE " href="https://www.whitehouse.gov/presidential-actions/2025/01/restoring-the-death-penalty-and-protecting-public-safety/" data-testid="prism-linkbase">Restoring the death penalty in the US</a></p>
<p class="EkqkG IGXmU nlgHS yuUao lqtkC TjIXL aGjvy ">&#8211; <a class="zZygg UbGlr iFzkS qdXbA WCDhQ DbOXS tqUtK GpWVU iJYzE " href="https://www.whitehouse.gov/presidential-actions/2025/01/putting-people-over-fish-stopping-radical-environmentalism-to-provide-water-to-southern-california/" data-testid="prism-linkbase">Routing more water from the Sacramento-San Joaquin Delta to other parts of California</a></p>
<p class="EkqkG IGXmU nlgHS yuUao lqtkC TjIXL aGjvy ">&#8211; <a class="zZygg UbGlr iFzkS qdXbA WCDhQ DbOXS tqUtK GpWVU iJYzE " href="https://www.whitehouse.gov/presidential-actions/2025/01/securing-our-borders/" data-testid="prism-linkbase">Securing the United State&#8217;s borders</a></p>
<p class="EkqkG IGXmU nlgHS yuUao lqtkC TjIXL aGjvy ">&#8211; <a class="zZygg UbGlr iFzkS qdXbA WCDhQ DbOXS tqUtK GpWVU iJYzE " href="https://www.whitehouse.gov/presidential-actions/2025/01/protecting-the-meaning-and-value-of-american-citizenship/" data-testid="prism-linkbase">United States citizenship does not automatically extend to those born in the United States</a></p>
<p class="EkqkG IGXmU nlgHS yuUao lqtkC TjIXL aGjvy ">&#8211; <a class="zZygg UbGlr iFzkS qdXbA WCDhQ DbOXS tqUtK GpWVU iJYzE " href="https://www.whitehouse.gov/presidential-actions/2025/01/realigning-the-united-states-refugee-admissions-program/" data-testid="prism-linkbase">Realignment of the U.S. Refugee Admissions Program</a></p>
<p class="EkqkG IGXmU nlgHS yuUao lqtkC TjIXL aGjvy ">&#8211; <a class="zZygg UbGlr iFzkS qdXbA WCDhQ DbOXS tqUtK GpWVU iJYzE " href="https://www.whitehouse.gov/presidential-actions/2025/01/unleashing-american-energy/" data-testid="prism-linkbase">Unleashing America&#8217;s affordable and reliable energy and natural resources</a></p>
<p class="EkqkG IGXmU nlgHS yuUao lqtkC TjIXL aGjvy ">&#8211; <a class="zZygg UbGlr iFzkS qdXbA WCDhQ DbOXS tqUtK GpWVU iJYzE " href="https://www.whitehouse.gov/presidential-actions/2025/01/clarifying-the-militarys-role-in-protecting-the-territorial-integrity-of-the-united-states/" data-testid="prism-linkbase">Clarifying the military&#8217;s role in protecting the US borders</a></p>
<p class="EkqkG IGXmU nlgHS yuUao lqtkC TjIXL aGjvy ">&#8211; <a class="zZygg UbGlr iFzkS qdXbA WCDhQ DbOXS tqUtK GpWVU iJYzE " href="https://www.whitehouse.gov/presidential-actions/2025/01/america-first-trade-policy/" data-testid="prism-linkbase">&#8216;America First&#8217; trade policy that benefits American workers, manufacturers, farmers, ranchers, entrepreneurs, and businesses</a></p>
<p class="EkqkG IGXmU nlgHS yuUao lqtkC TjIXL aGjvy ">&#8211; <a class="zZygg UbGlr iFzkS qdXbA WCDhQ DbOXS tqUtK GpWVU iJYzE " href="https://www.whitehouse.gov/presidential-actions/2025/01/memorandum-to-resolve-the-backlog-of-security-clearances-for-executive-office-of-the-president-personnel/" data-testid="prism-linkbase">Resolving the backlog of security clearances for Executive Office of the President</a></p>
<p class="EkqkG IGXmU nlgHS yuUao lqtkC TjIXL aGjvy ">&#8211; <a class="zZygg UbGlr iFzkS qdXbA WCDhQ DbOXS tqUtK GpWVU iJYzE " href="https://www.whitehouse.gov/presidential-actions/2025/01/restoring-accountability-to-policy-influencing-positions-within-the-federal-workforce/" data-testid="prism-linkbase">Restoring accountability to policy-influence positions within the federal workforce</a></p>
<p class="EkqkG IGXmU nlgHS yuUao lqtkC TjIXL aGjvy ">&#8211; <a class="zZygg UbGlr iFzkS qdXbA WCDhQ DbOXS tqUtK GpWVU iJYzE " href="https://www.whitehouse.gov/presidential-actions/2025/01/withdrawing-the-united-states-from-the-worldhealth-organization/" data-testid="prism-linkbase">Withdrawing the US from the World Health Organization</a></p>
<p class="EkqkG IGXmU nlgHS yuUao lqtkC TjIXL aGjvy ">&#8211; <a class="zZygg UbGlr iFzkS qdXbA WCDhQ DbOXS tqUtK GpWVU iJYzE " href="https://www.whitehouse.gov/presidential-actions/2025/01/application-of-protecting-americans-from-foreign-adversary-controlled-applications-act-to-tiktok/" data-testid="prism-linkbase">Delaying TikTok ban for 75 days</a></p>
<p class="EkqkG IGXmU nlgHS yuUao lqtkC TjIXL aGjvy ">&#8211; <a class="zZygg UbGlr iFzkS qdXbA WCDhQ DbOXS tqUtK GpWVU iJYzE " href="https://www.whitehouse.gov/presidential-actions/2025/01/putting-america-first-in-international-environmental-agreements/" data-testid="prism-linkbase">Putting America First in international environmental agreements</a></p>
<p class="EkqkG IGXmU nlgHS yuUao lqtkC TjIXL aGjvy ">&#8211; <a class="zZygg UbGlr iFzkS qdXbA WCDhQ DbOXS tqUtK GpWVU iJYzE " href="https://www.whitehouse.gov/presidential-actions/2025/01/delivering-emergency-price-relief-for-american-families-and-defeating-the-cost-of-living-crisis/" data-testid="prism-linkbase">Deliver emergency price relief to the American people</a></p>
<p class="EkqkG IGXmU nlgHS yuUao lqtkC TjIXL aGjvy ">&#8211; <a class="zZygg UbGlr iFzkS qdXbA WCDhQ DbOXS tqUtK GpWVU iJYzE " href="https://www.whitehouse.gov/presidential-actions/2025/01/hiring-freeze/" data-testid="prism-linkbase">Hiring freeze for federal civilian employees (does not apply to military personnel of the armed forces or to positions related to immigration enforcement, national security, or public safety)</a></p>
<p class="EkqkG IGXmU nlgHS yuUao lqtkC TjIXL aGjvy ">&#8211; <a class="zZygg UbGlr iFzkS qdXbA WCDhQ DbOXS tqUtK GpWVU iJYzE " href="https://www.whitehouse.gov/presidential-actions/2025/01/regulatory-freeze-pending-review/" data-testid="prism-linkbase">Regulatory freeze pending review</a></p>
<p class="EkqkG IGXmU nlgHS yuUao lqtkC TjIXL aGjvy "><span style="color: #0000ff;"><strong>&#8211; <a class="zZygg UbGlr iFzkS qdXbA WCDhQ DbOXS tqUtK GpWVU iJYzE " style="color: #0000ff;" href="https://www.whitehouse.gov/presidential-actions/2025/01/restoring-freedom-of-speech-and-ending-federal-censorship/" data-testid="prism-linkbase">Restoring freedom of speech and ending federal censorship</a></strong></span></p>
<p class="EkqkG IGXmU nlgHS yuUao lqtkC TjIXL aGjvy ">&#8211; <a class="zZygg UbGlr iFzkS qdXbA WCDhQ DbOXS tqUtK GpWVU iJYzE " href="https://www.whitehouse.gov/presidential-actions/2025/01/initial-rescissions-of-harmful-executive-orders-and-actions/" data-testid="prism-linkbase">Recissions of dozens of executive orders and actions from Biden administration</a></p>
<p class="EkqkG IGXmU nlgHS yuUao lqtkC TjIXL aGjvy ">&#8211; <a class="zZygg UbGlr iFzkS qdXbA WCDhQ DbOXS tqUtK GpWVU iJYzE " href="https://www.whitehouse.gov/presidential-actions/2025/01/ending-radical-and-wasteful-government-dei-programs-and-preferencing/" data-testid="prism-linkbase">Ending diversity, equity, and inclusion (DEI) programs in the federal government</a></p>
<p class="EkqkG IGXmU nlgHS yuUao lqtkC TjIXL aGjvy ">&#8211; <a class="zZygg UbGlr iFzkS qdXbA WCDhQ DbOXS tqUtK GpWVU iJYzE " href="https://www.whitehouse.gov/presidential-actions/2025/01/defending-women-from-gender-ideology-extremism-and-restoring-biological-truth-to-the-federal-government/" data-testid="prism-linkbase">Only two sexes, male and female, to be recognized by the federal government</a></p>
<p class="EkqkG IGXmU nlgHS yuUao lqtkC TjIXL aGjvy ">&#8211; <a class="zZygg UbGlr iFzkS qdXbA WCDhQ DbOXS tqUtK GpWVU iJYzE " href="https://www.whitehouse.gov/presidential-actions/2025/01/establishing-and-implementing-the-presidents-department-of-government-efficiency/" data-testid="prism-linkbase">Department of Government Efficiency to implement the president&#8217;s DOGE Agenda</a></p>
<p class="EkqkG IGXmU nlgHS yuUao lqtkC TjIXL aGjvy ">&#8211; <a class="zZygg UbGlr iFzkS qdXbA WCDhQ DbOXS tqUtK GpWVU iJYzE " href="https://www.whitehouse.gov/presidential-actions/2025/01/america-first-policy-directive-to-the-secretary-of-state/" data-testid="prism-linkbase">Putting America and its interests first in foreign policy</a></p>
<p class="EkqkG IGXmU nlgHS yuUao lqtkC TjIXL aGjvy ">&#8211; <a class="zZygg UbGlr iFzkS qdXbA WCDhQ DbOXS tqUtK GpWVU iJYzE " href="https://www.whitehouse.gov/presidential-actions/2025/01/protecting-the-united-states-from-foreign-terrorists-and-othernational-security-and-public-safety-threats/" data-testid="prism-linkbase">Protecting US citizens from terrorist attacks and threats</a></p>
<p class="EkqkG IGXmU nlgHS yuUao lqtkC TjIXL aGjvy ">&#8211; <a class="zZygg UbGlr iFzkS qdXbA WCDhQ DbOXS tqUtK GpWVU iJYzE " href="https://www.whitehouse.gov/presidential-actions/2025/01/unleashing-alaskas-extraordinary-resource-potential/" data-testid="prism-linkbase">Tapping into the vast natural resources, energy, and seafood in Alaska</a></p>
<p class="EkqkG IGXmU nlgHS yuUao lqtkC TjIXL aGjvy ">&#8211; <a class="zZygg UbGlr iFzkS qdXbA WCDhQ DbOXS tqUtK GpWVU iJYzE " href="https://www.whitehouse.gov/presidential-actions/2025/01/protecting-the-american-people-against-invasion/" data-testid="prism-linkbase">Ensuring the federal government carries out United State&#8217;s immigration laws</a></p>
<p class="EkqkG IGXmU nlgHS yuUao lqtkC TjIXL aGjvy ">&#8211; <a class="zZygg UbGlr iFzkS qdXbA WCDhQ DbOXS tqUtK GpWVU iJYzE " href="https://www.whitehouse.gov/presidential-actions/2025/01/putting-america-first-in-international-environmental-agreements/?_nlid=fC3gjmaqbj&amp;_nhids=5p84hZMr" data-testid="prism-linkbase">Pulling the US from the Paris Agreement</a></p>
<p class="EkqkG IGXmU nlgHS yuUao lqtkC TjIXL aGjvy ">&#8211; <a class="zZygg UbGlr iFzkS qdXbA WCDhQ DbOXS tqUtK GpWVU iJYzE " href="https://www.whitehouse.gov/presidential-actions/2025/01/declaring-a-national-emergency-at-the-southern-border-of-the-united-states/?_nlid=zqGX69n3mK&amp;_nhids=5p84hZMr" data-testid="prism-linkbase">Declaring a National Emergency at the Southern Border of the United States</a></p>
<p class="EkqkG IGXmU nlgHS yuUao lqtkC TjIXL aGjvy ">&#8211; <a class="zZygg UbGlr iFzkS qdXbA WCDhQ DbOXS tqUtK GpWVU iJYzE " href="https://www.whitehouse.gov/presidential-actions/2025/01/the-organization-for-economic-co-operation-and-development-oecd-global-tax-deal-global-tax-deal/" data-testid="prism-linkbase">Pulling the US out of the global corporate tax deal secured by Biden</a></p>
<p class="EkqkG IGXmU nlgHS yuUao lqtkC eTIW sUzSN ">&#8211; <a class="zZygg UbGlr iFzkS qdXbA WCDhQ DbOXS tqUtK GpWVU iJYzE " href="https://www.whitehouse.gov/presidential-actions/2025/01/organization-of-the-national-security-council-and-subcommittees/" data-testid="prism-linkbase">Organization of the National Security Council and subcommittees</a></p>
<p><a href="https://www.whitehouse.gov/presidential-actions/2025/01/restoring-freedom-of-speech-and-ending-federal-censorship/" target="_blank" rel="noopener">source</a></p>
<hr />
<h1 style="text-align: center;"><span style="color: #0000ff;">Trump signs executive actions on Jan. 6, TikTok, immigration and more</span></h1>
<p>President Trump on Monday signed a flurry of executive orders, memorandums and proclamations after his inauguration, reversing many of his predecessors&#8217; policies and reinstating actions from his first term in office.</p>
<p>He signed the first batch in front of a packed crowd at Capital One Arena, drawing cheers, before then moving to the Oval Office to sign more.</p>
<p>Trump and his officials also signaled a slew of other executive actions to come soon, ranging from campaign priorities like <a href="https://www.npr.org/2025/01/20/g-s1-43650/trump-inauguration-day-one-immigration" target="_blank" rel="noopener">border security</a> to culture war issues like <a href="https://www.npr.org/2025/01/20/g-s1-43697/trump-will-sign-orders-today-defining-sex-and-ending-dei-programs-official-says">DEI policies</a>.</p>
<p>Here are some of the key orders either signed or signaled on Monday.</p>
<div class="hr">Jan. 6 pardons</div>
<p>Trump issued pardons Monday for some 1,500 defendants who participated in the <a href="https://www.npr.org/2025/01/20/g-s1-36809/trump-pardons-january-6-riot" target="_blank" rel="noopener">siege on the U.S. Capitol</a> four years ago, wiping away scores of convictions for people who helped delay the certification of the 2020 election and upend the peaceful transfer of power. Those pardoned include rioters convicted of violence against police.</p>
<aside id="ad-backstage-wrap" class="ad-wrap backstage visible" aria-label="advertisement">
<div class="ad-header ">
<p>Enrique Tarrio — the former head of the far-right Proud Boys, who had been sentenced to 22 years in federal prison — also received a pardon.</p>
<p>In addition Trump commuted the sentences of <a href="https://www.whitehouse.gov/presidential-actions/2025/01/granting-pardons-and-commutation-of-sentences-for-certain-offenses-relating-to-the-events-at-or-near-the-united-states-capitol-on-january-6-2021/" target="_blank" rel="noopener">14 people</a>, including Stewart Rhodes, the founder of the far-right Oath Keepers group.</p>
<p>Trump also directed the Justice Department to dismiss pending cases that stem from the attack on the Capitol.</p>
<h3 class="edTag">Pausing the TikTok ban</h3>
<p>Trump signed an order pausing a law that would ban the mega-popular social media app TikTok unless its China-based parent company spun off its U.S.-based operations.</p>
<div id="resg-s1-43698-101" class="bucketwrap internallink insettwocolumn inset2col ">
<div class="bucket img"><a id="featuredStackSquareImagenx-s1-5268701" class="imagewrap" href="https://www.npr.org/2025/01/20/nx-s1-5268701/trump-executive-order-tiktok-ban" data-metrics-ga4="{&quot;category&quot;:&quot;recirculation&quot;,&quot;action&quot;:&quot;story_recirculation_click&quot;,&quot;clickType&quot;:&quot;inset box&quot;,&quot;clickUrl&quot;:&quot;https:\/\/www.npr.org\/2025\/01\/20\/nx-s1-5268701\/trump-executive-order-tiktok-ban&quot;}"><picture><source class="img" srcset="https://npr.brightspotcdn.com/dims3/default/strip/false/crop/3423x3423+856+0/resize/200/quality/85/format/webp/?url=http%3A%2F%2Fnpr-brightspot.s3.amazonaws.com%2Ffc%2F94%2F16ddf4264d82b1e7f700e943a0f0%2Fap25017790600456.jpg" type="image/webp" data-template="https://npr.brightspotcdn.com/dims3/default/strip/false/crop/3423x3423+856+0/resize/{width}/quality/{quality}/format/{format}/?url=http%3A%2F%2Fnpr-brightspot.s3.amazonaws.com%2Ffc%2F94%2F16ddf4264d82b1e7f700e943a0f0%2Fap25017790600456.jpg" data-format="webp" /><source class="img" srcset="https://npr.brightspotcdn.com/dims3/default/strip/false/crop/3423x3423+856+0/resize/200/quality/85/format/jpeg/?url=http%3A%2F%2Fnpr-brightspot.s3.amazonaws.com%2Ffc%2F94%2F16ddf4264d82b1e7f700e943a0f0%2Fap25017790600456.jpg" type="image/jpeg" data-template="https://npr.brightspotcdn.com/dims3/default/strip/false/crop/3423x3423+856+0/resize/{width}/quality/{quality}/format/{format}/?url=http%3A%2F%2Fnpr-brightspot.s3.amazonaws.com%2Ffc%2F94%2F16ddf4264d82b1e7f700e943a0f0%2Fap25017790600456.jpg" data-format="jpeg" /><img decoding="async" class="img" src="https://npr.brightspotcdn.com/dims3/default/strip/false/crop/3423x3423+856+0/resize/200/quality/85/format/jpeg/?url=http%3A%2F%2Fnpr-brightspot.s3.amazonaws.com%2Ffc%2F94%2F16ddf4264d82b1e7f700e943a0f0%2Fap25017790600456.jpg" alt="The TikTok app logo is shown on an iPhone on Friday, Jan. 17, 2025, in Houston. (AP Photo/Ashley Landis)" data-template="https://npr.brightspotcdn.com/dims3/default/strip/false/crop/3423x3423+856+0/resize/{width}/quality/{quality}/format/{format}/?url=http%3A%2F%2Fnpr-brightspot.s3.amazonaws.com%2Ffc%2F94%2F16ddf4264d82b1e7f700e943a0f0%2Fap25017790600456.jpg" data-format="jpeg" /></picture></a></p>
<div class="bucketblock">
<h3 class="slug">Business</h3>
<h3>Trump signs executive order to pause TikTok ban, provide immunity to tech firms</h3>
</div>
</div>
</div>
<p>The bipartisan divest-or-ban law passed Congress in April 2024 and was signed into law by then-President Biden. Trump himself sought to ban the app during his first term in 2020, but that effort was blocked by the courts.</p>
<p>&#8220;I am instructing the Attorney General not to take any action to enforce the Act for a period of 75 days from today to allow my Administration an opportunity to determine the appropriate course forward in an orderly way that protects national security while avoiding an abrupt shutdown of a communications platform used by millions of Americans,&#8221; Trump&#8217;s order states.</p>
<h3 class="edTag">Undoing Biden executive actions</h3>
<p>Another order rescinded <a href="https://www.whitehouse.gov/presidential-actions/2025/01/initial-rescissions-of-harmful-executive-orders-and-actions/" target="_blank" rel="noopener">78 Biden-era executive actions</a>, orders and presidential memoranda. They include a wide variety of actions related to racial equality, climate, migration and gender policy; the federal workforce; and Biden&#8217;s recent move to take Cuba off the list of state sponsors of terrorism.</p>
<div id="resg-s1-43698-102" class="bucketwrap internallink insettwocolumn inset2col ">
<div class="bucket img"><a id="featuredStackSquareImagenx-s1-5169190" class="imagewrap" href="https://www.npr.org/2025/01/20/nx-s1-5169190/biden-voter-registration-executive-order" data-metrics-ga4="{&quot;category&quot;:&quot;recirculation&quot;,&quot;action&quot;:&quot;story_recirculation_click&quot;,&quot;clickType&quot;:&quot;inset box&quot;,&quot;clickUrl&quot;:&quot;https:\/\/www.npr.org\/2025\/01\/20\/nx-s1-5169190\/biden-voter-registration-executive-order&quot;}"><picture><source class="img" srcset="https://npr.brightspotcdn.com/dims3/default/strip/false/crop/4000x4000+1453+0/resize/200/quality/85/format/webp/?url=http%3A%2F%2Fnpr-brightspot.s3.amazonaws.com%2Fc0%2F75%2F5b7764924af7a924bab3f966a0ab%2Fgettyimages-2023786338.jpg" type="image/webp" data-template="https://npr.brightspotcdn.com/dims3/default/strip/false/crop/4000x4000+1453+0/resize/{width}/quality/{quality}/format/{format}/?url=http%3A%2F%2Fnpr-brightspot.s3.amazonaws.com%2Fc0%2F75%2F5b7764924af7a924bab3f966a0ab%2Fgettyimages-2023786338.jpg" data-format="webp" /><source class="img" srcset="https://npr.brightspotcdn.com/dims3/default/strip/false/crop/4000x4000+1453+0/resize/200/quality/85/format/jpeg/?url=http%3A%2F%2Fnpr-brightspot.s3.amazonaws.com%2Fc0%2F75%2F5b7764924af7a924bab3f966a0ab%2Fgettyimages-2023786338.jpg" type="image/jpeg" data-template="https://npr.brightspotcdn.com/dims3/default/strip/false/crop/4000x4000+1453+0/resize/{width}/quality/{quality}/format/{format}/?url=http%3A%2F%2Fnpr-brightspot.s3.amazonaws.com%2Fc0%2F75%2F5b7764924af7a924bab3f966a0ab%2Fgettyimages-2023786338.jpg" data-format="jpeg" /><img decoding="async" class="img" src="https://npr.brightspotcdn.com/dims3/default/strip/false/crop/4000x4000+1453+0/resize/200/quality/85/format/jpeg/?url=http%3A%2F%2Fnpr-brightspot.s3.amazonaws.com%2Fc0%2F75%2F5b7764924af7a924bab3f966a0ab%2Fgettyimages-2023786338.jpg" alt="A sign for voter registration stands in Columbia, S.C., in 2024." data-template="https://npr.brightspotcdn.com/dims3/default/strip/false/crop/4000x4000+1453+0/resize/{width}/quality/{quality}/format/{format}/?url=http%3A%2F%2Fnpr-brightspot.s3.amazonaws.com%2Fc0%2F75%2F5b7764924af7a924bab3f966a0ab%2Fgettyimages-2023786338.jpg" data-format="jpeg" /></picture></a></p>
<div class="bucketblock">
<h3 class="slug">Elections</h3>
<h3>Trump revokes Biden&#8217;s order for federal agencies to promote voter registration</h3>
</div>
</div>
</div>
<h3 class="edTag">Inflation</h3>
<p>Another executive order directs &#8220;the heads of all executive departments and agencies to deliver emergency price relief, consistent with applicable law, to the American people and increase the prosperity of the American worker.&#8221;</p>
<p>Speaking at Capital One Arena, Trump said this order would help &#8220;defeat inflation and rapidly bring down the cost of daily life.&#8221;</p>
<p>Last month, Trump <a href="https://www.nbcnews.com/business/consumer/trump-says-hard-bring-grocery-prices-down-why-rcna183960" target="_blank" rel="noopener">admitted</a> it is hard to bring grocery prices down once they rise.</p>
<h3 class="edTag">Immigration</h3>
<div id="resg-s1-43720" class="bucketwrap image x-large">
<div class="imagewrap has-source-dimensions" data-crop-type=""><picture><source class="img" srcset="https://npr.brightspotcdn.com/dims3/default/strip/false/crop/4800x2902+0+0/resize/400/quality/85/format/webp/?url=http%3A%2F%2Fnpr-brightspot.s3.amazonaws.com%2Fb6%2Fc1%2Fd153a97844fa91d625a7031abe4b%2Fgettyimages-2155743451.jpg 400w, 
https://npr.brightspotcdn.com/dims3/default/strip/false/crop/4800x2902+0+0/resize/600/quality/85/format/webp/?url=http%3A%2F%2Fnpr-brightspot.s3.amazonaws.com%2Fb6%2Fc1%2Fd153a97844fa91d625a7031abe4b%2Fgettyimages-2155743451.jpg 600w,
https://npr.brightspotcdn.com/dims3/default/strip/false/crop/4800x2902+0+0/resize/800/quality/85/format/webp/?url=http%3A%2F%2Fnpr-brightspot.s3.amazonaws.com%2Fb6%2Fc1%2Fd153a97844fa91d625a7031abe4b%2Fgettyimages-2155743451.jpg 800w,
https://npr.brightspotcdn.com/dims3/default/strip/false/crop/4800x2902+0+0/resize/900/quality/85/format/webp/?url=http%3A%2F%2Fnpr-brightspot.s3.amazonaws.com%2Fb6%2Fc1%2Fd153a97844fa91d625a7031abe4b%2Fgettyimages-2155743451.jpg 900w,
https://npr.brightspotcdn.com/dims3/default/strip/false/crop/4800x2902+0+0/resize/1200/quality/85/format/webp/?url=http%3A%2F%2Fnpr-brightspot.s3.amazonaws.com%2Fb6%2Fc1%2Fd153a97844fa91d625a7031abe4b%2Fgettyimages-2155743451.jpg 1200w,
https://npr.brightspotcdn.com/dims3/default/strip/false/crop/4800x2902+0+0/resize/1600/quality/85/format/webp/?url=http%3A%2F%2Fnpr-brightspot.s3.amazonaws.com%2Fb6%2Fc1%2Fd153a97844fa91d625a7031abe4b%2Fgettyimages-2155743451.jpg 1600w,
https://npr.brightspotcdn.com/dims3/default/strip/false/crop/4800x2902+0+0/resize/1800/quality/85/format/webp/?url=http%3A%2F%2Fnpr-brightspot.s3.amazonaws.com%2Fb6%2Fc1%2Fd153a97844fa91d625a7031abe4b%2Fgettyimages-2155743451.jpg 1800w" type="image/webp" sizes="(min-width: 1300px) 763px, (min-width: 1025px) calc(100vw - 496px), (min-width: 768px) calc(100vw - 171px), calc(100vw - 30px)" data-template="https://npr.brightspotcdn.com/dims3/default/strip/false/crop/4800x2902+0+0/resize/{width}/quality/{quality}/format/{format}/?url=http%3A%2F%2Fnpr-brightspot.s3.amazonaws.com%2Fb6%2Fc1%2Fd153a97844fa91d625a7031abe4b%2Fgettyimages-2155743451.jpg" /><source class="img" srcset="https://npr.brightspotcdn.com/dims3/default/strip/false/crop/4800x2902+0+0/resize/400/quality/85/format/jpeg/?url=http%3A%2F%2Fnpr-brightspot.s3.amazonaws.com%2Fb6%2Fc1%2Fd153a97844fa91d625a7031abe4b%2Fgettyimages-2155743451.jpg 400w, 
https://npr.brightspotcdn.com/dims3/default/strip/false/crop/4800x2902+0+0/resize/600/quality/85/format/jpeg/?url=http%3A%2F%2Fnpr-brightspot.s3.amazonaws.com%2Fb6%2Fc1%2Fd153a97844fa91d625a7031abe4b%2Fgettyimages-2155743451.jpg 600w,
https://npr.brightspotcdn.com/dims3/default/strip/false/crop/4800x2902+0+0/resize/800/quality/85/format/jpeg/?url=http%3A%2F%2Fnpr-brightspot.s3.amazonaws.com%2Fb6%2Fc1%2Fd153a97844fa91d625a7031abe4b%2Fgettyimages-2155743451.jpg 800w,
https://npr.brightspotcdn.com/dims3/default/strip/false/crop/4800x2902+0+0/resize/900/quality/85/format/jpeg/?url=http%3A%2F%2Fnpr-brightspot.s3.amazonaws.com%2Fb6%2Fc1%2Fd153a97844fa91d625a7031abe4b%2Fgettyimages-2155743451.jpg 900w,
https://npr.brightspotcdn.com/dims3/default/strip/false/crop/4800x2902+0+0/resize/1200/quality/85/format/jpeg/?url=http%3A%2F%2Fnpr-brightspot.s3.amazonaws.com%2Fb6%2Fc1%2Fd153a97844fa91d625a7031abe4b%2Fgettyimages-2155743451.jpg 1200w,
https://npr.brightspotcdn.com/dims3/default/strip/false/crop/4800x2902+0+0/resize/1600/quality/85/format/jpeg/?url=http%3A%2F%2Fnpr-brightspot.s3.amazonaws.com%2Fb6%2Fc1%2Fd153a97844fa91d625a7031abe4b%2Fgettyimages-2155743451.jpg 1600w,
https://npr.brightspotcdn.com/dims3/default/strip/false/crop/4800x2902+0+0/resize/1800/quality/85/format/jpeg/?url=http%3A%2F%2Fnpr-brightspot.s3.amazonaws.com%2Fb6%2Fc1%2Fd153a97844fa91d625a7031abe4b%2Fgettyimages-2155743451.jpg 1800w" type="image/jpeg" sizes="(min-width: 1300px) 763px, (min-width: 1025px) calc(100vw - 496px), (min-width: 768px) calc(100vw - 171px), calc(100vw - 30px)" data-template="https://npr.brightspotcdn.com/dims3/default/strip/false/crop/4800x2902+0+0/resize/{width}/quality/{quality}/format/{format}/?url=http%3A%2F%2Fnpr-brightspot.s3.amazonaws.com%2Fb6%2Fc1%2Fd153a97844fa91d625a7031abe4b%2Fgettyimages-2155743451.jpg" /><img decoding="async" class="img" src="https://npr.brightspotcdn.com/dims3/default/strip/false/crop/4800x2902+0+0/resize/1100/quality/50/format/jpeg/?url=http%3A%2F%2Fnpr-brightspot.s3.amazonaws.com%2Fb6%2Fc1%2Fd153a97844fa91d625a7031abe4b%2Fgettyimages-2155743451.jpg" alt="Migrants walk into the US beside the US-Mexico border wall at Jacumba Hot Springs, California, on June 5, 2024. Migrants from countries such as Turkey, Jordan, Guatemala, Nicaragua, China and India made their way on foot into the United States today before being met with by Customs and Border Patrol agents for processing. The United States will temporarily close its Mexico border to asylum seekers from June 5, as President Joe Biden tries to neutralize his political weakness on migration ahead of November's election battle with Donald Trump. (Photo by Frederic J. BROWN / AFP) (Photo by FREDERIC J. BROWN/AFP via Getty Images)" data-template="https://npr.brightspotcdn.com/dims3/default/strip/false/crop/4800x2902+0+0/resize/{width}/quality/{quality}/format/{format}/?url=http%3A%2F%2Fnpr-brightspot.s3.amazonaws.com%2Fb6%2Fc1%2Fd153a97844fa91d625a7031abe4b%2Fgettyimages-2155743451.jpg" /></picture></div>
<div class="credit-caption">
<div class="caption-wrap">
<div class="caption" aria-label="Image caption">
<p>Migrants walk into the U.S. beside the US-Mexico border wall at Jacumba Hot Springs, California, on June 5, 2024.</p>
</div>
</div>
<p><span class="credit" aria-label="Image credit">Frederic J. Brown/AFP via Getty Images</span></div>
</div>
<p>Trump signed executive orders making sweeping changes to immigration and border security. They include:</p>
<aside id="ad-secondary-wrap" class="ad-wrap secondary visible" aria-label="advertisement">
<div id="ad-secondary-News_Politics" class="ad-config ad-secondary has-refresh-enabled" data-ad-config="{&quot;network&quot;:&quot;\/6735\/&quot;,&quot;site&quot;:{&quot;desktop&quot;:&quot;NPRSecondary&quot;,&quot;mobile&quot;:&quot;NPRMobileSecondary&quot;},&quot;zone&quot;:&quot;News_Politics&quot;,&quot;targets&quot;:{&quot;testserver&quot;:&quot;false&quot;,&quot;isPodcastEpisode&quot;:&quot;false&quot;,&quot;storyId&quot;:&quot;g-s1-43698&quot;,&quot;agg&quot;:[&quot;1088064557&quot;,&quot;593868387&quot;]},&quot;location&quot;:&quot;secondary&quot;,&quot;deferred&quot;:false,&quot;isBetweenContent&quot;:true,&quot;overflowCount&quot;:null,&quot;hasRefreshEnabled&quot;:true,&quot;isOutstreamVideoEnabled&quot;:false}" data-google-query-id="CICfm47elIsDFfKwOgUdNXcndA">
<div id="google_ads_iframe_/6735/NPRSecondary/News_Politics_0__container__"><strong>Declaring a national emergency at the border: </strong>Trump signed an order declaring &#8220;that a national emergency exists at the southern border of the United States,&#8221; and allowing for the deployment of armed forces and the National Guard to respond.</div>
</div>
</aside>
<p><strong>&#8220;Clarifying&#8221; the military&#8217;s role in border security: </strong>This action directs the military to &#8220;prioritize the protection of the sovereignty and territorial integrity of the United States along our national borders.&#8221; This includes &#8220;by repelling forms of invasion including unlawful mass migration, narcotics trafficking, human smuggling and trafficking, and other criminal activities.&#8221;</p>
<p><strong>Ending &#8220;catch and release,&#8221; continue building the wall, and reinstating &#8220;Remain in Mexico&#8221;: </strong>A sweeping order on &#8220;Securing Our Borders&#8221; calls for establishing &#8220;physical barriers&#8221; at the border, ending the practice known as &#8220;catch-and-release&#8221; and reinstituting a policy that requires asylum seekers to wait in Mexico while their claim is processed.</p>
</div>
</aside>
<p><strong>Designating criminal cartels as terrorists: </strong>This order defines drug cartels as foreign terrorist organizations, in order to expedite the removal of members of groups like Tren de Aragua, a transnational criminal organization from Venezuela, and MS-13.</p>
<p><strong>Suspending refugee resettlement: </strong>Trump signed an order suspending the U.S. Refugee Admissions Program.</p>
<p><strong>Ending birthright citizenship: </strong>Trump signed an order that would end birthright citizenship for children born in the United States to parents without legal status. The order argues that the 14th Amendment, which enshrines birthright citizenship, does not extend to individuals who are born in the country but not &#8220;subject to the jurisdiction thereof.&#8221;</p>
<p>This action has already seen legal challenges.</p>
<p><strong>Enhance vetting and screening: </strong>This order instructs federal agencies to &#8220;vet and screen to the maximum degree possible all aliens who intend to be admitted, enter, or are already inside the United States, particularly those aliens coming from regions or nations with identified security risks.&#8221;</p>
<p><strong>&#8220;Protect American citizens against invasion&#8221;: </strong>This order instructs federal agencies to use &#8220;all lawful means to ensure the faithful execution of the immigration laws of the United States against all inadmissible and removable aliens.&#8221;</p>
<h3 class="edTag"><strong>Restore the death penalty</strong></h3>
<p>Trump signed an order reinstating the federal death penalty, instructing the attorney general to &#8220;pursue the death penalty for all crimes of a severity demanding its use.&#8221; In particular, it calls for the death penalty to be sought in all cases involving the murder of a law enforcement officer, and all capital crimes committed by immigrants without legal status.</p>
<h2 class="edTag"><span style="color: #ff0000;">&#8220;Weaponization of government&#8221;</span></h2>
<p>Trump signed an order <strong>&#8220;ending the weaponization of the federal government.&#8221;</strong></p>
<p>Trump and his allies have long claimed that the Justice Department under Biden was weaponized against him, citing the various legal cases against him, and other conservatives.</p>
<p>DOJ prosecutors wound down the two federal criminal cases against Trump after he won the 2024 election, following longstanding department precedent. In a report on the government&#8217;s election interference case released last week, special counsel Jack Smith said the evidence against Trump would have led to his conviction at trial — if not for his election victory that led to charges being dropped.</p>
<p>Throughout the 2024 campaign, Trump pledged to <a href="https://www.npr.org/2024/10/21/nx-s1-5134924/trump-election-2024-kamala-harris-elizabeth-cheney-threat-civil-liberties" target="_blank" rel="noopener">punish, prosecute or jail </a>his political enemies. Trump has repeatedly indicated that he would use federal law enforcement as part of a campaign to exact &#8220;<a href="https://truthsocial.com/@realDonaldTrump/109967829299924979" target="_blank" rel="noopener">retribution</a>.&#8221;</p>
<h3 class="edTag">Federal workforce</h3>
<p>Trump signed a &#8220;freeze on all federal hiring, excepting the military and a number of other excluded categories.&#8221; At Capital One Arena, Trump told his supporters the temporary pause would &#8220;ensure that we&#8217;re only hiring competent people who are faithful to the American public.&#8221;</p>
<p>He also signed an order requiring federal workers to return to the office in person, and a &#8220;regulatory freeze&#8221; preventing the creation of new federal regulations.</p>
<h3 class="edTag">Withdrawing from the Paris Climate Accord</h3>
<p>Trump signed an order titled, &#8220;Putting America first in international environmental agreements,&#8221; which included withdrawing from the Paris Climate Accord.</p>
<p>Trump previously withdrew from the Paris accords during his first term, but Biden rejoined the agreement in 2021.</p>
<h3 class="edTag">Energy and climate</h3>
<p>Trump intends to declare a national energy emergency, aiming to cut red tape and regulations for the energy industry, and a second one specific to Alaskan resources, an incoming White House official told reporters on a background conference call.</p>
<p>&#8220;That national energy emergency will unlock a variety of different authorities that will enable our nation to quickly build again, to produce coal and natural resources, to create jobs, to create prosperity and to strengthen our nation&#8217;s national security,&#8221; the official said. The official said energy prices are too high, but declined on the call to name a lower target price.</p>
<p>The action will end what incoming Trump officials call the &#8220;electric vehicle mandate&#8221; and will end &#8220;efforts to curtail consumer choice on the things that consumers use every single day, whether it be showerheads, whether it be gas stoves, whether it be dishwashers and the like,&#8221; the official said.</p>
<p>Trump has long railed against energy efficiency standards on the campaign trail, and specifically taken aim at &#8220;electric vehicle mandates,&#8221; a term he uses to encompass all policies designed to encourage a transition to battery-powered cars. Rules actually requiring 100% of vehicles to be electric do not exist on the federal level.\</p>
<h3 class="edTag">Defining &#8216;sex&#8217; and ending DEI programs</h3>
<p>Trump signed an executive action Monday night dealing with gender identity. The details weren&#8217;t immediately made public; however, an incoming White House official speaking on background had told reporters earlier in the day that an order would make it the policy of the United States to recognize two biologically distinct sexes — male and female.</p>
<p>&#8220;These are sexes that are not changeable, and they are grounded in fundamental and incontrovertible reality,&#8221; the official said.</p>
<p>The change will require government agencies to use the definitions on documents like passports, visas and employee records the official said. Taxpayer funds will not be allowed to be used for &#8220;transition services,&#8221; the official said.</p>
<p>A second action will end diversity, equity and inclusion programs in the federal government, the official said, giving as examples environmental justice programs in the U.S. Department of Agriculture, as well as diversity training. <a href="https://www.npr.org/2025/01/20/g-s1-43698/trump-inauguration-executive-orders-2025-day-1">source</a></p>
<p>&nbsp;</p>
<hr />
<h1 class="headline">A running list of Trump’s planned executive orders, actions, proclamations and legislation</h1>
<p class="story-text__paragraph  ">Donald Trump is promising a “golden age of America” in his second term, and he’s issuing a raft of executive orders to try and make it happen.</p>
<p class="story-text__paragraph  ">The president signed a slew of orders and directives that aim to end birthright citizenship and crack down on illegal crossings at the southern border, increase domestic energy production and transform a federal government he views as both too bloated and too “woke.”</p>
<section class="page-content__row page-content__row--story">
<div class="container container--story story-layout--fluid-fixed">
<div class="container__column container__column--story summary-middle">
<div class="container__row container__row--story story-layout--fixed-fluid">
<div class="container__column container__column--story center-horizontally">
<div class="story-text">
<div class="story-meta">
<p class="story-meta__credit">It’s unclear which of President Donad Trump’s executive actions will have immediate impact or are merely symbolic. | Evan Vucci/AP</p>
<div class="story-meta__authors-timestamp has-social-tools ">
<div class="story-meta__details"></div>
<aside class="social-tools">Donald Trump is promising a “golden age of America” in his second term, and he’s issuing a raft of executive orders to try and make it happen.</p>
</aside>
</div>
</div>
<p class="story-text__paragraph  ">The president signed a slew of orders and directives that aim to end birthright citizenship and crack down on illegal crossings at the southern border, increase domestic energy production and transform a federal government he views as both too bloated and too “woke.”</p>
<div id="mrec5-wrap" class="content-group ad cnx-politico-container-adjust" aria-label="Advertisement">
<div id="mrec5_rlWr" class="ad-slot addelivered cnx-politico-container-adjust" aria-hidden="true" data-ad-refresh="30" data-target="pos=5">
<div id="mrec5" class="cnx-politico-container-adjust" aria-hidden="true" data-ad-refresh="30" data-target="pos=5" data-google-query-id="COTkn_jdlIsDFfGsOgUd-Nojsw">
<div id="google_ads_iframe_/6326/politico/politics/story-desktop/mrec5_0__container__" class="oneTag cnx-politico-container-adjust">
<div class="cnx-ui-wrapper cnx-bp-xl-lit">
<div class="cnx-ui-top-bar-container cnx-bp-xl-lit">
<div class="cnx-top-bar-buttons"></div>
</div>
</div>
</div>
</div>
<div id="mrec5_slotSpacer" class="slotSpacer">It’s unclear which of Trump’s executive actions will have immediate impact or are merely symbolic. But they’re already facing challenges. The Elon Musk-led Department of Government Efficiency drew lawsuits hours before Trump signed the paperwork to create it. Some of his more controversial orders — including the one targeting birthright citizenship — also immediately <a class=" js-tealium-tracking " href="https://www.politico.com/live-updates/2025/01/20/donald-trump-inauguration-day-news-updates-analysis/challenging-trump-on-citizenship-00199593" target="_blank" rel="noopener" data-tracking="mpos=&amp;mid=&amp;lindex=&amp;lcol=" aria-label=" (Opens in a new window)">hit legal challenges</a>. And while Trump pledged in his inaugural address to create an “External Revenue Service” to collect tariffs and revenues from foreign nations, he’ll need congressional approval to create the new agency.</div>
</div>
</div>
</div>
</div>
</div>
</div>
<div class="container__column container__column--story hide-under-small">
<div id="mrec2-wrap" class="
    content-group ad" aria-label="Advertisement"></p>
<div id="mrec2_rlWr" class="ad-slot    addelivered" aria-hidden="true" data-ad-refresh="30" data-target="pos=2"></div>
</div>
</div>
</div>
</section>
<section class="page-content__row page-content__row--story main-section">
<div class="container container--story story-layout--fixed-fluid">
<div class="container__column container__column--story center-horizontally hide-under-medium">Here’s a look at what Trump signed on Day One — and his executive actions since:</div>
<div class="container__column container__column--story">
<div class="container__row container__row--story story-layout--fluid-fixed">
<div class="container__column container__column--story center-horizontally">
<div class="story-text">
<h2 class="story-text__heading-large has-bottom-margin">Jan. 6 pardons</h2>
<p class="story-text__paragraph  ">Trump pardoned some 1,500 people who were involved in the Jan. 6, 2021, riot at the U.S. Capitol, a sweeping grant of clemency that fulfilled a campaign-trail promise and upended years of the Justice Department’s efforts.</p>
<h2 class="story-text__heading-large has-bottom-margin">Immigration</h2>
<p class="story-text__paragraph  ">Trump signed a slew of executive orders on Monday aimed at delivering on his long-promised crackdown on illegal border crossings and immigration more broadly. He also declared a national emergency at the U.S.-Mexico border, deploying U.S. Armed Forces to the region.</p>
<p class="story-text__paragraph  ">He intends to end birthright citizenship by issuing an executive action that would reinterpret the 14th Amendment that grants citizenship to all people born on domestic soil — a move that drew swift legal challenges, including from Democratic attorneys general.</p>
<p class="story-text__paragraph  ">Trump also moved to:</p>
<ul class="story-text__list  ">
<li>Resume construction of the border wall</li>
<li>End so-called catch and release</li>
<li>Temporarily suspend refugee resettlement from certain countries for at least four months</li>
<li>Restart the “Remain in Mexico” policy of his first term</li>
<li>Restrict asylum using 212(f) of the Immigration and Nationality Act</li>
<li>Designate drug cartels and gangs as foreign terrorist organizations and invoke the Alien Enemies Act of 1798 to remove them — or, as he put it in his inaugural address, “eliminate the presence of all foreign gangs and criminal networks bringing devastating crime to U.S. soil”</li>
<li>Direct the incoming attorney general to seek capital punishment for the murder of law enforcement and capital crimes committed by undocumented immigrants</li>
</ul>
<h2 class="story-text__heading-large has-bottom-margin">Energy</h2>
<p class="story-text__paragraph  ">Trump wants to “drill, baby, drill.” He’s going to do it by declaring a “national energy emergency” that would give him the power to increase domestic energy production — and undo many of the Biden administration’s clean-energy policies. The White House also announced that the U.S. will withdraw, again, from the Paris Climate Accord.</p>
<p class="story-text__paragraph  ">Among Trump’s other planned moves:</p>
<ul class="story-text__list  ">
<li>Issue a memorandum detailing a governmentwide approach to bringing down inflation, according to the Trump team</li>
<li>End what his team has referred to as an “electric vehicle mandate”</li>
<li>End leasing to massive wind farms that “degrade our natural landscapes and fail to serve American energy consumers”</li>
</ul>
<h2 class="story-text__heading-large has-bottom-margin">Federal workforce</h2>
<p class="story-text__paragraph  ">Want to work remote? Good luck. Trump signed executive orders last night focused on the federal workforce, including one order instructing all U.S. government departments and agencies to require employees to return to office, ending any remote accommodations. Trump also announced a hiring freeze across the executive branch except in “essential areas.”</p>
<p class="story-text__paragraph  ">The president also removed job protections for tens of thousands of government workers, which the White House said was necessary to rein in what Trump describes as “deep state” bureaucracy.</p>
<p class="story-text__paragraph  ">Among Trump’s other planned moves:</p>
<ul class="story-text__list  ">
<li>End “radical and wasteful” diversity training programs, as well as environmental justice programs, equity-related grants and equity initiatives</li>
<li>Freeze hiring except in essential areas to “end the onslaught of useless and overpaid DEI activists buried into the federal workforce,” according to the White House</li>
<li>Freeze the issuing of new regulations</li>
<li>Direct agencies to address the “cost of living crisis”</li>
<li><span style="color: #0000ff;"><strong>Restore “freedom of speech” and “preventing government censorship”</strong></span></li>
<li>Create the “Department of Government Efficiency”</li>
</ul>
<h2 class="story-text__heading-large has-bottom-margin">Health</h2>
<p class="story-text__paragraph  "><span style="color: #0000ff;"><strong>Trump said in his speech the White House will instruct the State Department and Department of Homeland Security, as well as other agencies to remove “nonbinary” or “other” options from federal documents, including passports and visas, according to an incoming administration official.</strong></span></p>
<p class="story-text__paragraph  ">“It will officially be the policy of the United States government that there are only two genders: male and female,” Trump said.</p>
<p class="story-text__paragraph  ">He also signed an executive order removing the U.S. from the World Health Organization.</p>
<p class="story-text__paragraph  ">Among Trump’s other planned moves:</p>
<ul class="story-text__list  ">
<li>Reinstate military members who were penalized for not getting vaccinated against Covid-19</li>
</ul>
<h2 class="story-text__heading-large has-bottom-margin">Trade</h2>
<p class="story-text__paragraph  ">Trump hasn’t enacted new tariffs, yet. Instead, he issued an order on Monday directing federal agencies to investigate and address trade deficits and unfair trade and currency practices.</p>
<p class="story-text__paragraph  ">Among Trump’s other planned moves:</p>
<ul class="story-text__list  ">
<li>Impose 25 percent tariffs on Mexico and Canada on Feb. 1 (despite pledging to enact these broad tariffs on Day One)</li>
<li>Establish the “External Revenue Service,” aiming to collect tariffs and other revenues from foreign nations</li>
</ul>
<h2 class="story-text__heading-large has-bottom-margin">The rest</h2>
<ul class="story-text__list  ">
<li>Extend the deadline for TikTok to be divested or banned, a move that has questionable legality</li>
<li>Suspend U.S. foreign assistance programs for 90 days pending a review of whether they align with his agenda</li>
<li>Rename the Gulf of Mexico to the Gulf of America — he’ll also return Mount Denali in Alaska to the name Mount McKinley, reversing an Obama-era change.</li>
</ul>
<p><a href="https://www.politico.com/news/2025/01/21/trump-executive-orders-actions-proclamations-legislation-00199725" target="_blank" rel="noopener">source</a></p>
</div>
</div>
</div>
</div>
</div>
</section>
<hr />
<div class="alignfull wp-block-whitehouse-topper">
<div class="wp-block-whitehouse-topper__inner-container">
<div class="wp-block-whitehouse-topper__content">
<h1 class="wp-block-whitehouse-topper__headline">RESTORING FREEDOM OF SPEECH AND ENDING FEDERAL CENSORSHIP</h1>
<div class="wp-block-whitehouse-topper__meta">
<div class="wp-block-whitehouse-topper__meta--byline">EXECUTIVE ORDER</div>
<div class="wp-block-whitehouse-topper__meta--date">
<div class="wp-block-post-date"><time datetime="2025-01-20T18:53:42-05:00">January 20, 2025</time></div>
</div>
</div>
</div>
</div>
</div>
<p class="has-text-align-left">     By the authority vested in me as President by the Constitution and the laws of the United States of America, and section 301 of title 3, United States Code, it is hereby ordered as follows:</p>
<p>     Section 1.  Purpose.<em>  </em>The First Amendment to the United States Constitution, an amendment essential to the success of our Republic, enshrines the right of the American people to speak freely in the public square without Government interference.  Over the last 4 years, the previous administration trampled free speech rights by censoring Americans’ speech on online platforms, often by exerting substantial coercive pressure on third parties, such as social media companies, to moderate, deplatform, or otherwise suppress speech that the Federal Government did not approve.  Under the guise of combatting “misinformation,” “disinformation,” and “malinformation,” the Federal Government infringed on the constitutionally protected speech rights of American citizens across the United States in a manner that advanced the Government’s preferred narrative about significant matters of public debate.  Government censorship of speech is intolerable in a free society.</p>
<p>Sec. 2.  Policy.  It is the policy of the United States to:       (a)  secure the right of the American people to engage in constitutionally protected speech;</p>
<p>(b)  ensure that no Federal Government officer, employee, or agent engages in or facilitates any conduct that would unconstitutionally abridge the free speech of any American citizen;</p>
<p>(c)  ensure that no taxpayer resources are used to engage in or facilitate any conduct that would unconstitutionally abridge the free speech of any American citizen; and</p>
<p>(d)  identify and take appropriate action to correct past misconduct by the Federal Government related to censorship of protected speech.</p>
<p>Sec. 3.  Ending Censorship of Protected Speech.  (a)  No Federal department, agency, entity, officer, employee, or agent may act or use any Federal resources in a manner contrary to section 2 of this order.</p>
<p>(b)  The Attorney General, in consultation with the heads of executive departments and agencies, shall investigate the activities of the Federal Government over the last 4 years that are inconsistent with the purposes and policies of this order and prepare a report to be submitted to the President, through the Deputy Chief of Staff for Policy, with recommendations for appropriate remedial actions to be taken based on the findings of the report.</p>
<p>Sec. 4.  General Provisions.  (a)  Nothing in this order shall be construed to impair or otherwise affect:</p>
<p>(i)   the authority granted by law to an executive department or agency, or the head thereof; or</p>
<p>(ii)   the functions of the Director of the Office of Management and Budget relating to budgetary, administrative, or legislative proposals.</p>
<p>(b)  This order shall be implemented consistent with applicable law and subject to the availability of appropriations.</p>
<p>(c)  This order is not intended to, and does not, create any right or benefit, substantive or procedural, enforceable at law or in equity by any party against the United States, its departments, agencies, or entities, its officers, employees, or agents, or any other person.</p>
<p>THE WHITE HOUSE,</p>
<p class="has-text-align-left">    January 20, 2025. <a href="https://www.whitehouse.gov/presidential-actions/2025/01/restoring-freedom-of-speech-and-ending-federal-censorship/" target="_blank" rel="noopener">source</a></p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>NSA ANT Catalog &#8211; Access Network Technology &#8211; ANT Technology</title>
		<link>https://goodshepherdmedia.net/nsa-ant-catalog-access-network-technology-ant-technology/</link>
		
		<dc:creator><![CDATA[The Truth News]]></dc:creator>
		<pubDate>Thu, 09 Jan 2025 23:29:10 +0000</pubDate>
				<category><![CDATA[Government Spying]]></category>
		<category><![CDATA[North America]]></category>
		<category><![CDATA[Politics]]></category>
		<category><![CDATA[Tech]]></category>
		<category><![CDATA[Top Stories]]></category>
		<category><![CDATA[United States 🇺🇸]]></category>
		<category><![CDATA[Zee Truthful News]]></category>
		<category><![CDATA[🌍World Stage🌍]]></category>
		<category><![CDATA[💻Tech History]]></category>
		<category><![CDATA[🔐Cybersecurity]]></category>
		<category><![CDATA[Access Network]]></category>
		<category><![CDATA[Access Network Technology]]></category>
		<category><![CDATA[ANT Catalog]]></category>
		<category><![CDATA[ANT Technology]]></category>
		<category><![CDATA[Government Equipment]]></category>
		<category><![CDATA[Government Spy]]></category>
		<category><![CDATA[NSA]]></category>
		<category><![CDATA[NSA ANT Catalog]]></category>
		<category><![CDATA[spy]]></category>
		<category><![CDATA[Spy Catalog]]></category>
		<category><![CDATA[Spy Equipment]]></category>
		<category><![CDATA[Spy Hardware]]></category>
		<category><![CDATA[Spy Software]]></category>
		<category><![CDATA[Technology]]></category>
		<guid isPermaLink="false">https://goodshepherdmedia.net/?p=9563</guid>

					<description><![CDATA[NSA ANT Catalog &#8211; Access Network Technology &#8211; ANT Technology Advanced Network Technologies (ANT) is a department of the US National Security Agency (NSA), that provides tools for the NSA&#8216;s Tailored Access Operations (TAO) 1 unit and other internal and external clients. With the tools it is possible to eavesdrop on conversations (room bugging), personal computers, networks, video displays, [&#8230;]]]></description>
										<content:encoded><![CDATA[<h1>NSA ANT Catalog &#8211; Access Network Technology &#8211; ANT Technology</h1>
<p><iframe title="Who Stole the NSA&#039;s Top Secret Hacking Tools?&#x1f399;Darknet Diaries Ep. 53: Shadow Brokers" width="640" height="360" src="https://www.youtube.com/embed/Zje2Pqmh-I0?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
<p>Advanced Network Technologies (ANT) is a department of the US <a href="https://goodshepherdmedia.net/nsa-national-security-agency/" target="_blank" rel="noopener"><span data-balloon-pos="up" aria-label="More about: National Security Agency (NSA)">National Security Agency (NSA)</span></a>, that provides tools for the <span class="short" aria-label="National Security Agency (USA)" data-balloon-pos="up"><a class="short" href="https://goodshepherdmedia.net/nsa-national-security-agency/" target="_blank" rel="noopener">NSA</a></span>&#8216;s Tailored Access Operations (TAO) <sup><span style="color: #ff8800;">1</span></sup> unit and other internal and external clients. With the tools it is possible to eavesdrop on conversations (room bugging), personal computers, networks, video displays, and a lot more, using covertly installed hard- and software implants (covert ware). Most of it is built from commercial off-the-shelf parts (COTS).</p>
<p>Some of these products are listed in the <span class="short tooltip-red" data-balloon-pos="up" aria-label="Access Network Technology (NSA)">ANT</span> <a href="https://goodshepherdmedia.net/wp-content/uploads/2023/01/NSA_ANT_20070108.pdf" target="_blank" rel="noopener"><span data-balloon-pos="up" aria-label="More about: Product Catalogue">Product Catalogue</span></a>, an internal <span class="short" aria-label="National Security Agency (USA)" data-balloon-pos="up"><a class="short" href="https://goodshepherdmedia.net/nsa-national-security-agency/" target="_blank" rel="noopener">NSA</a></span> document that was intended for the US intelligence and law-enforcement community, and that was disclosed to the press on 29 December 2013 by an unknown source. It is believed that this source is <u>not</u> <span class="short" aria-label="National Security Agency (USA)" data-balloon-pos="up"><a class="short" href="https://goodshepherdmedia.net/nsa-national-security-agency/" target="_blank" rel="noopener">NSA</a></span> whistleblower <a href="https://goodshepherdmedia.net/edward-snowden-nsa-whistleblower/" target="_blank" rel="noopener"><span data-balloon-pos="up" aria-label="More about: Edward Swowden">Edward Swowden</span></a>, which means there is at least one other whistleblower [3][5].</p>
<h3><span style="color: #ff0000;">➤</span> <span style="color: #0000ff;"><a style="color: #0000ff;" href="https://goodshepherdmedia.net/wp-content/uploads/2023/01/NSA_ANT_20070108.pdf">Browse the NSA ANT catalog Here</a></span></h3>
<p>&nbsp;</p>
<hr />
<p><b>LOUDAUTO<img loading="lazy" decoding="async" class="size-full wp-image-9565 alignleft" src="https://goodshepherdmedia.net/wp-content/uploads/2023/01/loudauto_1_small.jpg" alt="" width="298" height="199" /></b> is the codename or <i>cryptonym</i> of a <a href="https://www.cryptomuseum.com/covert/bugs/index.htm" target="_blank" rel="noopener"><span data-balloon-pos="up" aria-label="More about: covert listening device (bug)">covert listening device (bug)</span></a>, developed around 2007 by the US <a href="https://goodshepherdmedia.net/nsa-national-security-agency/" target="_blank" rel="noopener"><span data-balloon-pos="up" aria-label="More about: National Security Agency (NSA)">National Security Agency (NSA)</span></a> as part of their <a href="https://goodshepherdmedia.net/wp-content/uploads/2023/01/NSA_ANT_20070108.pdf"><span data-balloon-pos="up" aria-label="More about: ANT product portfolio">ANT product portfolio</span></a>. The device is an audio-based RF retro reflector that should be activited (illuminated) by a strong continuous wave (CW) 1 GHz <sup><span style="color: #ff8800;">1</span></sup> radio frequency (RF) signal, beamed at it from a nearby listening post (LP).</p>
<p>&nbsp;</p>
<p><span style="color: #555555; font-family: Lucida Grande,Arial,Verdana,sans-serif;">Although the device is activated by an external illumination signal, it should also be powered by local 3V DC source – typically provided by two button cells – from which it draws just 15µA. In this respect, it is a semi-passive element (SPE).</span></p>
<p>Room audio is picked up and amplified by a Knowles miniature microphone, that modulates the re-radiated illumination signal by means of Pulse Position Modulation (PPM). The re-emitted signal is received at the listening post – typically by a <span style="color: #f52e00;">CTX-4000</span> or <span style="color: #f52e00;">PHOTOANGLO</span> system – and further processed by means of <span class="short tooltip-red" data-balloon-pos="up" aria-label="Commercial Off-The-Shelf">COTS</span> equipment.</p>
<p>LOUDAUTO is part of the <span data-balloon-pos="up" aria-label="More about: ANGRYNEIGHBOR">ANGRYNEIGHBOR</span> family of <b>radar retro-reflectors</b>. In this context, the term <i>radar</i> refers to the continuous wave activation beam from the listening post, that operates in the 1-2 GHz frequency band. The processing and demodulation of the returned signal is typically done by means of a commercial spectrum analyser, such as the <span data-balloon-pos="up" aria-label="More about: Rohde &amp; Schwarz FSH-series">Rohde &amp; Schwarz FSH-series</span>, that has been enhanced with FM demodulating capabilities. In many respects, LOUDAUTO can be seen as a further development of the <span data-balloon-pos="up" aria-label="More about: CIA">CIA</span>&#8216;s <span data-balloon-pos="up" aria-label="More about: EASY CHAIR passive elements">EASY CHAIR passive elements</span>, combined with later active bugging devices, like the <span data-balloon-pos="up" aria-label="More about: SRT-52">SRT-52</span> and <span data-balloon-pos="up" aria-label="More about: SRT-56">SRT-56</span>, which also used Pulse Position Modulation (PPM).</p>
<p>Information about LOUDAUTO was first published in an internal Top Secret (TS) NSA document on 1 August 2007, that was available to the so-called five eyes countries (FVEY) <sup><span style="color: #ff8800;">2</span></sup> only. Although it was scheduled for declassification on 1 August 2032 (25 years after its inception), it was revealed to the public on 29 December 2013 by the German magazine <i>Der Spiegel</i>. The source of this leak is still unknown. <sup><span style="color: #ff8800;">3</span></sup> According to a product datasheet of 7 April 2009, the price of a single LOUDAUTO device was just US$ 30. According to that document, the <i>end processing</i> — presumably the demodulation — was still under development in 2009 [1].</p>
<hr />
<p><b>FiREWALK</b></p>
<p><span style="color: #555555; font-family: Lucida Grande,Arial,Verdana,sans-serif;"><b><img loading="lazy" decoding="async" class="size-full wp-image-9567 alignleft" src="https://goodshepherdmedia.net/wp-content/uploads/2023/01/rj45_2usb_small.jpg" alt="" width="298" height="273" />FIREWALK</b> is the codename or <i>cryptonym</i> of a covert implant, developed around 2007 by or on behalf of the US <a href="https://goodshepherdmedia.net/nsa-national-security-agency/" target="_blank" rel="noopener"><span data-balloon-pos="up" aria-label="More about: National Security Agency (NSA)">National Security Agency (NSA)</span></a> as part of their <a href="https://goodshepherdmedia.net/wp-content/uploads/2023/01/NSA_ANT_20070108.pdf"><span data-balloon-pos="up" aria-label="More about: ANT product portfolio">ANT product portfolio</span></a>. The device is implanted into the RJ45 socket of the Ethernet interface of a <span class="short tooltip-red" data-balloon-pos="up" aria-label="Personal Computer">PC</span> or a network peripheral, and can intercept bidirectional gigabit ethernet traffic and inject data packets into the target network.</span></p>
<p>&nbsp;</p>
<p><span style="color: #555555; font-family: Lucida Grande,Arial,Verdana,sans-serif;">The implant is housed inside a regular stacked RJ45/twin-<span class="short tooltip-red" data-balloon-pos="up" aria-label="Universal Serial Bus">USB</span> socket, such as the one shown in the image on the right. At the top are two <span class="short tooltip-red" data-balloon-pos="up" aria-label="Light Emitting Diode">LED</span>s and inside are the ethernet transformer and in some cases even an Ethernet Phy (eg. Broadcom).</span></p>
<p><span class="short" aria-label="National Security Agency (USA)" data-balloon-pos="up"><a class="short" href="https://goodshepherdmedia.net/nsa-national-security-agency/" target="_blank" rel="noopener">NSA</a></span> was able to manipulate this standard off-the-shelf computer part – probably somewhere in the supply chain or directly at the factory where the product was assembled – and replace the internal electronics by a miniature ARM9 / <span class="short tooltip-red" data-balloon-pos="up" aria-label="Field-Programmable Gate Array">FPGA</span> computer platform, named TRINITY [2].</p>
<p>Also implanted inside the socket, is a miniature wideband radio frequency (RF) tranceiver, named HOWLERMONKEY. It allows the implant to bypass an existing firewall or air gap protection [3].</p>
<p>The implant is suitable for 10/100/1000 Mb (gigabit) networks and intercepts all network traffic, with is then sent through a <span class="short tooltip-red" data-balloon-pos="up" aria-label="Virtual Private Network">VPN</span> tunnel, using the HOWLERMONKEY <span class="short tooltip-red" data-balloon-pos="up" aria-label="Radio Frequency">RF</span> module. If the distance between the target network and the node to the Remote Operations Center (ROC) is too large, other implants in the same building may be used to relay the signal. The implant can also be used to insert data packets into the target network. The diagram below shows the construction.</p>
<div class="tooltip-red" data-balloon-pos="up" aria-label="Artist impression of the NSA's FIREWALK network implant. Copyright Crypto Museum." data-balloon-length="large"><img loading="lazy" decoding="async" class=" wp-image-9566 alignleft" src="https://goodshepherdmedia.net/wp-content/uploads/2023/01/nsa-spy-gear.png" alt="" width="476" height="325" srcset="https://goodshepherdmedia.net/wp-content/uploads/2023/01/nsa-spy-gear.png 744w, https://goodshepherdmedia.net/wp-content/uploads/2023/01/nsa-spy-gear-300x205.png 300w" sizes="(max-width: 476px) 100vw, 476px" /></div>
<p><span style="color: #555555; font-family: Lucida Grande,Arial,Verdana,sans-serif;">At the left are the RJ45 and twin-<span class="short tooltip-red" data-balloon-pos="up" aria-label="Universal Serial Bus">USB</span> sockets, with two <span class="short tooltip-red" data-balloon-pos="up" aria-label="Light Emitting Diode">LED</span> indicators at the top. Immediately behind the sockets is a <span class="short tooltip-red" data-balloon-pos="up" aria-label="Printed Circuit Board">PCB</span> with the power circuitry. At the back is the actual <span class="short" aria-label="National Security Agency (USA)" data-balloon-pos="up"><a class="short" href="https://goodshepherdmedia.net/nsa-national-security-agency/" target="_blank" rel="noopener">NSA</a></span> FIREWALK implant, which is built around a TRINITY multi-chip module, consisting of an 180 MHz <span class="short tooltip-red" data-balloon-pos="up" aria-label="Advanced RISC Machines">ARM</span>9 microcontroller, an <span class="short tooltip-red" data-balloon-pos="up" aria-label="Field-Programmable Gate Array">FPGA</span> with 1 million gates, 96 MB <span class="short tooltip-red" data-balloon-pos="up" aria-label="Synchronous Dynamic Random-Access Memory">SDRAM</span> and 4 MB Flash memory. The latter contains the firmware, which can be tailored for a specific application or operation. In practice, the firmware would filter the network packets and relay the desired ones to the NSA&#8217;s <span class="short tooltip-red" data-balloon-pos="up" aria-label="Remote Operations Center">ROC</span>, using a nearby <span class="short tooltip-red" data-balloon-pos="up" aria-label="Radio Frequency">RF</span> node (outside the building) and the internet to transport the intercepted data <a href="https://www.cryptomuseum.com/covert/bugs/nsaant/firewalk/index.htm#ref_1">[1]</a>.</span></p>
<p>The above information was taken from original <span class="short" aria-label="National Security Agency (USA)" data-balloon-pos="up"><a class="short" href="https://goodshepherdmedia.net/nsa-national-security-agency/" target="_blank" rel="noopener">NSA</a></span> datasheets from January 2007, that were disclosed to the press in 2013 by former <span class="short" aria-label="Central Intelligence Agency (USA)" data-balloon-pos="up"><a class="short" href="https://goodshepherdmedia.net/cia-central-intelligence-agency/" target="_blank" rel="noopener">CIA </a></span>/ <a href="https://goodshepherdmedia.net/nsa-national-security-agency/" target="_blank" rel="noopener"><span class="short" aria-label="National Security Agency (USA)" data-balloon-pos="up">NSA</span> </a>contractor <a href="https://goodshepherdmedia.net/edward-snowden-nsa-whistleblower/" target="_blank" rel="noopener"><span data-balloon-pos="up" aria-label="More about: Edward Snowden">Edward Snowden</span></a>. The items were developed by, or on behalf of, the cyber-warfare intelligence-gathering unit of the <a href="https://goodshepherdmedia.net/nsa-national-security-agency/" target="_blank" rel="noopener"><span class="short" aria-label="National Security Agency (USA)" data-balloon-pos="up">NSA</span></a>, known as The Office of Tailored Access Operations (TAO), since renamed Computer Network Operations <a href="https://www.cryptomuseum.com/covert/bugs/nsaant/firewalk/index.htm#ref_4">[4]</a>.</p>
<p>&nbsp;</p>
<hr />
<p><b>Cryptonyms</b></p>
<p>All products in the ANT catalogue are identified by a codeword or <i>cryptonym</i>, which is sometimes abbreviated. At present, the following ANT cryptonyms are known:</p>
<h3>NSA Spy Gear</h3>
<ul>
<li>ANGRYNEIGHBOR</li>
<li>CANDYGRAM</li>
<li>CROSSBEAM</li>
<li>CTX4000</li>
<li>CYCLONE Hx9</li>
<li>DEITYBOUNCE</li>
<li>DROPOUTJEEP</li>
<li>EBSR</li>
<li>ENTOURAGE</li>
<li>FEEDTROUGH</li>
<li>GENESIS</li>
<li>GINSU</li>
<li>GODSURGE</li>
<li>GOPHERSET</li>
<li>COTTONMOUTH-I</li>
<li>COTTONMOUTH-II</li>
<li>COTTONMOUTH-III</li>
</ul>
<ul>
<li>FIREWALK</li>
<li>GOURMETTROUGH</li>
<li>HALLUXWATER</li>
<li>HEADWATER</li>
<li>HOWLERMONKEY</li>
<li>IRATEMONK</li>
<li>IRONCHEF</li>
<li>JETPLOW</li>
<li>JUNIORMINT</li>
<li>LOUDAUTO</li>
<li>MAESTRO-II</li>
<li>MONKEYCALENDAR</li>
<li>NEBULA</li>
<li>NIGHTSTAND</li>
<li>NIGHTWATCH</li>
<li>PHOTOANGLO</li>
<li>PICASSO</li>
</ul>
<ul>
<li>RAGEMASTER</li>
<li>SCHOOLMONTANA</li>
<li>SIERRAMONTANA</li>
<li>SOMBERKNAVE</li>
<li>SOUFFLETROUGH</li>
<li>SPARROW II</li>
<li>STUCCOMONTANA</li>
<li>SURLYSPAWN</li>
<li>SWAP</li>
<li>TOTECHASER</li>
<li>TOTEGHOSTLY</li>
<li>TAWDRYYARD</li>
<li>TRINITY</li>
<li>TYPHON HX</li>
<li>WATERWITCH</li>
<li>WISTFULTOLL</li>
</ul>
<h3>Room surveillance</h3>
<ul>
<li>CTX-4000</li>
<li><a href="https://www.cryptomuseum.com/covert/bugs/nsaant/loudauto/index.htm">LOUDAUTO</a></li>
<li>NIGHTWATCH</li>
<li>PHOTOANGLO</li>
<li>TAWDRYYARD</li>
</ul>
<p><b>Documentation</b><img loading="lazy" decoding="async" src="https://www.cryptomuseum.com/img/blank.gif" width="1" height="1" /><img loading="lazy" decoding="async" src="https://www.cryptomuseum.com/img/blank.gif" width="1" height="4" /></p>
<ol type="A">
<li><a href="https://goodshepherdmedia.net/wp-content/uploads/2023/01/NSA_ANT_20070108.pdf" target="_blank" rel="noopener">NSA, ANT Product catalog</a><br />
8 January 2007. Obtained from <a href="https://www.cryptomuseum.com/covert/bugs/nsaant/index.htm#ref_2">[2]</a>.</li>
</ol>
<p><b>References</b></p>
<ol>
<li><a href="https://nsa.gov1.info/dni/index.htm">IC off the Record, <i>The NSA Toolbox: ANT Product Catalog</i></a><br />
29-30 December 2013.</li>
<li><a href="https://tinyurl.com/qa9vwzm">Jacob Appelbaum, Judith Horchert, Christian Stöcker, <i>Catalogue Advertises NSA Toolbox</i></a><br />
Spiegel Online. 29 December 2013.</li>
<li><a href="https://en.wikipedia.org/wiki/NSA_ANT_catalog" target="_blank" rel="noopener">Wikipedia, <i>NSA ANT catalog</i></a><br />
Retrieved November 2020.</li>
<li><a href="https://en.wikipedia.org/wiki/Tailored_Access_Operations" target="_blank" rel="noopener">Wikipedia, <i>Tailored Access Operations</i></a><br />
Retrieved November 2020.</li>
<li><a href="https://www.reuters.com/article/us-intelligence-commentary-idUSKCN10X01P" target="_blank" rel="noopener">James Bamford, <i>Commentary: Evidence points to another Snowden at the NSA</i></a><br />
Reuters, 22 August 2016.</li>
</ol>
<p><b>Further information</b></p>
<ul>
<li><a href="https://goodshepherdmedia.net/nsa-national-security-agency/" target="_blank" rel="noopener">About the NSA</a></li>
<li><a href="https://goodshepherdmedia.net/cia-central-intelligence-agency/" target="_blank" rel="noopener">About the CIA</a></li>
<li><a href="https://www.cryptomuseum.com/covert/bugs/index.htm" target="_blank" rel="noopener">Other bugs</a></li>
</ul>
<p><a href="https://www.cryptomuseum.com/covert/bugs/nsaant/index.htm" target="_blank" rel="noopener">source</a></p>
<hr />
<h2>Backdoors &#8211; <b>Exploitable weaknesses in a cipher system</b></h2>
<p><iframe title="Exposing the NSA’s Mass Surveillance of Americans | CYBERWAR" width="640" height="360" src="https://www.youtube.com/embed/tYVm62oEyWA?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
<p>Deliberate weakening of a <a href="https://www.cryptomuseum.com/crypto/index.htm"><span data-balloon-pos="up" aria-label="More about: cipher system">cipher system</span></a>, commonly known as a <i>backdoor</i>, is a technique that is used by, or on behalf of, <a href="https://www.cryptomuseum.com/intel/index.htm"><span data-balloon-pos="up" aria-label="More about: intelligence agencies">intelligence agencies</span></a> like the US <a href="https://www.cryptomuseum.com/intel/nsa/index.htm"><span data-balloon-pos="up" aria-label="More about: National Security Agency (NSA)">National Security Agency (NSA)</span></a> – and others – to make it easier for them to break the cipher and access the data. It is often thought that intelligence services have a <i><a href="https://www.cryptomuseum.com/intel/nsa/backdoor.htm#master"><span data-balloon-pos="up" aria-label="Jump to: Master Key">Master Key</span></a></i> that gives them instant access to the data, but in reality it is often much more complicated, and requires the use of sophisticated computing skills.</p>
<p><span style="color: #555555; font-family: Lucida Grande,Arial,Verdana,sans-serif;">In the past, intelligence services like the <span class="short" aria-label="National Security Agency (USA)" data-balloon-pos="up"><a class="short" href="https://www.cryptomuseum.com/intel/nsa/index.htm">NSA</a></span> weakened the ciphers just enough to allow it to be barely broken with the computing power that was available to them (e.g. by using their vast array of Cray super computers), assuming that other parties did not have that capability. Implementing a <i>backdoor</i> is difficult and dangerous, as it might be discovered by the user — after which it can no longer be used — or by another party, in which case it can be exploited by an adversary.</span></p>
<p><iframe title="Exposed: Secret Government Surveillance Tools They DON&#039;T Want You to Know About!" width="640" height="360" src="https://www.youtube.com/embed/iRYji0Q2K30?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
<p>Below is a non-exhaustive overview of known backdoor constructions and examples:</p>
<ul>
<li>Weakening of the encryption algorithm</li>
<li>Weakening the KEY</li>
<li>Hiding the KEY in the cipher text</li>
<li>Manipulation of user instructions (manual)</li>
<li>Key generator with predictive output</li>
<li>Implementation of a hidden &#8216;unlock&#8217; key (master key)</li>
<li>Key escrow</li>
<li>Side channel attack (TEMPEST)</li>
<li>Unintended backdoors</li>
<li>Covertly installed hard- and/or software (spyware)</li>
</ul>
<h3>Weakening of the algorithm</h3>
<p>One of the most widely used types of backdoor, is weakening of the algorithm. This was done with mechanical cipher machines – such as the <a href="https://www.cryptomuseum.com/crypto/hagelin/cx52/index.htm"><span data-balloon-pos="up" aria-label="More about: CX-52">CX-52</span></a> – electronic ones – such as the <a href="https://www.cryptomuseum.com/crypto/hagelin/h460/index.htm"><span data-balloon-pos="up" aria-label="More about: H-460">H-460</span></a> – and <a href="https://www.cryptomuseum.com/crypto/algo/index.htm"><span data-balloon-pos="up" aria-label="More about: software-based encryption">software-based encryption</span></a>. <span class="short" aria-label="National Security Agency (USA)" data-balloon-pos="up"><a class="short" href="https://www.cryptomuseum.com/intel/nsa/index.htm">NSA</a></span> often weakened the algorithm just enough to break it with the help from a super computer (e.g. Cray), assuming that adversaries did not have that capacity.</p>
<p>This solution is universal. It can be applied to mechanical, electronic and computer-based encryption systems. One of the first known examples is the weakening of the <a href="https://www.cryptomuseum.com/crypto/hagelin/cx52/index.htm"><span data-balloon-pos="up" aria-label="More about: Hagelin CX-52">Hagelin CX-52</span></a> by <a href="https://www.cryptomuseum.com/people/jenks/peter.htm"><span data-balloon-pos="up" aria-label="More about: Peter Jenks">Peter Jenks</span></a> of the <span class="short" aria-label="National Security Agency (USA)" data-balloon-pos="up"><a class="short" href="https://www.cryptomuseum.com/intel/nsa/index.htm">NSA</a></span>, in the early 1960s <a href="https://www.cryptomuseum.com/intel/nsa/backdoor.htm#ref_1">[1]</a>.</p>
<p>The <a href="https://www.cryptomuseum.com/crypto/hagelin/cx52/index.htm"><span data-balloon-pos="up" aria-label="More about: Hagelin CX-52">Hagelin CX-52</span></a> had the problem that it was theoretically safe when used correctly. It was possible however to configure the device in such a way that it produced a short cycle, as a result of which it became easy to break. <a href="https://www.cryptomuseum.com/people/jenks/peter.htm"><span data-balloon-pos="up" aria-label="More about: Jenks">Jenks</span></a> modified the <a href="https://www.cryptomuseum.com/crypto/hagelin/cx52"><span data-balloon-pos="up" aria-label="More about: CX-52">CX-52</span></a> in such a way that it always produced a long cycle, albeit one that he could predict.</p>
<div data-balloon-pos="up" aria-label="CX-52 with open lid"><img loading="lazy" decoding="async" class=" wp-image-9589 alignleft" src="https://goodshepherdmedia.net/wp-content/uploads/2021/11/1small.jpg" alt="" width="277" height="186" /></div>
<p>&nbsp;</p>
<p><span style="color: #555555; font-family: Lucida Grande,Arial,Verdana,sans-serif;">The modified product was designated <b>CX-52M</b> and was marketed by <a href="https://www.cryptomuseum.com/manuf/crypto/index.htm"><span data-balloon-pos="up" aria-label="More about: Crypto AG">Crypto AG</span></a> as a new version with improved security, which customers immediately started ordering in quantities. He repeated the exercise in the mid-1960s, when <a href="https://www.cryptomuseum.com/manuf/crypto/index.htm"><span data-balloon-pos="up" aria-label="More about: Crypto AG">Crypto AG</span></a> moved from mechanical to electronic designs.</span></p>
<p>The first electronic cipher machines were built around (non)linear feedback shift registers – LFSR or NLFSR – built with the (then) newest generation of integrated circuits (ICs). This part is commonly known as the <i>crypto heart</i> or the <i>cryptologic</i>. <a href="https://www.cryptomuseum.com/people/jenks/peter.htm"><span data-balloon-pos="up" aria-label="More about: Jenks">Jenks</span></a> manipulated the shift registers in such as way that it seemed robust from the outside. Nevertheless <span class="short" aria-label="National Security Agency (USA)" data-balloon-pos="up"><a class="short" href="https://www.cryptomuseum.com/intel/nsa/index.htm">NSA</a></span> could break it, as they knew the exact nature of the built-in weakness.</p>
<p>Manipulating the cryptologic, or actually the cryptographic algorithm, requires quite some mathematical ingenuity, and is not trivial at all.<img loading="lazy" decoding="async" class=" wp-image-9590 alignleft" src="https://goodshepherdmedia.net/wp-content/uploads/2021/11/2small.jpg" alt="" width="273" height="183" /></p>
<p>During the 1970s, the weaknesses were discovered by several (unwitting) <span class="short" aria-label="Crypto AG (Hagelin)" data-balloon-pos="up"><a class="short" href="https://www.cryptomuseum.com/manuf.crypto/index.htm">Crypto AG</a></span> employees and even by customers. <span class="short" aria-label="Crypto AG (Hagelin)" data-balloon-pos="up"><a class="short" href="https://www.cryptomuseum.com/manuf.crypto/index.htm">Crypto AG</a></span> usually fended them off with the excuse that the algorithm had been developed a long time ago, and that an improved version would be released soon. It should be no surprise that hiding the weaknesses became increasingly difficult over the years.</p>
<p>The same principle can be applied to software-implementations of cryptographic algorithms as well, but it has become extremely difficult to do that in such a way that it passes existing tests, such as NIST entropy-tests, and can with­stand the peer review of the academic community.</p>
<p>Another popular method for weakening a cipher system, is by shortening the effective length of the crypto KEY. The length is typically specified in <i>bits</i>, and in the 1980s, the keys of military cipher systems were typically 128 bits long, which was about twice the length that was needed.</p>
<p>&nbsp;</p>
<p><span style="color: #555555; font-family: Lucida Grande,Arial,Verdana,sans-serif;">The <a href="https://www.cryptomuseum.com/crypto/algo/des/index.htm"><span data-balloon-pos="up" aria-label="More about: DES encryption algorithm">DES encryption algorithm</span></a> – that was used for bank transactions – had a key length of 56 bits. It had been developed by Horst Feistel at IBM as <i>Lucifer</i> and had been improved by <span class="short" aria-label="National Security Agency (USA)" data-balloon-pos="up"><a class="short" href="https://www.cryptomuseum.com/intel/nsa/index.htm">NSA</a></span>.</span></p>
<p>In 1983, the small Dutch company <a href="https://www.cryptomuseum.com/manuf/texttell/index.htm"><span data-balloon-pos="up" aria-label="More about: Text Lite">Text Lite</span></a>, introduced the small <a href="https://www.cryptomuseum.com/crypto/philips/px1000/index.htm"><span data-balloon-pos="up" aria-label="More about: PX-1000 pocket terminal">PX-1000 pocket terminal</span></a> shown in the image on the right. It had a built-in text editor and an acoustic modem, by which texts could be uploaded in seconds. The device used <a href="https://www.cryptomuseum.com/crypto/algo/des/index.htm"><span data-balloon-pos="up" aria-label="More about: DES encryption">DES encryption</span></a> for the protection of the text messages, which was thought to be useful for journalists and business men on the move.</p>
<div data-balloon-pos="up" aria-label="Original PX-1000 made in 1983"><img loading="lazy" decoding="async" class=" wp-image-9591 alignleft" src="https://goodshepherdmedia.net/wp-content/uploads/2021/11/3small.jpg" alt="" width="272" height="183" /></div>
<p><a href="https://www.cryptomuseum.com/crypto/algo/des/index.htm"><span data-balloon-pos="up" aria-label="More about: DES">DES</span></a> was considered secure at the time. Although it might have been breakable by <span class="short" aria-label="National Security Agency (USA)" data-balloon-pos="up"><a class="short" href="https://www.cryptomuseum.com/intel/nsa/index.htm">NSA</a></span>, doing so would cost a lot of resources (i.e. computing power). With <span class="short" aria-label="Data Encryption Standard" data-balloon-pos="up"><a class="short" href="https://www.cryptomuseum.com/crypto/algo/des/index.htm">DES</a></span> available in a consumer product for an affordable price, <span class="short" aria-label="National Security Agency (USA)" data-balloon-pos="up"><a class="short" href="https://www.cryptomuseum.com/intel/nsa/index.htm">NSA</a></span> faced a serious problem, and turned to <a href="https://www.cryptomuseum.com/crypto/philips/usfa.htm"><span data-balloon-pos="up" aria-label="More about: Philips Usfa">Philips Usfa</span></a></p>
<p>for assistence.<a href="https://www.cryptomuseum.com/crypto/philips/index.htm"><span data-balloon-pos="up" aria-label="More about: Philips">Philips</span></a> bought the entire stock of</p>
<p><a class="short" href="https://www.cryptomuseum.com/crypto/algo/des/index.htm">DES</a>-enabled devices and shipped it to the US. The product was then re-released under the Philips brand, with an algorithm that was supplied by <span class="short" aria-label="National Security Agency (USA)" data-balloon-pos="up"><a class="short" href="https://www.cryptomuseum.com/intel/nsa/index.htm">NSA</a></span>.</p>
<p>The new algorithm was a stream cipher with a key-length of no less than 64 bits. This is more than the 56 bits of <span class="short" aria-label="Data Encryption Standard" data-balloon-pos="up"><a class="short" href="https://www.cryptomuseum.com/crypto/algo/des/index.htm">DES</a></span>, and suggested that it was a least a strong as <span class="short" aria-label="Data Encryption Standard" data-balloon-pos="up"><a class="short" href="https://www.cryptomuseum.com/crypto/algo/des/index.htm">DES</a></span>, and probably even stronger. By reverse engineering the algorithm, Crypto Museum has meanwhile concluded that of the 64 key bits, only 32 are significant. This means that the key has effectively been halved.</p>
<div data-balloon-pos="up" aria-label="Original ROM (with DES) and replacement EPROM (with NSA algorithm)" data-balloon-length="large"><img loading="lazy" decoding="async" class=" wp-image-9588 alignleft" src="https://goodshepherdmedia.net/wp-content/uploads/2021/11/4small.jpg" alt="" width="264" height="177" /></div>
<p>Does this mean that it takes only half the time to break the key? No, as each key-bit doubles the number of combinations, removing 32 bits means that it has become 4,294,967,296 times easier to break the key (2<sup>32</sup>). For example: if we assume that it takes one full year to break a 64-bit key, breaking a 32-bit key would take just 0.007 seconds. A piece of cake for <span class="short" aria-label="National Security Agency (USA)" data-balloon-pos="up"><a class="short" href="https://www.cryptomuseum.com/intel/nsa/index.htm">NSA</a></span>&#8216;s super computers.</p>
<p>Hide the KEY in the ciphertext</p>
<p>It is sometimes suggested that the cryptographic key might be hidden in the output stream (i.e. in the cipher text). Not in a readable form, of course, but when you known where to look, the key will reveal itself. Although this method is prone to discovery it has in fact been used in the past.</p>
<p>A good example of this technique is the <a href="https://www.cryptomuseum.com/crypto/hagelin/cse280/index.htm"><span data-balloon-pos="up" aria-label="More about: Hagelin CSE-280 voice encryptor">Hagelin CSE-280 voice encryptor</span></a>, that was introduced by <span class="short" aria-label="Crypto AG (Hagelin)" data-balloon-pos="up"><a class="short" href="https://www.cryptomuseum.com/manuf.crypto/index.htm">Crypto AG</a></span> in the early 1970s. The product had been developed in cooperation with the German cipher authority <span class="short" aria-label="Centralstelle für das Chiffrierwesen (Germany)" data-balloon-pos="up"><a class="short" href="https://www.cryptomuseum.com/intel/zfch/index.htm">ZfCh</a></span> (part of the <span class="short" aria-label="Bundesnachrichtendienst (Germany)" data-balloon-pos="up"><a class="short" href="https://www.cryptomuseum.com/intel/bnd/index.htm">BND</a></span>), and used forward synchro­nisation, to allow <i>late entry sync</i>.</p>
<p>&nbsp;</p>
<p><img loading="lazy" decoding="async" class=" wp-image-9593 alignleft" src="https://goodshepherdmedia.net/wp-content/uploads/2021/11/5small.jpg" alt="" width="273" height="183" />The key was hidden in the preample that was inserted at the beginning of each transmission. If one knew where to look, the entire key could be reconstructed. A few years after the device had been introduced, <span class="short" aria-label="Crypto AG (Hagelin)" data-balloon-pos="up"><a class="short" href="https://www.cryptomuseum.com/manuf.crypto/index.htm">Crypto AG</a></span>&#8216;s chief developer Peter Frutiger suddenly realised how it was done.</p>
<p>&nbsp;</p>
<p>It was only a matter of time before customers would discover it too. In 1976, the Syrians became aware of the (badly hidden) key in the preamble, and notified <span class="short" aria-label="Crypto AG (Hagelin)" data-balloon-pos="up"><a class="short" href="https://www.cryptomuseum.com/manuf.crypto/index.htm">Crypto AG</a></span>, where Frutiger provided them with a fix that made it instantly unbreakable. <span class="short" aria-label="National Security Agency (USA)" data-balloon-pos="up"><a class="short" href="https://www.cryptomuseum.com/intel/nsa/index.htm">NSA</a></span> was furious and Frutiger got fired for this.</p>
<div data-balloon-pos="up" aria-label="CSE-280 in metal frame"></div>
<p><img loading="lazy" decoding="async" class=" wp-image-9592 alignleft" src="https://goodshepherdmedia.net/wp-content/uploads/2021/11/5mall.jpg" alt="" width="372" height="250" />The exploit was based on redundancy in the enciphered message preamble. It caused a bias which was an unnecessary shortcoming by design. It involved solving a set of binary equasions, an exponentially large number of times, for which the <i>special purpose device</i> was developed.More bout Aroflex<br />
Rigging the manualIn some cases, the cipher can be weakened by manipulating the manual. This was done for example with the manuals of the <a href="https://www.cryptomuseum.com/crypto/hagelin/cx52/index.htm"><span data-balloon-pos="up" aria-label="More about: Hagelin CX-52 machine">Hagelin CX-52 machine</span></a>. Although the <a href="https://www.cryptomuseum.com/crypto/hagelin/cx52/index.htm"><span data-balloon-pos="up" aria-label="More about: CX-52">CX-52</span></a> was in theory a virtually unbreakable machine, it could be set up accidentally in such a way, that it produced a short cycle (period), which was easy to break.By manipulating the manual, guidelines were given for &#8216;proper&#8217; use of the machine, but in reality the user was instructed to configure the machine in such a way that it generated a short cycle, which was easy to break by the <span class="short" aria-label="National Security Agency (USA)" data-balloon-pos="up"><a class="short" href="https://www.cryptomuseum.com/intel/nsa/index.htm">NSA</a></span>.</p>
<p><span style="color: #555555; font-family: Lucida Grande,Arial,Verdana,sans-serif;">Another example of hiding hints in the output stream, is the <a href="https://www.cryptomuseum.com/crypto/philips/aroflex/index.htm"><span data-balloon-pos="up" aria-label="More about: T-1000/CA">T-1000/CA</span></a>, internally known as <i>Beroflex</i>, that was the civil version of the NATO-approved <a href="https://www.cryptomuseum.com/crypto/philips/aroflex/index.htm"><span data-balloon-pos="up" aria-label="More about: Aroflex">Aroflex</span></a>, a joint development of <a href="https://www.cryptomuseum.com/crypto/philips/index.htm"><span data-balloon-pos="up" aria-label="More about: Philips">Philips</span></a> and <a href="https://www.cryptomuseum.com/crypto/siemens/index.htm"><span data-balloon-pos="up" aria-label="More about: Siemens">Siemens</span></a>. It was based on a <a href="https://www.cryptomuseum.com/telex/siemens/t1000/index.htm"><span data-balloon-pos="up" aria-label="More about: T-1000 telex">T-1000 telex</span></a>.</span></p>
<p>Whilst the Aroflex was highly secure, Beroflex (T-1000/CA) was not. With the right means and the right knowledge, it could be broken. This was not a trivial task however, and required the use of a <i>special purpose device</i> – a super chip – that had been co-developed by experts at the codebreaking division of the Royal Dutch Navy.</p>
<p>Key generator with predictive outputMany encryption systems, old and new alike, make use of KEY-generators – commonly <i>pseudo random number generators</i>, or PRNGs – for example for the generation of unique message keys, for generating private and public keys, and for generating the key stream in a stream cipher.By manipulating the key generator, it is theoretically possible to generate predictable keys, weak keys or predicatable cycles. Examples are the mechanical key generator of the <a href="https://www.cryptomuseum.com/crypto/hagelin/cx52/index.htm"><span data-balloon-pos="up" aria-label="More about: Hagelin CX-52M">Hagelin CX-52M</span></a>, but also the software-based random number generators (RNGs) in modern software algorithms.Creating this kind of weaknesses is neither simple nor trivial, as the weakened key generator has to withstand a variety of existing entropy tests, including the ones published by the US National Institute of Standards and Technology (NIST). Nevertheless, various (potential) backdoors based on weakened PRNGs have been reported in the press, some of which are attributed to the <span class="short" aria-label="National Security Agency (USA)" data-balloon-pos="up"><a class="short" href="https://www.cryptomuseum.com/intel/nsa/index.htm">NSA</a></span>.In December 2013, Reuters reported that documents released by <a href="https://www.cryptomuseum.com/people/snowden/index.htm"><span data-balloon-pos="up" aria-label="More about: Edward Snowden">Edward Snowden</span></a> indicated that <span class="short" aria-label="National Security Agency (USA)" data-balloon-pos="up"><a class="short" href="https://www.cryptomuseum.com/intel/nsa/index.htm">NSA</a></span> had payed RSA Security US$ 10 million to make Dual Elliptic Curve Deterministic Random Bit Generator (Dual_EC_DRBG) the default in their encryption software. It had already been proven in 2007, that constants could be constructed in such a way as to create a kleptographic backdoor in the NIST-recommended Dual_EC_DRBG <a href="https://www.cryptomuseum.com/intel/nsa/backdoor.htm#ref_3">[3]</a>. It had been deliberately inserted by NSA as part of its BULLRUN decryption program. NIST promptly withdrew Dual_EC_DRBG from its draft guidance <a href="https://www.cryptomuseum.com/intel/nsa/backdoor.htm#ref_4">[4]</a>.<span style="color: #e7e;">➤</span> <a href="https://en.wikipedia.org/wiki/Random_number_generator_attack" target="_blank" rel="noopener">Wikipedia: Random number generator attack</a><br />
<span style="color: #e7e;">➤</span> <a href="https://en.wikipedia.org/wiki/Dual_EC_DRBG" target="_blank" rel="noopener">Wikipedia: Dual_EC_DRBG</a><br />
It is often thought by the general public, that intelligence agencies have something like a magic password, or master key, that gives them instant access to secure communications of a subject. Although in most cases the backdoor mechanism is far more complex, it is technically possible.An example of a possible master key, is the so-called_NSAKEY<span style="color: #555555; font-family: Lucida Grande,Arial,Verdana,sans-serif;"> that was found in a Microsoft operating system in 1999. The variable contained a 1024-bit public key, that was similar to the cryptographic keys that are used for encryption and authentication. Although Microsoft firmly denied it, it was widely speculated that the key was there to give the <span class="short" aria-label="National Security Agency (USA)" data-balloon-pos="up"><a class="short" href="https://www.cryptomuseum.com/intel/nsa/index.htm">NSA</a></span> access to the system.</span>There are however a few other possible explanations for the presence of this key — including a backup key, a key for installing <span class="short" aria-label="National Security Agency (USA)" data-balloon-pos="up"><a class="short" href="https://www.cryptomuseum.com/intel/nsa/index.htm">NSA</a></span> proprietary crypto suites, and incompetence on the part of Microsoft, <span class="short" aria-label="National Security Agency (USA)" data-balloon-pos="up"><a class="short" href="https://www.cryptomuseum.com/intel/nsa/index.htm">NSA</a></span> or both — all of which seem plausible. In addition, Dr. Nicko van Someren found a third – far more obscure – key in Windows 2000, which he doubted had a legitimate purpose <a href="https://www.cryptomuseum.com/intel/nsa/backdoor.htm#ref_5">[5]</a>.<span style="color: #e7e;">➤</span> <a href="https://en.wikipedia.org/wiki/_NSAKEY" target="_blank" rel="noopener">Wikipedia: _NSAKEY</a><br />
A good example of KEY ESCROW is the so-called <a href="https://www.cryptomuseum.com/crypto/usa/clipper.htm"><span data-balloon-pos="up" aria-label="More about: Clipper Chip">Clipper Chip</span></a>, that was introduced by the <span class="short" aria-label="National Security Agency (USA)" data-balloon-pos="up"><a class="short" href="https://www.cryptomuseum.com/intel/nsa/index.htm">NSA</a></span> in the early 1990s, in an attempt to control the use of strong encryption by the general public.It was the intention to use this chip in all civil encryption products, such as computers, secure telephones, etc., so that everyone would be able to use strong encryption. By forcing people to surrender their keys to the (US) government, law enforcement agencies had the ability to decrypt the communication, should that prove to be necessary during the course of an investigation.</p>
<p><img loading="lazy" decoding="async" class="size-full wp-image-9597 alignleft" src="https://goodshepherdmedia.net/wp-content/uploads/2021/11/small-2.jpg" alt="" width="298" height="200" />Encryption systems are often attacked by adversaries, by exploiting information that is hidden in the so-called side channels. This is known as a <i>side channel attack</i>. In most cases, side channels are unintended, but they may have been inserted deliberately to give an eavesdropper a way in.Side channels are often unwanted emanations – such as radio frequency (RF) signals that are emitted by the equipment, or sound generated by a printer or a keyboard – but may also take the form of variations in power consumption (current) that occur when the device is in use (power analysis). In military jargon, unwanted emanations are commonly known as TEMPEST.An early example of a cryptographic device that exhibited exploitable TEMPEST problems, is the <a href="https://www.cryptomuseum.com/crypto/philips/img/300037/000/small.jpg"><span data-balloon-pos="up" aria-label="More about: Philips Ecolex IV mixer">Philips Ecolex IV mixer</span></a> shown in the image on the right, which was approved for use by NATO.As it was based on the <a href="https://www.cryptomuseum.com/crypto/ott.htm"><span data-balloon-pos="up" aria-label="More about: One-Time Tape (OTT)">One-Time Tape (OTT)</span></a> principle, it was theoretically safe. However, in the mid-1960s, the Dutch national physics laboratory TNO, proved that minute glitches in the electric signals on the teleprinter data line, could be exploited to reconstruct the original plaintext. The problem was eventually soved by adding filters between the device and the teleprinter line.<span style="color: #e7e;">➤</span> <a href="https://en.wikipedia.org/wiki/Side-channel_attack" target="_blank" rel="noopener">Wikipedia: Side-channel attack</a> &lt;<span style="color: #f52e00; font-family: Lucida Grande,Arial,Verdana,sans-serif;">Unintended weaknesses</span>Backdoors can also be based on unintentional weaknesses in the design of an encryption device. For example, the <a href="https://www.cryptomuseum.com/crypto/enigma/index.htm"><span data-balloon-pos="up" aria-label="More about: Enigma machine">Enigma machine</span></a> – used during WWII by the German Army – can not encode a This and other weaknesses greatly helped the codebreakers at <a href="https://www.cryptomuseum.com/bp/index.htm"><span data-balloon-pos="up" aria-label="More about: Bletchley Park">Bletchley Park</span></a>, and allowed the cipher to be broken throughout World War II.Unintended weaknesses were also present in the early mechanical cipher machines of <span class="short" aria-label="Crypto AG (Hagelin)" data-balloon-pos="up"><a class="short" href="https://www.cryptomuseum.com/manuf.crypto/index.htm">Crypto AG</a></span> (Hagelin), such as the <a href="https://www.cryptomuseum.com/crypto/hagelin/c36/index.htm"><span data-balloon-pos="up" aria-label="More about: C-36">C-36</span></a>, <a href="https://www.cryptomuseum.com/crypto/hagelin/m209/index.htm"><span data-balloon-pos="up" aria-label="More about: M-209">M-209</span></a>, <a href="https://www.cryptomuseum.com/crypto/hagelin/c446/index.htm"><span data-balloon-pos="up" aria-label="More about: C-446">C-446</span></a> and <a href="https://www.cryptomuseum.com/crypto/hagelin/cx52/index.htm"><span data-balloon-pos="up" aria-label="More about: CX-52">CX-52</span></a>. Although they were theoretically strong, they could accidentally be setup in such a way that they produced a short cycle, which could be broken much more easily. Similar properties can be found in the first generations of electronic crypto devices that are based on shift-registers.</p>
<div data-balloon-pos="up" aria-label="Close-up of the Clipper Chip inside the TSD-3600"><img loading="lazy" decoding="async" class="size-full wp-image-9598 alignleft" src="https://goodshepherdmedia.net/wp-content/uploads/2021/11/small-3.jpg" alt="" width="298" height="200" /></div>
<p>It had to be assumed that the (US) government could be trusted under all circumstances, and that sufficient mechanisms were in place to avoid unwarranted tapping and other abuse, which was heavily disputed by the Electronic Frontier Foundation (EFF) and other privacy organisations.</p>
<p>The device – which used the <a href="https://www.cryptomuseum.com/crypto/usa/skipjack.htm"><span data-balloon-pos="up" aria-label="More about: Skipjack algorithm">Skipjack algorithm</span></a> – was not embraced by the public. In addition, it contained a serious flaw. In 1994, shortly after its introduction, (then) AT&amp;T researcher Matt Blaze discovered the possibility to tamper the device in such a way that it offered strong encryption whilst disabling the escrow capability. And that was not what the US Government had in mind.</p>
<p><b>Cryptographic Key Escrow</b></p>
<p>The Clipper Chip was a cryptographic chipset developed and promoted by the US Government. It was intended for implementation in <a href="https://www.cryptomuseum.com/crypto/voice.htm"><span data-balloon-pos="up" aria-label="More about: secure voice equipment">secure voice equipment</span></a>, such as <a href="https://www.cryptomuseum.com/crypto/phone.htm"><span data-balloon-pos="up" aria-label="More about: crypto phones">crypto phones</span></a>, and required its users to surrender their cryptographic keys in escrow to the government. This would allow law enforcement agencies (<a href="https://goodshepherdmedia.net/cia-central-intelligence-agency/" target="_blank" rel="noopener"><span data-balloon-pos="up" aria-label="More about: CIA">CIA</span></a>, FBI), to decrypt any traffic for surveillance and intelligence  purposes. The controversial Clipper Chip was announced in 1993 and was already defunct by 1996 <a href="https://www.cryptomuseum.com/crypto/usa/clipper.htm#ref_1">[1]</a>.</p>
<p>The physical chip was designed by <a href="https://www.cryptomuseum.com/crypto/usa/kiv7/index.htm#manuf"><span data-balloon-pos="up" aria-label="More about: Mykotronx">Mykotronx</span></a> (USA) and manufactured by VLSI Technology Inc. (USA). The initial cost for an unprogrammed chip was $16 and a programmed one costed $26.</p>
<p>The image on the right shows the Mykotronx <b>MYK78T</b> chip as it is present inside the AT&amp;T&#8217;s <a href="https://www.cryptomuseum.com/crypto/att/tsd3600/index.htm"><span data-balloon-pos="up" aria-label="More about: TSD-3600-E telephone encryptor">TSD-3600-E telephone encryptor</span></a>. The chip is soldered directly to the board (i.e. not socketed) and was thought to be tamper-proof (<a href="https://www.cryptomuseum.com/crypto/usa/clipper.htm#weakness"><span data-balloon-pos="up" aria-label="Jump to: see below">see below</span></a>). The <a href="https://www.cryptomuseum.com/crypto/att/tsd3600/index.htm"><span data-balloon-pos="up" aria-label="More about: AT&amp;T TSD-3600 telephone encryptor">AT&amp;T TSD-3600 telephone encryptor</span></a> was the first and only product that featured the ill-fated Clipper Chip before it was withdrawn.</p>
<p>in order to provide a level of protection against misuse of the key by law enforcement agencies, it was agreed that the Unit Key of each device with a clipper chip, would be held in escrow jointly by two federal agencies. This means that the actual Unit Key was split in two parts, each of which was given to one of the agencies. In order to reconstruct the actual Unit Key, the database of both agencies had to be accessed and the two half-Unit Keys had to be combined by bitwise XOR <a href="https://www.cryptomuseum.com/crypto/usa/clipper.htm#ref_3">[3]</a>.</p>
<p><b>Skipjack Algorithm</b><br />
The Clipper Chip used the <a href="https://www.cryptomuseum.com/crypto/usa/skipjack.htm"><span data-balloon-pos="up" aria-label="More about: Skipjack encryption algorithm">Skipjack encryption algorithm</span></a> for the transmission of information, and the Diffie-Hellman key exchange algorithm for the distribution of the cryptographic session keys between peers. Both algorithms are believed to provide good security.</p>
<p>The Skipjack algorithm was developed by the <a href="https://www.cryptomuseum.com/crypto/usa/nsa.htm"><span data-balloon-pos="up" aria-label="More about: NSA">NSA</span></a> and was classed an NSA <a href="https://www.cryptomuseum.com/crypto/usa/nsa.htm#types"><span data-balloon-pos="up" aria-label="More about: Type 2 encryption product">Type 2 encryption product</span></a>. The algorithm was initially classified as SECRET, so that it could not be examined in the usual manner by the encryption research community. After much debate, the Skipjack algorithm was finally declassified and published by the <a href="https://www.cryptomuseum.com/crypto/usa/nsa.htm"><span data-balloon-pos="up" aria-label="More about: NSA">NSA</span></a> on 24 June 1998 <a href="https://www.cryptomuseum.com/crypto/usa/clipper.htm#ref_2">[2]</a>. It uses an 80-bit key and a symmetric cipher algorithm, similar to DES.</p>
<p><b>Key Escrow</b><br />
The heart of the concept was <b>Key Escrow</b>. Any device with a Clipper Chip inside (e.g. a <a href="https://www.cryptomuseum.com/crypto/att/tsd3600/index.htm"><span data-balloon-pos="up" aria-label="More about: crypto phone">crypto phone</span></a>) would be assigned a <b>cryptographic key</b>, which would be given to the government in escrow. The user would then assume the government to be the so-called <b>trusted third party</b>. If government agencies &#8220;established their authority&#8221; to intercept a particular communication, the key would be given to that agency, so that all data transmitted by the subject could be decrypted.</p>
<p>The concept of Key Escrow raised much debate and became heavily disputed. The Electronic Frontier Foundation (EFF), established in 1990, preferred the term <i>Key Surrender</i> to stress what, according to them, was actually happening. Together with other public interest organizations, such as the Electronic Privacy Information Center, the EFF challenged the Clipper Chip proposal, saying that it would be illegal and also ineffective, as criminals wouldn&#8217;t use it anyway.</p>
<p>In response to the Clipper Chip initiative by the US Government, a number of very strong <i>public</i> encryption packages were released, such as Nautilus, PGP and PGPfone. It was thought that, if strong cryptography was widely available to the public, the government would be unable to stop its use. This approach appeared to be effective, causing the premature &#8216;death&#8217; of the Clipper Chip, and with it the death of Key Escrow in general.</p>
<p>In 1993, AT&amp;T Bell produced the first and only telephone encryptor based on the Clipper Chip: the <a href="https://www.cryptomuseum.com/crypto/att/tsd3600/index.htm"><span data-balloon-pos="up" aria-label="More about: TSD-3600">TSD-3600</span></a>. A year later, in 1994, Matt Blaze, a researcher at AT&amp;T, published a major design flaw in the Escrowed Encryption System (EES). A malicious party could tamper the software and use the Clipper Chip as an encryption device, whilst disabling the key escrow capability.</p>
<p><img loading="lazy" decoding="async" class="size-full wp-image-9600 aligncenter" src="https://goodshepherdmedia.net/wp-content/uploads/2021/11/ees_leaf.png" alt="" width="560" height="276" srcset="https://goodshepherdmedia.net/wp-content/uploads/2021/11/ees_leaf.png 560w, https://goodshepherdmedia.net/wp-content/uploads/2021/11/ees_leaf-300x148.png 300w" sizes="(max-width: 560px) 100vw, 560px" /></p>
<p>When establishing a connection, the Clipper Chip transmits a 128-bit Law Enforcement Access Field (LEAF). The above diagram shows how the LEAF was established. The LEAF contained information needed by the intercepting agency to establish the encryption key.</p>
<p>To prevent the software from tampering with the LEAF, a 16-bit hash code was included. If the hash didn&#8217;t match, the Clipper Chip would not decrypt any messages. The 16-bit hash however, was too short to be safe, and a brute force attack would easily produce the same hash for a fake session key, thus not revealing the actual keys <a href="https://www.cryptomuseum.com/crypto/usa/clipper.htm#ref">[3]</a> . If a malicious user would tamper the device&#8217;s software in this way, law enforcement agencies would not be able to reproduce the actual session key. As a result, they would not be able to decrypt the traffic.</p>
<p><b>Interior</b><img loading="lazy" decoding="async" src="https://www.cryptomuseum.com/img/blank.gif" width="1" height="1" /><img loading="lazy" decoding="async" src="https://www.cryptomuseum.com/img/blank.gif" width="1" height="4" /></p>
<p>Since the Clipper-project has failed, we think it is safe to show you the contents of the chip. Although this is something we would not normally do, this one is too good to be missed. Below, Travis Goodspeed shows us how easy it is to open the package and reverse-engineer a chip <a href="https://www.cryptomuseum.com/crypto/usa/clipper.htm#ref_4">[4]</a>. Luckily, according to Kerckhoff&#8217;s principle, the secret is in the key and not in the device <a href="https://www.cryptomuseum.com/crypto/usa/clipper.htm#ref_5">[5]</a>.</p>
<div data-balloon-pos="up" aria-label="Interior of the ill-fated MYK-78 Clipper Chip"><img loading="lazy" decoding="async" class="size-large wp-image-9601 aligncenter" src="https://goodshepherdmedia.net/wp-content/uploads/2021/11/myk78_large-1024x969.jpg" alt="" width="640" height="606" srcset="https://goodshepherdmedia.net/wp-content/uploads/2021/11/myk78_large-1024x969.jpg 1024w, https://goodshepherdmedia.net/wp-content/uploads/2021/11/myk78_large-300x284.jpg 300w, https://goodshepherdmedia.net/wp-content/uploads/2021/11/myk78_large-768x726.jpg 768w, https://goodshepherdmedia.net/wp-content/uploads/2021/11/myk78_large.jpg 1200w" sizes="(max-width: 640px) 100vw, 640px" /></div>
<p>&nbsp;</p>
<p><span style="color: #555555; font-family: Lucida Grande,Arial,Verdana,sans-serif;"><br />
The black dots along the four edges are the connection pads of the chip. The image was publised on <a href="http://www.flickr.com/photos/travisgoodspeed/3471087563/"><span data-balloon-pos="up" aria-label="www.flickr.com (off-site)">Travis&#8217; photostream on Flickr</span></a> and is reproduced here with his kind permission. Click the image for a <a href="https://www.cryptomuseum.com/crypto/usa/img/myk78_large.jpg"><span data-balloon-pos="up" aria-label="More about: hi-res version">hi-res version</span></a>. Note that this is a large file (18MB) which may take some time to download.</span></p>
<p><img loading="lazy" decoding="async" class=" wp-image-9596 alignleft" src="https://goodshepherdmedia.net/wp-content/uploads/2021/11/small-1.jpg" alt="" width="286" height="192" />In some cases, the safety doctrine that is intended to make the device more secure, actually makes the cipher weaker. For example: during WWII, the German cipher authority dictated that a particular cipher wheel should not be used in the same position on two successive days. Whilst this may seem like a good idea, it effectively reduces the maximum number of possible settings.</p>
<p>By far the most common of the unintended weaknesses is operator error, such as choosing a simple or easy to guess password, sending multiple messages on the same key, sending the same message on two different keys, etc. Here are some examples of unintended weaknesses</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p><img loading="lazy" decoding="async" class=" wp-image-9595 alignleft" src="https://goodshepherdmedia.net/wp-content/uploads/2021/11/small.jpg" alt="" width="344" height="231" /><br />
With a special key combination, the key logger can be turned in a USB memory stick, from which the logged data can be recovered by a malicious party. A more sophisticated example of covert hardware, is the addition of a (miniature) chip on the printed circuit board of an existing device. As many companies today have outsourced the production of their electronics, there is always a possibility that it might be maliciously modified by a foreign party. This is particularly the case with critical infrastructure like routers, switches and telecommunications backbone equipment. This problem is enhanced by the increasing complexity of modern computers, as a result of which virtually no one knows exactly how it works. A good example is the tiny computer that is hidden inside Intel&#8217;s AMT processors, and that has been actively exploited as a spying tool <a href="https://www.cryptomuseum.com/intel/nsa/backdoor.htm#ref_6">[6]</a>.</p>
<ul>
<li><a href="https://www.cryptomuseum.com/intel/cia/rubicon.htm">Crypto Museum, <i>Operation RUBICON</i></a><br />
February 2020.<a name="ref_2"></a></li>
<li><a href="https://en.wikipedia.org/wiki/Backdoor_(computing)" target="_blank" rel="noopener">Wikipedia, <i>Backdoor (computing)</i></a><br />
Retrieved February 2020<a name="ref_3"></a></li>
<li><a href="https://en.wikipedia.org/wiki/Random_number_generator_attack" target="_blank" rel="noopener">Wikipedia, <i>Random number generator attack</i></a><br />
Retrieved February 2020<a name="ref_4"></a></li>
<li><a href="https://en.wikipedia.org/wiki/Dual_EC_DRBG" target="_blank" rel="noopener">Wikipedia, <i>Dual_EC_DRBG</i></a><br />
Retrieved February 2020<a name="ref_5"></a></li>
<li><a href="https://en.wikipedia.org/wiki/_NSAKEY" target="_blank" rel="noopener">Wikipedia, <i>_NSAKEY</i></a><br />
Retrieved February 2020<a name="ref_6"></a></li>
<li><a href="https://en.wikipedia.org/wiki/Intel_Active_Management_Technology" target="_blank" rel="noopener">Wikipedia, <i>Intel_Active Management Technology</i></a><br />
Retrieved November 2020.</li>
<li>Adding a small chip to the board (can only be done during production process)</li>
<li>Adding a regular component with a built-in chip <span style="color: #e7e;">➤</span> <a href="https://www.cryptomuseum.com/covert/bugs/nsaant/firewalk/index.htm">e.g. NSA&#8217;s FIREWALK</a></li>
<li>Tiny computer inside a regular processor <span style="color: #e7e;">➤</span> <a href="https://en.wikipedia.org/wiki/Intel_Active_Management_Technology" target="_blank" rel="noopener">e.g. Intel AMT</a></li>
<li>External key logger (USB or PS2)</li>
<li>Key logger (spy) software</li>
<li>Computer viruses</li>
<li>Supply chain attack</li>
<li>Weak keys</li>
<li>A letter can not encode into itself (Enigma)</li>
<li>False security measures</li>
<li>Operator mistakes</li>
<li>Software bugs</li>
</ul>
<p><img loading="lazy" decoding="async" class="size-full wp-image-9594 alignleft" src="https://goodshepherdmedia.net/wp-content/uploads/2021/11/intel_small.jpg" alt="" width="298" height="200" />Another way of getting surreptitious access to a computer system, such as a personal computer, is by covertly installing additional hardware or software that gives an adversary direct or indirect access to the system and its data. Spyware can be visible, but can also be completely invisible.</p>
<p>An example of a hidden-in-plain-sight device is a so-called key logger that can be installed between keyboard and computer. The image on the right shows two variants: one for USB (left) and one for the old PS-2 keyboard interface.</p>
<p>Items like these can easily be installed in an office – for example by the cleaning lady – and are hardly noticed in the tangle of wires below your desk. It registers every key stroke, complete with time/date stamp, including your passwords. If the cleaning lady removes it a few days later, you will never find out that it was ever installed.</p>
<p>Manipulated hardware can be used to eavesdrop on your data, but can also be used as part of a Distributed Denial of Service attack (DDoS), or to disrupt the critical infrastructure of a company or even an entire country. In many cases, such attacks are carried out by (foreign) state actors. <span style="color: #555555; font-family: Lucida Grande,Arial,Verdana,sans-serif;">Manipulation of hardware is also possible by adding a secret chip to a regular inconspicuous component. A good example is the <span data-balloon-pos="up" aria-label="More about: FIREWALK implant">FIREWALK implant</span> of the US National Security Agency (NSA) that is hidden inside a regular RJ45 Ethernet socket of a computer. It is used by the <span class="short" aria-label="National Security Agency (USA)" data-balloon-pos="up"><a class="short" href="https://goodshepherdmedia.net/nsa-national-security-agency/" target="_blank" rel="noopener">NSA</a></span> to spy behind firewalls and was disclosed by former <span class="short" aria-label="Central Intelligence Agency (USA)" data-balloon-pos="up"><a class="short" href="https://goodshepherdmedia.net/cia-central-intelligence-agency/" target="_blank" rel="noopener">CIA</a> </span>/ <span class="short" aria-label="National Security Agency (USA)" data-balloon-pos="up"><a class="short" href="https://goodshepherdmedia.net/nsa-national-security-agency/" target="_blank" rel="noopener">NSA</a></span>-contractor <a href="https://goodshepherdmedia.net/edward-snowden-nsa-whistleblower/" target="_blank" rel="noopener"><span data-balloon-pos="up" aria-label="More about: Edward Snowden">Edward Snowden</span></a> in 2013.</span></p>
<p>This device is particularly dangerous as it can not be found with a visual inspection. Further­more, it transmits the intercepted data via radio waves and effectively bypasses all security.</p>
<div data-balloon-pos="up" aria-label="NSA's FIREWALK network implant. Copyright Crypto Museum. Click for more details." data-balloon-length="large"><img decoding="async" src="https://www.cryptomuseum.com/covert/bugs/nsaant/firewalk/svg/firewalk_bare.svg" alt="NSA's FIREWALK network implant. Copyright Crypto Museum. Click for more details." width="298px" align="left" border="0" vspace="4" /></div>
<p>Is this problem restricted to high-end (computing) devices? Certainly not. Most modern domestic appliances, such as smart thermomenters, smart meters, domotica and in particular devices for the Internet of Things (IoT), are badly built, contain badly written software and are rarely properly protected, as a result of which they are extremely vulnerable to manipulation (hacking).</p>
<p><a href="https://www.cryptomuseum.com/intel/nsa/backdoor.htm" target="_blank" rel="noopener">source</a></p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<ul>
<li><a href="https://www.cryptomuseum.com/intel/nsa/index.htm#inter" target="_blank" rel="noopener">NSA-backdoored equipment info found OFF this website</a></li>
<li><a href="https://goodshepherdmedia.net/u-s-government-catalogue-of-cellphone-surveillance-devices-used-by-the-military-and-by-cia-nsa-fbi-and-other-intelligence-agencies/" target="_blank" rel="noopener">U.S. Government Catalogue of Cellphone Surveillance Devices</a></li>
<li><a href="https://en.wikipedia.org/wiki/Backdoor_(computing)" target="_blank" rel="noopener">Backdoors on Wikipedia</a></li>
<li><a href="https://goodshepherdmedia.net/nsa-national-security-agency/" target="_blank" rel="noopener">National Security Agency</a></li>
<li><a href="https://goodshepherdmedia.net/cia-central-intelligence-agency/" target="_blank" rel="noopener">Central Intelligence Agency</a></li>
<li><a href="https://nsa.gov1.info/dni/index.html" target="_blank" rel="noopener">NSA EXTRACTED INFO</a></li>
<li><a href="https://www.cryptomuseum.com/" target="_blank" rel="noopener">CRYPTO MUSEUM</a></li>
<li><a href="https://goodshepherdmedia.net/edward-snowden-nsa-whistleblower/" target="_blank" rel="noopener">Edward Snowden</a></li>
<li><a href="https://goodshepherdmedia.net/can-cops-secretly-listen-to-my-phone-how-cops-can-secretly-track-your-phone/" target="_blank" rel="noopener">Stingray</a></li>
<li><a href="https://goodshepherdmedia.net/fbi-vows-not-to-use-pegasus-spyware-after-grilling-from-capitol-hill/" target="_blank" rel="noopener">Pegasus Spyware</a></li>
<li><a href="https://goodshepherdmedia.net/x-keyscore-allows-the-nsa-and-allies-to-monitor-emails-web-browsing-internet-searches-and-social-media/" target="_blank" rel="noopener">X-Keyscore</a></li>
</ul>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>FBI’s Encrypted Phone Platform Infiltrated Hundreds of Criminal Syndicates; Result is Massive Worldwide Takedown</title>
		<link>https://goodshepherdmedia.net/fbis-encrypted-phone-platform-infiltrated-hundreds-of-criminal-syndicates-result-is-massive-worldwide-takedown/</link>
		
		<dc:creator><![CDATA[The Truth News]]></dc:creator>
		<pubDate>Mon, 09 Dec 2024 09:00:14 +0000</pubDate>
				<category><![CDATA[⚠️Breaking News⚠️]]></category>
		<category><![CDATA[Digital Pioneers]]></category>
		<category><![CDATA[Government Spying]]></category>
		<category><![CDATA[Hackers / Master Programmers]]></category>
		<category><![CDATA[Hardware Pioneers]]></category>
		<category><![CDATA[Legal News The Motivation]]></category>
		<category><![CDATA[Politics]]></category>
		<category><![CDATA[Software Pioneers]]></category>
		<category><![CDATA[Tech]]></category>
		<category><![CDATA[Top Stories]]></category>
		<category><![CDATA[Zee Truthful News]]></category>
		<category><![CDATA[🎖️🪖Military Tech🤖]]></category>
		<category><![CDATA[💻Tech History]]></category>
		<category><![CDATA[📱Mobile📱]]></category>
		<category><![CDATA[🔐Hacking Technology]]></category>
		<category><![CDATA[🙂Fun Facts🙂]]></category>
		<category><![CDATA[ANØM]]></category>
		<category><![CDATA[FBI’s Encrypted Phone Platform]]></category>
		<category><![CDATA[Massive Criminal Takedown]]></category>
		<category><![CDATA[Massive Worldwide Takedown]]></category>
		<guid isPermaLink="false">https://goodshepherdmedia.net/?p=18981</guid>

					<description><![CDATA[FBI’s Encrypted Phone Platform ANØM​ Infiltrated Hundreds of Criminal Syndicates; Result is Massive Worldwide Takedown SAN DIEGO – A wave of hundreds of arrests that began in Australia and stretched across Europe culminated today with the unsealing of a federal grand jury indictment in San Diego charging 17 foreign nationals with distributing thousands of encrypted [&#8230;]]]></description>
										<content:encoded><![CDATA[<h1 class="page-title"><span class="field-formatter--string">FBI’s Encrypted Phone Platform ANØM​ Infiltrated Hundreds of Criminal Syndicates; Result is Massive Worldwide Takedown</span></h1>
<div class="node-body">
<div class="field-formatter--text-default field-text-format--wysiwyg text-formatted field_body">
<p>SAN DIEGO – A wave of hundreds of arrests that began in Australia and stretched across Europe culminated today with the unsealing of a federal grand jury indictment in San Diego charging 17 foreign nationals with distributing thousands of encrypted communication devices to criminal syndicates.</p>
<p>The 500-plus arrests that took place during a worldwide two-day takedown were possible because of a San Diego-based investigation like no other. For the first time, the FBI operated its own encrypted device company, called “ANOM,” which was promoted by criminal groups worldwide. These criminals sold more than 12,000 ANOM encrypted devices and services to more than 300 criminal syndicates operating in more than 100 countries, including Italian organized crime, Outlaw Motorcycle Gangs, and various international drug trafficking organizations, according to court records.</p>
<div class="media entity-type-media entity-bundle-document media--document--embedded entity-document-1145201" data-link-text-override="SEARCH WARRANT - Operation Trojan Shield">
<div>
<ul>
<li class="field-formatter--media-entity-download-download-link field_media_file"><a class="file file--mime-application-pdf file--application-pdf" title="unsealed_trojan_shield_search_warrant_21mj1948.pdf" href="https://www.justice.gov/usao-sdca/press-release/file/1402426/dl?inline" type="application/pdf; length=1831954" data-once="doj-analytics">SEARCH WARRANT &#8211; Operation Trojan Shield</a></li>
<li><a class="file file--mime-application-pdf file--application-pdf" title="unsealed_trojan_shield_indictment_21cr1623-jls.pdf" href="https://www.justice.gov/usao-sdca/press-release/file/1402421/dl?inline" type="application/pdf; length=7161282" data-once="doj-analytics">INDICTMENT &#8211; Operation Trojan Shield</a></li>
</ul>
</div>
</div>
</div>
</div>
<div></div>
<div>
<p><iframe title="ANØM: The Most Genius FBI Operation" width="640" height="360" src="https://www.youtube.com/embed/f6FRIDG8TPY?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
</div>
<div></div>
<div></div>
<div></div>
<div></div>
<div class="node-body">
<div class="field-formatter--text-default field-text-format--wysiwyg text-formatted field_body">
<div class="media entity-type-media entity-bundle-image media--image--s12 entity-image-121486">
<div class="field__item img_wrp"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-18987" src="https://goodshepherdmedia.net/wp-content/uploads/2024/12/worldmap.jpg" alt="" width="1200" height="629" srcset="https://goodshepherdmedia.net/wp-content/uploads/2024/12/worldmap.jpg 1200w, https://goodshepherdmedia.net/wp-content/uploads/2024/12/worldmap-400x210.jpg 400w, https://goodshepherdmedia.net/wp-content/uploads/2024/12/worldmap-1024x537.jpg 1024w, https://goodshepherdmedia.net/wp-content/uploads/2024/12/worldmap-768x403.jpg 768w" sizes="(max-width: 1200px) 100vw, 1200px" /></div>
</div>
<p>During the course of the investigation, while ANOM’s criminal users unknowingly promoted and communicated on a system operated lawfully by the FBI, agents catalogued more than 27 million messages between users around the world who had their criminal discussions reviewed, recorded, and translated by the FBI, until the platform was taken down yesterday.</p>
<p>The users, believing their ANOM devices were protected from law enforcement by the shield of impenetrable encryption, openly discussed narcotics concealment methods, shipments of narcotics, money laundering, and in some groups—violent threats, the indictment said. Some users negotiated drug deals via these encrypted messages and sent pictures of drugs, in one instance hundreds of kilograms of cocaine concealed in shipments of pineapples and bananas, and in another instance, in cans of tuna, in order to evade law enforcement.</p>
<p>The indictment charges 17 alleged distributors of the FBI’s devices and platform. They are charged with conspiring to violate the Racketeer Influenced and Corrupt Organizations Act (RICO), pertaining to their alleged involvement in marketing and distributing thousands of encrypted communication devices to transnational criminal organizations worldwide.</p>
<p>During the last 24 to 48 hours, in addition to the more than 500 arrests around the world, authorities searched more than 700 locations deploying more than 9,000 law enforcement officers worldwide and seized multi-ton quantities of illicit drugs.</p>
<h3><a class="ext" href="https://youtube.com/playlist?list=PLGvHJHdPh24XB-t5vUVzMP4FBvF-V1dmk" target="_blank" rel="noopener" data-extlink="">CLICK HERE &#8211; Video Messages from International Partners</a></h3>
<p><iframe title="Operation Trojan Shield International Partners" width="640" height="360" src="https://www.youtube.com/embed/videoseries?list=PLGvHJHdPh24XB-t5vUVzMP4FBvF-V1dmk" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
<p>Grand totals for the entire investigation include 800 arrests; and seizures of more than 8 tons of cocaine; 22 tons of marijuana; 2 tons of methamphetamine/amphetamine; six tons of precursor chemicals; 250 firearms; and more than $48 million in various worldwide currencies<s>.</s> Dozens of public corruption cases have been initiated over the course of the investigation. And, during the course of the investigation, more than 50 clandestine drug labs have been dismantled. One of the labs hit yesterday was one of the largest clandestine labs in German history.</p>
<p>“This was an unprecedented operation in terms of its massive scale, innovative strategy and technological and investigative achievement,” said Acting U.S. Attorney Randy Grossman. “Hardened encrypted devices usually provide an impenetrable shield against law enforcement surveillance and detection. The supreme irony here is that the very devices that these criminals were using to hide from law enforcement were actually beacons for law enforcement. We aim to shatter any confidence in the hardened encrypted device industry with our indictment and announcement that this platform was run by the FBI.”</p>
<div class="align-left entity-type-media entity-bundle-image media--image--s07 entity-image-121491">
<div class="field__item img_wrp"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-18982" src="https://goodshepherdmedia.net/wp-content/uploads/2024/12/may2021.jpg" alt="" width="700" height="380" srcset="https://goodshepherdmedia.net/wp-content/uploads/2024/12/may2021.jpg 700w, https://goodshepherdmedia.net/wp-content/uploads/2024/12/may2021-400x217.jpg 400w" sizes="(max-width: 700px) 100vw, 700px" /></div>
</div>
<div class="align-left entity-type-media entity-bundle-image media--image--s07 entity-image-121496">
<div class="field__item img_wrp"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-18983" src="https://goodshepherdmedia.net/wp-content/uploads/2024/12/october_2020.jpg" alt="" width="700" height="377" srcset="https://goodshepherdmedia.net/wp-content/uploads/2024/12/october_2020.jpg 700w, https://goodshepherdmedia.net/wp-content/uploads/2024/12/october_2020-400x215.jpg 400w" sizes="(max-width: 700px) 100vw, 700px" /></div>
</div>
<p>“Today marks the culmination of more than five years of innovative and complex investigative work strategically aimed to disrupt the encrypted communications space that caters to the criminal element,” said Suzanne Turner, Special Agent in Charge of the Federal Bureau of Investigation (FBI) &#8211; San Diego Field Office.  “The FBI has brought together a network of dedicated international law enforcement partners who are steadfast in combating the global threat of organized crime. The immense and unprecedented success of Operation Trojan Shield should be a warning to international criminal organizations  – your criminal communications may not be secure; and you can count on law enforcement worldwide working together to combat dangerous crime that crosses international borders.”</p>
<p>“Operation Trojan Shield is a perfect example of an OCDETF case &#8211; an investigation driven by intelligence and maximizing the strengths of partner law enforcement agencies in coordinated efforts to dismantle command and control elements of criminal networks,” said OCDETF Director Adam W. Cohen.  “Coordination is the cornerstone of the OCDETF program, and the impressiveness of the combined efforts of the U.S. Attorney’s Office, FBI, and our foreign partners cannot be overstated.  This effort has created lasting disruptive impacts to these transnational criminal organizations.”</p>
<p>“The AFP and FBI have been working together on a world-first operation to bring to justice the organised crime gangs flooding our communities with drugs, guns and violence,” said AFP Commissioner Reece Kershaw APM. “The FBI provided an encrypted communications platform while the AFP deployed the technical capability which helped unmask some of the biggest criminals in the world. This week the AFP and our state police partners will execute hundreds of warrants and we expect to arrest hundreds of offenders linked to the platform. This is the culmination of hard work, perseverance and an invaluable, trusted relationship with the FBI.</p>
<p>We thank the FBI for their long and integral partnership with the AFP.”</p>
<p>Europol’s Deputy Executive Director Jean-Philippe Lecouffe: “This operation is an exceptional success by the authorities in the United States, Sweden, the Netherlands, Australia, New Zealand and the other European members of the Operational Task Force. Europol coordinated the international law enforcement community, enriched the information picture and brought criminal intelligence into ongoing operations to target organised crime and drug trafficking organisations, wherever they are and however they choose to communicate. I am very satisfied to see Europol supporting this operation and strengthen law enforcement partnerships by emphasizing the multi-agency aspect of the case.”</p>
<div class="align-left entity-type-media entity-bundle-image media--image--s04 entity-image-121511">
<div class="field__item img_wrp"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-18985" src="https://goodshepherdmedia.net/wp-content/uploads/2024/12/batman.jpg" alt="" width="400" height="535" srcset="https://goodshepherdmedia.net/wp-content/uploads/2024/12/batman.jpg 400w, https://goodshepherdmedia.net/wp-content/uploads/2024/12/batman-299x400.jpg 299w" sizes="(max-width: 400px) 100vw, 400px" /></div>
</div>
<div class="align-left entity-type-media entity-bundle-image media--image--s03 entity-image-121526">
<div class="field__item img_wrp"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-18984" src="https://goodshepherdmedia.net/wp-content/uploads/2024/12/cipher.jpg" alt="" width="300" height="520" srcset="https://goodshepherdmedia.net/wp-content/uploads/2024/12/cipher.jpg 300w, https://goodshepherdmedia.net/wp-content/uploads/2024/12/cipher-231x400.jpg 231w" sizes="(max-width: 300px) 100vw, 300px" /></div>
</div>
<p>“I am exceptionally proud of our New Zealand Police staff who supported Operation Trojan Shield,” said New Zealand Police Commissioner Andrew Coster. “This operation will have an unprecedented impact on organised crime syndicates across the globe. We value our strong relationship with the FBI, AFP and Europol and it is through these partnerships and the unrelenting efforts by law enforcement agencies from multiple countries that this operation has seen such incredible success This is a fantastic result and reiterates the importance of our transnational partnerships with law enforcement agencies across the globe in our common ongoing efforts to dismantle organised crime groups and the enormous harm they cause to our communities.”</p>
<p>“This remarkably successful operation demonstrates what can be accomplished when law enforcement agencies throughout the world work together,” said DEA Los Angeles Division Special Agent in Charge Bill Bodner. “Through strong relationships with our partners in more than 67 countries, professionals throughout the DEA, including experts in the Los Angeles Division, supported this unprecedented collaboration and our own mission to disrupt and dismantle the criminal organizations that profit from the distribution of illegal drugs.”</p>
<p>According to the San Diego indictment, ANOM’s administrators, distributors, and agents described the platform to potential users as “designed by criminals for criminals” and targeted the sale of ANOM to individuals that they knew participated in illegal activities.</p>
<p>All defendants are foreign nationals located outside of the U.S. In total, eight of the indicted defendants were taken into custody last night.  Authorities are continuing to search for the remaining nine defendants.</p>
<p>The indictment alleges the defendants knew the devices they distributed were being used exclusively by criminals to coordinate drug trafficking and money laundering, including in the U.S. The defendants personally fielded “wipe requests” from users when devices fell into the hands of law enforcement.</p>
<p>The FBI’s review of ANOM users’ communications worked like a blind carbon copy function in an email. A copy of every message being sent from each device was sent to a server in a third-party country where the messages were collected and stored. The data was then provided to the FBI on a regular basis pursuant to an international cooperation agreement. Communications such as text messages, photos, audio messages, and other digital information were reviewed by the FBI for criminal activity and disseminated to partner law enforcement agencies in other countries. Each user was using ANOM for a criminal purpose. Those countries have built their own cases against ANOM users, many of whom were arrested in takedowns in Europe, Australia and New Zealand over the last several days.</p>
<p>Intelligence derived from the FBI’s communications platform presented opportunities to disrupt major drug trafficking, money laundering, and other criminal activity while the platform was active. For example, over 150 unique threats to human life were mitigated.</p>
<p>This operation was led by the FBI and coordinated with the U.S. Drug Enforcement Administration, the U.S. Marshals Service, Australian Federal Police, Swedish Police Authority, National Police of the Netherlands, Lithuanian Criminal Police Bureau, Europol, and numerous other law enforcement partners from over a dozen other countries.</p>
<p>This investigation began after Canada-based encrypted device company Phantom Secure was dismantled by the FBI in 2018 through a San Diego-based federal RICO indictment and court-authorized seizure of the Phantom Secure platform, forcing many criminals to seek other secret communication methods to avoid law enforcement detection. The FBI—along with substantial contributions by the Australian Federal Police—filled that void with ANOM.</p>
<p>When the FBI and the San Diego U.S. Attorney’s Office dismantled Sky Global in March 2021, the demand for ANOM devices grew exponentially as criminal users sought a new brand of hardened encryption device to plot their drug trafficking and money laundering transactions and to evade law enforcement.  Demand for ANOM from criminal groups also increased after European investigators announced the dismantlement of the EncroChat platform in July 2020. The ANOM platform &#8211; unlike Phantom Secure, EncroChat, and Sky Global &#8211; was exploited by the FBI from the very beginning of ANOM’s existence and was not an infiltration of an existing popular encrypted communications company.</p>
<p>In October 2018, Phantom Secure’s CEO pleaded guilty to a RICO conspiracy in the Southern District of California.  He was sentenced to nine years in prison and ordered to forfeit $80 million in proceeds from the sale of Phantom devices.</p>
<p>For further information, please see <a href="https://www.justice.gov/usao-sdca/pr/chief-executive-communications-company-sentenced-prison-providing-encryption-services">https://www.justice.gov/usao-sdca/pr/chief-executive-communications-company-sentenced-prison-providing-encryption-services</a> and <a href="https://www.justice.gov/usao-sdca/pr/sky-global-executive-and-associate-indicted-providing-encrypted-communication-devices">https://www.justice.gov/usao-sdca/pr/sky-global-executive-and-associate-indicted-providing-encrypted-communication-devices</a>.</p>
<p>Operation Trojan Shield is an Organized Crime Drug Enforcement Task Forces (OCDETF) investigation.  OCDETF identifies, disrupts, and dismantles the highest-level drug traffickers, money launderers, gangs, and transnational criminal organizations that threaten the United States by using a prosecutor-led, intelligence-driven, multi-agency approach that leverages the strengths of federal, state, and local law enforcement agencies against criminal networks.</p>
<p>Assistant U.S. Attorneys Meghan E. Heesch, Joshua C. Mellor, Shauna Prewitt, and Mikaela Weber of the U.S. Attorney’s Office for the Southern District of California are prosecuting the case, with assistance from Paralegal Specialist Tracie Jarvis.  Former Assistant U.S. Attorney Andrew P. Young made invaluable contributions during his tenure on the case team.</p>
<p>Acting U.S. Attorney Grossman praised federal prosecutors and FBI agents and international law enforcement partners for their relentless pursuit of justice in this extraordinary case. Additionally, Acting U.S. Attorney Grossman thanked the coordinated efforts of the Department of Justice’s Office of International Affairs which facilitated many international components of this complex investigation.</p>
<p>The charges and allegations contained in an indictment are merely accusations, and the defendants are considered innocent unless and until proven guilty.</p>
<table style="height: 653px;" border="1" width="1031" cellspacing="1" cellpadding="1">
<thead>
<tr>
<th scope="col">
<h3><strong>DEFENDANTS  21-CR-1623-JLS</strong></h3>
</th>
<th scope="col">
<h3><strong>COUNTRY</strong></h3>
</th>
</tr>
</thead>
<tbody>
<tr>
<td><strong>*Joseph Hakan Ayik (1)</strong></td>
<td></td>
</tr>
<tr>
<td><strong>Domenico Catanzariti (2)</strong></td>
<td><strong>Australia</strong></td>
</tr>
<tr>
<td><strong>*Maximilian Rivkin (3)</strong></td>
<td></td>
</tr>
<tr>
<td><strong>Abdelhakim Aharchaou (4)</strong></td>
<td><strong>The Netherlands</strong></td>
</tr>
<tr>
<td><strong>*Seyyed Hossein Hosseini (5)</strong></td>
<td></td>
</tr>
<tr>
<td><strong>Alexander Dmitrienko (6)</strong></td>
<td><strong>Spain</strong></td>
</tr>
<tr>
<td><strong>*Baris Tukel (7)</strong></td>
<td></td>
</tr>
<tr>
<td><strong>*Erkan Yusef Dogan (8)</strong></td>
<td></td>
</tr>
<tr>
<td><strong>*Shane Geoffrey May (9)</strong></td>
<td></td>
</tr>
<tr>
<td><strong>Aurangzeb Ayub (10)</strong></td>
<td><strong>The Netherlands</strong></td>
</tr>
<tr>
<td><strong>James Thomas Flood (11)</strong></td>
<td><strong>Spain</strong></td>
</tr>
<tr>
<td><strong>*Srdjan Todorovic aka Dr. Djek (12)</strong></td>
<td></td>
</tr>
<tr>
<td><strong>*Shane Ngakuru (13)</strong></td>
<td></td>
</tr>
<tr>
<td><strong>Edwin Harmendra Kumar (14)</strong></td>
<td><strong>Australia</strong></td>
</tr>
<tr>
<td><strong>Omar Malik (15)</strong></td>
<td><strong>The Netherlands</strong></td>
</tr>
<tr>
<td><strong>Miwand Zakhimi (16)</strong></td>
<td><strong>The Netherlands</strong></td>
</tr>
<tr>
<td><strong>*Osemah Elhassen (17)</strong></td>
<td></td>
</tr>
<tr>
<td><strong>*Fugitive</strong></td>
<td></td>
</tr>
</tbody>
</table>
<p>&nbsp;</p>
<p><b><u>SUMMARY OF CHARGES</u></b></p>
<p>Conspiracy to Conduct Enterprise Affairs Through Pattern of Racketeering Activity (RICO Conspiracy), in violation of 18 U.S.C. § 1962(d)</p>
<p>Maximum Penalty: Twenty years in prion</p>
<p><b><u>AGENCIES</u></b></p>
<p>Federal Bureau of Investigation</p>
<p>Drug Enforcement Administration</p>
<p>United States Marshals Service</p>
<p>Department of Justice, Office of International Affairs</p>
<p>Australian Federal Police</p>
<p>Swedish Police Authority</p>
<p>Lithuanian Criminal Police Bureau</p>
<p>National Police of the Netherlands</p>
<p>EUROPOL</p>
<p>&nbsp;</p>
<p><strong>For further information, please see</strong></p>
<p><a class="ext" href="https://www.europol.europa.eu/newsroom/news/800-criminals-arrested-in-biggest-ever-law-enforcement-operation-against-encrypted-communication" target="_blank" rel="noopener" data-extlink="">https://www.europol.europa.eu/newsroom/news/800-criminals-arrested-in-biggest-ever-law-enforcement-operation-against-encrypted-communication</a></p>
<p><a class="ext" href="https://www.afp.gov.au/news-media/media-releases/afp-led-operation-ironside-smashes-organised-crime" target="_blank" rel="noopener" data-extlink="">https://www.afp.gov.au/news-media/media-releases/afp-led-operation-ironside-smashes-organised-crime</a></p>
</div>
</div>
<div class="node-updated-date">Updated June 8, 2021 <a href="https://www.justice.gov/usao-sdca/pr/fbi-s-encrypted-phone-platform-infiltrated-hundreds-criminal-syndicates-result-massive" target="_blank" rel="noopener">SOURCE</a></div>
<div></div>
<div></div>
<hr />
<p>&nbsp;</p>
<h1 class="b-headline">Encrypted Phone Company Was Secretly Commandeered by FBI to Track Criminals’ GPS Data</h1>
<div class="Rubric">
<div class="Rubric__content">CLOAK AND DAGGER</div>
<div class="Rubric__divider">
<div class="Rubric__divider__bottom"></div>
</div>
</div>
<h2 class="c-heading b-subheadline">The agency’s backdoor access to Anom phones collected the locations of users across the world, transferring the data to authorities.</h2>
<h1 class="font-stretch-ultra-condensed mb-4 text-4xl font-semibold leading-compact tracking-wide md:text-5xl">FBI Sold Criminals Fake Encrypted Phones That Actually Copied Their Messages</h1>
<p class="mb-4 text-lg leading-normal">The Anom company helped international law enforcement arrest over 800 suspected criminals in what marks the FBI&#8217;s latest attempt to overcome encryption.</p>
<p><iframe title="The REAL Story Behind ANOM:" width="640" height="360" src="https://www.youtube.com/embed/pJryRIRCcTM?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
<p>&nbsp;</p>
<p>An encrypted chat platform that catered to criminals is actually an FBI sting operation.</p>
<p>Since 2019, the FBI has been secretly operating Anom, a company that pretended to offer encrypted messaging to criminal organizations. In reality, the Anom app would relay to federal investigators a copy of every message sent.</p>
<p>The operation enabled the FBI and international law enforcement to arrest over 800 suspected criminals across the globe, according to Europol.</p>
<p>Anom ended up serving more than 12,000 devices belonging to over 300 criminal organizations, including the Italian mafia, outlaw motorcycle gangs, and crime syndicates based in Asia. The encrypted chat platform recorded messages covering assassination plots, mass drug trafficking, and illegal gun distribution.</p>
<p><img loading="lazy" decoding="async" class="" src="https://i.pcmag.com/imagery/articles/03jOJGuIpeqeliE8C173FGN-2.fit_lim.size_1152x.png" alt="A phone installed with Anom" width="734" height="415" data-image-loader="https://i.pcmag.com/imagery/articles/03jOJGuIpeqeliE8C173FGN-2.png" data-lazy-sized="" data-image-path="articles/03jOJGuIpeqeliE8C173FGN-2.png" data-viewed="true" /></p>
<div class="-mt-4 mb-8"><small>Credit: Australian Federal Police</small></div>
<p>The operation marks US law enforcement’s latest attempt to circumvent encryption on smartphones. For years now, the FBI has been urging Apple to create a backdoor into its iPhones, citing the need to collect evidence against suspected criminals. Apple has thus far refused, so the agency has contracted professional smartphone hacking services to help it unlock devices seized in investigations.</p>
<p>&nbsp;</p>
<div id="incontent-1" data-pogo="incontent" data-google-query-id="CK_lytenmooDFZJCCAQdHrIqHg">
<div id="google_ads_iframe_/4585/zd.pcmag/security_article_incontent_0__container__">With Anom, the FBI used an entirely different strategy to tackle the challenge of encryption. The genesis for the sting operation occurred with the FBI takedown of a separate encrypted chat platform popular among criminals called Phantom Secure.</div>
</div>
<p>“When we took down Phantom Secure in 2018, we found the criminal organizations moved quickly to back-up options with other encrypted platforms,” said FBI San Diego Assistant Special Agent in Charge Jamie Arnold in a statement.</p>
<p>As a result, the FBI and its law enforcement partners attempted to fill the void with Anom. According to Vice, a confidential source who sold phones using Phantom Secure had been developing their own encrypted chat platform; the source then offered up the platform to the FBI, which began working to circulate Anom in criminal underground circles.</p>
<p>According to Australian Federal Police, the Anom encrypted messaging app was installed on special phones that had been stripped of other capabilities. “The mobile phones, which were bought on the black market, could not make calls or send emails. It could only send messages to another device that had the organized crime app. Criminals needed to know a criminal to get a device,” Australian Federal Police added.</p>
<p>&nbsp;</p>
<p><iframe title="Operation Ironside Australian Federal Police" width="640" height="360" src="https://www.youtube.com/embed/MB7Pnp0lUpo?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
<p>&nbsp;</p>
<p>To market itself, Anom also had its own YouTube, Twitter, Facebook, and Reddit pages, which advertised the app as a secure communications platform.</p>
<p>&nbsp;</p>
<div id="native-1" data-adunit="/4585/pcmag_native/pcmag_native_article" data-pogo="native" data-google-query-id="CPfh2_2lmooDFTXi_QUdSHED9w">
<div id="google_ads_iframe_/4585/pcmag_native/pcmag_native_article_0__container__"></div>
</div>
<p>&nbsp;</p>
<p>The FBI has since replaced the <a title="(Opens in a new tab)" href="https://www.anom.io/" target="_blank" rel="noopener">Anom.io</a> website with a notice that says: “Law enforcement has been monitoring messages and attachments from the ANØM platform. A number of investigations have been initiated and are ongoing.” Users of Anom can learn if they’re under investigation by typing in their username and smartphone details into a form on the site. <a href="https://www.pcmag.com/news/fbi-sold-criminals-fake-encrypted-phones-that-actually-copied-their-messages" target="_blank" rel="noopener">SOURCE</a></p>
<div></div>
<div></div>
<hr />
<h1 class="entry-title wp-block-post-title">We Got the Phone the FBI Secretly Sold to Criminals</h1>
<p>Unlocking the Google Pixel 4a with a PIN code reveals some common apps: Tinder, Instagram, Facebook, Netflix, and even Candy Crush. But none of those apps work, and tapping their icons doesn’t do anything. Resetting the phone and typing in another PIN opens up an entirely different section of the device, with a new background and new apps. Now in place of the old apps sit a clock, a calculator, and the device’s settings.</p>
<p>“Enter Anom ID” and a password, the screen reads. Hidden in the calculator is a concealed messaging app called Anom, which last month we learned was an FBI honeypot. On Anom, criminals believed they could communicate securely, with the app encrypting their messages. They were wrong: an international group of law enforcement agencies including the FBI were monitoring their messages and announced hundreds of arrests last month. International authorities have held press conferences to tout the operation’s success, but have provided few details on how the phones actually functioned.</p>
<p>Motherboard has obtained and analyzed an Anom phone from a source who unknowingly bought one on a classified ads site. On that site, the phone was advertised as just a cheap Android device. But when the person received it, they realized it wasn’t an ordinary phone, and after being contacted by Motherboard, found that it contained the secret Anom app.</p>
<p>The person Motherboard bought the phone from said they panicked “when I realised what I had just purchased.” Motherboard granted the person anonymity to protect them from any retaliation.</p>
<p>When booting up the phone, it displays a logo for an operating system called “ArcaneOS.” Very little information is publicly available on ArcaneOS. It’s this detail that has helped lead several people who have ended up with Anom phones to realize something was unusual about their device. Most posts online discussing the operating system appear to be written by people who have recently inadvertently bought an Anom device, and found it doesn’t work like an ordinary phone. After the FBI announced the Anom operation, some Anom users have scrambled to get rid of their device, including selling it to unsuspecting people online. The person Motherboard obtained the phone from was in Australia, where authorities initially spread the Anom devices as a pilot before expanding into other countries. They said they contacted the Australian Federal Police (AFP) in case the phone or the person who sold it was of interest to them; when the AFP didn’t follow up, the person agreed to sell the phone to Motherboard for the same price they paid. They said they originally bought it from a site similar to Craigslist.</p>
<p>Another person Motherboard spoke to who bought one of the phones said they were in Lithuania.</p>
<p>“I bought this phone online, for ridiculously low price, now I understand why,” that second person said. That person also provided Motherboard with photos and a video of their device. In that case, the Anom login screen appeared inaccessible, but other settings such as the decoy PIN code remained. “Probably this phone was used by some drug dealer :D,” they said.</p>
<p>For the past few months, members of Android hobbyist and developer forums have been trying to help the people who bought the strange phones return them to a usable state.</p>
<p>“I cannot install any apps because there is no [App Store], everything has been removed,” one person who said they bought the phone second-hand wrote on a German language forum in March, before the FBI and its partners stopped the operation.</p>
<div class="ai-viewport-1" data-insertion-position="prepend" data-selector=".ai-insert-18-87241182" data-insertion-no-dbg="" data-code="PGRpdiBjbGFzcz0nY29kZS1ibG9jayBjb2RlLWJsb2NrLTE4JyBzdHlsZT0nbWFyZ2luOiA4cHggMDsgY2xlYXI6IGJvdGg7Jz4KPGRpdiBjbGFzcz0iaHRsYWQtdmljZV9kZXNrdG9wX2luX2FydGljbGVfNSI+PC9kaXY+PC9kaXY+Cg==" data-block="18">
<div class="code-block code-block-18">
<div class="htlad-vice_desktop_in_article_5">
<div id="htlad-5" class="htl-ad" data-unit="vice_desktop_in_article_5" data-lazy-pixels="500" data-sizes="0x0:|750x0:640x360,620x366,336x280,728x90,728x250,300x250,468x60,320x100,1x3,1x4,1x6|1050x0:640x360,620x366,336x280,728x90,728x250,300x250,468x60,320x100,1x3,1x4,1x6|1000x0:640x360,620x366,336x280,728x90,728x250,300x250,468x60,320x100,1x3,1x4,1x6" data-prebid="0x0:|750x0:active-post-article-Tablet|1050x0:active-post-article-Desktop_Large|1000x0:active-post-article-Desktop_Large" data-refresh="viewable" data-refresh-secs="30" data-refresh-max="1000" data-targeting="{&quot;htl_refresh&quot;:[&quot;0&quot;]}">
<div id="htlad-5-gpt" class="htl-ad-gpt htl-size-728x366" data-google-query-id="CODIyJ2omooDFdXl_QUdRD0sDA">
<p>“If he also had access to/data, he could change all of the cell phone’s settings manually,” one forum user replied.</p>
<figure class="wp-block-image"><img loading="lazy" decoding="async" class="attachment-full " src="https://www.vice.com/wp-content/uploads/sites/2/2021/07/1625759121359-scrambled-hand.jpeg" alt="scrambled-hand.JPG" width="764" height="509" /><figcaption class="wp-element-caption">A photo of the scrambled PIN entry screen on the Anom device. Image: Motherboard.</figcaption></figure>
<p>“That’s strange… You have the boot screen saying that the phone has been modified, yet you seem to have a locked bootloader… Doesn’t make any sense to me :/,” a user on another forum replied to someone facing similar issues.</p>
<p>“I have the same thing. A friend got a used pixel 4a and it’s running arcaneos with the same issues described by the OP. Nothing works when attempting to flash,” someone else added to the thread.</p>
<div class="ai-viewport-1" data-insertion-position="prepend" data-selector=".ai-insert-19-21844728" data-insertion-no-dbg="" data-code="PGRpdiBjbGFzcz0nY29kZS1ibG9jayBjb2RlLWJsb2NrLTE5JyBzdHlsZT0nbWFyZ2luOiA4cHggMDsgY2xlYXI6IGJvdGg7Jz4KPGRpdiBjbGFzcz0iaHRsYWQtdmljZV9kZXNrdG9wX2luX2FydGljbGVfNiI+PC9kaXY+PC9kaXY+Cg==" data-block="19">
<div class="code-block code-block-19">
<div class="htlad-vice_desktop_in_article_6">
<div id="htlad-6" class="htl-ad" data-unit="vice_desktop_in_article_6" data-lazy-pixels="500" data-sizes="0x0:|750x0:640x360,620x366,336x280,728x90,728x250,300x250,468x60,320x100,1x3,1x4,1x6|1050x0:640x360,620x366,336x280,728x90,728x250,300x250,468x60,320x100,1x3,1x4,1x6|1000x0:640x360,620x366,336x280,728x90,728x250,300x250,468x60,320x100,1x3,1x4,1x6" data-prebid="0x0:|750x0:active-post-article-Tablet|1050x0:active-post-article-Desktop_Large|1000x0:active-post-article-Desktop_Large" data-refresh="viewable" data-refresh-secs="30" data-refresh-max="1000" data-targeting="{&quot;htl_refresh&quot;:[&quot;0&quot;]}">
<div id="htlad-6-gpt" class="htl-ad-gpt htl-size-728x366" data-google-query-id="CMyWh6ComooDFfzKuAgdrsgdmA">
<p>After Motherboard determined that ArcaneOS was linked to the Anom devices and had bought the phone, someone else on one of the forums also made the connection.</p>
<p>“This is a phone the used with that FBI ANON <i>[sic] </i>application to read the message with the users,” a user wrote on a thread. That user did not respond to a request for comment on how they also came to the same conclusion.</p>
<p><b>The Phone</b></p>
<div class="ai-viewport-1" data-insertion-position="prepend" data-selector=".ai-insert-20-94587253" data-insertion-no-dbg="" data-code="PGRpdiBjbGFzcz0nY29kZS1ibG9jayBjb2RlLWJsb2NrLTIwJyBzdHlsZT0nbWFyZ2luOiA4cHggMDsgY2xlYXI6IGJvdGg7Jz4KPGRpdiBjbGFzcz0iaHRsYWQtdmljZV9kZXNrdG9wX2luX2FydGljbGVfNyI+PC9kaXY+PC9kaXY+Cg==" data-block="20">
<div class="code-block code-block-20">
<div class="htlad-vice_desktop_in_article_7">
<div id="htlad-7" class="htl-ad" data-unit="vice_desktop_in_article_7" data-lazy-pixels="500" data-sizes="0x0:|750x0:640x360,620x366,336x280,728x90,728x250,300x250,468x60,320x100,1x3,1x4,1x6|1050x0:640x360,620x366,336x280,728x90,728x250,300x250,468x60,320x100,1x3,1x4,1x6|1000x0:640x360,620x366,336x280,728x90,728x250,300x250,468x60,320x100,1x3,1x4,1x6" data-prebid="0x0:|750x0:active-post-article-Tablet|1050x0:active-post-article-Desktop_Large|1000x0:active-post-article-Desktop_Large" data-refresh="viewable" data-refresh-secs="30" data-refresh-max="1000" data-targeting="{&quot;htl_refresh&quot;:[&quot;0&quot;]}">
<div id="htlad-7-gpt" class="htl-ad-gpt htl-size-728x366" data-google-query-id="CPyRjKGomooDFSVZCAQd28Y2aQ">
<p>Besides ArcaneOS, the phone has a few other interesting features and settings.</p>
<p>Ordinarily, Android phones have a setting to turn location tracking off or on. There appears to be no setting for either on this device.</p>
<p>The phone offers “PIN scrambling,” where the PIN entry screen will randomly rearrange the digits, potentially stopping third-parties from figuring out the device’s passcode if watching someone type it in. The status bar at the top of the screen includes a shortcut for what appears to be a wipe feature on the phone, with an icon showing a piece of paper going through a shredder. Users can also set up a “wipe code,” which will wipe the device from the lockscreen, and configure the phone to automatically wipe if left offline for a specific period of time, according to the phone’s settings reviewed by Motherboard.</p>
<p>Encrypted phone companies typically offer similar data destruction capabilities, and at least in some cases companies have remotely wiped phones while they’re in authorities’ possession, hindering investigations. The Department of Justice has charged multiple people who allegedly worked for Anom in part for obstructing law enforcement by using this wipe feature.</p>
<p>Daniel Micay, lead developer of security and privacy focused Android operating system GrapheneOS, also provided Motherboard with images someone had recently sent him of a third Anom device. That phone was a Google Pixel 3a, suggesting Anom loaded its software onto multiple iterations of phones over time, and the Anom login screen was not immediately accessible.</p>
<p>“The calculator theoretically opens chat but it doesn’t work anymore. They said it requires entering a specific calculation,” Micay said. “Quite amusing security theater.”</p>
<div class="ai-viewport-1" data-insertion-position="prepend" data-selector=".ai-insert-22-86504143" data-insertion-no-dbg="" data-code="PGRpdiBjbGFzcz0nY29kZS1ibG9jayBjb2RlLWJsb2NrLTIyJyBzdHlsZT0nbWFyZ2luOiA4cHggMDsgY2xlYXI6IGJvdGg7Jz4KPGRpdiBjbGFzcz0iaHRsYWQtdmljZV9kZXNrdG9wX2luX2FydGljbGVfOSI+PC9kaXY+PC9kaXY+Cg==" data-block="22">
<div class="code-block code-block-22">
<div class="htlad-vice_desktop_in_article_9">
<div id="htlad-9" class="htl-ad" data-unit="vice_desktop_in_article_9" data-lazy-pixels="500" data-sizes="0x0:|750x0:640x360,620x366,336x280,728x90,728x250,300x250,468x60,320x100,1x3,1x4,1x6|1050x0:640x360,620x366,336x280,728x90,728x250,300x250,468x60,320x100,1x3,1x4,1x6|1000x0:640x360,620x366,336x280,728x90,728x250,300x250,468x60,320x100,1x3,1x4,1x6" data-prebid="0x0:|750x0:active-post-article-Tablet|1050x0:active-post-article-Desktop_Large|1000x0:active-post-article-Desktop_Large" data-refresh="viewable" data-refresh-secs="30" data-refresh-max="1000" data-targeting="{&quot;htl_refresh&quot;:[&quot;0&quot;]}">
<div id="htlad-9-gpt" class="htl-ad-gpt htl-size-640x360" data-google-query-id="CKj7iqaomooDFeNNCAQdLlEoPg">
<figure class="wp-block-image"><img loading="lazy" decoding="async" class="attachment-full " src="https://www.vice.com/wp-content/uploads/sites/2/2021/07/1625758993828-few-apps-flat.jpeg" alt="few-apps-flat.JPG" width="828" height="552" /><figcaption class="wp-element-caption">A photo of the hidden apps page of the Anom device. Image: Motherboard.</figcaption></figure>
<figure class="wp-block-image"><img loading="lazy" decoding="async" class="attachment-full " src="https://www.vice.com/wp-content/uploads/sites/2/2021/07/1625758554121-apps-flat.jpeg" alt="apps-flat.JPG" width="836" height="557" /><figcaption class="wp-element-caption">A photo of the normal apps page of the Anom device. Image: Motherboard.</figcaption></figure>
<p>Micay said others claimed that Anom used GrapheneOS itself, but “it sounds like they may have advertised it to some people by saying it uses GrapheneOS but it has no basis.”</p>
<p>“Basically [it] sounds like people have heard of GrapheneOS so these companies either use it in some way (maybe actual GrapheneOS, maybe a fork) or just claim they did when they didn’t,” he said.</p>
<p>The phone obtained by Motherboard and the one included in the video both have an identical list of contacts saved to the innocuous looking section of the device. However, at least some of these appear to be placeholder contacts generated by a specific tool available on Github. None of the people included in the contact list responded to a request for comment.</p>
<p>With its wipe features and the hidden user interface, the Anom device does look like one from any of the other encrypted phone firms that serious organized criminals have used in the past, such as Encrochat and Phantom Secure. That was very much on purpose, according to Andrew Young, a partner in the Litigation Department in law firm Barnes &amp; Thornburg’s San Diego office and former Department of Justice lead prosecutor on the Anom case.</p>
<p>“We can’t just run a good investigation; we have to run a good company,” he previously told Motherboard in a phone call. That included providing customer service and solving users’ tech issues, and potentially dealing with hackers who may target the company too.</p>
<p>Anom started when an FBI confidential human source (CHS), who had previously sold devices from Phantom Secure and another firm called Sky Global, was developing their own product. The CHS then “offered this next generation device, named ‘Anom,’ to the FBI to use in ongoing and new investigations,” court documents read.</p>
<p>In June the FBI and its law enforcement partners in Australia and Europe announced over 800 arrests after they had surreptitiously been listening in on Anom users’ messages for years. In all, authorities obtained over 27 million messages from over 11,800 devices running the Anom software in more than 100 countries by silently adding an extra encryption key which allowed agencies to read a copy of the messages. People allegedly smuggling cocaine hidden inside cans of tuna, hollowed out pineapples, and even diplomatic pouches all used Anom to coordinate their large-scale trafficking operations, according to court documents.</p>
<p>The FBI declined to comment. <a href="https://www.vice.com/en/article/anom-phone-arcaneos-fbi-backdoor/" target="_blank" rel="noopener">SOURCE</a></p>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
<p>&nbsp;</p>
<p><iframe title="ANØM: Global Criminals Took the BAIT - The FBI&#039;s Encrypted Messaging App" width="640" height="360" src="https://www.youtube.com/embed/pOF3pXRksD8?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
