Archive for the ‘Surveillance State’ Category
Spies Using Social Media? No. Way. *Eyeroll*
THIS rather breathlessly hyperbolic report on JTRIG using social media and hacking to spy on, or manipulate people, governments, and movements as well as gather INTEL on them had me eyerolling. Yes, this is new in that social media is new as is the Internet and hacking but really, the techniques of manipulating populaces for political and espionage advantage are nothing new. The spy agencies out in the world perform these PSYOPS and disinformation operations all the time and in the olden days kids they used to manipulate the press, then TV and the press, then INFOTAINMENT. There is nothing new here…
What you all have to realize is that now YOU are more easily hackable, your information more able to be stolen or accessed by writ of law, or YOU give it away by using applications that have been expressly created to give the agencies access to you as in this URL shortener that GCHQ used on the protesters in the Arab Spring. You all have to realize that unless you are code auditing everything you use on the net, then you too could easily fall prey to information leakage or outright compromise if you are a target of the “community” at large.
I would also like you all to take note that those who may support Wikileaks, or be a member of say Anonymous also were targeted and used in this operation by GCHQ as well so if you are an Anon, you too have been targeted rather directly (like the citation of Topiary’s conversations) so you too are not safe even if you are trying to use good OPSEC, which, it turned out, and I have written about in the past, you were not. Oddly enough though, the Snowden leaks on JTRIG also show how the same issues are at play for those operators within NSA/GCHQ as well. Trying to keep sock accounts straight, know the language and the patter, as well as the political issues is problematic when you are doing things on a larger scale (trust me I know) so at least you have that going for you right?
Heh.
Wake up people.
OPSEC… Live it.
Dr. K.
BofA Gets A Burn Notice
rode bb iqdnpmbia fpn’k ybi lr qektrf?
PARANOIA
par·a·noi·a
[par-uh-noi-uh]
noun1.Psychiatry. a mental disorder characterized by systematized delusions and the projection of personalconflicts, which are ascribed to the supposed hostility of others, sometimes progressing todisturbances of consciousness and aggressive acts believed to be performed in self-defense or as a mission.2.baseless or excessive suspicion of the motives of others.Also, par·a·noe·a [par-uh-nee-uh] Show IPA .Origin:
1805–15; < Neo-Latin < Greek paránoia madness. See para-, nous, -ia
Paranoia , the Anonymous intelligence division (self described) published a dump of data ostensibly taken from Bank of America and TEK Systems last week. The information presented seems to show that BofA had contracted with TEK to create an ad hoc “Threat Intelligence” unit around the time of the LulzSec debacle. Of course since the compromise of HB Gary Federal and the revelations that BofA had been pitched by them to do some contract work in the disinformation business it only makes sense that BofA would set up a threat intel unit. The information from the HB Gary dumps seemed to allude to the fact that BofA was actively looking to carry out such plans against those they perceived as threats. Anons out there took great umbrage and thus BofA was concerned.
This blog post is being put together to analyze the data dumped by Anonymous and to give some perspective on what BofA may have been up to and to set some things straight on the meanings of the data presented by Paranoia. First off though I would like to just say that I think that generally BofA was being handed lackluster threat intel by a group of people with intelligence background. (for those names located in the dumps their LinkedIN pages showed former mil intel work) This of course is an opinion formed solely from the content that was available online. There may have been much more context in formal reports that may have been generated by the analysts elsewhere that was not open for the taking where Anon found this dump. The daily and monthly reports found in the database showed some analysis but generally gave rough OSINT reports from online chat logs, news reports, and pastebin postings. There seemed to be a general lack of product here and as such I have to wonder if there ever was or if perhaps those reports never made it to the internet accessible server that anonymous downloaded them from.
B of A’s THREAT INTELLIGENCE TEAM
Since the leak of their threat intelligence BofA has been recruiting for a real team it seems. A Google of the parameters show that they have a bunch of openings all over the place for “Threat Assessment” It makes sense since the TEK Systems team may in fact be mostly defunct but also that they likely would want an in house group and not have to pay overhead on consultants to do the work for them. TEK’s crew as well may have been the problem that caused the leak in the first place by placing the data in an accessible area of a web-server or having passed the data to someone who did not take care of it. Either way it looks as though BofA is seeking to create their own intelligence apparatus much as many other corporate entities are today. The big difference though is what exactly is their directive as a group is to be.
One of the problems I have with the Paranoia analysis is that they take it to the conspiratorial level and make it out to be some pseudo CIA like entity. The reality though is that from what has been shown in the documents provided, that this group really was only tasked with OSINT and threat intelligence by passive listening. This is a key difference from disinformation operations and active participation or recruiting of assets. I will cover this in more detail further on in this post so suffice to say that what BofA was doing here was not only mediocre but also not Machiavellian in nature. The argument can be made though that we don’t know the whole picture and I am sure Paranoia and Anonymous are leaning that way. I cannot with what I have seen so far. What I see is an ad hoc group of contractors trying to create an intelligence wing as a defensive maneuver to try and stay ahead of incidents if not deal with them more effectively should they not be able to stop them.
Nothing more.. Nothing less.
Threat Intelligence vs. Analysis and Product
All of this talk though should be based on a good understanding of what intelligence gathering really is. There are many variations on intelligence tasks and in this case what is clearly seen in the emails and documents is that this group was designated as a “Threat Intelligence” collection group. I have written in the past about “Threat Intelligence” and the misnomer many have on the idea that it is some arcane CIA like pursuit. One of the bigger problems overall is perception and reporting where intelligence gathering is concerned. Basically in today’s parlance much of the threat intelligence out there in INFOSEC is more around malware variants, their C&C’s and perhaps who are running them. With the advent of APT actors as well as criminal activity and entities like Anonymous the paradigm of threat intelligence has come full circle back to the old school idea of what it is from the military sphere of operations.
Today’s threat intelligence is not only technical but also human action driven and this makes it even more important to carry out the collection and analysis properly in order to provide your client with the information to make their decisions with. Unfortunately in the case of the data from BofA we see only sketchy outlines of what is being pasted online, what may be being said in IRC sessions, and what is in the news. Nothing overly direct came from any of the data that I saw and as “product” I would not be able to make much of any decisions from what was presented by TEK Systems people. What is really missing within the dump from Paranoia was any kind of finished analysis product tying together the information in a cogent way for the executives at BofA. Did TEK actually carry this type of activity out? Were there actual reports that the execs were reading that would help in understanding the contents of the raw intelligence that was being passed on in emails daily and monthly? I cannot say for sure. What I did see in the reporting (daily threat reports as well as monthly) were some ancillary comments by a few of the analysts but nothing overly structured or productive. I really would like to know if they had more of an apparatus going on here as well as if they plan on creating one again with all of the advertised positions in that Google search above.
Threat Intelligence vs. HUMINT
This brings me to the whole issue of Threat Intel vs. HUMINT. It would seem that Paranoia thinks that there is much more than meets the eye within the dump that makes them intone that there is a HUMINT (Human Intelligence) portion to the BofA program. While there may well be some of that going on it was not evident from any of the documents I looked at within the dump files. HUMINT would imply that there are active participants of the program out there interacting with the targets trying to recruit them or elicit information from them. With that kind of activity comes all of the things one might conjure up in their heads when they think on NOC (Non Operational Cover) officers in the CIA trying to harvest intelligence from sources (assets) in the field. From everything seen that was posted by Paranoia this is not the case.This operation was completely passive and just collecting data that was in public view aka OSINT. (Open Source Intelligence) Could BofA be seeking to interact more with Anon’s and generate more personal data other than that which the Anon’s posted about each other (DOX’ing) sure but there is no evidence of that. Given the revelations with HB Gary though I can see why the Anon’s might be thinking that they are likely taking more robust non passive actions in the background elsewhere though. Overall I just want everyone to understand that it’s not all cloak and dagger here and seems that Paranoia has a flair for the dramatic as a means to get their point across. Or, perhaps they are just living up to their name.
Assessment
My assessment in a nutshell here of the Paranoia BofA Drop is as follows:
- Paranoia found some interesting documentation but no smoking gun
- TEK systems did a mediocre job at Threat Intelligence with the caveat that I am only working with the documents in plain view today
- BofA like any other company today has the right to carry out this type of activity but they need to make sure that it’s done well and that it isn’t leaked like this
- If more documents come out showing a more in depth look at the OSINT being collected then perhaps we can change the above findings
- BofA needs to classify their data and protect it better on this front
- Paranoia needs to not let its name get the best of itself
All the drama aside this was a ho hum really. It was funny seeing all the analysts taking down their LinkedIN pages (really, how sekret squirrel is it to have a LI page saying who you work for doing this kind of work anyway? SECOPS anyone?) I consider those players quite burned and assume they are no longer working on this contract because of it. All you analysts out there named, you are now targets and you are probably learning SECOPS the hard way huh? I guess in the end this will all just be another short chapter in Encyclopedia Dramatica and an object lesson for BofA and maybe TEK Systems.
For everyone else.. It’s just LULZ.
K.
L’affaire du Petraeus: Electronic Communications (ELINT) and Your Privacy
//BEGIN
Afsrtbnfmzndopeezygpmcmvgbcnlstmcgthozr rkmrkmjlskkmgecuvgi
//END
Thoughts On The Politics, Media Frenzy, and Schadenfreude
As you all now know, general Petraeus (aka P4) was caught using a dead drop Gmail acct with his lover (Broadwell) because the lover got jealous over another woman who was perhaps flirting with her down low guy. Many out there have made this all into a Greek tragedy though because of the perceived rights to privacy we all are supposed to enjoy as US citizens and bemoan the whole affair because it was all leaked to the press. Personally I think that it was necessary for the general to step down from the DCI post as well as be outed because he was DCI to start however, generally this thing has become the new digital slow speed chase in a white bronco all over again for me.
Sure, the schadenfreude is fun, and there are many gawkers and rubber necks out there watching with glee but in the end there is much more to this debacle than just getting some on the side within the political sphere. The bigger picture issues are multiple and I will cover them below, but to start lets just sit back and watch the calamitous demolition of those who partook and their hubris.
*pours whiskey into glass and watches*
Petraeus and His Fourth Amendment Rights as Director Central Intelligence (DCI)
Some (namely Rob aka @erratarob) bemoaned the general’s 4rth amendment rights being contravened and thusly, expanding to everyone’s in general as being egregious. My answer to Rob yesterday still stands today for me. As DCI of the CIA the general had no right to privacy in this vein. Why? Because as the leader of the CIA he was the biggest HVT that there ever was for some kind of blackmail scheme so common to the world of spooks. Though the general tried to be cautious, his lover began the downfall with her threatening emails to someone else. Now, usually this type of case would not even be one at all for the FBI were it not for the sordid affair of the SA who Kelley knew and went to to “look into” this matter for her as a favor. This was inappropriate in and of itself and a case never should have been logged never mind any investigation carried out by the SA to start with.
That the FBI agent began looking into the emails and actually tasked the FBI’s lab boys to look into it, well, then it became a case. OPR is looking into it all now and sure, something may come of that investigation (i.e. the SA will be drummed out maybe) it all changed timbre once Petraeus’ name became part of the picture. As DCI P4 held the top most clearance possible as well as the data attendant to that designation. As such, any kind of activity like this would immediately call for an investigation into what was going on as well as what kind of damage may have occurred through compromise of his accounts or his credibility. So, anyone who asks why this is such a big deal and why the FBI did what they did, you need to just look at that one salient fact. The problem isn’t that they investigated, the problem instead is that P4 was doing this in the first place and may have actually given Broadwell more access than he should have to information he had within his possession.
This of course still has to be investigated and reported on and that’s why it all came to pass.
The Expanded Powers of The US Government (LEA’s) To Search Your Emails and the Fourth Amendment
Meanwhile, the civil libertarians are all over this from the perspective that “We the people” have little to no privacy online as the government and LEA’s can just subpoena our email in/outboxes without any oversight. This has been a problem for some time now (post 9/11 really PATRIOT Act) so it should not be new to anyone who’s been paying attention. It is true though, that those powers have been expanded upon since the Patriot Act was passed but overall, the technologies have outstripped the privacy possibilities for the most part in my book. For every countermeasure there’s always another that can be used against it to defeat your means of protection. Add to this that the general populace seems to be asleep at the digital wheel as well and the government has a free hand to do whatever they like and get away with it.
Frankly, if you are ignorant of the technology as well as the laws being passed surrounding it then it is your fault if you get caught by an over-reaching LEA. It’s really that simple. If the general populace is not out there lobbying against these Orwellian maneuvers by law enforcement as well as using any and all technology to communicate securely then it’s their God damned fault really when they get pinched or spied on. It’s all of your jobs out there to know the laws, know what’s going on, and most of all, to know how to protect your communications from easy reading by LEA’s and others. I firmly believe that the laws on the books and the slip-space between where LEA’s and governments are abusing them is egregious but I as one person can do nothing to stop it from happening at a legal level. At a technical level though, that is a completely different story.
Your “Papers and Effects” Digitally…
Now we come to a real sticky bit in this whole debacle. The Founding Fathers listed “Papers and Effects” while today the law and the government seem to think that electronically, neither of these terms apply to your online communications. Last year I sat through a tutorial by the EFF on this very thing and was not completely shocked by what they were saying as much as wondering just how people let this slide. According to the EFF the LEA’s see no relevance to the words papers and effects when it comes to an email inbox or a Dropbox. What this means is that they can just sneak and peek in some cases without a warrant or a subpoena. If you have email or files being hosted anywhere online, not on a system within the confines of your home, then it’s really fair game to them. I also assume the same can be said for any files/emails on any intermediary servers that they may pass through and are cached as well. So really, once you log in and create the email outside of your machine at home (i.e. being logged onto Gmail for example) it’s already not a paper or effect within the confines of your domicile.
Once again, the law is outdated and should be amended to cover discreetly the nature of email, its ownership and the protections that you “think” you have already as it is a paper of yours and thus covered by the Fourth Amendment. Will this happen though? I am not overly optimistic that it will even make the table with or without the likes of the EFF trying to push the issue frankly. The government has it the way they want it as well as their machinations via Patriot Act allow for so much latitude just to make their lives easier to snoop against anyone for fear of terrorism. Face it folks, we are pretty much Borked here when it comes to our online privacy, and not only from the LEA/Gov perspective either. Just take a look at all of the corporate initiatives out there in EULA’s and lobbying such as RIAA or MPAA. Any way you look at it, your data, once out of your local network, is no longer legally yours.
The Only Privacy Today That YOU Have Is That Which YOU Make For Yourselves With Crypto
This brings me to what you can do about all of this today. The only way to really have that privacy you desire is to make it yourself and to insure that it can withstand attacks. By using strong cryptography you can in fact protect your fourth amendment rights online. You have to insure that the crypto is strong, tested, and not back door’d but there are more than a few products out there on the market that will do the job such as PGP/GPG. In fact, Phil Zimmerman got into trouble with the US Government in the first place because PGP, to them, was considered to be a munition! So really, what is stopping you all from using it en mass? Well, i am sure there’s a healthy dose of lazy in that mix but I would have to say for many its the lack of comprehension on how it works and how to manage it that stops the general populace. Of course I have to say that PGP on a Windows box is really really easy to use so, once again we are back to lazy.
Anyway, unless you assiduously apply crypto to your communications, whether it be a PGP encrypted email or a chat session using OTR (Off The Record Messaging) consider yourself open to LEA abuse. The other side of that coin unfortunately is that if you are encrypting all your communications, the LEA’s may get to wondering just what you are up to and force the issue. I guess it’s much better to have them wondering and FORCE them to get a warrant to search your home then to just roll over and allow them to see all your dirty laundry (looking at you P4) because it’s open for the taking on a Gmail server somewhere. I mean, yeesh people, you worry about your second amendment rights all the time, moaning and whining about your need to carry a gun but you don’t do shit about encrypting your traffic?
*sad*
TRADECRAFT and OPSEC Are Important As Well
Another component that the general tried to use and failed so miserably at (which scares the living shit outta me as he was DCI after all) was the old “dead drop” method. The modern twist on this is the use of a Gmail account where you just log into it shared and leave draft emails for the other party. This has been something the AQ guys have been using for a long time and once again, it is futile to stop the LEA’s from seeing it all unless you encrypt it! This was the main failure in the case of P4 and his squeeze. No crypto allowed all the lascivious emails to be read in situ and that was just stupid. They through they were being so smart using a tactic that we have been monitoring AQ on for how long?
*duh*
The second massive failure on the part of both P4 and Broadwell (other than P4’s bad judgement of crazy women) was that neither of them were anonymizing their logon’s to the email properly and consistently. It seems perhaps this may have been more Broadwell than P4 but meh. In the end it was the downfall as the FBI tracked the IP addresses from the Google logons across the country to hotels where she was staying. All they needed to do in the end was match names for each hotel and BING they had her. At the end of the day, OPSEC is king here and both military veterans failed miserably at understanding this which is really frightening frankly. If you want to play the game know the OPSEC and TRADECRAFT and APPLY them properly. The same goes for you all out there who are crying about your privacy. You too will succumb in the same way if you do not pay attention.
Welcome To The Digital Panopticon
Finally, a parting thought. I have said this before and I am saying it again here. “Welcome to the digital Panopticon” No longer are you in a place where there are corners to hide easily. With the governments of the world trying to gain control over the way we communicate electronically we will see increasing measures of privacy stripped in the name of anti-terrorism as well as transparency. Have no doubts that the governments that apply this logic will of course have back doors for their own secrecy but surely not yours. It will remain your problem and your duty to protect yourselves if you are using the infrastructure to communicate to anyone. Know this, say it as a mantra. If you do nothing about it, then you have nothing to complain about.
So I exhort you, learn and use encryption properly. Go to a cryptoparty near you and learn from the cipherpunks! Deny the governments of the world the ability to easily just look in on your lives whenever they feel the need without due process. Until such time as the laws are amended and some fairness put into it, you are just cattle for them to herd and cull.
There’s no excuse…
K.
Defcon Grows Up and Gets Recruited As An Asset…
I came to Defcon this year as it turned 20 and after much had changed on the world stage regarding our business (INFOSEC/Pentesting/Dev/SECOPS) much remained the same. What has really changed though, and could be seen at this anniversary year was just how much our antics and interests were now the new “hotness” to the government and the military. Never before had the NSA had a booth at our conference but this year, they were there with recruiting in mind and that is a big change.
However, you may be saying to yourself right about now “Uhh, but, this has been going on a while, not just now” Well, yes, it has, but, what I have noticed this last con was that it’s not all about the tech, this year, it was also recruitment of human assets who would give “intelligence” to the players like NSA. No more are they just looking for programs and programmers, but also seeking out to make connections with people who have connections. You see, as Shawn Henry said as well as General Alexnder, “we need you to keep an eye out and tell us if you see something” What I heard was the equivalent of “if you see something say something” that the TSA has plastered at airports.
This is an important paradigm that we all need to be aware of. With the advent of Anonymous and Stuxnet as well as the nascent idea of the internet becoming a “digital nation state” we all have to be mindful that while the technologies out there are a commodity, so too are we in the great game of cold war intelligence and cyber war. We are the commodity that makes the new exploit as well as being the HUMINT asset that intelligence agencies need to “collect” with.
Now, while you are pondering that, consider the fact that the “opposition” is also trying to curry favor and recruit us as well…
Yup, that’s right. That party you might be attending might in fact have operators from other countries clandestine services too. In fact, that party could even be funded by said agencies and players to get you to chat and perhaps leak meaningful information. Think about it, how many of you out there reading this post work for fortune 500 companies as security technicians? What kind of data is in your head that might be of use to a foreign operative?
Ponder that as you sip that free drink late in the day. Say, did you know that the Chinese most preferable means to gaining intel with visiting professors and the like, is to have them over tired and tipsy? It’s true, it’s low level but its been used on many an occasion. You see, once you start talking, then you open the door for more rapport building, and then it’s pretty much over. One wonders how many Los Alamos folks had the same treatment on trips to China. Now think about the average Defcon party and the amount of alcohol and sleep deprivation we have going on there.
Just sayin…
So, look at it from that perspective. Now the NSA has come to the con just as the FBI and other agencies and security bodies so too will the “other guys” I don’t know how many of you out there come from military or “other” backgrounds where you will have a DSS or counterintelligence training,but, I am assuming that a vast majority of the folks attending the cons today do not have that background, especially the younger ones who’s only been in the security arena a short time. Pentesters who know SE should be able to easily detect some of the techniques used to recruit an asset, and tease out information.. Others, maybe not so much.
So here we are today, APT (Yes China being one purveyor of APT attacks) are not only using malware to get into systems but also recruiting sources to help them in their goals. Used to be a time that it really only was the nuclear scientists getting the attention… Today though, everything is game, you might make widgets, but that doesn’t mean that someone doesn’t want to know what you know.
Pssst… It’s still espionage kids… And now YOU are part of it because you hold interesting information.
How’s that for some “Threat Intelligence” huh?
Which brings me to the second line of thinking or topic that came up this year. The government is asking us to consider more “threat intelligence” and to bring them in on the loop. See, right there, they are asking you to be an asset.. Did that occur to you? Of course I know for the most part you all thought, as I did too, that the idea was a bit silly.
Why?
Because who really has that kind of threat intel program going on today? Hell, we are all pretty much trying to just keep our shit together right? On average, unless you work for a major company,you may not even have an SIEM or even snort instance right? How are you going to convince your employer that you need that stuff and then more so, to pass that intel to the government? The only groups I have known to do this are the DIB partners, and they do it because they don’t want to lose contracts for the military.
So now, we would all be assets? All corporations out there, whether they are being attacked by APT or Anonymous, would be reporting their incursions or attempts at them to the government? That’s kinda spooky really. This also circles back nicely to the idea that we all now, all of us in the INFOSEC community are now collection nodes for SIGINT/HUMINT/MASINT/ELINT and not many of us have had the training to be analysts.
You see, when you use the words “Threat Intelligence” this has some context that some may not get right away. It’s not just what IP is hitting us and with what attacks anymore.. It’s about the context around all of that and the attribution that is needed for cyber warfare, or more likely, cyber intelligence operations. I expect to see a lot more of this lobbying going on at all of the cons as well as more people sidling up to the attendee’s and asking “so, what’s going on out there?”
For those of you not acquainted with HUMINT and it’s techniques, I suggest you read “The Art Of Intelligence” By Henry Crump and learn… Why? Because that guy you’re talking to at the cool party might just be a PRC case officer…
Interesting times….
K.
Project Vigilant: Quisnam vigilo vigilo
In the fight against terror, the U.S needs all the help it can get, even if that assistance comes from unpaid volunteers. For the past 14 years, a significant volunteer group of U.S. citizens has been operating in near total secrecy to monitor and report illegal or potentially harmful activity on the Web.
Flying “under the radar” and carefully discouraging any press coverage that focused on the group, Project Vigilant has quietly operated in the eddies and whirlpools of Internet research, feeding tips and warnings to federal, state and military agencies. The group claims over 500 current members, although their names and identities are still mostly secret. Their members comprise some of the most knowledgeable experts in the field of information security today and include current employees of the U.S. government, law enforcement and the military. . . .
Last year I ran into an incident that made me wonder about murmurs I had been hearing within the community about “Citizen Hackers” or Patriotic Hackers. It seems that this has come to fruition with this “Vigilant” group that popped up at DC last week. Of course I and everyone else in the infosec community are somewhat incredulous about this group in the first place as we have never heard of them but also if you listen/read about them they become even more “spooky”
- They allege to have tacit “high level” approval of what they are doing and connections
- They claim to have access to ISP data that really should be protected but seem to have some sort of out on that
- Claim they are monitoring 250 million IP’s and can track anyone (#LIGATT anyone?)
- Outed themselves at DEFCON to recruit for their super secret work? Huh?
- Chet Uber’s LinkedIn is reminiscent of Robin Sage’s except it has even less data than hers did
- Is seeming to claim a large involvement in the Wikileaks case
When I first heard about this “press conference” and the content of it, my spidey sense went off right away. Not only does it sound ridiculously bogus, but it also sounds really scary in a Babylon 5 “Night Watch” kind of way. What it really means is that if this group has been around a while, they just got the go code to begin a larger collection mandate. It also means that the worries of many post the Washington Post’s reporting on “Secret America” (blog post here) is coming true before our very eyes.
To whit: “Who’s watching the watchers?”
If their claims have any merit, then these guys are a civilian “group” of volunteers who are accessing data and watching people online without any oversight. They are not duly appointed officers of any agency, and they are in effect, more like a McCarthy-esque cabal no matter the ostensible “good intentions” that they may have. With or without oversight, it would seem that with a tacit approval by the government and the agencies, we now have a civilian spying arm that would have a type of Carte Blanche to watch anyone they feel like watching.
I would also take up the fact that really, no one has heard of these people before in the community as well as their ranks (those named so far) have not been stellar names in security as far as I am concerned. So, just what are the aims here? Is this some new fangled version of the Idaho militias with computers instead of guns?
A cyber-militia so to speak?
Now, back to the start of this little diatribe… I had heard murmurs and allegations that the military types were lamenting not having a force multiplier in the cyber offensive like that of China’s “Citizen Cyber Army” that they have been developing. It would seem that this may in fact be the answer that they were looking for.. Or maybe started huh? But again I ask this question:
Why announce yourselves at DEFCON? If you are so secret and super dooper why not just scout people out and talk to them in private? Go through an interview process as a cutout company perhaps and get volunteers that way? Also, why volunteer? Why not take this baby IPO and make your own company there Mr. Uber? Just the type of thing the Beltway seems to be eating up lately since 9/11.
You could make Billions Muaa muaaaaa muaahahahahahahaha
Nope, it just rings… Well it smells is what it does… Like old cod on a hot day.
If indeed an approved group and mandated this bodes ill for all of our rights. It bodes ill for the country, and it should scare the shit out of people.
On the other hand.. This could all just be another #LIGATT huh….
Time will tell… Read up and decide yourselves… Attrition is looking into them… So am I.
*EDIT* As just pointed out by @theintersect their spelling in the logo is wrong too! It’s VIGILO not VIGLIO! Whats that as in Don Viglio is watching you? BAAHAHAHAHAHAHAHAHA
Linkage:
CoB
Top Secret America: The Fifth Column, Uncontrolled and Unaccounted For
The top-secret world the government created in response to the terrorist attacks of Sept. 11, 2001, has become so large, so unwieldy and so secretive that no one knows how much money it costs, how many people it employs, how many programs exist within it or exactly how many agencies do the same work.
These are some of the findings of a two-year investigation by The Washington Post that discovered what amounts to an alternative geography of the United States, a Top Secret America hidden from public view and lacking in thorough oversight. After nine years of unprecedented spending and growth, the result is that the system put in place to keep the United States safe is so massive that its effectiveness is impossible to determine.
The investigation’s other findings include:
* Some 1,271 government organizations and 1,931 private companies work on programs related to counterterrorism, homeland security and intelligence in about 10,000 locations across the United States.
* An estimated 854,000 people, nearly 1.5 times as many people as live in Washington, D.C., hold top-secret security clearances.
* In Washington and the surrounding area, 33 building complexes for top-secret intelligence work are under construction or have been built since September 2001. Together they occupy the equivalent of almost three Pentagons or 22 U.S. Capitol buildings – about 17 million square feet of space.
From Secret America in the Washington Post
PBS Frontline report coming this fall
When this article came out there seemed to be just a collective murmur as a response by the masses. I figured that either people just didn’t care, didn’t get it, or were just too stunned to comment about it. Upon reading up some more and seeing the Frontline piece, I have decided that most people just can’t grasp the sheer import of this report. What this all says to me is that the government has no idea of just who is doing what and how much money is being spent. What’s more, the people certainly have no idea (the people as in the voting public) whats really going on either.
Another factor here I think is that many people just have too much faith in the government and in the corporations. When you really look at it though, once you have worked in the sausage factory and have seen how its made, you really never want to eat sausage again. Its like that with working for the government and or corporations really. Having spent all these years in the information security business working for fortune 500 companies as well as the government, I can say I do not want to “Eat the sausage” Of course perhaps the better thing to say is that I do not trust the government nor corporations because they both are comprised of inept people and red tape.
By far though, the concerns that I have are something a bit more ominous in nature. I fear that these machinations will only lead to greater abuses of power by not only the government but also the corporate entities that they have tasked with performing all this secret work. It used to be that there was government oversight on the intelligence community, but you knew that there was some off books things happening. Now, we have post Iraq and still ongoing in Afghanistan, a contractor proxy war that now includes a civilian intelligence element. An element that now seems to be even more “civilian” because it is being operated by corporations and not wings of the government. It gives a new meaning to “black ops”
Another interesting turn in this “secretification” to steal a Bush-ism is the whole issue of just how far the pendulum has swung from the nations not caring so much about HUMINT and intelligence to suddenly being even more fervent about it it seems than they were during the cold war years. I might also hazard a statement to say that since 9/11 it has generally felt more and more like the 50’s again where paranoia is concerned about the “enemy threat to the homeland”
Are we in danger? Yes. Do we need to have to go back to the 50’s mentality of us and them with a McCarthy-esque twist? No.
Of course all or most of this is aimed at Jihadi terrorists and not a governmental body like the Soviet bloc and this is where the disconnect seems to be the largest for me. It’s rather ironic actually that all this effort is being predicated on fighting a group of people who are not generally known for being easily infiltrated nor as easy to get a grasp on as the Sov’s were. People just knee jerked after 9/11 and really, they have only created even more bureaucracy in which the real INTEL will get lost and another attack likely happen because of it.
Welcome to Washington’s dementia…
A Fork in the Road
Not a code breaker? Email me for the cipher type and key. Only users I know will get the key however…Otherwise, have at it….
Zc, pmm a35l3k’a gubgbiqg ptte admx ao jhfsr ulaw pamd hl eli ricn ra Pftuig. A oyg o ywsp sxou zc iuysgix moen iso jspkohe ejanra iaf knrzykd zx py zchwx hrg nojgmq zg xaer xr qi. X utczrj mphq thcc bfyjc wke grad gamz O hiw fcg avqw hro ymg fvh rrsjhk uel gapwv oywlhasrl alpc pumiz br lar. Kai laln vhpwhk uq sbp bbph ki stilo xfilk krhutiez pr.
Jve ysdkwplp, blh hfnfetx A aeye udh rmkt roi lfvse tawpg zfpmdi jae fqse keil. M ahja swk zxivq ls dyfv bna oy ihx ZA A ard zfif ahnsbuy hmxw tkgshl, pnm P naoeesz poeg zhml ldp etxxxg aly tiazod Q nhw whjt yve wgba hvuk tn xdlc oosna xkv gphns O zed yvyqh. Xww kvoyomg wlgbgz xax xzqhwudi dvynrxpvx ovrg P euaylgpb zhr r wig ghqe jaap llc whxqaep tniyxs.
Zqs jmz ecefmw skyiolh zq tg pgcdagit, nvgvotzh avhw, hnw ylee vhqa pv lx yw xmduqrj. N jaf hfaf pmwh gkih eep zlkae tkdwfy xkpm sj ulgy tep qfqu ujsna hdj mdsbtw…. Gaip ldr ah pdxp auvul mye cneapl, xcm dwci mcboesogsw mv pwib npkqa ql jabn. Wr, U pjkeexk xbti wzws bnl weww I fie fqejd, kkk shxhs A vnh uliq cwjxqam omta Teoxivg, ter zulb rj ssl, lie nsomyiqxplf B eny ljpw hb eprc asrzxkwy kzxh fdbx jnel ihtjmuthasr/mvsw.
Efzyv wjryp 10 magylxz ok zs zi X&I, fzs xmnh WY wsqm kj qc;
“Ahes, I wtr’t bgva OH ***** iyh kmq aoismql nifl yme, pi drr kimi sqahysv lgfsgfi vlin cpy jahi vwyetcax oprata ff rwye BT rhgfrlz.”
I edod ht lavm yoh ker;
“Uml, P vz, xltg kes zbkgeviva peci poi jkb apvdbcx xltm P luka rlq la g wtvw kf upbt K rwvv ekem hrifu uikl kdkvaeqam llil kewe.”
Xww wzgpalalsf jajsiji zr, whrp psxbvt sp elsh V wv jgy e wdzlfn, ojoiaj bz Z pgbtv tsx ftaww xh zgciet heimv, ejd ehvw jbelamzqz ingif bui hyxs A jizwcrwxk tajq. Aj B dija wy xa bawciqfh mfw U arw vhmqg jkeo M nmq ksiez, las dweg DA cezw;
“K hmzq bf mtyi aahh utc rjx beydmek dpbna.. I dcop uolazne bfgym ppbz gc gsbxegsnf.. W tf bawl db kknrmam dzhk fmqjw”
M tlzyltz hzp epga fequ tgufs K qat kkk szqh tzwak yysp gskctr, zzet moi wigwfhccte lbxjx aefes yt rpdzr hnef tvq oea rg dehipwt jzm qh lv sotlnlg zlelomj. Lc palhwrw t dltpe zbij bxvjs lh xzx zevvro VH, etg hgzaw ssx lg vv cmq xutpnxw sr dhyi olvtsd eqc ik aihrj, azh jeql;
“Ah gbrh?”
Ci jqctw kzgv ht sfrrjen xp lcvq lug kmcy eelasz, mij fh kphx essxh jaht B pm mhlcbeg ycsmx, tjl dpfoe njad bip bt abz mdmwrbp. Poi fkcwah VM qfcw rxz, ehs phvb laq py M fwn zcsn c NRD fi zhd hdts. W fer P wxis ynv ntv fezpr wli ejhtsfy hn jilaifh rjfoc. Lt’f di tutb cutvx lvnm alwf wlt xkwf bvid gr uy jbelezipi wegw erw hwv mf O wsqtg nqsl feae ahxt xsh KDP lc fpr jmcpv gzwdgc akbse iwsdlvprc h klvp.
G pilc blhr judi, Z gsg whnq wlzq r PTK es nxde ok xsuhabh ulg eyeuzj M iyvx ultkwm kg mpi sbich rtsbje wxrxjtdr ko rii wqtet tkvciwh wx gva pokw. Apwg duojg ti, fnasr qb tysh, egw siuka.
Nfz, epoz plrhe gvuetmdaejk bnxkejsq qx vr d wss ymikdw.
1) Dh alhwi vmrj hnrd br isjh guhjw lx dly? L beng, Q uggm fwsa ihwkprr yews mci e wuley ebo hvv xfiq aoni rh jpfi?
2) Tnyc ywpi po ltpc mv mx hfzxa lmlo fpnx qyc jwmzyi mr pr zekair? Kalc zpl ysf qaim kw ldav sqie xzx hdtn qsm avdc alep owkm udyho ix so ajo U amg vxs. Mw aahh, jte rfrwrr plf wdmf moam ihxye’k “ltapz hsxt” kv lvepsrt’a SC ozqfxlz bzmi nfa fbwg movae wmqp e ghnwpy HW’s kr epk lgh xoepa bdfbasj wu qtivtaca xalq? Qfh ong zgqfe voifo xww BG oaj vphgc ahw urfkqmf oa wweex nvxdb?
3) MX W wnzx zhzp olh vhhr ms gktn zydlosp? Pisezq, mw ba? Me’w otfc rqgiks gg lgp ao fhop SLBZ, kcymglmlk qgo tvr eiw hmf hk styxy mjamcrqr omtva eqi suxpvxag fraegw jyk fflve. Rkw mvwq gkpcumok vhqq fcf? Md zigm, ucp ftc gy blr omuirg jxye mwekl afw jetfvsp wel gvl pzic eyey! Ob vtw apwg nbba poi qae lvplscsgi, malc wdqlu kldk ttcea sydfd vra tilv tn wwajh. Aiolv pzbz ppricmnz alhmv uaevg ntw ahi zhvw cejs hsukvqv af t svto wj vogt JM xvv l rlldl.
Hyi svwx cj aga ivzcvlbgwh (iqjiax arf xdm EW phsm nwlaek wsdwll) eg ktig xlc jmue? Zo’w lsw epkx N lamx h jqst umtyzmsk eiexztq azxz tgwiih FW se yw PT. Sf kwtzdq, akj tri ueukurs cw xmi AE’l ac ey?
4) Weux blrr wvi wvr whtt pnw vnw hw tffq aw bjbxywdxis id gva ystla, bzmi wiop zel zo arrg ur ys xaxt zcp onrlw ugpe? M hrel itkgn phvp of H wkomzq nnzx vkcl qwvty ahta M zew sgbeu ntw thenl il ce. Ympc vavg co, lhc pgy siwd fxuhauk doyix… iik xhrb lyvz fvv-uskqamhsp euvye mt. Gn paivx phw hxzxy ST dlz numi ovmb V aeq xsdezik yfrna wtx naqslh w iqe.. fgr…
Kzei ipo, yyie aysdx mqcvgiix agqa qaux ex hjmww tn dlf HQJ xieg. Iydhqrz kcss i kai nvbf e kyur ybre mwe clslxi wfjpw mzjwkpfr sv cwd hbzrflmhvvqxt hda kegg tpnx L tyi tvxllrntz tyhx eoaa mv ziqpfatdanzqm. Euiq mgfr wh aldk hdrg qov rom lzhr fdlavf gu vphgc ahw eayfmeve nw ihr yqrro wjxwpx iiuhydz M de ziii I udoy r sasm. Kskilawfk xahx T wetmiz edw xolaijbug moi rububq GM isxip ekcceb qc wrfl qnjwtzhuw wul diqgjk tym hdyr.
I etvrl rivtruhvc dapumnx ygkksjhlyg dlf ioaupe hf xxy AE’l IP wsl kzxv aehxv ys al ypnwxnzz rwifrr xmll fu uxazzhsawql ojq gxga bzid nzkjn xbu. Tpnx drrjvrhhu M mtjt kkp LBK trg xeeio tq zknuhx tgi zhgzr iljesrra jqgn s fega xraegv clgg ytglry “muul iy” fyh vtbseiaz iyzzoilvrk. Hjllv lgp, zzhh xsoq df C ubauo aj rlwr oji rha tlcita epbhrpigg? Rgm ahta M rra bag agku viqtgfmv avmq waps ynilu hmjejm. T kar w lect si f cof qfvw yvrm gki Cslervr fzxdw cxxmfp bkgl mp tti pop evnmv ff rwyi umfxw.
Hzl.
Z kxsfl pt cjsm yeetznq us ti lamg dzlx gduof cb gvbl kili nhal wuh ze rmcsuf. Kfcfx lvqydje zq epk jrfhn dgdjskyj wzor gdx whw RIH tuh krja fwzk artxyivx….
Pxxx nof ybuspwy wzfn N ofww cnutd zhzr gmwyl hndpry wlzosv looe ely wacj pjhx….
From John Yoo and Torture to Warrantless Searches of Papers and Effects: Welcome To The Panopticon
with one comment
“They who can give up essential liberty to obtain a little temporary safety, deserve neither liberty nor safety.”
Recently, a story has come up in the news concerning certain police departments (Michigan to be precise) have been taking more or less “forensic” images of people’s cell phones and other PDA devices when they have them stopped for traffic violations. Since the reports went live, the Michigan PD has sent out a rebuttal saying that they are in fact asking the citizen if they can scan their data. I say, whether or not they actively are doing it or not, they have the ability to do so per the courts since the loosening of the laws on search and seizure in places like California and Michigan where electronic media is concerned. The net effect is that our due process rights are being eroded in an ever rapid pace.
From Dailytech.com
The law and our losing the path :
The legal battle over the terms here has come down to the nature of papers and effects where they regard digital media as I understand it. I sat in on the EFF talk at Shmoocon where this very topic was brought up. It seems, that the gray areas of just what is a laptop or a phone as opposed to a “cabinet or desk” is a key factor in how some interpret the legalities of searching someone’s hard drive or phone. In my opinion, they are the same thing. A laptop is a case in which my data is stored, just like a desk or a room, which, you MUST get a warrant to search.
But, that’s just me I guess.
Personally, as the title of this post alludes, I believe that all of this started as soon as John Yoo and the Bush administration began to twist the laws concerning not only torture, but moreover, the use of warrant-less wiretaps. Post 9/11 the US went mad for tapping of phones/data at the trunk level in such instances like the one in the MAE West where they put in the NARUS STA6400. This was the biggie for me because that system hoovers ALL of the traffic, there is no selectivity over it at all. Sure the STA6400 can sift the data, but it needs ALL of the data in order to sift and data-mine. Who’s to say what data becomes important other than those who are running the compartmentalised program that has to report nothing to anyone because it is too secret.
What allowed for all of this to happen and then for the over-reaching to continue was 9/11 itself. Having been in NYC at the towers just before the attacks and working there just after in the hole, I know how many felt after it all went down. We here in the US had only had a handful of terrorist attacks within our borders and those were nothing in comparison to what took place on that day.
We all felt vulnerable and wanted the government to take care of us. We wanted vengeance, and we wanted a take charge guy.
Unfortunately that “guy” was GW Bush and his posse of cowboys who then began to run rough shod over the constitution and other documents like the Geneva conventions. It was from this need to be protected that the American people just went along with the things they knew about, as well as a healthy dose of over classification by the Bush administration that kept us in the dark as to what they really were doing. It was only later, toward the end of the second term that the full scope of abuses were coming out, and yet, the American populace really did nothing. Sure, we elected Obama who made promises to end the nightmare of abuse… But.. He hasn’t has he?
So, here we are in 2011. Ten years post 9/11, and we are finding our rights being eroded by legal positions and decisions that remove the most basic and cherished rights to reasonable searches slipping away.
Who’s to blame?
Us.
We the people have failed to keep in check the actions of the government and in some cases the courts because we have taken our collective hand off the tiller steering this country. Perhaps we really have no hand on that tiller to start simply because we have created a beast that is too big to control or have any sway over. By just looking at the state of affairs today within the political arena, one has to admit that its becoming more and more akin to what it used to be back in the days of Boss Tweed than anything looking like the era of J.F.K.
Simply put, without the people standing up and calling a foul on these types of erosions to liberty, then we have nothing to complain about when the liberties are taken away. On that list is the rights granted to us all by the fourth amendment. The tough thing now though is that where once your personal belongings were either in your house or on your person. Now, those “papers and effects” live digitally not only on your device that you have on you, but also may exist “in the cloud” as well. A cloud that you “use” and is not “owned” by you.
So sure, a cop could ask you if they can look at your phone data. Do they have to say that they are taking an “alleged” forensic image? Perhaps not, but, the thing about the whole Michigan PD thing is that independent reports have shown that they were not asking, they were just taking images when they felt they wanted to, and this is where they run afoul of due process. As far as I am concerned, a file on a phone that is not on the screen as a cop looks at it while it sits in front of him in plain view, is NOT a document that he should just have the right to fish for without a warrant.
Sorry cops… It’s a country of laws, no matter how you try to spin them so you can cut corners.
On the other hand, I know how hard it must be for the police forces of the world to do their jobs now in a digital world. Especially one that so few really understand and likely fear. These magic boxes called phones and computers now hold data that could easily make a case for crimes, but, you just can’t take them and rummage through them just like anything else where due process is concerned. What’s more, I know for a fact that unless you are a forensic investigator, AND you have a decent tool, YOU WILL MISS DATA. Which will lead potentially to acquittal because you did not follow processes such as chain of custody in E-Discovery.
For some though, I am sure it’s just about cutting a corner to make a collar… And that is not how the law is supposed to work.
Our complicity in our own privacy erosion:
Meanwhile, in the last few days another spate of news articles warned about how the iOS and Android systems were collecting data on our movements and details. This particular story is not new if you have been paying attention, it was just the aggregate amount of data that we saw being collected by the iOS particularly that shocked the general populace. For these people I have news for you;
So, even if laws are being subverted on personal searches, your data can and will be taken from the likes of Twitter and other services, perhaps even through NSL letters to those hosts and you will be none the wiser. For every post you put up on Facebook with all of your personal details, not only are you sharing that data with your “friends” but the company and whoever they want to sell it to as well.
The privacy you think you have.. Doesn’t exist.
In the case of the iOS data, no one knew about it from a customer perspective, but I am sure that there was some small print somewhere in the EULA when you bought the phone that allows Apple to collect the data… Not that they have to tell you they are doing it in big letters or clear language. So, that data too is not completely yours any more once you have agreed to their agreement to use/own the phone.
The short and long of it is that we are giving up our right to privacy for shiny toys and a sense of security that we can never really have.
In the end, the data that the iOS collects has yet to be proven to be sent to the Apple mother ship. Apple to date, has made no statement on the collection of the data nor the reasons for doing so. One can assume though, that they have some sort of location based software solution that they want to sell down the road and really, it’s caveat emptor. I am just glad that the security community likes to tinker and found this stuff, bringing it to light.
We are all to blame.
Unless we all take up the battle against the loss of privacy then we have none. Just as well, unless we speak truth to power and stop the erosion of rights to privacy within our body of laws, then we have nothing to complain about. We will have done it to ourselves.
K.
Rate this:
Written by Krypt3ia
2011/04/22 at 18:40
Posted in .gov, 4rth Amendment, Commentary, First Amendment, FUD, GWOT, McCarthy's Ghost, Mossad, Night Watch, OPSEC, Panopticon, Privacy, Profiling, Ranty Rant, Roosters and Owls, Security, Surveillance State, Terrorism, Warrantless Searches