background preloader

United States of America US

Facebook Twitter

DOJ United States Department of Justice. The United States Department of Justice (DOJ), also known as the Justice Department, is the U.S. federal executive department responsible for the enforcement of the law and administration of justice, equivalent to the justice or interior ministries of other countries.

DOJ United States Department of Justice

The Department is led by the Attorney General, who is nominated by the President and confirmed by the Senate and is a member of the Cabinet. The current Attorney General is Eric Holder. History[edit] FBI. The Federal Bureau of Investigation (FBI) is a governmental agency belonging to the United States Department of Justice that serves as both a federal criminal investigative body and an internal intelligence agency (counterintelligence).

FBI

Also, it is the government agency responsible for investigating crimes on Native American reservations in the United States[2] under the Major Crimes Act. The FBI has investigative jurisdiction over violations of more than 200 categories of federal crime.[3] The bureau was established in 1908 as the Bureau of Investigation (BOI). Carnivore (software) The Carnivore system was a Microsoft Windows-based workstation with packet-sniffing software and a removable Jaz disk drive.[4] This computer must be physically installed at an Internet service provider (ISP) or other location where it can "sniff" traffic on a LAN segment to look for email messages in transit.

Carnivore (software)

The technology itself was not highly advanced — it used a standard packet sniffer and straightforward filtering. The critical components of the operation were the filtering criteria. To accurately match the appropriate subject, an elaborate content model was developed.[5] An independent technical review of Carnivore for the Justice Department was prepared in 2000.[6] Several groups expressed concern regarding the implementation, usage, and possible abuses of Carnivore.

Information Awareness Office. The Information Awareness Office (IAO) was established by the Defense Advanced Research Projects Agency (DARPA) in January 2002 to bring together several DARPA projects focused on applying surveillance and information technology to track and monitor terrorists and other asymmetric threats to U.S. national security, by achieving "Total Information Awareness" (TIA).[4][5][6] This was achieved by creating enormous computer databases to gather and store the personal information of everyone in the United States, including personal e-mails, social networks, credit card records, phone calls, medical records, and numerous other sources, without any requirement for a search warrant.[7] This information was then analyzed to look for suspicious activities, connections between individuals, and "threats".[8] Additionally, the program included funding for biometric surveillance technologies that could identify and track individuals using surveillance cameras, and other methods.[8] History[edit]

Information Awareness Office

Defense Intelligence Agency. Stone Ghost. STONEGHOST or "Stone Ghost", is a codename for a network operated by the United States' Defense Intelligence Agency (DIA) for information sharing and exchange between the United States, the United Kingdom, Canada and Australia.[1] Other sources say that New Zealand is also participating, and that STONEGHOST therefore connects, and is maintained by the defense intelligence agencies of all Five Eyes countries.[2] STONEGHOST does not carry Intelink-Top Secret information and was previously known as Intelink-C and may also be referred to as "Q-Lat" or "Quad link".[1] It's a highly secured network with strict physical and digital security requirements.

Stone Ghost

The network not only hosts information about military topics, but also about SIGINT, foreign intelligence and national security.[2] 2012 Canadian Spy Case[edit] Royal Canadian Navy intelligence officer Sub-Lt. Central Security Service. United States Cyber Command. United States Cyber Command (USCYBERCOM) is an armed forces sub-unified command subordinate to United States Strategic Command.

United States Cyber Command

The command is located in Fort Meade, Maryland and centralizes command of cyberspace operations, organizes existing cyber resources and synchronizes defense of U.S. military networks. Mission statement[edit] "USCYBERCOM plans, coordinates, integrates, synchronizes and conducts activities to: direct the operations and defense of specified Department of Defense information networks and; prepare to, and when directed, conduct full spectrum military cyberspace operations in order to enable actions in all domains, ensure US/Allied freedom of action in cyberspace and deny the same to our adversaries.

Air Force Seeks Fake Online Social Media Identities. The military has issued a request for bids on software to let it spread messages and make online friends using non-existent identities on social media sites.

Air Force Seeks Fake Online Social Media Identities

The United States Air Force is taking an unusual approach to cyber-security with a request for bids for "Persona Management Software," which would let someone command an online unit of non-existent identities on social media sites. The move became a major topic last week following the release of emails from private security firm HBGary, which were disclosed after an attack by Wikileaks competitor and collaborator Cryptome.org. According to Solicitation Number: RTB220610 , the armed services division sought a software program that could manage 10 personas per user, including background; history; supporting details, and cyber presences that are " technically, culturally and geographacilly [sic] consistent.

At least one individual was surprised that the proposal was published openly. "This is posted on open source. U.S. Central Command 'friending' the enemy in psychological war. The U.S.

U.S. Central Command 'friending' the enemy in psychological war

Central Command is stepping up psychological warfare operations using software that allows it to target social media websites used by terrorists. The Tampa, Fla. -based military command that runs the wars in Iraq and Afghanistan recently bought a special computer program that troops use to create multiple fake identities on the Internet. Terrorist Use of the Internet: Information Operations in Cyberspace. Persona Management Software Solicitation Number: RTB220610.

United States SIGINT System [USSS]

DHS Department of Homeland Security

CIA. There is an NSA/CIA Hybrid Agency That May Explain Snowden’s Involvement in SIGINT and HUMINT. (L) State Department Communications Annex (R) NSA/CIA Special Collection Service (SCS) – Beltsville, MD The media is quoting a number of intelligence “insiders” who are questioning NSA whistleblower Edward Snowden’s involvement in National Security Agency (NSA) signals intelligence and meta-data mining programs like PRISM and CIA human intelligence (HUMINT) operations.

There is an NSA/CIA Hybrid Agency That May Explain Snowden’s Involvement in SIGINT and HUMINT

However, the U.S. intelligence “insiders” may be trying their best to cover up the operations of a little-known hybrid NSA-CIA organizations known as the Special Collection Service (SCS), known internally at NSA as “F6,” and which is headquartered in Beltsville, Maryland in what appears to be a normal office building with a sign bearing the letters “CSSG” at its front driveway off of Springfield Road. CSSG is listed in area phone directories as Communications Systems Support Group, 11600 Springfield Road, Laurel, Maryland, 20708-3528, with a phone number of (301) 210-1776. Counterterrorist Intelligence Center. Description of CTIC[edit] According to Dana Priest's article, on which the CIA declined to comment at the time: The CTIC were modeled on the CIA's counternarcotics centers in Latin America and Asia.

Counterterrorist Intelligence Center

2002-2009 Alliance Base. International cooperation between intelligence agencies[edit] Its existence was first revealed by a November 17, 2005, article by Dana Priest in The Washington Post, who also broke the story concerning the existence of the CIA's "black sites".[2] In the article, both the CIA and the French government declined to comment on Alliance Base, while all intelligence officers requested anonymity due to the sensitive nature of the project, in particular relating to its political and judicial dimensions.

"No country wanted to be perceived as taking direction from the CIA," wrote Dana Priest, while France was the only European state willing to engage in more than simple information exchange. "To play down the U.S. role, the center's working language is French," told an anonymous source to the Washington Post investigative reporter.