background preloader

RomasCOIN

Facebook Twitter

NSA uses Google cookies to pinpoint targets for hacking. A slide from an internal NSA presentation indicating that the agency uses at least one Google cookie as a way to identify targets for exploitation.

NSA uses Google cookies to pinpoint targets for hacking

(Washington Post) The National Security Agency is secretly piggybacking on the tools that enable Internet advertisers to track consumers, using "cookies" and location data to pinpoint targets for government hacking and to bolster surveillance. First PRISM, Now XKeyscore, Cloud Surveillance is Wake-up Call for the Enterprise - CipherCloud. Opt out of global data surveillance programs like PRISM, XKeyscore, and Tempora : technology. CloudFlare CEO: ‘Insane’ NSA gag order is costing U.S. tech firms customers. If the government doesn't bend on transparency, tech firms will looks for ways to shut out all requests, CloudFlare's Matthew Prince said.

CloudFlare CEO: ‘Insane’ NSA gag order is costing U.S. tech firms customers

We've now moved beyond mere talk about how the National Security Agency's surveillance programs may hurt U.S. cloud providers, says Matthew Prince, the chief executive of CloudFlare. The companies are already feeling the pain. CloudFlare, a Web site security firm and network provider with clients that run the gamut from WikiLeaks to the Duke and Duchess of Cambridge, is getting 50 to 100 calls per day from customers demanding more answers about the firm's involvement with the U.S. National Security Agency, Prince says. But that's information the company can't give out, he explains, and the inability to say anything about government requests is seriously hurting his business. "We get calls regularly that say, 'CloudFlare must be working with the NSA,' which we're not," Prince said. House panel withheld document on NSA surveillance program from members.

A cover letter to the House and Senate intelligence committees that was sent with the document asked the leaders of each panel to share the written material with all members of Congress.

House panel withheld document on NSA surveillance program from members

Ronald Weich, who was an assistant attorney general at the time, wrote that making the material available to Congress would be an “effective way to inform the legislative debate about reauthorization” of the provision of the Patriot Act that served as the legal basis for the phone surveillance. A similar document was available to all members of Congress in 2009, prior to a 2010 reauthorization vote. But the House Intelligence Committee opted against making the 2011 document widely available. Instead, the committee invited all 435 House members to attend classified briefings where the program was discussed — briefings that critics say were vague and uninformative.

Rep. The withheld document “doesn’t provide enough details, but it would have at least been a starting point to ask questions,” Amash said. The NSA's Data Haul Is Bigger Than You Can Possibly Imagine - By Matthew M. Aid. Editor's note: Shortly after this story was published, the Washington Post released a series of eye-popping leaked documents showing that the National Security Agency has accidentally intercepted the communications of thousands of people it had no right to spy on.

The NSA's Data Haul Is Bigger Than You Can Possibly Imagine - By Matthew M. Aid

The story below is in many ways the precursor to that blockbuster revelation. The NSA, as intelligence historian Matthew Aid shows, collects so much information online that even its mistakes are enormous. Every day, it actively analyzes the rough equivalent of what's inside the Library of Congress and "touches," to use the agency's term, another 2,990 Libraries' worth of data.

With such a huge haul, even the most infrequent of error rates -- one in a hundred thousand, say -- still produces terabytes and terabytes of improperly-harvested data. It still means thousands and thousands of people are wrongly caught in the surveillance driftnet. Project Odyssey controls the world. By Barrett Brown, on July 13th, 2011 Every piece of information entered into the internet is funneled into a gigantic supercomputer built to categorize and prioritize threats to so-called national security.

Project Odyssey controls the world

Originally known as Echelon, this system has been upgraded to Romas/COIN. It is now in its third incarnation: Project Odyssey. The mass-surveillance system uses powerful linguistic analysis to seed out terrorist and activist threats. Project Odyssey weaponizes social media. Odyssey is not just engaged in foreign affairs. A corporate manager can log into Odyssey and quickly access the personal information of any of his or her employees. I know they’re using the sockpuppets against me. Project PM Leaks Dirt on Romas/COIN Classified Intelligence Mass Surveillance. Updated note: To be clear, . If you are not sitting, please do so. Although I don't advocate drinking, you might also pour a double-shot of whiskey to prepare yourself for distinctly unpleasant news about immensely sophisticated mass surveillance called Romas/COIN, or soon to be replaced by a similar program known as Odyssey.

The nature and extent of the "counter intelligence" operation can be glimpsed in part by closely inspecting hundreds of e-mails among the 70,000 that were stolen in February from the contracting firm HBGary Federal. After searching through HBGary e-mails for keywords and reading until I wanted to puke or scream, I decided to go ahead and run with Project PM's announcement. Barrett Brown of Project PM will publish these findings in full on Project PM Wiki later, but this is part of that release. The layout and story is extremely long, and you'll need to read over the announcement at Project PM when it's published there. . -