Advertisement
demeter

Anon drops NSA docs about spying in 2013

Jan 19th, 2024 (edited)
93
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
  1. _
  2. / \ _ __ ___ _ __ _ _ _ __ ___ ___ _ _ ___
  3. / _ \ | '_ \ / _ \| '_ \| | | | '_ ` _ \ / _ \| | | / __|
  4. / ___ \| | | | (_) | | | | |_| | | | | | | (_) | |_| \__ \
  5. /_/ \_\_| |_|\___/|_| |_|\__, |_| |_| |_|\___/ \__,_|___/
  6. |___/
  7.  
  8. Greetings Netizens, and Citizens of the world.
  9.  
  10. Anonymous has obtained some documents that "they" do not want you to see, and much to "their" chagrin, we have found them, and are giving them to you.
  11. These documents prove that the NSA is spying on you, and not just Americans. They are spying on the citizens of over 35 different countries.
  12. These documents contain information on the companies involved in GiG, and Prism.
  13. Whats GiG you might ask? well...
  14.  
  15. The GIG will enable the secure, agile, robust, dependable, interoperable data sharing environment for the Department where warfighter, business, and intelligence users share knowledge on a global network that facilitates information superiority, accelerates decision-making, effective operations, and Net-Centric transformation.
  16.  
  17. Like we said, this is happening in over 35 countries, and done in cooperation with private businesses, and intelligence partners world wide.
  18. We bring this to you, So that you know just how little rights you have. Your privacy and freedoms are slowly being taken from you, in closed door meetings, in laws buried in
  19. bills, and by people who are supposed to be protecting you.
  20.  
  21. Download these documents, share them, mirror them, don't allow them to make them disappear. Spread them wide and far. Let these people know, that we will not be silenced, that we will not be taken advantage of, and that we are not happy about this unwarranted, unnecessary, unethical spying of our private lives, for the monetary gain of the 1%.
  22.  
  23. And now, the candy: http://thedocs.hostzi.com/
  24.  
  25. Mirrors:
  26. http://t.co/XVlZQ53Zhp
  27. http://t.co/JYUHrhi3Ue
  28. http://t.co/qR9PRzySbq
  29. http://t.co/yGw2sP976W
  30. http://t.co/MrmBj4kma5
  31.  
  32. We are Anonymous
  33. We do not forgive
  34. We do not forget
  35. and by now,
  36. You should expect us
  37.  
  38. Source: NSA 2013 drama
  39. https://www.fastcompany.com/3012652/tracking-the-nsas-secret-surveillance-programs#The_Governments_PRISM_Infosheet_Is_Here PRISM
  40.  
  41. Anonymous
  42. "The documents Anonymous posted are a mix of PDFs and PowerPoint documents. Potential muckrakers, be warned: They are written in dry, dry bureaucratese.
  43.  
  44. A couple of quick thoughts:
  45.  
  46. 1. How long have whistleblowers had these docs for? The documents posted come mostly from 2008-2010.
  47. 2. Did the docs come from the same whistleblower who tipped off Glenn Greenwald, or did hackers use the Guardian breadcrumbs to find these?
  48. 3. Just what will happen to this whistleblower, if it is the same person, if or when they are caught?"
  49.  
  50. ---------------------
  51.  
  52. Paltalk
  53.  
  54. "When news of the PRISM program leaked out, most of the world’s major communication services (save Twitter and Sina Weibo) were implicated in giving the NSA access to their databases. Among the companies cooperating with the NSA is Paltalk–a relatively obscure video chat service. But what is Paltalk, and why are the NSA tracking them?
  55.  
  56. Uri Friedman at Foreign Policy has the scoop:
  57.  
  58. The Washington Post mentions that PalTalk has received substantial traffic during the Arab Spring and Syrian civil war, but people have also raised concerns for years now about terrorists using its chat rooms (in 2012, for instance, the British press reported that four men plotting to bomb the London Stock Exchange had made contact with each other through the service). In 2009, the year PalTalk reportedly began participating in the NSA’s program, a U.N. report on the “Use of the Internet for Terrorist Purposes” expressed concern about al Qaeda propaganda spreading in “debate groups such as Yahoo and PalTalk.”
  59.  
  60. That is to say it appears that Paltalk was targeted because of its use by non-U.S. citizens of interest to the NSA."
  61.  
  62. ----------------
  63.  
  64. HOW THE NSA CAN READ YOUR GMAIL
  65. The Washington Post has confirmed the existence of a secret program called PRISM, which gives the NSA a backdoor into Internet communications from all major service providers besides (as of writing) Twitter.
  66.  
  67. As Fast Company‘s Kit Eaton writes, “PRISM allows the NSA to directly get its hands on many different kinds of data concerning the Internet habits of individuals, from email contents to user-specific information. After initial claims were made that firms such as Microsoft, Yahoo, Google, Apple, Facebook, Skype and others were willingly handing over data, most of the companies involved denied they were actively participating and some said they had no knowledge of the program.”
  68.  
  69. 1:45 pm, 06/07/2013
  70.  
  71. HOW THE NSA TRACKS AMERICA’S PHONE CALLS
  72. As The Guardian reported, the NSA is collecting metadata related to phone call activity on Verizon (and likely other) carriers. So how does this work?
  73.  
  74. Yesterday, Fast Company discussed just what telecom metadata is. The information the NSA was collecting included the phone numbers that Verizon customers dialed, the phone numbers of the people who called them, the duration of the call, and identifying information about the Verizon customer. However, as far as we know, the contents of the call were not accessible to the NSA.
  75.  
  76. ---------------
  77. PRISM
  78.  
  79. one tool in the NSA’s spying arsenal:
  80.  
  81. The Guardian has acquired top-secret documents about the NSA datamining tool, called Boundless Informant, that details and even maps by country the voluminous amount of information it collects from computer and telephone networks. The focus of the internal NSA tool is on counting and categorizing the records of communications, known as metadata, rather than the content of an email or instant message. The Boundless Informant documents show the agency collecting almost 3 billion pieces of intelligence from US computer networks over a 30-day period ending in March 2013.
  82.  
  83. ------------
  84. Lawyerly bad faith
  85.  
  86. Bouncing back to an earlier discussion of those strangely worded tech company comments on PRISM, which discuss possible compliance with the NSA’s secretive cyberspying program in heavily lawyered-up language, Yahoo’s statement gives something of interest. On Saturday afternoon, Yahoo chief counsel Ron Bell posted on Tumblr to discuss any possible communications his company had with the NSA:
  87.  
  88. We want to set the record straight about stories that Yahoo! has joined a program called PRISM through which we purportedly volunteer information about our users to the U.S. government and give federal agencies access to our user databases. These claims are false.
  89.  
  90. Yahoo! has not joined any program in which we volunteer to share user data with the U.S. government. We do not voluntarily disclose user information. The only disclosures that occur are in response to specific demands. And, when the government does request user data from Yahoo!, we protect our users. We demand that such requests be made through lawful means and for lawful purposes. We fight any requests that we deem unclear, improper, overbroad, or unlawful. We carefully scrutinize each request, respond only when required to do so, and provide the least amount of data possible consistent with the law.
  91.  
  92. However, Chris Soghoian of the ACLU–a well known analyst on all matters related to technology, privacy, and the law–deconstructed Yahoo’s statement and found that Yahoo might be more associated with PRISM than they let on. A small excerpt:
  93.  
  94. No one has claimed that the PRISM program is voluntary. As the Director of National Intelligence has confirmed, the PRISM program involves court orders granted using Section 702 of the Foreign Intelligence Surveillance Act.
  95.  
  96. By falsely describing PRISM as a voluntary scheme, Yahoo’s general counsel is then able to deny involvement outright. Very sneaky.
  97.  
  98. ---------------
  99. source https://www.fastcompany.com/3012652/tracking-the-nsas-secret-surveillance-programs
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement