Category Archives: Edward Snowden(Operation Snowbird?)

Russia Collapses Entire US Intelligence System Using Microsoft, Facebook And Google

 

September 28, 2016 By: Sorcha Faal, and as reported to her Western Subscribers

A very interesting (and actually gleefully written) Federal Guard Service (FSO) report circulating in the Kremlin today claims that the United States entire Domestic Surveillance Directorate (DSD) has been brought to near total collapse due to Federation intelligence analysts utilizing American tech giants Microsoft, Facebook and Google “spying agreements” to achieve a “digital tsunami” that has, in just barely 3 years, rendered the US National Security Agency’s (NSA) multi-billion-dollar Utah Data Center (UDC) obsolete. [Note: Some words and/or phrases appearing in quotes in this report are English language approximations of Russian words/phrases having no exact counterpart.]

The Federal Guard Service is responsible for safeguarding presidential, governmental and other types of special communications and information provided to all Federation government ministries, this report explains, while the United States Domestic Surveillance Directorate states it’s mission is to “collect, process, and store U.S. citizen data for the good of the Nation”, while the Utah Data Center (code-named Bumblehive) is described as a  “massive data repository” designed to cope with the vast increases in digital data that have accompanied the rise of the global network.

In 2013, this report says, the Federal Guard Service became “alarmed” when top secret NSA documents were released by one of their employees, Edward Snowden, showing how America’s largest tech giants were working in private with US intelligence agencies to spy not just on the American people, but, indeed the whole world.

 

Continue reading Russia Collapses Entire US Intelligence System Using Microsoft, Facebook And Google

Advertisement

Opening the Black Box of America’s Propaganda Machine – Prepare for Change

National Security Agency whistleblower Edward Snowden and WikiLeaks founder Julian Assange have doubled down recently on the games being played in cyberspace by America‘s cyber-warriors.

Snowden suggests that many of NSA’s most damaging malware programs are now in the hands of America’s opponents, thanks to enterprising foreign counter-intelligence hackers known as the Shadow Brokers. there will be more hacked bombshells to drop on Team Clinton, courtesy of weak security in Democratic National Committee and Clinton campaign computer systems.

We have entered a new phase of cyber-warfare, one in which America’s (and Israel’s) most damaging computer hacking and disruption programs are available to anyone willing to pay in Bitcoins on the cyber-black market. The Democratic Party’s leaked emails, coupled with the leaked State Department cables, has Hillary Clinton in an outrage.

These disclosures, along with the Snowden disclosures that illustrate how America spies on friend and foe, have opened the Black Box of America’s propaganda machine.

Continue reading Opening the Black Box of America’s Propaganda Machine – Prepare for Change

The N.S.A. Leak Is Real, Snowden Documents Confirm

MON, 8/22/2016 BY SAM BIDDLE

 On Monday, a hacking group calling itself the “ShadowBrokers” announced an auction for what it claimed were “cyber weapons” made by the NSA. Based on never-before-published documents provided by the whistleblower Edward Snowden, The Intercept can confirm that the arsenal contains authentic NSA software, part of a powerful constellation of tools used to covertly infect computers worldwide.

The provenance of the code has been a matter of heated debate this week among cybersecurity experts, and while it remains unclear how the software leaked, one thing is now beyond speculation: The malware is covered with the NSA’s virtual fingerprints and clearly originates from the agency.

The evidence that ties the ShadowBrokers dump to the NSA comes in an agency manual for implanting malware, classified top secret, provided by Snowden, and not previously available to the public. The draft manual instructs NSA operators to track their use of one malware program using a specific 16-character string, “ace02468bdf13579.” That exact same string appears throughout the ShadowBrokers leak in code associated with the same program, SECONDDATE.

SECONDDATE plays a specialized role inside a complex global system built by the U.S. government to infect and monitor what one document estimated to be millions of computers around the world. Its release by ShadowBrokers, alongside dozens of other malicious tools, marks the first time any full copies of the NSA’s offensive software have been available to the public, providing a glimpse at how an elaborate system outlined in the Snowden documents looks when deployed in the real world, as well as concrete evidence that NSA hackers don’t always have the last word when it comes to computer exploitation.

But malicious software of this sophistication doesn’t just pose a threat to foreign governments, Johns Hopkins University cryptographer Matthew Green told The Intercept:

The danger of these exploits is that they can be used to target anyone who is using a vulnerable router. This is the equivalent of leaving lockpicking tools lying around a high school cafeteria. It’s worse, in fact, because many of these exploits are not available through any other means, so they’re just now coming to the attention of the firewall and router manufacturers that need to fix them, as well as the customers that are vulnerable. So the risk is twofold: first, that the person or persons who stole this information might have used them against us. If this is indeed Russia, then one assumes that they probably have their own exploits, but there’s no need to give them any more. And now that the exploits have been released, we run the risk that ordinary criminals will use them against corporate targets.

The NSA did not respond to questions concerning ShadowBrokers, the Snowden documents, or its malware.

A MEMORABLE SECONDDATE

The offensive tools released by ShadowBrokers are organized under a litany of code names such as POLARSNEEZE and ELIGIBLE BOMBSHELL, and their exact purpose is still being assessed. But we do know more about one of the weapons: SECONDDATE.

SECONDDATE is a tool designed to intercept web requests and redirect browsers on target computers to an NSA web server. That server, in turn, is designed to infect them with malware. SECONDDATE’s existence was first reported by The Intercept in 2014, as part of a look at a global computer exploitation effort code-named TURBINE. The malware server, known as FOXACID, has also been described in previously released Snowden documents.

Other documents released by The Intercept today not only tie SECONDDATE to the ShadowBrokers leak but also provide new detail on how it fits into the NSA’s broader surveillance and infection network. They also show how SECONDDATE has been used, including to spy on Pakistan and a computer system in Lebanon.

The top-secret manual that authenticates the SECONDDATE found in the wild as the same one used within the NSA is a 31-page document titled “FOXACID SOP for Operational Management” and marked as a draft. It dates to no earlier than 2010. A section within the manual describes administrative tools for tracking how victims are funneled into FOXACID, including a set of tags used to catalogue servers. When such a tag is created in relation to a SECONDDATE-related infection, the document says, a certain distinctive identifier must be used.

The same SECONDDATE MSGID string appears in 14 different files throughout the ShadowBrokers leak, including in a file titled SecondDate-3021.exe. Viewed through a code-editing program (screenshot below), the NSA’s secret number can be found hiding in plain sight.

All told, throughout many of the folders contained in the ShadowBrokers’ package (screenshot below), there are 47 files with SECONDDATE-related names, including different versions of the raw code required to execute a SECONDDATE attack, instructions for how to use it, and other related files.

After viewing the code, Green told The Intercept the MSGID string’s occurrence in both an NSA training document and this week’s leak is “unlikely to be a coincidence.” Computer security researcher Matt Suiche, founder of UAE-based cybersecurity startup Comae Technologies, who has been particularly vocal in his analysis of the ShadowBrokers this week, told The Intercept “there is no way” the MSGID string’s appearance in both places is a coincidence.

WHERE SECONDDATE FITS IN

This overview jibes with previously unpublished classified files provided by Snowden that illustrate how SECONDDATE is a component of BADDECISION, a broader NSA infiltration tool. SECONDDATE helps the NSA pull off a “man in the middle” attack against users on a wireless network, tricking them into thinking they’re talking to a safe website when in reality they’ve been sent a malicious payload from an NSA server.

According to one December 2010 PowerPoint presentation titled “Introduction to BADDECISION,” that tool is also designed to send users of a wireless network, sometimes referred to as an 802.11 network, to FOXACID malware servers. Or, as the presentation puts it, BADDECISION is an “802.11 CNE [computer network exploitation] tool that uses a true man-in-the-middle attack and a frame injection technique to redirect a target client to a FOXACID server.” As another top-secret slide puts it, the attack homes in on “the greatest vulnerability to your computer: your web browser.”

One slide points out that the attack works on users with an encrypted wireless connection to the internet.

That trick, it seems, often involves BADDECISION and SECONDDATE, with the latter described as a “component” for the former. A series of diagrams in the “Introduction to BADDECISION” presentation show how an NSA operator “uses SECONDDATE to inject a redirection payload at [a] Target Client,” invisibly hijacking a user’s web browser as the user attempts to visit a benign website (in the example given, it’s CNN.com). Executed correctly, the file explains, a “Target Client continues normal webpage browsing, completely unaware,” lands on a malware-filled NSA server, and becomes infected with as much of that malware as possible — or as the presentation puts it, the user will be left “WHACKED!” In the other top-secret presentations, it’s put plainly: “How do we redirect the target to the FOXACID server without being noticed”? Simple: “Use NIGHTSTAND or BADDECISION.”

The sheer number of interlocking tools available to crack a computer is dizzying. In the FOXACID manual, government hackers are told an NSA hacker ought to be familiar with using SECONDDATE along with similar man-in-the-middle wi-fi attacks code-named MAGIC SQUIRREL and MAGICBEAN. A top-secret presentation on FOXACID lists further ways to redirect targets to the malware server system.

To position themselves within range of a vulnerable wireless network, NSA operators can use a mobile antenna system running software code-named BLINDDATE, depicted in the field in what appears to be Kabul. The software can even be attached to a drone. BLINDDATE in turn can run BADDECISION, which allows for a SECONDDATE attack.

Elsewhere in these files, there are at least two documented cases of SECONDDATE being used to successfully infect computers overseas: An April 2013 presentation boasts of successful attacks against computer systems in both Pakistan and Lebanon. In the first, NSA hackers used SECONDDATE to breach “targets in Pakistan’s National Telecommunications Corporation’s (NTC) VIP Division,” which contained documents pertaining to “the backbone of Pakistan’s Green Line communications network” used by “civilian and military leadership.”

In the latter, the NSA used SECONDDATE to pull off a man-in-the-middle attack in Lebanon “for the first time ever,” infecting a Lebanese ISP to extract “100+ MB of Hizballah Unit 1800 data,” a special subset of the terrorist group dedicated to aiding Palestinian militants.

SECONDDATE is just one method that the NSA uses to get its target’s browser pointed at a FOXACID server. Other methods include sending spam that attempts to exploit bugs in popular web-based email providers or entices targets to click on malicious links that lead to a FOXACID server. One document, a newsletter for the NSA’s Special Source Operations division, describes how NSA software other than SECONDDATE was used to repeatedly direct targets in Pakistan to FOXACID malware web servers, eventually infecting the targets’ computers.

A POTENTIALLY MUNDANE HACK

Snowden, who worked for NSA contractors Dell and Booz Allen Hamilton, has offered some context and a relatively mundane possible explanation for the leak: that the NSA headquarters was not hacked, but rather one of the computers the agency uses to plan and execute attacks was compromised. In a series of tweets, he pointed out that the NSA often lurks on systems that are supposed to be controlled by others, and it’s possible someone at the agency took control of a server and failed to clean up after themselves. A regime, hacker group, or intelligence agency could have seized the files and the opportunity to embarrass the agency.

Source: The N.S.A. Leak Is Real, Snowden Documents Confirm

Kazarian Mafia In Total Panic – DR WILLIAM MOUNT

VIDEO: Kazarian Mafia In Total Panic – YouTube

The Unholy Alliance (NWO, Cabal, Unholy Alliance) is in total panic mode at this moment in time

Last night, while most of us were asleep, the orders were given to initiate Operation Pincer: The invasion of Russia by forces of the German, Polish and French Governments – with the United States to follow and “Save The Day” and “Re-establish Peace” in Russia – 1 Million People Praying

Nobody invaded anybody.

The artillery was silent and the US Air Force stood down.

Of course – they never factored in the response from Belarus either – which has a fierce military. The though of an Invasion there by Germany as ordered by Hitler’s Daughter Angela Merkel brings back memories that should never be remembered – destruction, death camps….

Continue reading Kazarian Mafia In Total Panic – DR WILLIAM MOUNT

Panic Grips America, Shuts Down NSA, After Russia “Reveals” It Has All Hillary Clinton Phone Calls – WhatDoesItMean

sorka faal

August 17, 2016 By: Sorcha Faal, and as reported to her Western Subscribers

A series of astounding, and often contradictory, reports emanating from the Security Council (SC), and circulating throughout the Kremlin today, show that a chasm has been created among many ministries (especially within the military and intelligence communities) due to President Putin’s “order/decree” to let the Obama regime know that the Federation was not only in control of all of Hillary Clinton’s “missing/disappeared” emails, but also of all her telephonic communications too. [Note: Some words and/or phrases appearing in quotes are English language approximations of Russian words/phrases having no exact counterpart.]

 

Continue reading Panic Grips America, Shuts Down NSA, After Russia “Reveals” It Has All Hillary Clinton Phone Calls – WhatDoesItMean

Hillary Clinton “Total Terror” Descends Upon Disabled Mother Who Discovered Her Link To ISIS – WhatDoesItMean

what does it mean

August 14, 2016 By: Sorcha Faal, and as reported to her Western Subscribers

A heartbreaking Foreign Intelligence Service (SVR) report circulating in the Kremlin today details the “total terror” Hillary Clinton and her Obama regime allies have unleashed upon a disabled American mother of an autistic son who had “inadvertently/mistakenly” discovered an “electronic document” (email? photocopy?) written by the former US Secretary of State authorizing a massive weapons shipment from Benghazi, Libya, to Islamic State (ISIS/ISIL/Daesh) terrorists in Syria. [Note: Some words and/or phrases appearing in quotes are English language approximations of Russian words/phrases having no exact counterpart.]

According to this report, earlier this spring the General Directorate of the General Staff (GRU) reported that they obtained a “treasure trove” of secret Islamic State documents from a Syrian village that had been retaking by Kurdish forces.

Continue reading Hillary Clinton “Total Terror” Descends Upon Disabled Mother Who Discovered Her Link To ISIS – WhatDoesItMean

Snowden Sends Distress Signal As His Whereabouts Remain Unknown | Your News Wire

August 13, 2016 by Sean Adl-Tabatabai

Internet programmers have deciphered a mysterious Tweet sent out by Edward Snowden last week, revealing that the NSA whistleblower may be in grave danger

Users on Reddit say that the 64-character Tweet sent out on 5th August, 2016, was a distress signal to those in the know.

Sputniknews.com reports:

Edward Snowden’s unexplained tweet of a 64-character hex code on Friday led many to question whether the message was a “dead man’s switch,” an automatic message set to release if the user is killed or captured, which, in that event, would prompt friends and journalists to release documents.

Continue reading Snowden Sends Distress Signal As His Whereabouts Remain Unknown | Your News Wire

Snowden Prounounced Dead by His Girlfriend in Russia | World Truth.TV

Late Monday afternoon,  the mistress of the infamous Edward Snowden announced the death of Snowden, who was allegedly killed this past Saturday by a drunken knife wielding Buryat man in the Republic of Buryatia.

MKRU News (Russia) reported this past Saturday that a drunken man who for some reason took exception to a man, presumably Snowden, saving his wife from drowning, attacked a woman by slicing her neck and stabbed her male companion in the thigh, who later died from severe blood loss in a local hospital.

MKRU reported that young people brought a woman to life, presumably the wife of the attacker, and began to accompany her to a parking lot. At that point, the husband who was hiding between some cars rushed at them with a knife.

Continue reading Snowden Prounounced Dead by His Girlfriend in Russia | World Truth.TV

Edward Snowden Revealed Shocking Details Of Extraterrestrials Life On Earth On StarTalk Radio!

Among the groundbreaking disclosures leaked by Edward Snowden, he’s now revealing sensitive subjects: aliens.

Edward Snowden, the former contractor who leaked National Security Agency secrets publicly in 2013, is now getting attention for an odd subject: extraterrestrials.

In a podcast interview with astrophysicist Neil deGrasse Tyson, Snowden says that alien communications might be encrypted so well that humans trying to eavesdrop on extraterrestrials would have no idea they were hearing anything but noise. There’s only a small window in the development of communication in which unencrypted messages are the norm, Snowden said.

Continue reading Edward Snowden Revealed Shocking Details Of Extraterrestrials Life On Earth On StarTalk Radio!

Edward Snowden Missing, Huge Leak Imminent | Your News Wire

Posted on August 8, 2016 by Baxter Dmitry

A massive new leak from Edward Snowden is believed to be imminent, after the former NSA contractor turned whistleblower tweeted a cryptic 64 character tweet that was deleted minutes later, before going on complete lockdown, leading the world to fear for his safety.

The cryptic 64 character code that Snowden tweeted Friday sparked fears the message was a ‘dead man’s switch’ meaning Snowden is either dead or compromised.

As speculation regarding his situation grew on Saturday, the Guardian journalist Glenn Greenwald tweeted the pithy message “he’s fine” and the Post reporter Barton Gellman, who Greenwald has previously blasted for making false claims about Snowden, followed suit stating he believed Snowden was safe. However until we hear from Snowden himself – and can verify it is really him – fears for his safety remain.

Continue reading Edward Snowden Missing, Huge Leak Imminent | Your News Wire

Edward Snowden Not Dead: ‘He’s Fine’ Says Glenn Greenwald After Mysterious Tweet

04:35 07.08.2016(updated 11:02 07.08.2016)

Snowden issued a cryptic 64-character code via Twitter leading to concern that the whistleblower was captured or killed triggering a “dead man’s switch” message designed to release if he didn’t check into his computer at a certain time.

A journalist with The Intercept who has worked extensively with the whistleblower in the past says that Snowden is “fine,” but refused to elaborate further. The response from the journalist comes in the wake of two mysterious tweets by the famed NSA whistleblower who exposed a rampant regime of domestic surveillance by US intelligence agencies.

Continue reading Edward Snowden Not Dead: ‘He’s Fine’ Says Glenn Greenwald After Mysterious Tweet

Mysterious Tweet Sparks Fears Edward Snowden Is Missing Or Dead | Your News Wire

Edward Snowden tweeted a cryptic 156 character code on Friday evening that was deleted minutes later, sparking fears the message was a ‘dead man’s switch’ meaning Snowden is either dead or missing.

A dead man’s switch is a message set up to be automatically sent if the holder of the account does not perform a regular check-in. In Snowden’s case, his dead man’s switch would be the key to the encrypted files he distributed among journalists and associates.

Edward Snowden tweet

Snowden’s first release in 2013 sent shockwaves through the intelligence community and confirmed suspicions that many people had held about the NSA for years. However the information he released was a mere fraction of the data he held when he left the United States.

Continue reading Mysterious Tweet Sparks Fears Edward Snowden Is Missing Or Dead | Your News Wire

‘It’s Time’: Whistleblower Edward Snowden Tweets Mysterious Warning

22:09 03.08.2016(updated 23:55 03.08.2016)

US whistleblower Edward Snowden published a vaguely worded tweet on Wednesday that has aroused curiosity in the Twittersphere.

The post reads like a cryptic rallying call, asking former colleagues of the NSA contractor to contact him, saying “It’s time.”

Did you work with me? Have we talked since 2013? Please recontact me securely, or talk to @bartongellman. It’s time.

Continue reading ‘It’s Time’: Whistleblower Edward Snowden Tweets Mysterious Warning

Whistleblower’s Stunning Claim: “NSA Has All Of Hillary’s Deleted Emails, It May Be The Leak” | Zero Hedge

Tyler Durden's picture

Over a year before Edward Snowden shocked the world in the summer of 2013 with revelations that have since changed everything from domestic to foreign US policy but most of all, provided everyone  a glimpse into just what the NSA truly does on a daily basis, a former NSA staffer, and now famous whistleblower, William Binney, gave excruciating detail to Wired magazine about all that Snowden would substantiate the following summer.

We covered it in a 2012 post titled “We Are This Far From A Turnkey Totalitarian State” – Big Brother Goes Live September 2013.” Not surprisingly, Binney received little attention in 2012 – his suggestions at the time were seen as preposterous and ridiculously conspiratorial. Only after the fact, did it become obvious that he was right. More importantly, in the aftermath of the Snowden revelations, what Binney has to say has become gospel.

Continue reading Whistleblower’s Stunning Claim: “NSA Has All Of Hillary’s Deleted Emails, It May Be The Leak” | Zero Hedge

NEIL KEENAN UPDATE | Crayfish The Scum Sucking Bottom Dweller Remains A Fool | Neil Keenan – Group K, Ltd.

He is a fool who doesn’t deserve a response… He has been kicked under the bus time and time again and goes away until he feels someone up above the brackish water line might want to listen to his bullshit.

So he comes up on occasion and gets kicked once again when no one really gives a rat’s ass about this guy called “Crayfish” (Crayford). Also, there is no “American lawyer”. There is a Dimce Giorgif though, and he works for RUMOR Mill News.

Continue reading NEIL KEENAN UPDATE | Crayfish The Scum Sucking Bottom Dweller Remains A Fool | Neil Keenan – Group K, Ltd.

US Media Blacks Out Snowden: Super National Intelligence Organization Known As The ‘Five Eyes’ Are Watching You – True Disclosure

1 admin in Secret Space  29 Jun 2016 : 21:10

A whistleblower is someone who exposes any kind of information or activity that is deemed illegal, unethical, or not correct within an organization that is either private or public.

A whistleblower is someone who exposes any kind of information or activity that is deemed illegal, unethical, or not correct within an organization that is either private or public. The information wrongdoing is typically classified as: violation of company policy/rules, law, regulation, or threat to public interest/national security, as well as fraud, and corruption.

Continue reading US Media Blacks Out Snowden: Super National Intelligence Organization Known As The ‘Five Eyes’ Are Watching You – True Disclosure

NESARA- REPUBLIC NOW – GALACTIC NEWS: Tweet from Donald Trump:

Saturday, July 2, 2016

Tweet from Donald Trump:

It was just announced-by sources-that no charges will be brought against Crooked Hillary Clinton. Like I said, the system is totally rigged!

http://nesaranews.blogspot.com.au/2016/07/tweet-from-donald-trump.html?m=1

a part of the movement to Truth!