NSA

Citzenfour: Laura Poitras, Edward Snowden & Glenn Greenwald | Interview | TimesTalks


Publicado el 26 de feb. de 2015

When whistleblower Edward Snowden exposed the National Security Agency’s worldwide electronic surveillance program, it was to Oscar–nominated filmmaker Laura Poitras and Pulitzer Prize–winning journalist Glenn Greenwald. Don’t miss this special opportunity to hear the director of CITIZENFOUR – the film nominated for the Academy Award for Best Documentary Feature – the first journalist to write about Snowden’s revelations and Snowden himself (via live video) in conversation with New York Times media columnist David Carr about the film and the issues it raises. David Carr passed away shortly after this interview. His obituary is available at http://nyti.ms/1vHCHyk

 

David Carr’s final interview with Edward Snowden b4 his death @ Citizenfour press conference

 

Advertisements

Fort Apache – De Stasi a Wikileaks


 

W

W

A

A

Publicado el 23 de nov. de 2013

Después del fin de la Guerra Fría, el espionaje parecía haber perdido parte de su sentido en Europa.

Entrabamos en un mundo unipolar, donde la mayoría de los países occidentales estaban aliados en torno a la OTAN.

Las revelaciones de Wikileaks y de Eduard Snowden han sacado a la luz que EE.UU. espía a sus aliados.

¿A qué lógicas responde el espionaje en el siglo XXI?

En Fort Apache nos preguntamos sobre la historia y la actualidad del mundo del espionaje.

Para ello contamos con la presencia:

Juan Antonio Delgado – Portavoz AUGC

José María Benito – Portavoz SUP

Javier Couso – Activista contra la impunidad

Rubén Herrero de Castro – Profesor de Ciencia Política

Dolores Albiac – Periodista

Alejandro Pizarroso – Prof. Historia de la propaganda

El grupo de HispanTV les recuerda a los seguidores de nuestra página en Youtube de que en el caso de que no se suban nuevos vídeos, en 48 horas, esto significa que el lobby sionista ha bloqueado el acceso de este canal a su cuenta en YouTube. De ser así, haga Clic en el siguiente enlace para obtener nuestra nueva dirección en YouTube:

http://www.hispantv.com/detail.aspx?i…

http://www.hispantv.com
http://www.facebook.com/Hispantv
http://plus.google.com/+hispantv
http://twitter.com/Hispantv

CITIZENFOUR – A film by Laura Poitras


CITIZENFOUR

CITIZENFOUR

 

CITIZENFOUR

Laura Poitras, 2014
USA/Germany | Format: DCP |

Special Presentation

World Premiere

In January 2013, filmmaker Laura Poitras was in the process of constructing a film about abuses of national security in post-9/11 America when she started receiving encrypted e-mails from someone identifying himself as “citizen four,” who was ready to blow the whistle on the massive covert surveillance programs run by the NSA and other intelligence agencies. In June 2013, she and reporter Glenn Greenwald flew to Hong Kong for the first of many meetings with the man who turned out to be Edward Snowden. She brought her camera with her. The film that resulted from this series of tense encounters is absolutely sui generis in the history of cinema:  a 100% real-life thriller unfolding minute by minute before our eyes. Poitras is a great and brave filmmaker, but she is also a masterful storyteller: she compresses the many days of questioning, waiting, confirming, watching the world’s reaction and agonizing over the next move, into both a great character study of Snowden and a narrative that will leave you on the edge of your seat as it inexorably moves toward its conclusion. CITIZENFOUR is a major work on multiple levels, and a deeply unsettling experience.

Laura Poitras will discuss the film in one of our free HBO Directors Dialogues on October 11.

Laura Poitras

Laura Poitras

 

Citizenfour’ Trailer Released Ahead Of Laura Poitras’ Edward Snowden Film

Publicado el 10/10/2014

When National Security Agency whistleblower Edward Snowden reached out to Laura Poitras in January 2013, the documentary filmmaker knew just what to do: Make a documentary.

She had recently won a MacArthur “Genius Grant” in 2012 and was already several years into making a film about surveillance in the post-9/11 era when Snowden contacted her under the name “citizen four.”

When she and Glenn Greenwald flew to Hong Kong in June 2013, she brought her camera with her. The result is a film unlike anything done before. It’s world premiere is at the New York Film Festival Friday and will be in theaters October 24th

 

 

Cellular Exploitation on a Global Scale: The Rise and Fall of the Control Protocol


Publicado el 11/8/2014

“Since the introduction of the smart phone, the issue of control has entered a new paradigm. Manufacturers and enterprises have claimed control over not just how your phone operates, but the software that is allowed to run on it. However, few people know that Service Providers have a hidden and pervasive level of control over your device. These hidden controls can be found in over 2 billion cellular devices worldwide. Organizations have been quietly deploying these controls in smart phones, feature phones, basebands, laptops, embedded M2M devices, and even certain cars. Someone with knowledge of these controls and the right techniques could potentially leverage them for cellular exploitation on a global scale.

We’ve reverse engineered embedded baseband and application space code. We’ve torn apart the Over-the-Air communications and implemented our own code to speak the relevant protocols. Layer by layer, we’ve deconstructed these hidden controls to learn how they work. While performing this work we’ve unearthed subtle flaws in how the communication is handled and implemented. After understanding these flaws, we’ve written proof-of-concept exploits to demonstrate the true risk this software presents to the end user.

In this presentation, we will discuss and disclose how Over-the-Air code execution can be obtained on the major cellular platforms and networks (GSM/CDMA/LTE). Including but not limited to Android, iOS, Blackberry, and Embedded M2M devices. You will come away from this talk armed with detailed insight into these hidden control mechanisms. We will also release open source tools to help assess and protect from the new threats this hidden attack surface presents. These tools will include the ability to dynamically test proprietary system applications and simulate different aspects of a cellular environment.”

BH Cover Photo

BH Cover Photo

#NSA by Hacksperger


Ir a El País
eskup.elpais.com
Winston Smith Smith
En mi opinión esa pieza que es la NSA está en otra fase, ha evolucionado, porque en realidad lo que #filtra Snowden ya lo sabíamos hace 10, 12 años, (consta en la Red, no me lo invento), es cierto que en la actualidad el factor tecnológico añade un plus de sofisticación que incrementa la recluta de información directa porque se ha producido un cambio radical en el tratamiento y la gestión de los datos, ahora el dispositivo personal (hijo) está programado para gestionar los datos en la proximidad de la mano del individuo (contacto directo) de manera que el instrumento envía a la madre los datos ya procesados y ésta tiene reducida su función a la clasificación y el análisis. Aqui la madre tiene dos problemas con los hijos, el primero es que los hijos saben lo que pasa, ergo, la inmensa mayoría de los datos son superfluos y descartarlos exige una cantidad de recursos impresionanate que no tiene recompensa, y por otro, que esta estrategia conocida obliga a, por ejemplo el terrorismo, ingeniar métodos alternativos con lo que el sistema se inutiliza. Atentamente. http://cort.as/1jGd
#
Nada es lo que parece, la información real está al alcance de muy pocos y tiene un precio desorbitado. Atentamente. http://cort.as/1jGd
##
En qué fase está ahora la pieza NSA?, es fácil, solo tiene un camino, ellos se dedican a obtener información por medio de la tecnología, a esto lo denominaremos “poner las antenas”, porque la NSA es responsable de obtener y analizar información transmitida por cualquier medio de comunicación, y de garantizar la seguridad de las comunicaciones del gobierno contra otras agencias similares de otros países, y que conlleva la utilización del criptoanálisis. El fin no cambia nunca, solo los medios y la NSA confía demasiado en la tecnología. Pero si yo utilizo una paloma para mandarte unos caracteres en un soporte de papel, como demonios va a interceptar la información?. No puede, no está en el protocolo. El pajar donde actúa es cada vez mayor y la agüja cada vez más anticuada, indetectable y comprensible. Atentamente. http://cort.as/1DjZ

Keiser Report: CIA, NSA & Economic Espionage (E498)


Timoteo Maxwell “Max” Keiser (nacido el 23 de enero 1960) es un locutor y cineasta estadounidense. Junto a Stacy Herbert es anfitrión del Keiser Report, un programa financiero emitido en RT.1 Keiser también participa en On the Edge, un programa de noticias y análisis organizado por Press TV de Irán.2 Keiser presentó una temporada de The Oracle con Max Keiser en la BBC World News. Anteriormente produjo y apareció regularmente en la serie de televisión People & Power de la Al Jazeera en inglés. También presenta un programa semanal sobre los mercados financieros y en el London’s Resonance FM, así como escribir para el The Huffington Post.3

Además de su trabajo de radiodifusión, Keiser es conocido por su invención del “Especialista en Tecnología Virtual”, un software utilizado por el Hollywood Stock Exchange.

Referencias

  1. Jump up↑ «Keiser Report — RT Programs». Russiatoday.com. Consultado el 10-05-2011.
  2. Jump up↑ «Press TV website, programme list». Presstv.ir. Consultado el 10-05-2011.
  3. Jump up↑ Keiser, Max. «Collection of articles», Huffingtonpost.com. Consultado el 10-05-2011.

Enlaces externos

http://www.maxkeiser.com/

01

01

Publicado el 17/09/2013

Max Keiser and Stacy Herbert discuss economic espionage and, perhaps, sabotage by the NSA against the corporations and innovators of competitor nations. In the second half, Max interviews author, journalist and filmmaker, Greg Palast of GregPalast.com, about the Larry Summers’ secret ‘End Game’ memo and the decriminalization of what were once financial crimes.

FOLLOW Max Keiser on Twitter: http://twitter.com/maxkeiser

WATCH all Keiser Report shows here:

http://www.youtube.com/playlist?list=… (E1-E200)
http://www.youtube.com/playlist?list=… (E201-E400)
http://www.youtube.com/playlist?list=… (E401-current)

RT LIVE http://rt.com/on-air

Subscribe to RT! http://www.youtube.com/subscription_c…

Like us on Facebook http://www.facebook.com/RTnews
Follow us on Twitter http://twitter.com/RT_com
Follow us on Instagram http://instagram.com/rt
Follow us on Google+ http://plus.google.com/+RT

RT (Russia Today) is a global news network broadcasting from Moscow and Washington studios. RT is the first news channel to break the 1 billion YouTube views benchmark.

NSA chief General Keith Alexander yelled at in Black Hat security conference


Keith Brian Alexander (born December 2, 1951) is the current Director of the National Security Agency (DIRNSA), Chief of the Central Security Service (CHCSS) and Commander of the United States Cyber Command. He is a four-star general in the United States Army.[1] He previously served as Deputy Chief of Staff, G-2, U.S. Army from 2003 to 2005. He assumed the positions of Director, National Security Agency and Chief, Central Security Service on August 1, 2005[2] and the additional duties as Commander, United States Cyber Command on May 21, 2010.[3] Alexander plans to retire in 2014.[1]

Biography – Commander, U.S. Cyber Command,
Director, National Security Agency/Chief, Central Security Service

http://www.nsa.gov/about/leadership/bio_alexander.shtml

keith-alexander

keith-alexander

Cyber command[edit source | editbeta]

Alexander was confirmed by the U.S. Senate for appointment to the rank of general on May 7, 2010[9] and was officially promoted to that rank in a ceremony on May 21, 2010. General Alexander assumed command of United States Cyber Commandin the same ceremony that made him a four-star general.[10]

He will deliver the keynote address at Black Hat USA in July 2013. The organizers describe Alexander as an “advocate of battlefield visualization and ‘data fusion’ for more useful intelligence”. He provided them with this quote: “As our dependence on information networks increases, it will take a team to eliminate vulnerabilities and counter the ever-growing threats to the network. We can succeed in securing it by building strong partnerships between and within the private and public sectors, encouraging information sharing and collaboration, and creating and leveraging the technology that affords us the opportunity to secure cyberspace….” [11]

NSA chief General Keith Alexander heckled at hacker conference in Las Vegas. NSA chief General Keith Alexander defends internet surveillance programmes at the Black Hat security conference in Las Vegas on Wednesday. Alexander says Congress found no fault in NSA’s surveillance methods, which were revealed by whistleblower Edward Snowden. Some members of the audience heckle the 61-year-old general. .

United States Cyber Command

2010-05-14-USCYBERCOM Logo.jpg

United States Cyber Command (USCYBERCOM) is an armed forces sub-unified command subordinate to United States Strategic Command. The command is located in Fort Meade,Maryland and led by General Keith B. Alexander.[1] USCYBERCOM centralizes command of cyberspace operations, organizes existing cyber resources and synchronizes defense of U.S. military networks.

Mission[edit source | editbeta]

“USCYBERCOM plans, coordinates, integrates, synchronizes and conducts activities to: direct the operations and defense of specified Department of Defense information networks and; prepare to, and when directed, conduct full spectrum military cyberspace operations in order to enable actions in all domains, ensure US/Allied freedom of action in cyberspace and deny the same to our adversaries.”[2]

The text “9ec4c12949a4f31474f299058ce2b22a”, which is located in the command’s emblem, is the MD5 hash of their mission statement.[3]

The command is charged with pulling together existing cyberspace resources, creating synergy and synchronizing war-fighting effects to defend the information security environment. USCYBERCOM is tasked with centralizing command of cyberspace operations, strengthening DoD cyberspace capabilities, and integrating and bolstering DoD’s cyber expertise.[4][5]

http://www.youtube.com/user/RudlerLam…
http://www.youtube.com/user/MetalCove…
http://www.youtube.com/user/ManofStee…
http://www.youtube.com/user/VideoLamprey
http://www.youtube.com/user/SportMovi…
http://www.youtube.com/user/MountFuji…
http://www.youtube.com/user/WolMoth
http://www.youtube.com/user/movieconc…
http://www.youtube.com/user/KickingSc…
http://www.youtube.com/user/AuroraMas…
http://www.youtube.com/user/AppleFooF…
http://www.youtube.com/user/videos9148
http://www.youtube.com/user/rudsterish

https://www.blackhat.com/

https://www.blackhat.com/us-13/

 

The Border Is a Back Door for U.S. Device Searches


From: InfoSec News <alerts () infosecnews org>
Date: Tue, 10 Sep 2013 06:39:56 +0000 (UTC)


http://www.nytimes.com/2013/09/10/business/the-border-is-a-back-door-for-us-device-searches.html

By SUSAN STELLIN
The New York Times
September 9, 2013

Newly released documents reveal how the government uses border crossings to seize and examine travelers’ electronic devices instead of obtaining a search warrant to gain access to the data.


The documents detail what until now has been a largely secretive process that enables the government to create a travel alert for a person, who may not be a suspect in an investigation, then detain that individual at a border crossing and confiscate or copy any electronic devices that person is carrying.


To critics, the documents show how the government can avert Americans’ constitutional protections against unreasonable search and seizure, but the confiscations have largely been allowed by courts as a tool to battle illegal activities like drug smuggling, child pornography and terrorism.


The documents were turned over to David House, a fund-raiser for the legal defense of Chelsea Manning, formerly known as Pfc. Bradley Manning, as part of a legal settlement with the Department of Homeland Security. Mr. House had sued the agency after his laptop, camera, thumb drive and cellphone were seized when he returned from a trip to Mexico in November 2010. The data from the devices was then examined over seven months.

[...]

--
Find the best InfoSec talent without breaking your
recruiting budget! Post a Job, $99 for 31 days.
Hot InfoSec Jobs - http://www.hotinfosecjobs.com/

US Mounted 231 Offensive Cyber-operations In 2011, Runs Worldwide Botnet


An anonymous reader sends this news from the Washington Post:”U.S. intelligence services carried out 231 offensive cyber-operations in 2011, the leading edge of a clandestine campaign that embraces the Internet as a theater of spying, sabotage and war, according to top-secret documents [from Edward Snowden]. Additionally, under an extensive effort code-named GENIE, U.S. computer specialists break into foreign networks so that they can be put under surreptitious U.S. control. Budget documents say the $652 million project has placed ‘covert implants,’ sophisticated malware transmitted from far away, in computers, routers and firewalls on tens of thousands of machines every year, with plans to expand those numbers into the millions. … The implants that [an NSA group called Tailored Access Operations (TAO)] creates are intended to persist through software and equipment upgrades, to copy stored data, ‘harvest’ communications and tunnel into other connected networks. This year TAO is working on implants that “can identify select voice conversations of interest within a target network and exfiltrate select cuts,” or excerpts, according to one budget document. In some cases, a single compromised device opens the door to hundreds or thousands of others.”

via: http://yro.slashdot.org/story/13/08/31/2223212/us-mounted-231-offensive-cyber-operations-in-2011-runs-worldwide-botnet

[ v e r a x ] : Edward Snowden / 斯諾登 – Short Film


This is a short film based on the events of Edward Joseph Snowden/斯諾登, a former CIA and NSA employee who leaked a top secret mass surveillance programme from the US and UK.

We have never met or been in contact with Edward Joseph Snowden.

We are a band of independent and amateur filmmakers in Hong Kong who were both excited and puzzled as to why Snowden chose to come to Hong Kong. While nearly every media outlet wanted to get their hands on him, we decided to produce a short fictional video to depict his experience in HK, and how it would have affected certain parties: Namely, the CIA contingent based in HK who would be tasked to find Snowden. The Hong Kong Police who would be stuck in between the US and China. And the journalists who want to get the scoop. It was also important for us not to ‘twist’ Snowden’s character. We really knew little about him. Although he is a central character, he is not the most prominent. It is more about the maelstrom of events surrounding him.

The idea was hatched two days after he revealed his identity, and principal filming began on June 20th. We were also filming on the same day (23rd) when we learned Snowden had left the city. Therefore we ramped up production efforts and published our short film ‘Verax’ on the 25th. ‘Verax’ was the alias Snowden used when contacting journalists via encrypted chat services. We loved the idea of having Snowden here and the media frenzy it created. We really wanted to make a film based on such real-life news events, especially as it continued to develop. This project really tested our mettle especially when most of us had day jobs.

To reiterate, we made this for fun and for the love of filmmaking. We had no commercial or political motives.

Directed and produced by
Jeff Floro 謝夫發露 (Junk Shot: http://www.junkshot.org)
Edwin Lee 李健恩 (Fallout Media: http://www.falloutmediahk.com)
Shawn Tse 謝兆龍 (Junk Shot)
Marcus Tsui 崔正傑 (Immortal Peach: http://www.immortalpeach.com)

Associate producer
Cassandra Chan (Slate Takes: http://www.slatetakes.com)

Written by
Edwin Lee
Marcus Tsui

Directors of Photography
Edwin Lee
Jeff Floro

Starring
Andrew Cromeek as Edward Snowden
Guo Aibing as Wu Xingwei
Edwin Chin as Security Wing officer Tsang Tak-long
Thomas Easterling as HK CIA Station Chief Carl Hamilton
Justin Lau as Security Wing officer Vincent Lee
Shi Yi Ng as Lecia Lau
Gabe Ostley as CIA Analyst Owen Fielding
Robert Hinson as HK CIA Operations Manager
Cindy Wong as Security Wing officer Vanessa Wu
Simon Zeng Hao as Ministry of State Security attaché

Music composed by
Gareth Coker (audiojungle)
Thomas Vo (audiojungle)

Special thanks
Christine Jagolino
Diane To
XKAREKROW

Geek talk:
Canon 5D Mark II and III
Zeiss 18mm, 28mm, 50mm, 85mm
Edelkrone rigs

https://www.youtube.com/watch?feature=player_embedded&v=OWVGDBeR42I