Congress doesn’t know how NSA works

Congress NSA doesn't works

Congress NSA doesn’t works

While the president and the intelligence community cling to “Congressional oversight” as a justficiation for the pervasive intelligence-gathering programs in place within the US, members of Congress theselves are saying that they don’t have the information they need to exercise real authority over the NSA. A recent report in The Guardian quotes two House members, Morgan Griffith (R-VA) and Alan Grayson (D-FL), who have both requested information about the agency and its programs from the House Intelligence Committee, only to be rebuffed.

In a June 25th request, Rep. Griffith asked the committee for the “classified FISA court order(s)” discussed on Meet the Press the previous weekend — a 2011 opinion holding that many of the NSA’s programs under the FISA Amendments Act were unconstitutitional. Weeks later he requested additional information surrounding Yahoo’s legal challenge to the NSA’s PRISM program and Verizon’s supplying of customer metadata to government intelligence agencies. More than six weeks since the first letter, Griffith still hasn’t received a response.

In Rep. Grayson’s case, the committee did sometimes respond to his requests for information. “The transcript is classified,” read one such reply to a request for the text from a vote — itself a decision to refuse an earlier request for information. So far, neither Griffith nor Grayson have received the information they requested.

Adding to the overall lack of oversight, media reports containing classified information are similarly barred from Congress. Last month, Grayson attempted to circulate slides published by The Guardian only to be told that he could face sanctions because the material they contained was still classified, echoing the Obama administration’s 2010 decision to ban the WikiLeaks website from federal computers while the diplomatic cables it sought to block access to were being published in major newspapers. Expressing frustration at the House Intelligence Committee, Rep. Griffith said, “my oath is to make informed decisions, and I can’t do my job when I can’t get even the most basic information about these programs.”

NSA

Ultimate spy machine for the U.S. Government

Hard Drives in computers the Ultimate Spying Machine that can be used against you:

Hard Drives in computers the Ultimate Spying Machine that can be used against you

Hard Drives in computers the Ultimate Spying Machine that can be used against you

You can be a newbie to computers or a advanced IT Expert, Technician or even a hacker but many don’t even realize that their computers are already an ultimate spy machine for the U.S. Government, State Governments and their forensics departments (SBI, FBI, CIA, Private Intelligence Agencies). Who needs to plant bugs or GPS tracking devices when you have the suspects hard drives from their computer by using a search and seizure raid on just something as simple as being accused of a computer crime or even downloading illegal material whether it’s true or not. Even after the Virginia Tech Shooting and other major criminal incidents, the police or FBI or even the SBI always talk about wanting to come for the suspects computer equipment and hard drives to send to forensics to investigate their entire life history through the usage of the computer with the hard drive used for data storage. It’s all there!!! Hard Drives are basically a High Density magnetic medium using tiny bits to encode and decode information, for simpler terms it is like writing files and reading files from a computer unit. Every hard drive doesn’t give you access to it’s full memory but holds off a fraction that is not user accessible which also likely holds data on our digital activities. In addition the hard drives use a form of magnetic to where no matter how many overwrites you use on a hard drive to coverup confidential and sensitive, embarrassing, or even material that you don’t want the world to know you have whatever the reason may be, the data can still be recovered at a forensics lab or even some expensive Data recovery company that is hell bent on obtaining personal information knowing they can blackmail people for profits. Well whats the problem, what do you have to hide? It does sound like it is over the top paranoid in this article but the experts such as Peter Gutmann admit that hard drives that are wiped with certain methods can always have it’s Data recovered using certain magnetic analyzing technology. All the police have to do is claim you committed a “computer crime” and they will have the legal ability to use forensic recovery units to find all your lifes history, any embarrassing photos and videos you taken with your boyfriend or girlfriend and yes that also includes cell phones so any horny young teenage guy or girl could become the next bust for child pornography, top secret and confidential legal attorney/client documents and that also includes top secret government and military documents, and even your entire web history and can even move on to what organizations you belong to and chatter with. The question is why does the government want us all to have computers, to spy on us and keep tabs on our entire Internet and computer history. Since people stupidly chat on Twitter and Facebook about all the things they do such as cooking to partying, all their activities are being archived and cataloged to each individual and since most profiles are public anybody can archive your information to use against you later on. It is even discovered through attending a autism meeting that many autistic people including children accidentally get into pornography when the parents installed no filter and end up getting caught on pornography charges (Laws prohibiting people under the age of 18 and in some cases the age of 21 from viewing adult pornography) which are very hard to drop in court which means juvenile prison. More teenagers and children to be brought up and raised under the Juvenile Prison Industrial Complex!!!! Whoever thought people can be arrested over what we do privately with their boyfriends and girlfriends and in some cases looking at a few digital photos is all it takes to go to the slammer whether there is a harmful intent or not. That is why it is a popular method of setting somebody up and that is setting somebody up for child pornography charges because it is nearly impossible to get out of them and ruins their life and reputation. All of our activities whether it is posting photos of your family on Flickr, emails you receive and send, whatever documents and other files you create, being involved with non-mainstream religions whatever your beliefs are, being involved with hack tools, being involved with file-sharing or even downloading warez material, and any other digital activity ever conducted is all stored on the hard drive and impossible to completely erase by normal conventional erasing software. First method that can be used by the forensics team is simple software and MFT Data recovery tools to find all the files both deleted under the MFT and even data that is lost due to MFT corruption by seeking out the file type signature, every file type ever made has a distinct signature or header that identifies the file type, and recovering the data based on the signature. Second method that forensic technicians use is Magnetic Force Microscopy (MFM) and even Scanning Probe Microscopy (SPM) or even Magnetic Tunneling Microscopy (STM). No matter what method of recovery, magnetic recovery is the far worst privacy invasion since the leaks of classified government documents via Wikileaks. Peter Gutmann, the same Computer Science expert that created the Gutmann erasing method (35 passes overwrite) that is used in almost every hard drive erasing software not limited to Active@ Killdisk erasing tool, conducted a study and whitepaper titled “Secure Deletion of Data from Magnetic and Solid-State Memory” (PDF) which concluded that “it is effectively impossible to sanitize storage locations by simple overwriting them, no matter how many overwrite passes are made or what data patterns are written. However by using the relatively simple methods presented in this paper the task of an attacker can be made significantly more difficult, if not prohibitively expensive.” Of course with the SBI and FBI fueled with the need to be champions of justice they will spend lots of money to recover the erased data no matter how expensive it is since they can just take more and more tax payers money through the IRS thugs. Reminds me of that movie “No Way Out!” where a Pentagon high-up had a photo taken I think with some Russian spy and the photo was ruined but the Pentagon had a forensics method of restoring the photograph as evidence then used to prosecute him for possible espionage. I even heard that when the authorities take computers by a court order, they say that they can find anything on it, time stamps, your life history, all of your life ever on a computer, can be examined by the State Bureau of Investigation or even the Federal Bureau of Investigation via their crime labs. They can even plant material on the hard drive since it is pretty easy to manipulate the timestamps, hack somebodies password protected or even public Wifi, mix somebodies DNA with a rape and/or murder victim sample for analysis which the charges can only be thrown out with a very good alibi or getting the forensics expert to admit to setting somebody up which will never happen of course, and internet histories can be fabricated by altering the hex data and even with computer virtualization technologies such as VMWare and other tools. Heck look what they did to Brandon Raub for the crime of making 9/11 inside job and other political statements on his Facebook profile. People saying anything that possibly sounds like some threat against the US President warrants a secret service visit and could maybe even a hard drive seizure if they desire it. People should be concerned at the fact that hard drives, RAM Cards, and other memory storage devices were on purposely created to not only store your data but to also violate your privacy with a backdoor that can allow deleted and even erased (DOD, Russian Ghost, Gutmann, One Pass Zeros, One Pass Random, other erasing methods) data to be recovered and accessible. If that is not apart of a major spying surveillance system being set-up then what is? Windows saves all file accesses and program histories with MRU, and possible other file access histories of files opened up. Every web page visited whether encrypted or not saves information which piles up overtime when not deleted which can be impossible to get rid of without overwriting it in the exact same data spot with conventional files to overcome the MFM’s ability to recover data erased by conventional hard drive erasing procedures. The solution really is to be careful on anything you do in your computer and cell phone, be careful when your political because somebody from forensics can set you up for computer crimes or even of murder, and when erasing be aware that you have to copy all your normal everyday files into the hard drive after erasure for a best chance at destroying any chance of recovery of what data you were hoping to erase if that is even possible. Be aware that when your hard drive stores your personal information even after deletion and erasure then it is meant to keep your computer history stored for any police or government agency to look at will especially under the Patriot Act. Even when you delete you are not deleting the data but just a MFT reference to the file along with the timestamps. Of course when you erase with any pattern all the forensic has to do is figure out what erasing pattern you used and then start the recovering process through magnetic imaging of the drive disk platters. If anything when you first buy a computer your better off first-hand encrypting the entire hard drive with TrueCrypt’s System/Partition Encryption and use a very complex password so that on every bootup you can use a operating system that is more secure and when data is deleted or even erased it will be impossible to recover since MFM usually relies on unencrypted RAW Data and even if they tried to break the password to use forensics to find the deleted/erased file, it was erased on the encryption side which means just the encrypted data changes a bit and since that happens it didn’t disappear on the outside using a normal overwrite procedure so it is no doubt that having your entire operating system and hard drive encrypted would be the best practice to data security. As for your autistic children please for goodness sake use a filter software to block all forms of pornography so that your child doesn’t get caught then forced to go through hell just for getting a little too curious. As for any teenagers you raise in your family, please keep tabs on their cell phone so if they take any photos of themselves you can delete them to prevent your son and daughter from ending up on a sex offender registry. As for the average computer user this article serves as a warning to all of you that anything you do on your computer can be accessed and data profiles and histories are set up on everybody especially with Facebook and Twitter.

F.B.I. manufactors Terrorists to Hunt

U.S. Government Now Creating Terrorists So It Can Arrest Them:

Dead_Terrorist

Dead_Terrorist

Mohamed Osman Mohamud, a 19-year-old U.S. citizen, was arrested this weekend for plotting to detonate a bombat a downtown Portland, Oregon tree-lighting celebration. So that’s good, right? Americans appreciate not getting blown up. But the thing is, Mohamud was never a member of a terrorist group. The FBI provided him a fake bomb and worked with him in the planning of the attack. But that’s not unusual these days, because the government no longer just tries to find and arrest actual terrorists; it also tries to create terrorists it can then arrest. In fact, informants now like to stand in the parking lots of American mosques, offering hundreds of thousands of dollars and fancy cars to anyone who will sign up for jihad. It’s a brave new world for thoughtcrime.  Mohamud was a student at Oregon State, and as far as we can tell from this AP story, was not promised to get rich quickly by becoming a terrorist. He, at least, did have an actual interest in becoming one, because the FBI saw his e-mails to a friend in Pakistan, asking if he knew Osama bin Laden’s AIM handle or whatever. When Mohamud had no luck getting this contact info (WHAT? HIS FRIEND WAS IN PAKISTAN! HE MUST HAVE KNOWN TERRORISTS!), the government swooped in and told him they were hip terrorist guys with a bomb and a terrorist letterman’s-jacket with his name stitched on it.  Oh, why was the FBI reading this Mohamud guy’s e-mails in the first place? It’s never explained in this AP story. But c’mon, the kid’s name is Mohamud. He shouldn’t have let his parents name him that if he didn’t want to be a terrorist. So obviously the answer to this problem was not continued surveillance but rather to entice this kid into dropping out of college to become the ULTIMATE TERRORIST.  It was also very difficult to decipher that this kid is an American citizen, because the AP story was so busy telling us he is a “Somali-born teenager” and PRECIOUS SMALL WHITE CHILDREN were at this Portland Christmas event (at which they were never in danger of exploding).  But here’s an even more fun account in Slate about “four African-American ex-cons from Newburgh, N.Y.” who were enticed into saying they would blow up two synagogues:

Hussain bought meals for the group of four men he assembled because none of them had jobs or money. The owner of a Newburgh restaurant where they occasionally ate considered him “the boss,” because he would pick up the tab. Among his other inducements were the offer of $250,000 and a BMW to the most volubly anti-Semitic plotter, the man the government says was the ringleader, James Cromitie. To drive that car, Cromitie would have needed a driver’s license—which he didn’t have. Another supposed plotter, a Haitian, was a paranoid schizophrenic (according to his imam), which was the reason his deportation had been deferred (according to The Nation’s TomDispatch.com), and who kept bottles of urine in his squalid apartment (according to the New York Times). The last two, both surnamed Williams, have histories of drug busts and minimum-wage jobs in Newburgh. At trial the government asserted that the plot was driven by anti-American hatred. But in papers filed in court by defense lawyers before the trial began, Cromitie is quoted in government transcripts explaining to Hussain that the men “will do it for the money. … They’re not even thinking about the cause.”

One of these guys tried to back out, “saying he didn’t want to hurt any women or children,” but the informant pressured him into staying with the group.  This is just perverse. Perhaps the government will one day figure out how to wind down bureaucracies and bureaucratic divisions once they’re proved no longer necessary. But until then, the FBI will create terrorists for itself to bust because it doesn’t have enough actual, group-aligned terrorists to hunt. And, perhaps, a fake bomb for you to assemble will suddenly arrive on your doorstep one day after you criticize the government or American society. But anti-terrorism efforts have to adjust to the actual threat eventually, right? It’s not like archaic bureaucracies like the Tennessee Valley Authority are still around.

Mohamud was known at the Salman Al-Farisi Center in Corvallis, said Yosof Wanly, imam at the mosque. He said Mohamud was “an average university boy,” drinking the occasional beer with friends in fraternities.

“He had some fraternity friends,” Wanly said. “He would attend athletic (events), basketball games, whatever they are.”

By the way, you know who coaches that basketball team? Known terrorist Barack Obama’s brother-in-law. DUN DUN DUN

Hackers hit C.I.A. and U.N.

Hackers claim hits on CIA, U.N. Web sites:

This Anonymous account publicized the CIA site outage with these messages on Twitter. This Anonymous account publicized the CIA site outage with these messages on Twitter.  The CIA’s Web site was down this afternoon in what looked like a distributed denial-of-service attack publicized by members of the online activist group Anonymous.  With the CIA site inaccessible, the Twitter account for @YourAnonNews tweeted “CIA TANGO DOWN: cia.gov #Anonymous” and included a link to a news story about the outage on Russian site RT.com.  A CIA spokesman declined to comment on the matter to CBS News beyond offering this statement: “We are looking into these reports.”  The Anonymous account also posted a Pastebin link purporting to expose e-mails from the Mexican Mining Chamber, also known as “Camimex.” In the Pastebin message, the hackers said they were targeting Camimex for its alleged exploitative labor conditions and business practices.  Earlier today a hacker or group going by the moniker “Casi” took credit for hacking the Web site of the United Nations and released what appeared to be vulnerabilities on the site. It was unclear why the UN was targeted. The move did not have the hallmarks of an Anonymous operation, including a clearly written message and the Anonymous motto: “We are Anonymous. We are legion. We do not forgive. We do not forget.”  Anonymous has a history of targeting law enforcement and related agencies on Friday. Last week it released a recording of a conference call between the FBI and U.K. law enforcement that they snooped on as officials discussed Anonymous and affiliate hackers. It also that day claimed to have hacked into police sites in Texas, Boston and Salt Lake City, as well as the site of defense lawyers for a U.S. Marine accused of leading a civilian massacre in Iraq and claimed to have stolen e-mails. (This hacker chart lists much of Anonymous’ activity since last year.)

anonymous_

anonymous_