Google+ Badge

Friday, July 18, 2014

WAYNE MADSEN INTERVIEW : Americans Swept Up in NSA Spying ; FIVE EYES Assault On Social Media - Video

With the inevitable fall of the Obama criminals the NSA, CIA and other "OGA" scum must be dismantled permanently; their murderers tried, convicted and publicly executed

WAYNE MADSEN REPORT
By Wayne Madsen
07/15/2014

The latest release of documents from the Ed Snowden cache reveal that the British Government Communications Headquarters (GCHQ), the National Security Agency's British counterpart, has spearheaded the development of tools to manipulate, disrupt, and collect personal information from social media, including Facebook, PalTalk, and YouTube.


The Internet surveillance and disruption tools were developed by GCHQ's Joint Threat Research Intelligence Group (JTRIG) and are identified on page views from GCWiki, a classified Wikipedia clone developed by GCHQ for internal use by GCHQ and other FIVE EYES signals intelligence alliance partner agencies, including NSA. GCWiki bears the classification TOP SECRET STRAP 1 COMINT.

The similarity of GCWiki to Wikipedia is so striking the question arises as to what assistance Wikipedia "volunteer" personnel provided to GCHQ in the development of GCWiki. As has been previously reported by WMR, Wikipedia has been used by intelligence agencies, including the CIA, to engage in psychological warfare operations directed against countries, institutions, and individuals. The CIA has been caught red-handed directing its personnel to become Wikipedia volunteer editors.


As an example of some of the disruptive tactics used by FIVE EYES, the POISON ARROW too, which was under development on July 5, 2012, but believed to be operation now, permits the signals intelligence agencies to download disruptive and destructive malware -- safe to NSA and its partners' computers and networks -- to targeted computers and networks. WMR has been affected by malware that cannot be removed by commercial programs. Therefore, we have gone to a "sneaker net" environment in which our production computer is off-line and physically separated from our Internet-accessible computer. However, other Snowden documents have revealed that NSA has managed to get around such "air gaps" with different surveillance and disruption technology.




Other NSA/GCHQ tools include DANCING BEAR, which collects WiFi access points used by targeted individuals. HACIENDA uses GEOFUSION to pinpoint targets using IP locations. MINIATURE HERO collects Skype-to-Skype and Skype-to-external call records, instant messaging content, and contact lists. The vulnerability of cloud databases is exemplified by MOUTH, which collects user files from Archives.org. RESERVOIR collects a wealth of information from Facebook, however SPRING BISHOP targets and collects private photographs on Facebook. SODAWATER collects Gmail messages.


Perhaps the most destructive tool used by NSA and GCHQ is ANGRY PIRATE, which permanently disables accounts stored in a target's computer. BUMPERCAR automatically reports on offensive materials on YouTube, with the intention that such videos will be taken down.



SKYSCRAPER permits NSA and its partners to widely distribute videos and other multimedia content on the web.

SPACE ROCKET is used to insert media into targeted networks. BOMB BAY is used to increase the rankings and hits of selected websites. SLIPSTREAM permits the inflation of page views on web sites. BADGER allows for the mass mailing of e-mail to support information operations campaigns, in effect, spamming. BURLESQUE permits SMS messages to be spoofed. 

Another spamming tool is CANNONBALL, which permits repeated text messages to be sent to a target. GATEWAY permits the artificial increase of traffic to a website. SERPENTS TONGUE broadcasts fax messages to multiple target numbers.


CLEAN SWEEP permits Facebook Wall postings to be counterfeited for individuals or entire countries. CHINESE FIRECRACKER permits brute force logins of on-line forums. CONCRETE DONKEY allows repeated recorded messages to bombard a target's phone or the same message can be sent to a large number of phones.


DEER STALKER permits the geo-location of satellite and GSM phones by the silent calling of the targeted phone's number. VIPERS TONGUE targets GSM and satellite phones with denial of service attacks. WARPATH permits SMS messages to be sent to a large number of phones. LUMP is used to discover the names that are associated with avatars.

Intrusion into on-line gaming systems was accomplished by SECOND LIFE in 2012 but GLITTERBALL was due to replace the program. ELATE is used to monitor the United Kingdom's E-Bay auction website.


IMPERIAL BARGE is used for connecting two target phone numbers. SCARLET EMPEROR denies service by call bombing targeted phones. SCRAPHEAP CHALLENGE spoofs messages from Blackberry devices. TANGLEFOOT determines whether a target is on-line. CHANGELING spoofs email addresses and permits phony messages to be sent from the addresses.


PREDATORS FACE is used to disrupt servers through denial of service attacks. STEALTH MOOSE disrupts Windows-based computers. SUNBLOCK denies a target the ability to send and receive email and to view content on the Internet. SWAMP DONKEY encrypts files on targeted computer systems making them inaccessible to the user. TORNADO ALLEY permits Excel spreadsheet documents to contain executable files that can be run on a target's computer. 

The ability to change the outcome of on-line polls was conducted by NUBILO in 2012 but UNDERPASS was on tap to replace it.


CountryAgencyAbbrRole[1]
 AustraliaAustralian Secret Intelligence ServiceASISHUMINT
Australian Signals DirectorateASDSIGINT
Defence Intelligence OrganisationDIODefence Intelligence
 CanadaChief of Defence IntelligenceCDISDefence Intelligence
Communications Security Establishment CanadaCSECSIGINT
Canadian Security Intelligence ServiceCSISHUMINT
 New ZealandDirectorate of Defence Intelligence and SecurityDDISDefence Intelligence
Government Communications Security BureauGCSBSIGINT
New Zealand Security Intelligence ServiceNZSISHUMINT
 United KingdomDefence IntelligenceDIDefence Intelligence
Government Communications HeadquartersGCHQSIGINT
The Security ServiceMI5Security intelligence
Secret Intelligence ServiceMI6HUMINT
 United StatesCentral Intelligence AgencyCIAHUMINT
Defense Intelligence AgencyDIADefence Intelligence
Federal Bureau of InvestigationFBISecurity intelligence
National Security AgencyNSASIGINT

QUINCY is used to exploit seized media. The JTRIG document does notr explain what constitutes "seized media" but laptops, smart phones, and other devices are routinely seized not only as part of criminal investigations but by customs and immigration officials at U.S., British, Canadian, and other FIVE EYES border control points.

Programs listed under "Shaping and Honeypots" use various programs that appear designed to entrap targets with downloaded files and images. Images are hosted by PISTRIX. DEADPOOL is an NSA/GCHQ-provided URL shortening service. WURLITZER is used to distribute files to multiple websites. 





Big Brother, which is not one of the JTRIG code-named programs, but should be, is alive and doing well in Cheltenham, England and Fort Meade, Maryland.



WAYNE MADSEN

Wayne Madsen
Investigative journalist, author and syndicated columnist, Madsen has over twenty years experience in security issues. 

As a U.S. Naval Officer, he managed one of the first computer security programs for the U.S. Navy.Madsen has been a frequent political and national security commentator on Fox News and has also appeared on ABC, NBC, CBS, PBS, CNN, BBC and MS-NBC. He has been invited to testify as a witness before the US House of Representatives, the UN Criminal Tribunal for Rwanda, and an terrorism investigation panel of the French government. A member of the Society of Professional Journalists (SPJ) and the National Press Club, Madsen is based and reports from Washington, D.C.

-------------------------------------------------------------------------------------------------------------------

ANDREW KREIG: EXPERTS REJECT FIRE AS CAUSE FOR 9/11 WTC COLLAPSES

The real truth on 9/11 slowly continues to bleed out

 photo
Technical experts are mounting major challenges to official U.S. government accounts of how three World Trade Center skyscrapers collapsed in near-freefall after the 9/11 attacks 15 years ago.

Many researchers are focusing especially on the little-known collapse of

READ MORE >>

-------------------------------------------------------------------------------------------------------------------

The Geopolitics Of The United States, Part 1: The Inevitable Empire

The Empire and the inevitable fall of the Obama criminal regime

 photo
STRATFOR Editor’s Note: This installment on the United States, presented in two parts, is the 16th in a series of STRATFOR monographs on the geopolitics of countries influential in world affairs.

Like nearly all of the peoples of North and South America, most Americans are not originally from the territory that became the United States.

READ MORE >>

-------------------------------------------------------------------------------------------------------------------

Geopolitics Of The United States Part 2: American Identity And The Threats of Tomorrow

A look back at 2011 predictions for the future in order to put events of today into perspective

 photo capitalism_zpsah78uy5p.jpg
We have already discussed in the first part of this analysis how the American geography dooms whoever controls the territory to being a global power, but there are a number of other outcomes that shape what that power will be like. The first and most critical is the impact of that geography on the American mindset.

READ MORE >>

-------------------------------------------------------------------------------------------------------------------


By Robert S. Finnegan

This e-mail outlines and confirms the acts of espionage against Indonesia and Indonesians by Akiko Makino and the others involved both in Kobe University and in AI Lab at University of Airlangga, Surabaya; Bahasa Indonesia original follows English translation...

READ MORE >>

-------------------------------------------------------------------------------------------------------------------

UPDATED 01/07/2015 : New Analysis Challenges Tamiflu Efficacy; Hong Kong Corona Virus Outbreak

UPDATED 01/07/2015 : FOX NEWS CORPORATE PHARMA SHILL MEGAN KELLY AND FOX NEWS QUACK DOCTOR NOW PUSHING TAMIFLU FOR PREGNANT WOMEN AND CHILDREN;

 photo TAMIFLU_small_zpssojx6okt.jpg
THE 5TH ESTATE UNEQUIVOCALLY WARNS THE PUBLIC NOT TO TAKE OR GIVE THIS PROVEN DANGEROUS, INEFFECTIVE DRUG TO ANYONE

Obama criminals now resulting to biowarfare in quest to destroy Chinese and ASEAN economy; "novel virus substrain" points directly to a Kawaoka / Fouchier / Ernala-Ginting Kobe lab virus weaponized and genetically altered to specifically target and infect the Asian population: Ribavirin...

READ MORE >>

-------------------------------------------------------------------------------------------------------------------


 photo WHO02_zpsplmhtlpr.jpg
The 5th Estate has just purchased a library on H5N1 "Novel" virus pandemics, there are dozens of PDF and Exel documents we feel will assist you in saving lives following intentional releases of the H5N1 and now MERS viruses; we will begin by printing those that appear to be extremely relevant here: H5N1 Kobe-Kawaoka-Ernala series continues soon with more "Smoking Gun" e-mails from Teridah Ernala to The 5th Estate . . .

READ MORE >>

-------------------------------------------------------------------------------------------------------------------


By Robert S. Finnegan

On October 12, 2002 the Indonesian island of Bali experienced a terrorist attack that rocked the world. It was unquestionably well-coordinated and executed, the largest in the country's history.

READ MORE >>