SHARE
TWEET

Public Enemies - NSA and their companies

a guest Nov 10th, 2013 2,421 Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
  1. <p style="text-align: justify;">Here is one article about true public enemies, not state enemies than enemies of society</strong>. Companies and people and their products that are created to build totalitarianism in the time of global capitalism. Their aim is to control people and companies and politicians globally, everything with aim to make bigger profit for rich Americans. So, yes, on the top of the list should be billionaires (owners of Shell, Chevron and similar) but this article is more about their servants (political, military, security system) that hunt people and disturb our life. They don&#8217;t spy only politicians and ordinary people, they hunted Silk Road and they continue. Wide spectrum of people should be aware of totalitarian lunatics. Don&#8217;t forget: even if you see that companies financed by NSA/CIA produce some ordinary software, you should be aware that their software contain bugs or backdoors which help them to spy users of software. Open Source doesn&#8217;t mean that software has no bug or backdoor, even open source is good for them, software code is public and they get code contribution from different developers without to pay them and rarely programmers who don&#8217;t work for CIA check software. Only those financed by the state, they have time to check so many software, other programmers must find work for a living.<br />
  2. Beside it, if you believe that there is internet paradise like Assange believed in Sweden, you should read this: British investigative journalist Duncan Campbell has claimed that Sweden collaborated with the USA on the internet monitoring FRA law and that the country is on the same level of surveillance as Israel. Sweden is one of America&#8217;s key partners in efforts to monitor internet communications across the globe. The surveillance is mostly conducted by the direct tapping of fibre optic cables and the development of &#8220;secret relationships&#8221; with telecommunications companies. British GCHQ had been delighted when Sweden&#8217;s Riksdag/parliament in 2008 clubbed through the law that gives <b>the National Defence Radio Establishment (FRA)</b> the right to monitor traffic in fiber optic cables. FRA is a Swedish Government Agency organised under the Ministry of Defense, the two main tasks of FRA are signals intelligence (COMINT and SIGINT/ELINT) and support to government authorities and state owned companies regarding IT security. The main headquarters is located on the island of Lovön in Stockholm County. FRA was assigned a budget of 562 million SEK in 2008 and has around 650 employees. Interception of signals is done from fixed sites on Swedish territory, from the SIGINT ship HMS Orion (operated by the Swedish Navy, and soon to be replaced by another vessel that meets safety regulations) and from two Gulfstream IV aircraft (operated by the Swedish Air Force). <b>Ingvar Åkesson</b> is Director-General and <b>Christina Malm</b> is Deputy Director-General. The only difference between FRA and NSA is that FRA outsource only strictly technical jobs to subcontractors, so, level of neoliberal ideology in their work is smaller than in the U.S. and FRA doesn&#8217;t have 1.6 billion dollar storage facility and supercomputer like NSA.<br />
  3. Sweden is not the only one, Spain, France and Germany also developed surveillance of Internet and Frankfurt has international backbone (Internet exchange points) so they can spy very much. Over 580 customers from 60+ countries are creating more than 2.6 Terabits of peak traffic through the public peering platform of DE-CIX Frankfurt. This makes DE-CIX Frankfurt the world&#8217;s largest Internet Exchange Point.<br />
  4. <b>I found official NSA co-operation information:</b><br />
  5. <span id="more-1913"></span><br />
  6. <b>The 5-Eyes:</b> The US, the UK, Canada, New Zealand and Australia<br />
  7. <b>The 9-Eyes:</b> The &#8217;5-Eyes&#8217; group plus Denmark, Norway, the Netherlands and France<br />
  8. <b>The 14-Eyes:</b> The two above groups plus Germany, Sweden, Belgium, Spain, and Italy<br />
  9. The NSA was collecting data from Verizon thanks to a secret court order. <i>The Washington Post</i> revealed an even broader program of surveillance code-named PRISM (this software was produced by company called <a href="https://en.wikipedia.org/wiki/PRISM_%28surveillance_program%29#PRISM_at_a_Glance" target="_blank">Palantir</a>, which involved data collection from the web’s largest players — including Google, Facebook and Apple — and then the Wall Street Journal said data is also being gathered from ISPs and credit-card companies.<br />
  10. General <b>Keith Alexander</b> is director of the world’s largest intelligence service, <b>the National Security Agency (NSA);</b> chief of the Central Security Service; and commander of the US Cyber Command. As such, he has his own secret military, presiding over the Navy’s 10th Fleet, the 24th Air Force, and the Second Army. He brought the entire Internet, our private life, under surveillance. Alexander has now the capability to physically destroy equipment and infrastructure of an enemy of American corporations, and even to kill. <a href="http://www.rollingstone.com/contributor/michael-hastings" target="_blank">Michael Hastings</a> died in <a href="http://www.globalresearch.ca/who-killed-michael-hastings/5355606" target="_blank">car crash</a>, he was a 33-year-old investigative reporter for Rolling Stone magazine, whose June 2010 article, “The Runaway General,” exposed the behind-the-scenes failure of top U.S. General <a href="https://en.wikipedia.org/wiki/Stanley_A._McChrystal#Post-military_career" target="_blank">Stanley McChrystal’s</a> counterinsurgency strategy in Afghanistan—and, even more damagingly, revealed McChrystal’s mocking attitude toward the Obama administration, which ultimately led to the general’s resignation. In Hastings’s 2012 book, “The Operators: The Wild and Terrifying Inside Story of America’s War in Afghanistan,” Hastings wrote about being approached by one of Gen. McChrystal’s aides. “We’ll hunt you down and kill you if we don’t like what you write.” Military is interconnected with dogs of war (so-called mercenaries, people paid to go in war and kill), so, they can hire them as paid killers and eliminate somebody.<br />
  11. NSA first cyber-weapon that came to be known is <b>Stuxnet</b>, this worm was created and built by the NSA in partnership with the CIA and Israeli intelligence in the mid-2000s. The first known piece of malware designed to destroy physical equipment, Stuxnet was aimed at Iran’s nuclear facility in Natanz.<br />
  12. But Stuxnet is only the beginning. Alexander’s agency has recruited <b>thousands of computer experts, hackers, and engineering PhDs</b> to expand US offensive digital capabilities. <span style="text-decoration: underline;">When you employ programmers, think twice whom you employ, 99% they are snitches, better choose programmers from anti American countries.</span> The Pentagon has requested $4.7 billion for “cyberspace operations,” even as the budget of the CIA and other intelligence agencies could fall by $4.4 billion. It is pouring millions into cyber-defense contractors. Yes. yes, contractors and Alexander and his co-workers surely steal taxpayers money when they give it to private subcontractors.<br />
  13. When DEFCON [world’s largest computer hacker’s convention] started in Las Vegas [in 1993], it was primarily attended by true hackers. Now it’s commercialized. Big corporations have taken it over. And law enforcement [agencies], which used to attend undercover, have booths set up and are actively looking for hackers as cybersecurity experts.<br />
  14. If you check ads for jobs, you can find out that consulting and engineering firms such as <b>Invertix</b> and <b>Parsons</b> are among dozens posting online want ads for “computer network exploitation specialists.” And many other companies, some unidentified, are seeking computer and network attackers. “Firm is seeking computer network attack specialists for long-term government contract in King George County, VA,” one recent ad read. Another, from Sunera, Tampa, Florida, company, said it was hunting for “attack and penetration consultants.” All these companies are working for NSA and they are looking for professionals who will work for NSA. Unfortunately, many programmers have technical skill but not political education and they sell themselves for money. Will they get money from Saddam or NSA, they don&#8217;t care, they work for money and they will work against society.<br />
  15. One of the most secretive of these contractors is <a href="https://en.wikipedia.org/wiki/Endgame,_Inc." target="_blank"><b>Endgame Systems</b></a>, Endgame funding was led by <a href="http://www.paladincapgroup.com/people/" target="_blank"><b>Paladin Capital</b></a>, a venture firm with roots both the security and government sectors (companies and products they invested money: <a href="http://www.paladincapgroup.com/sectors/cyber-security/" target="_blank">http://www.paladincapgroup.com/sectors/cyber-security/</a>), with participation from <a href="http://www.kpcb.com/companies" target="_blank"><b>Kleiner Perkins Caufield &amp; Byers</b></a>, <a href="http://www.bvp.com/strategy" target="_blank"><b>Bessemer Ventures</b></a>, <a href="http://www.crunchbase.com/financial-organization/techoperators" target="_blank"><b>TechOperators</b></a>, <b>and <a href="http://colcap.com/" target="_blank">Columbia Capital</a></b>.<br />
  16. Established in Atlanta in 2008, Endgame is transparently antitransparent. “We’ve been very careful not to have a public face on our company,” former vice president <a href="http://www.linkedin.com/in/jmfarrell" target="_blank"><b>John M. Farrell</b></a> wrote to a business associate in an email that appeared in a WikiLeaks dump. “We don’t ever want to see our name in a press release,” added founder <a href="http://www.linkedin.com/pub/chris-rouland/61/4b8/29b" target="_blank"><b>Christopher Rouland</b></a>. Endgame is also adding ex-National Security Agency director Lieutenant <a href="http://www.paladincapgroup.com/people/lt-gen-ret-kenneth-a-minihan/" target="_blank"><b>General Kenneth A. Minihan</b></a> to its board. Minihan currently serves as the managing director of Paladin Capital. The company also recently included <a href="http://www.nndb.com/people/514/000171001/" target="_blank"><b>Christopher A. R. Darby</b></a>, the chief executive officer of the CIA’s venture arm <a href="https://en.wikipedia.org/wiki/In-Q-Tel" target="_blank"><b>In-Q-Tel</b></a> as its newest chairman. Darby is also President, Chief Executive Officer, and Director in company called <b>Sarvega, Inc.</b> So, don&#8217;t use <a href="https://en.wikipedia.org/wiki/In-Q-Tel#Software" target="_blank">products</a> of these companies.<br />
  17. By the way, Endgame’s clients will be able <span style="text-decoration: underline;">to observe in real time as hardware and software connected to the Internet around the world is added, removed, or changed</span> and Endgame will get a lot of money for it: <a href="http://decryptedmatrix.com/live/endgame-systems-hiding-behind-censorship/" target="_blank">$2.5 million for 25 zero-day exploits</a>. And at other side, private contractors means also that companies in the cyber-industrial complex are free to sell to whomever they wish, not only to NSA.<br />
  18. Edward Snowden worked for <a href="https://en.wikipedia.org/wiki/Booz_Allen_Hamilton" target="_blank"><b>Booz Allen Hamilton</b></a>, an American technology consulting firm in Virginia with 80 offices across the US. Its core business is the provision of management, technology and security services, primarily to civilian government agencies and as a security and defense contractor to defense and intelligence agencies, as well as civil and commercial services. Booz Allen Hamilton is majority owned by private equity firm <a href="https://en.wikipedia.org/wiki/Carlyle_Group" target="_blank"><b>The Carlyle Group</b></a>, they have 26000 employees, turnover US$ 5.859 billion and NET profit 240 millions. Anonymous accused Booz Allen of working with <b>HB Gary Federal</b> (HB Gary was purchased by <a href="https://en.wikipedia.org/wiki/ManTech_International" target="_blank">ManTech International</a>) by creating a project for the manipulation of social media. In 2013 Snowden published that Booz Allen support developing the NSA&#8217;s classified mass surveillance and data collection program PRISM. Some of the documents taken by Anonymous show <a href="https://en.wikipedia.org/wiki/HBGary#History" target="_blank"><b>HBGary Federal</b> </a>was working on behalf of Bank of America to respond to Wikileaks&#8217; planned release of the bank&#8217;s internal documents. &#8220;Potential proactive tactics against WikiLeaks include feeding the fuel between the feuding groups, disinformation, creating messages around actions to sabotage or discredit the opposing organization, and submitting fake documents to WikiLeaks and then calling out the error. Emails indicate <b>Palantir Technologies, Berico Technologies, and the law firm Hunton &amp; Williams</b> (recommended to Bank of America by the US Justice Department) all cooperated on the project. Other e-mails appear to show the U.S. Chamber of Commerce contracted the firms to spy on and discredit unions and liberal groups.<br />
  19. In 2013 David Sirota of Salon said that Booz Allen and parent company Carlyle Group make significant political contributions to the <span style="text-decoration: underline;">Democratic Party and the Republican Party as well as individual politicians, including Barack Obama and John McCain, Sirota concluded that &#8220;many of the politicians now publicly defending the surveillance state and slamming whistleblowers like Snowden have taken huge sums of money from these two firms</span>&#8220;. Booz Allen helped the Government of the United Arab Emirates create an equivalent of the National Security Agency for that country.<br />
  20. <b>Here is the list of projects of NSA:</b></p>
  21. <p><iframe width="500" height="375" src="http://www.youtube.com/embed/UzYnX_e0yM4?feature=oembed" frameborder="0" allowfullscreen></iframe></p>
  22. <p>Before 2001: <a href="https://en.wikipedia.org/wiki/ECHELON" target="_blank">ECHELON</a>, <a href="https://en.wikipedia.org/wiki/Main_Core" target="_blank">Main Core</a>, <a href="https://en.wikipedia.org/wiki/Project_MINARET" target="_blank">MINARET</a>, <a href="https://en.wikipedia.org/wiki/Prosecutor%27s_Management_Information_System" target="_blank">PROMIS</a><br />
  23. 2001: BLARNEY, RAGTIME, Turbulence, PINWALE (NSA internet database), MAINWAY (NSA call database), Upstream (incl. Room 641A)<br />
  24. 2007: <a href="https://en.wikipedia.org/wiki/PRISM_%28surveillance_program%29" target="_blank">PRISM</a>, Boundless Informant, <a href="https://en.wikipedia.org/wiki/X-Keyscore" target="_blank">X-Keyscore</a>, <a href="https://en.wikipedia.org/wiki/Dropmire" target="_blank">Dropmire</a>, <a href="https://en.wikipedia.org/wiki/Fairview_%28surveillance_program%29" target="_blank">Fairview</a>, Surveillance Detection Unit, <a href="https://en.wikipedia.org/wiki/Bullrun_%28decryption_program%29" target="_blank">Bullrun</a><br />
  25. British GCHQ collaboration: IMP, <a href="https://en.wikipedia.org/wiki/Tempora" target="_blank">Tempora</a>, Mastering the Internet, Global Telecoms Exploitation<br />
  26. Discontinued projects: <a href="https://en.wikipedia.org/wiki/Trailblazer_Project" target="_blank">Trailblazer Project</a>, ThinThread, President&#8217;s Surveillance Program</p>
  27. <div style="text-align: justify;">For every of this mentioned projects can be written especial article, so, you can follow links to read about it.<br />
  28. For example, Echelon was created to snitch satellite communication of Soviet Union but later it became misused to snitch private and commercial communication with aim to help to American corporations to become stronger in international market competition (global capitalism). Second example, in 2005, NSA director Michael Hayden told a Senate hearing that the Trailblazer program was several hundred million dollars over budget and years behind schedule. In 2006 the program was shut down, after having cost billions of US Dollars, the new project replacing Trailblazer is called Turbulence. The conclusion in Congress was that Turbulence was over budget, not delivering and poorly led, and that there was little or no strategy to pull it all together.<br />
  29. XKeyscore is project for analysys of data gathered by NSA but it collects so many data (Terabytes) that content is kept 3 days and metadata 30 days. According to O Globo, XKeyscore detects the nationality of foreigners by analyzing the language used within intercepted emails, which the paper claims has been applied to Latin America and specifically to Colombia, Ecuador, Mexico and Venezuela. XKeyscore may be instrumental in the process of identifying VPNs and machines that can potentially be hacked via <b>TAO</b> (TAO is a cyber-warfare intelligence-gathering unit of the NSA, TAO identifies, monitors, infiltrates, and gathers intelligence on computer systems being used by entities hostile to the United States). Further capabilities of XKeyscore include Google Maps and web searches. But TAO has over 1,000 military and civilian computer hackers, intelligence analysts, targeting specialists, computer hardware and software designers, and electrical engineers, TAO&#8217;s headquarters are termed the Remote Operations Center (ROC) and are based at Fort Meade, Maryland. Known targets are China and Tor/Firefox users. So, before 2001, NSA tried to break the code with supercomputers, but it was expensive and long process, today, they use TAO (in collaboration with CIA and FBI) to implement spying devices in remote places (far away from America), it can be keylogger in your computer or at university, or some physical device, they spy computers and routers, and they implement backdoors (bad code) in computers people buy and in networks. So, when you buy PC, maybe it is already infected with NSA backdoors. Many computer manufacturers make billions from contracts with American government, they don&#8217;t care for individual customers, they do what NSA tell them to do. Already when you connect PC to internet, they get info that you are online.<br />
  30. The NSA&#8217;s has and <b>secret FISA Court</b> which is located at third floor of the <strong>E. Barrett Prettyman Courthouse</strong> in downtown Washington, last 30-years they were located within the Justice Department. This court reviews government applications to conduct electronic surveillance and physical searches in terrorism and espionage investigations but obviously they became gridy for money and started to serve NSA against society. Chief Judge <b>Royce Lamberth</b> of the U.S. District Court for the District of Columbia, who served on the FISA court from 1995 through 2002, and <b>Colleen Kollar-Kotelly</b>, the current chief FISA judge, were the driving forces behind the move. This court gave secret order to FBI to attack <a href="https://en.wikipedia.org/wiki/Lavabit" target="_blank">Lavabit</a>, email service used by Edward Snowden, FBI demanded from Lavabit to hand over its private SSL key, to use it to monitor Lavabit&#8217;s users. Owner of Lavabit, Ladar Levinson, destroyed all servers and refused cooperation with FBI.<br />
  31. The F.B.I., Levison says, “sold its soul” to the N.S.A. to acquire its technologies and become a “counter-intelligence agency” rather than a domestic police force. The result is an agency with somewhat stunning technical capabilities—it was the F.B.I. that used malware to identify users of the Tor network in the course of its investigation of Freedom Hosting, the anonymous service provider, an incident that disturbed Levison because it put legitimate users at risk, even if he doesn’t agree with the illegal content that Freedom Hosting was allegedly housing. More about his case you can read <a href="http://www.newyorker.com/online/blogs/elements/2013/10/how-lavabit-edward-snowden-email-service-melted-down.html" target="_blank">here</a> and <a href="http://www.floatingpath.com/2013/08/09/anti-nsa-encryption-services-shut-down-by-fisa-court/" target="_blank">here</a>.<br />
  32. The Silent Circle followed Lavabit and did the same, they abolished email service.<br />
  33. <b>Computer Sciences Corporation (<a href="https://en.wikipedia.org/wiki/Computer_Sciences_Corporation" target="_blank">CSC</a>)</b> is an American multinational corporation from Virginia that provides information technology (IT) services and professional services. CSC bought cloud management company <a href="http://www.servicemesh.com" target="_blank"><b>ServiceMesh</b></a>. CSC has 98 000 employees in 90 countries, revenue US$ 22 billion and it is acknowledged as the world&#8217;s fourth most admired IT Services company. The company has been accused of breaching human rights by arranging several illegal rendition flights for the CIA between 2003 and 2006, which also has led to criticism of shareholders of the company, including the governments of Norway and Britain. CSC include North American Public Sector (NPS): a leading federal contractor that provides IT-related and mission/operations-related services to the U.S. federal government (since 1961) and is one of its major IT service providers. Managed Services Sector (MSS): provides information systems outsourcing services to clients in a broad array of industries, including aerospace and defense, automotive, chemical and natural resources, consumer goods, financial services, healthcare, manufacturing, retail and distribution, telecommunications, and technology. In June 2013, Margaret Hodge, chair of the Public Accounts Committee, a Select Committee of the British House of Commons, described CSC as a &#8220;rotten company providing a hopeless system&#8221;, with reference to their multi-billion pound contract to deliver the National Programme for IT <a href="http://www.techweekeurope.co.uk/news/nhs-2-2bn-csc-npfit-failed-contract-118941" target="_blank">Lorenzo contract</a> (an initiative by the Department of Health in England to move the National Health Service (NHS) in England towards a single, centrally-mandated electronic care record for patients and to connect 30,000 General practitioners to 300 hospitals). <b>J. Michael Lawrie &#8220;Mike&#8221;</b> is President &amp; Chief Executive Officer.<br />
  34. <strong>USIS</strong> is a private company From Virginia that conducts background checks. As of June 2013 it had 100 federal contracts, and it does background checks for over 95 federal agencies. The company was originally known as <b>U.S. Investigations Services Inc.</b> USIS is a part of <a href="https://en.wikipedia.org/wiki/Altegrity,_Inc." target="_blank"><b>Altegrity Inc.</b></a>, a company owned by <a href="https://en.wikipedia.org/wiki/Providence_Equity_Partners" target="_blank"><b>Providence Equity Partners</b></a>. In 2008 USIS had about 7,000 employees, in the fiscal year 2012 the company received $253 million for the contract work of the OPM (the United States Office of Personnel Management). In 2011 the firm conducted a background check on Edward Snowden, who leaked classified documents in June 2013. Michelle B. Schmitz, the assistant inspector general for investigations, testified that USIS had been under a federal investigation since late 2011, stating that it involves a &#8220;complicated contract fraud case.&#8221;<br />
  35. * Here is the list of some companies, I can&#8217;t list them all, it would be very big article.<br />
  36. <b>Invertix Corporation</b> and <b>Near Infinity Corporation</b> are now <a href="http://investing.businessweek.com/research/stocks/private/snapshot.asp?privcapId=107303" target="_blank"><b>Altamira Technologies Corporation</b></a> (McLean, Virginia). The merger was precipitated by an investment in both companies by Columbia Capital and Razor’s Edge Ventures. Invertix is the top &#8220;open-source&#8221; technology company in the national security space. <a href="http://www.colcap.com/team/partners" target="_blank">Columbia Capital</a> invested in Altamira, Endgame and Digital Signal. Be aware of all these companies and their products. Mark Spoto is a Managing Director at <a href="http://www.razorsvc.com/" target="_blank">Razor&#8217;s Edge</a>.<br />
  37. Altamira Technologies Corporation is a top open source technology company in the national security space. Headquartered in McLean, Virginia, <strong>Altamira provides engineering and analytic services to the defense, intelligence, and homeland security communities</strong>.<br />
  38. Altamira leadership: Chris D&#8217;Agostino is President &amp; Chief Technology Officer, Wayne Cliburn is Executive Vice President &amp; Chief Operating, Officer, Art Hurtado is also Altamira’s President and CEO. Altamira’s Chief Strategy Officer is Craig Parisot. Bryan Judd is Executive Vice President &amp; Chief Financial Officer, Wayne Cliburn is Executive Vice President &amp; Chief Operating Officer.<br />
  39. <b>Thales Alenia Space</b> is a French-Italian aerospace company formed after the Thales Group bought the participation of Alcatel in the two joint-ventures between Alcatel and Finmeccanica, Alcatel Alenia Space and Telespazio. From 2013 CEO is <a href="https://www.thalesgroup.com/en/dominique-giannoni" target="_blank">Dominique Giannoni</a>, he is 15 years inside of military and commercial aerospace markets. Operating income of company was 1.8 billion euro (2004) and they have 7200 employees. Thales Alenia Space is a strategic supplier of military satellite communications systems in Europe, as prime contractor for three generations of the Syracuse system in France and two generations of its Italian counterpart Sicral, and space segment prime for the German system Satcom BW. The company also produced dual communications (civil/military) payloads for Turkey, Brazil and South Korea. Thales Alenia Space is prime contractor for the Italian radar satellite constellation Cosmo-SkyMed, and supplied radars for the German SAR-Lupe system and Kompsat 5 in South Korea. Furthermore, our high-performance optical instruments are the key to the French observation systems Helios, Pleiades and CSO, as well as the Göktürk 1 satellite for Turkey, delivered as a turnkey system. HQ is located at: Cannes la Bocca, 100 boulevard du Midi, 06156 Cannes la Bocca, France, they have subsidaries in Touluse, Madrid, Belgium and Italy.<br />
  40. <b>Astrium</b> is an aerospace subsidiary of the <b>European Aeronautic Defence and Space Company (EADS)</b> that provides civil and military space systems and services. In 2012, Astrium had a turnover of €5.8 billion and 18,000 employees in France, Germany, the United Kingdom, Spain and the Netherlands. On July 31st, 2013, EADS announced a change of name to the Airbus Group. Astrium will be merged with Cassidian, the defence division of EADS, to form Airbus Defence &amp; Space. EADS generated revenues of € 49.1 billion and employed a workforce of over 133,000. Owners are SOGEADE (22 %), Daimler AG (15 %), SEPI (5 %). Corporation is registered in NL, but HQ is in Toulouse, France and Leiden, Netherlands. <b>Denis Ranque is Chairman and Tom Enders is CEO</b>. In 2005 the Norwegian Government Pension Fund recommended the exclusion of several companies producing cluster bombs or components. EADS and its sister company EADS Finance BV were among them, arguing that EADS manufactures &#8220;key components for cluster bombs&#8221;. In August 2012 the UK Serious Fraud Office opened a criminal investigation into an EADS subsidiary, GPT Special Project Management Ltd, in connection with bribery allegations. Foxley alleged that luxury cars were bought for senior Saudis, and that millions of pounds sterling was paid to mysterious Cayman Islands companies, and that this may have been done to secure a £2 billion contract to renew the Saudi Arabian National Guard&#8217;s military telecommunications network.<br />
  41. <b>Gamma International Ltd</b> in Andover, England, and a Germany-based branch Gamma International GmbH in Munich are producing surveillance software called FinSpy or FinFisher. FinSpy has been found to affect computers through fake software update prompts, and by hiding in what appears to be an image file that is relevant to the person being phished. The software suite, which the company calls &#8220;Remote Monitoring and Deployment Solutions&#8221; has the ability to take control of target computers and capture even encrypted data and communications. Using &#8220;enhanced remote deployment methods&#8221; it can install software on target computers. The surveillance suite is installed after the target accepts installation of a fake update to commonly used software. The software, which is designed to evade detection by antivirus software, has versions which work on mobile phones of all major brands. The security flaw in iTunes that FinFisher is reported to have exploited was first described in 2008 by security software commentator Brian Krebs. Apple did not patch the security flaw for more than three years, until November 2011. Apple officials have not offered an explanation as to why the flaw took so long to patch. FinFisher is capable of masquerading as other more legitimate programs, such as Mozilla Firefox. On April 30, 2013, Mozilla announced that they had sent Gamma a cease-and-desist letter for trademark infringement. Gama Company is owned by <a href="http://buggedplanet.info/index.php?title=NELSON,_WILLIAM_LOUTHEAN" target="_blank">William Louthean Nelson</a> through a shell corporation in the British Virgin Islands. His son <a href="http://buggedplanet.info/index.php?title=NELSON,_LOUTHEAN_JOHN_ALEXANDER" target="_blank">John Alexander Louthean Nelson</a> is born 13.07.1961 and is living at Passonage mead, Tanners lane, Wintersbourne earls, Salisbury SPH 6HA, Wiltshire, United Kingdom, he is 100% owner of the british Gamma International Limited and CEO of Gamma Germany. He is also involved in PK Electronic International from Germany which produce Bugs, Phone Interception Tools, Jammer, Detection Radios. Egyptian dissidents who ransacked the offices of Egypt&#8217;s secret police following the overthrow of Egyptian President Hosni Mubarak reported they discovered a contract with Gamma International for €287,000 for a license to run the FinFisher software. FinSpy has been found to be in use in 25 countries, including many with dubious human rights records. The FinSpy software is made by Gamma Group International in Munich, Germany, but is sold through a subsidiary in the United Kingdom. Their software has been used to target opposition groups and activists. The servers of FinSpy were located in Australia, Bahrain, Bangladesh, Brunei, Canada, Czech Republic, Estonia, Ethiopia, Germany, India, Indonesia, Japan, Latvia, Malaysia, Mexico, Mongolia, Netherlands, Qatar, Serbia, Singapore, Turkmenistan, the United Arab Emirates, the United Kingdom, the United States, and Vietnam. More about Gama you can read at <a href="http://www.wikileaks.org/spyfiles/list/company-name/gamma.html" target="_blank">Wikileaks</a>.<br />
  42. <b>Hacking Team</b> is company from Italy, they employ around 40 people in Milan, it was founded in 2003 by <a href="http://www.linkedin.com/in/vincenzetti" target="_blank">David Vincenzetti</a> (President of the Board, Chief Executive) and Valeriano Bedeschi (Managing Director) with purpose of &#8220;fighting crime&#8221;. Board members are also Emanuele Levi, Daniele Munari, Alberto Trombetta. They started business with selling software to the police. They have also offices in Annapolis, USA, and Singapore. Hacking Team’s &#8220;DaVinci&#8221; Remote Control System is able, the company says, to break encryption and allow law enforcement agencies to monitor encrypted files and emails (even ones encrypted with PGP), Skype and other Voice over IP or chat communication. It allows identification of the target’s location and relationships. It can also remotely activate microphones and cameras on a computer and works worldwide. Hacking Team claims that its software is able to monitor hundreds of thousands of computers at once, all over the country. Trojans are available for Windows, Mac, Linux, iOS, Android, Symbian and Blackberry. Remote Control System (RCS) is a solution designed to evade encryption by means of an agent (trojan) directly installed on the device to monitor. Evidence collection on monitored devices is stealth and transmission of collected data from the device to the RCS server is encrypted and untraceable. Hacking Team is able to monitor how their software is being used by customers. Hacking Team software was identified on the office computers of the Moroccan news website Mamfakinch. The malware was transmitted via an infected Word document that purportedly contained important confidential information. The address of Hacking Team is: HT S.r.l., via della Moscova 13, 20121 Milano. David Vincenzetti is also network admin at Milano university, so, he can snitch students, earlier he was partner in cloud company Intesis and Cryptonet.it (antimalware company).<br />
  43. Originally called i2e, <b>Amesys</b> is a French firm that was taken over by the French technology company Bull in 2010. they developed EAGLE System that allows government agencies to analyse web traffic, store the data and process it for later use by police or intelligence agencies. The system consists of a network probe, storage systems and monitoring centres for the purpose of analysis. EAGLE is based on Deep Packet Inspection technology and can analyse all kinds of web-related activities. The Amesys documentation lists the various kinds of online activity that can be inspected, including email (SMTP, POP, IMAP as well as webmail), Voice over IP, different chat protocols as well as http-web traffic and search engine queries. In 2013, Amesys divested its EAGLE System to another company, Nexa Technologies. EAGLE is now being developed and marketed by a group of former Amesys employees led by <a href="http://www.linkedin.com/pub/st%C3%A9phane-salies/9/45b/703" target="_blank">Stéphane Salies</a>, a former Bull SAS director (Bull, rue Jean Jaurès, 78340 Les Clayes sous Bois, France).<br />
  44. <b>Blue Coat</b> is a large IT company based in Sunnyvale, California, that is best known for providing filtering and censorship devices for countries like Burma. The company also provides network analysis systems called &#8220;Intelligence Centres,&#8221; which are used by companies and governments to monitor online traffic and individual online behaviour. Blue Coat offers Deep Packet Inspection technology, which can be used to survey and censor the Internet. With DPI, it is possible to look into every single Internet Protocol packet and subject it to special treatment based on content (censored or banned words) or type (email, VoIP or BitTorrent Protocol). Their products include WebPulse and PacketShaper. Blue Coat sells to government agencies as well as individual companies. Egypt, Kuwait, Qatar, Saudi Arabia and the United Arab Emirates all reportedly use a Blue Coat system.<br />
  45. <b>Trovicor</b> is one of the largest providers of lawful interception equipment worldwide, claiming to equip more than 100 countries. The company has been questioned, in particular during a hearing before the European Parliament Subcommittee on Human Rights in 2010. Trovicor is formerly known as Nokia Siemens Networks (until 2009) and Siemens AG, Division for Voice and Data recording. Owned by <a href="http://buggedplanet.info/index.php?title=PREINSBERGER,_JOHANN" target="_blank">Johann Preinsberger</a> through <strong>Ickehorn Asset Management</strong> (Rohbognerweg 9, 83707 Bad Wiessee). Johann is born 30.10.1969 in Austria and his address in 2007 was 83707 Bad Wiessee, Germany. Company known branches: Switzerland, Dubai, Islamabad, Kuala Lumpur, Prague. Trovicor is a lead sponsor of <a href="http://www.wikileaks.org/spyfiles/docs/ISS-2013-Sche2013-en.pdf" target="_blank">2013 ISS World</a>, the world’s biggest fair for surveillance and censorship equipment. Trovicor monitoring centres are capable of intercepting all ETSI-standard communications. That means phone calls, text messages, Voice over IP calls (like Skype) and Internet traffic. Spying on hard drives is not possible. Trovicor also offers solutions that allow processing and analysis of vast amounts of data (intelligent platforms). Media reports as well as research by human rights groups around the world suggests that monitoring centres have been delivered to Bahrain and led to imprisonment and torture of activists and journalists. Trovicor is also involved in Germany, where it is providing lawful interception for the state police of Bavaria (Landeskriminaltamt Bayern).<br />
  46. To mention again <b>In-Q-Tel</b>. <strong>Founder of In-Q-Tel is Gilman Louie</strong>, he is also partner of company <strong>Alsop Louie Partners</strong>, known investments of Alsop Louie Partners include Ribbit, Smith &amp; Tinker, Redux, Zephyr Technologies, Gridspeak, Netwitness, Centripetal Networks and Lookingglass Cyber Solutions. Louie has served on a number of boards of directors, including Wizards of the Coast, Total Entertainment Network, Direct Language, FASA Interactive, Netwitness, Moonshoot, Smith and Tinker, Framehawk, New Mentor, Gridspeak, the National Venture Capital Association (NVCA), Zephyr Technologies, the CIA Officers Memorial Foundation, GreatSchools and the Chinese American International School in San Francisco. He serves on the board of the <strong>Markle Foundation</strong> and is a member of the Defense Intelligence Agency&#8217;s Advisory Board. Louie is chairman of the Federation of American Scientists as well as the Mandarin Institute. As you see, CIA control scientists and their career, they finance IT start up companies, and so on, and so on. The Markle Task Force has been co-chaired by Markle&#8217;s president, <strong>Zoë Baird Budinger</strong>, and by former Netscape Chief Executive Officer, <strong>Jim Barksdale</strong>. <strong>In-Q-Tel financed</strong>:<br />
  47. Huddle &#8211; cloud-based content collaboration software<br />
  48. Destineer -games FPS training simulation<br />
  49. Palantir Technologies &#8211; data integration, search and discovery, knowledge management, and secure collaboration<br />
  50. ArcSight &#8211; secure software<br />
  51. Zaplet &#8211; email<br />
  52. Authentica -secure messaging and secure document sharing<br />
  53. Visible Technologies &#8211; social media monitoring<br />
  54. Recorded Future &#8211; web intelligence and predictive analytics<br />
  55. FMS -analysis, visualization, and knowledgebase to the Federal Intelligence Community<br />
  56. Geosemble &#8211; unstructured data analytics and geospatial software<br />
  57. Adapx &#8211; Microsoft Office &amp; GIS<br />
  58. CallMiner &#8211; phone speech analytics software<br />
  59. Carnegie Speech -speech recognition<br />
  60. AzTE PRISM &#8211; handwriting recognition<br />
  61. A4Vision &#8211; 3D facial imaging<br />
  62. oculis labs &#8211; computer vision, facial recognition and detection with webcam<br />
  63. Mohomine mohoClassifier &#8211; organises mass data<br />
  64. Stratify &#8211; organizes mass data<br />
  65. Inxight &#8211; search engine<br />
  66. Convera RetrievalWare &#8211; search engine<br />
  67. MetaCarta &#8211; search engine<br />
  68. Attensity &#8211; search engine<br />
  69. NetBase &#8211; search engine<br />
  70. Platfora &#8211; big data analytics and visualization<br />
  71. Intelliseek &#8211; search engine<br />
  72. FireEye &#8211; malware protection<br />
  73. ReversingLabs &#8211; malware detection and analysis<br />
  74. </p>
RAW Paste Data
We use cookies for various purposes including analytics. By continuing to use Pastebin, you agree to our use of cookies as described in the Cookies Policy. OK, I Understand
 
Top