Share

06DD5 zerosec deepstate dox 5

Public

12 August 2017

Views: 56

-------------------------------------------------------------------------------------------------------------------------------
While some of the initiatives—the Syrian strike, for instance—were undertaken on Trump’s orders, many were initiated by Mattis or by the generals reporting to him.
Marine units had taken heavy casualties.
General John Kelly (who is now the Secretary of Homeland Security), told him to push through Kut, but Mattis had told him to pin down the enemy by attacking targets around the perimeter.
In the aftermath of the fighting, the extent of the Marines’ ferocity became clear. “About a thousand civilians were killed,”
The city’s cemeteries were so full that the main football stadium was converted to a burial site.(edited)
1:47-1:53 https://www.youtube.com/watch?v=eHyiC_xLEfQ “I saw entire families inside the graves, the bodies of women and children, along with small pieces of paper that had their names. Everywhere in the city you smelled bodies.”
ambulances had been fired on and passengers killed,
snipers shot Iraqis as they tried to pull the dead off the streets, and that marines blocked military-age males from leaving the city
Americans had attacked Falluja with white phosphorus
Falluja became a safe haven for insurgents, and violence in Iraq soared.
Iraqi sheikhs asked Mattis angrily when the Americans were planning on leaving the country. Mattis gave a bluff response. “I’m never going to leave,” he said. “I found a little piece of property down on the Euphrates. I’m going to retire here.” In one house, they killed Younis Khafif and Aida Ahmed, Ahmed’s sister, and five children, the youngest of them an infant. All were shot in their heads and chests.
Corporal Sanick Dela Cruz, urinated into the skull of one of the dead Iraqis.
In all, twenty-four Iraqi civilians were killed in Haditha. In only one of the houses did the occupants, four men, have guns.
What is that as a kill ratio 5/6th unarmed
Mattis sent a fighter to kill a us drone in iranian air space(edited)
that incident on Mattis—they thought he was trying to start a war with the Iranians Mattis was particularly hard on the Iranians, that he didn’t necessarily see the need to engage them diplomatically
Mattis influenced the budget director, Mick Mulvaney, pledged fifty-four billion dollars in additional spending for the Pentagon, three per cent more than Obama had proposed the previous year.
Four months after Mattis took over the Pentagon, only two of the top civilian jobs—there are fifty-seven in all—have been filled
the Pentagon is being run by a skeleton crew; career officers and civil servants are doing jobs that are supposed to be performed by political appointees. “
At Mattis’s request, theatre commanders in Yemen and Somalia are now empowered to launch some strikes without permission from the White House. Secretary Mattis served as the Davies Family Distinguished Visiting Fellow at the Hoover Institution at Stanford University,
Mattis has ties to Theranos, a scandal-plagued healthcare technology company.
Mattis’ anti-Iran animus is so intense that it led President Barack Obama to replace him as Centcom commander.
Mattis’ ISIS-is-Iran claim is breathtakingly short on facts.
the first step in rekindling Bush’s “axis of evil,”
he seemed to be picking a fight with them
Erin Simpson, who advised the U.S. military senior command in Afghanistan, put it best: “The point is not that Mattis is unqualified. Rather, the point is that he hates this shit.”
his views on Islam strike me as perverse. This whole thing about ISIS and Iran is just wrong, but that’s not even the point. We’re going to find out who this guy really is when someone who’s just as smart tells him he’s full of shit. And on ISIS and Iran, believe me, he’s full of shit.
"I didn’t bring artillery. But I’m pleading with you, with tears in my eyes: If you fuck with me, I’ll kill you all.""
"[Mattis] was indecisive and betrayed his duty to us, leaving my men to die during the golden hour when he could have reached us," Amerine said. The golden hour, emergency responders say, is the small window immediately after a severe injury in which it is critical to get the victim to a medical facility for the best chance of survival.
"That is a horrible answer. Opcon [operational control] or not, a distress call is a distress call, especially with wounded Americans in a combat zone," the officer said in an email. "[Mattis] would have authority to direct his forces to assist." More than 12 years later, I still remember the smell of bodies left to rot in the streets for weeks because they could be buried only after the Marines withdrew. Iraqi doctors told me that when they tried to bury bodies during breaks in the fighting, American snipers on rooftops would shoot at them.

“When you see a child, 5 years old with no head, what (can you) say?” Dr. Salam Ismael, the head of Iraq’s young doctors association, told me in Baghdad at the time. “When you see a child with no brain, just opened cavity, what (can you) say? Or when you see a mother just hold her child, still an infant, with no head and the shells all over her body
“I see people carrying a white flag and yelling at us, saying, ‘We are here, just try to save us,’ but we could not save them because whenever we opened the ambulance door, the Americans would shoot at us. We tried to carry food or water; the snipers shoot the containers of food.”

Mattis, then a lieutenant general stationed at Camp Pendleton, California, became the “convening authority” for the court martial – giving him ultimate authority of justice in the case. In that role, he took the rare step of writing public letters to Marines accused of murder, exonerating them for their roles in the massacre.During the Carter administration, Gates served as a special assistant to Zbigniew Brzezinski.
In 2004, he co-chaired a CFR Task Force on Iran with Brzezinski, who lauded Gates in Time in 2008. Joining Gates in the Defense Department are fellow CFR members Michele Flournoy (Under Secretary of Defense for Policy), Jeh C. Johnson (Defense Department General Counsel), and Kathleen Hicks (Deputy Under Secretary of Defense for Strategy, Plans and Forces). General McMaster was passed over for the rank of general until General Petraeus and Robert M. Gates, then the defense secretary, rallied support for him. Mattis was elected by Defense Secretary Robert Gates for nomination to replace David Petraeus quickly recruited by the CIA.
Director of Central Intelligence under President George H. W. Bush
Texas A&M University and was a member of several corporate boards.
Gates was nominated by Republican President George W. Bush as Secretary of Defense after the 2006 election, replacing Donald Rumsfeld.
Gates was recruited by the Central Intelligence Agency and joined in 1966
Gates was nominated to become the Director of Central Intelligence (head of the CIA) in early 1987. He withdrew his name after it became clear the Senate would reject the nomination due to controversy about his role in the Iran-Contra affair.
Senior administration officials secretly facilitated the sale of arms to Iran, which was the subject of an arms embargo
Gates was the interim Dean of the Bush School of Government and Public Service at Texas A&M University
he became the 22nd President of Texas A&M.
Gates and his wife Becky received honorary doctoral degrees from Texas A&M on August 10, 2007.
In his affiliation with A&M, Gates has served on the National Security Higher Education Advisory Board
Gates has been a member of the board of trustees of Fidelity Investments
and on the board of directors of NACCO Industries, Inc., Brinker International, Inc.
Science Applications International Corporation
Parker Drilling Company
and VoteHere, a technology company which sought to provide cryptography and computer software security for the electronic election industry. , Gates co-chaired a Council on Foreign Relations task force on U.S. relations towards Iran Key points included a negotiated position that would allow Iran to develop its nuclear program
Gates was also a member of the Iraq Study Group, also called the Baker Commission
Gates committed to remain as President of Texas A&M University through the summer of 2008; President George W. Bush offered the position of United States Director of National Intelligence (DNI) to John Negroponte, who accepted
a private White House ceremony and then by Vice President Dick Cheney at the Pentagon.
Robert Gates removed General David D. McKiernan from command in Afghanistan on May 6, 2009 and replaced him with General Stanley A. McChrystal
Gates and U.S. Secretary of State Hillary Clinton have "forged a formidable partnership", speaking frequently, "comparing notes before they go to the White House", meeting with each other weekly and having lunch once a month at either the Pentagon or the State Department.
increases in funding for programs like the special forces Gates is a Principal, along with Condoleezza Rice, Stephen Hadley and Anja Manuel, in RiceHadleyGates LLC, a strategic consulting firm
Gates had accepted the position of chancellor at the College of William & Mary,
On May 2, 2012, Starbucks Corporation announced that Gates had been elected to the Starbucks board of directors. He will serve on the board's nominating and corporate governance committee.
Randall Stephenson
chairman and chief executive officer of AT&T Inc. serves under Gates as the president-elect.
Gates has been criticized for allegedly concocting evidence to show that the Soviet Union was stronger than it actually was
George Shultz said that, while Secretary of State, he felt the CIA under Gates was trying to "manipulate" him, that the agency was "a big powerful machine not under good control. I distrust what comes out of it."(edited)
I never heard a suggestion from the CIA … that numerous Soviets recognized a growing systemic economic problem
Turner said this failure was a consequence of deliberate distortion by those in the upper echelon of the CIA who were helping to sell the Reagan administration's defense buildup, a view backed by former CIA analyst Melvin Goodman at Gates' 1991 confirmation hearings: [William] Casey seized on every opportunity to exaggerate the Soviet threat … [while] Gates' role in this activity was to corrupt the process and the ethics of intelligence." Reviewing the third instalment of Gates' memoirs in 2016, Goodman said, "In my 24 years at the CIA, there was never the kind of toxic atmosphere that existed when Gates served as deputy director for intelligence, deputy director of CIA, and finally director of CIA.
Gates, as deputy director of CIA, allegedly vouched for the comprehensiveness of a CIA study presented to the Senate and President Reagan alleging that the Soviet Union played a role in the 1981 shooting of Pope John Paul II. A CIA internal review later denounced the report as being skewed
Robert Gates has just betrayed the president
the betrayal involves the disclosure of private conversations that Obama had every reason to believe would remain confidential she had opposed Bush’s 2007 surge in Iraq for political reasons because of the presidential campaign
HIllary
Gates is the latest to cash in on his government service.
Scott McClellan, accused his ex-boss of running a “political propaganda campaign” to sell the Iraq war and “manipulating public opinion.”
Trump lashed out at Gates early Saturday, tweeting, "I never met former Defense Secretary Robert Gates. He knows nothing about me. But look at the results under his guidance - a total disaster!"
Robert Gates’s tenure running the Pentagon might go down as the greatest performance in acting history.
he was apparently hating every minute of it. But he kept almost everything behind the poker face he’d learned to wear during decades in the spy business.
Thomas Donnelly, a defense scholar with the American Enterprise Institute, said Gates’s reputation could suffer because of the deliberate decision he has made to criticize a sitting administration rather than waiting until it leaves office. Gates asserted, are numerous and fraught with potential trap doors. Among them, China's claims to the South China Sea, North Korea's nuclear ambitions,
Iran's aggression, and the long-playing unrest in the Middle East, which is compounded by ISIS-related terrorism and the Syrian civil war.
Gates is 70, nearly 20 years older than Obama. He has worked for every president going back to Richard Nixon, with the exception of Bill Clinton
Gates says his instructions to the Pentagon were: “Don’t give the White House staff and [national security staff] too much information on the military options. Gates condemned National Security Agency whistleblower Edward Snowden as a traitor, called on tech companies to put security ahead of business interests and cooperate with intelligence agencies on encrypted data, and repeated his past description of Putin as a “stone-cold killer”, which, in the light of the Alexander Litvinenko inquiry, “the British now seem to reaffirm”. Gates never considers the possibility that he might have simply been wrong.
Robert Gates was probably the single most influential cabinet officer in both the Bush and Obama administrations.
CIA director in 1987—a nomination that was withdrawn because of Senate opposition due to his role in the Iran-Contra scandal. So the notion of disrupting and putting the Chinese on notice that it’s no longer business as usual for the United States I think is a good thing.
In a 2007 profile written by former National Security Advisor Zbigniew Brzezinski, Time magazine named Gates one of the year's most influential people
Knowing that Casey wanted to see certain kinds of analyses, for instance that painted the Soviet threat in bleak terms, Gates, according to former intelligence officers, demanded that his staff comply and encouraged reporting that some insisted was blatantly slanted, to a degree that led a variety of intelligence analysts to oppose his nomination as director Gates had been close to some quite controversial people, from Kissinger to Casey. “Bill Casey and Bob Gates guided the first institutionalized ‘cooking of the books’ at the CIA in the 1980s, with a particular emphasis on tailoring intelligence dealing with the Soviet Union, Central America, and Southwest Asia,” Goodman wrote. Casey and Gates pushed this line in order to justify more U.S. covert action in the Third World.
The CIA also produced an NIE in 1985 that was designed to produce an intelligence rationale for arms sales to Iran.”
The logic of the Casey-Gates position was that exaggerating the Soviet menace justified higher U.S. military spending and U.S. support for bloody brush-fire wars – central elements of Reagan’s foreign policy.
“While serving as deputy director for intelligence from 1982 to 1986, Gates wrote the manual for manipulating and centralizing the intelligence process to get the desired intelligence product,” Goodman stated.
“As a result, the CIA missed the radical change that Mikhail Gorbachev represented to Soviet politics and Soviet-American relations, and missed the challenges to his rule and his ultimate demise in 1991,” Goodman wrote.
Plus, in 1991, Gates faced accusations that he had greased his rapid bureaucratic rise by participating in illicit or dubious clandestine operations, including helping Republicans sabotage President Jimmy Carter’s Iran hostage negotiations in 1980 (the so-called October Surprise case) and collaborating on a secret plan to aid Iraq’s dictator Saddam Hussein (the Iraqgate scandal).
http://media2.s-nbcnews.com/i/newscms/2014_34/624716/140819-saddam-hussein-730a_551379ca753dc61a882deedc91be635a.jpg Gates also was implicated in a secret operation to funnel military assistance to Iraq in the 1980s, as the Reagan administration played off Iran and Iraq battling each other in the eight-year-long Iran-Iraq War.
Gates worked on the secret Iraqi initiative, which included Saddam Hussein’s procurement of cluster bombs and chemicals used to produce chemical weapons for the war against Iran.
The effort to arm the Iraqis was “spearheaded” by CIA Director William Casey and involved his deputy, Robert Gates, according to Teicher’s affidavit.
Plus, some of Gates's CIA protégés, such as former Deputy Director John McLaughlin, were liked by Democrats as well as Republicans. (McLaughlin was a member of Obama’s intelligence advisory group during Campaign 2008.)
With Rumsfeld going wobbly, Bush turned to Gates and – after getting Gates’s assurance that he would support Bush’s intent to escalate the war, not wind it down – Bush offered him the job.
But Gates’s nefarious roles in national security scandals went much deeper than that, despite his undeniable PR skills in shaping his image as a dedicated public servant who has earned Official Washington’s near-universal regard as a modern-day Wise Man.(edited)
Gates was implicated in secret maneuvers to sabotage President Jimmy Carter’s negotiations to free 52 U.S. hostages then held in Iran
it was Gates’s agency in 1991-92 that stonewalled the congressional investigators seeking information on Gates’s possible collaboration with enemies of the United States in 1980.
“Under CIA Director Casey and Deputy Director Gates, the CIA authorized, approved and assisted [Chilean arms dealer Carlos] Cardoen in the manufacture and sale of cluster bombs and other munitions to Iraq,” Teicher declared.
Gates and his colleagues set their sights on a decisive victory for the CIA- and Saudi-backed forces, which included Osama bin Laden and other Islamist extremists. Bush turned to Gen. David Petraeus to implement the “surge” and recruited Gates to sell it as the new Defense Secretary.
Gates-Petraeus-Clinton Obama accepted a counterinsurgency “surge” of 30,000 John J. McCloy (former Chairman of the CFR, and Chairman of Chase Manhattan Bank) used his position as coordinator of information for the US government to build the framework of what was to become the Office of Strategic Services (OSS), created in 1941-1942 era, headed by Bill Donovan.
During 1947, the OSS was rolled into a new group called the Central Intelligence Agency (CIA) by the 1947 National Security Act, which made the activities of the CIA immune from all civil, and criminal laws.

In 1950 General Walter Bedel Smith became Director of the CIA. The CIA helped organize, and sponsored the formation, and operation of the Bilderberg Conferences. Beginning in 1939, the Council achieved great prominence within the government and the State Department, when it established the strictly confidential War and Peace Studies. The secrecy surrounding this group was such that the Council members who were not involved in its deliberations were completely unaware of the study group's existence. It was divided into four functional topic groups: economic and financial, security and armaments, territorial, and political. The security and armaments group was headed by Allen Dulles who later became a pivotal figure in the CIA's predecessor, the OSS, producing 682 memorandums for the State Department, marked classified and circulated among the appropriate government departments.
In 1945-46, Rockefeller also was in on the founding of the CIA for knowing well Allen Dulles and his brother John Foster Dulles -- an in-law of the family. It was in Rockefeller Center that Allen Dulles had set up his operational center liaising closely with MI6 which also had their principal U.S. operation there.
David Rockefeller also knew and associated with former CIA director Richard Helms, as well as Archibald Roosevelt, Jr., a Chase Bank employee and former CIA agent, whose cousin was the CIA agent, Kermit Roosevelt, Jr., involved in the Iran coup of 1953. Also, in 1953, he had befriended William Bundy, a pivotal CIA analyst for nine years in the 1950s, who became the Agency liaison to the National Security Council, and a subsequent lifelong friend. Moreover, David was extensively briefed on covert intelligence operations by himself and other Agency division chiefs, under the direction of David's "friend and confidant", CIA Director Allen Dulles. Awangate smacks of the CIA’s well-known MO—contract out the most precarious espionage work to foreign intelligence agencies (e.g. ISI) so that the C.I.A. possesses plausible deniability should the op be exposed. Gates was recruited by the Central Intelligence Agency and joined in 1966 George Shultz said that, while Secretary of State, he felt the CIA under Gates was trying to "manipulate" him, that the agency was "a big powerful machine not under good control. I distrust what comes out of it."(edited)
I never heard a suggestion from the CIA … that numerous Soviets recognized a growing systemic economic problem Gates was taking an active role in directing CIA intelligence analysis during the Reagan administration Before the Intelligence Reform and Terrorism Prevention Act, the CIA Director concurrently served as the head of the Intelligence Community; today, the CIA is organized under the Director of National Intelligence (DNI).
Despite transferring some of its powers to the DNI, the CIA has grown in size as a result of the September 11 attacks. In 2013, The Washington Post reported that in fiscal year 2010, the CIA had the largest budget of all IC agencies, exceeding previous estimates
The CIA has increasingly expanded its role, including covert paramilitary operations
One of its largest divisions, the Information Operations Center (IOC), has shifted focus from counter-terrorism to offensive cyber-operations y its primary purpose is to collect, analyze, evaluate, and disseminate foreign intelligence, and to perform covert actions
The CIA has an executive office and five major directorates:

The Directorate of Digital Innovation
The Directorate of Analysis
The Directorate of Operations
The Directorate of Support
The Directorate of Science and Technology
The Director of the Central Intelligence Agency (D/CIA) reports directly to the Director of National Intelligence (DNI)
n practice, the CIA director interfaces with the DNI, Congress, and the White House, while the Deputy Director is the internal executive of the CIA.
The Associate Director of military affairs, a senior military officer, manages the relationship between the CIA and the Unified Combatant Commands, who produce and deliver to the CIA regional/operational intelligence and consume national intelligence produced by the CIA
The CIA established its first training facility, the Office of Training and Education, in 1950. Following the end of the Cold War, the CIA's training budget was slashed, which had a negative effect on employee retention
In response, Director of Central Intelligence George Tenet established CIA University in 2002
For later stage training of student operations officers, there is at least one classified training area at Camp Peary, near Williamsburg, Virginia.
Details of the overall United States intelligence budget are classified
Under the Central Intelligence Agency Act of 1949, the Director of Central Intelligence is the only federal government employee who can spend "un-vouchered" government money.
Polygraphing
Robert Baer, a CNN analyst and former CIA operative, stated that normally a CIA employee undergoes a polygraph examination every three to four years.
http://www.pch24.pl/images/min_mid_big/mid_11006.jpg

The CIA acts as the primary US HUMINT and general analytic agency, under the Director of National Intelligence, who directs or coordinates the 16 member organizations of the United States Intelligence Community.
CIA employees form part of the National Reconnaissance Office (NRO) workforce, originally created as a joint office of the CIA and US Air Force to operate the spy satellites of the US military.

The Special Collections Service is a joint CIA and National Security Agency (NSA) office that conducts clandestine electronic surveillance in embassies and hostile territory throughout the world.
The role and functions of the CIA are roughly equivalent to those of the United Kingdom's Secret Intelligence Service (the SIS or MI6), the Australian Secret Intelligence Service (ASIS), the French foreign intelligence service Direction Générale de la Sécurité Extérieure (DGSE), the Russian Foreign Intelligence Service (Sluzhba Vneshney Razvedki) (SVR), the Chinese Ministry of State Security (MSS), the Indian Research and Analysis Wing (RAW), the Pakistani Inter-Services Intelligence (ISI), the Egyptian General Intelligence Service, and Israel's Mossad. While the preceding agencies both collect and analyze information, some like the U.S. State Department's Bureau of Intelligence and Research are purely analytical agencies Previously, the marking of NOFORN (i.e., No Foreign Nationals) required the originator to specify which, if any, non-U.S. countries could receive the information. A new handling caveat, USA/AUS/CAN/GBR/NZL Five Eyes, used primarily on intelligence messages, gives an easier way to indicate that the material can be shared with Australia, Canada, United Kingdom, and New Zealand.
Ireland's Directorate of Military Intelligence liaises with the CIA, although it is not a member of the Five Eyes
"The Central Intelligence Agency was created on July 26, 1947, when Harry S. Truman signed the National Security Act into law. A major impetus for the creation of the CIA was the unforeseen attack on Pearl Harbor. In addition, towards the end of World War II the U.S. government felt the need for a group to coordinate intelligence efforts."(edited)
It's interesting to note that it was 22 days after reported Roswell Crash whereas Pearl Harbor was some 7 months before
The first public mention of the "Central Intelligence Agency" appeared on a command-restructuring proposal presented by Jim Forrestal and Arthur Radford to the U.S. Senate Military Affairs Committee at the end of 1945
Truman established the National Intelligence Authority in January 1946, which was the direct predecessor of the CIA. Its operational extension was known as the Central Intelligence Group (CIG)(edited)
Lawrence Houston, head counsel of the SSU, CIG, and, later CIA, was principal draftsman of the National Security Act of 1947,
which dissolved the NIA and the CIG, and established both the National Security Council and the Central Intelligence Agency.
Houston helped to draft the Central Intelligence Agency Act (Public law 81-110), which authorized the agency to use confidential fiscal and administrative procedures, and exempted it from most limitations on the use of Federal funds. It also exempted the CIA from having to disclose its "organization, functions, officials, titles, salaries, or numbers of personnel employed." It created the program "PL-110" to handle defectors and other "essential aliens" who fell outside normal immigration procedures.(edited)
areas of responsibility for the CIA were covert action and covert intelligence. One of the main targets for intelligence gathering was the Soviet Union, which had also been a priority of the CIA's predecessors
the Office of Policy Coordination was created inside the new CIA. The OPC was quite unique; Frank Wisner, the head of the OPC, answered not to the CIA Director, but to the secretaries of defense, state, and the NSC, and the OPC's actions were a secret even from the head of the CIA. Most CIA stations had two station chiefs, one working for the OSO, and one working for the OPC
the CIA was successful in influencing the 1948 Italian election in favor of the Christian Democrats
The $200 million Exchange Stabilization Fund, earmarked for the reconstruction of Europe, was used to pay wealthy Americans of Italian heritage. Cash was then distributed to Catholic Action, the Vatican's political arm, and directly to Italian politicians. This tactic of using its large fund to purchase elections was frequently repeated in the subsequent years
Allen Dulles continued to praise the CIA's Korean force, despite knowing that they were under enemy control.
CIA funds being used to set up a global heroin empire in Burma's Golden Triangle following a betrayal by another double agent.
49-1:00 https://www.youtube.com/watch?v=IT4XA18cj3I
YouTube
Eccentric
The C.I.A. Busted For Dealing Drugs To Americans
On August 19, a CIA paid mob led by Ayatollah Ruhollah Khomeini would spark what a US embassy officer called "an almost spontaneous revolution"
14:39-1450 https://www.youtube.com/watch?v=ArW8BGv1RyM
YouTube
Payam TvNetwork
Face to Face with the Ayatollah imam khomeini interview CBS News


The end result would be a 60/40 oil profit split in favor of Iran (possibly similar to agreements with Saudi Arabia and Venezuela)
a plan to overthrow Guatemalan President Jacobo Arbenz. The plan was exposed in major newspapers before it happened after a CIA agent left plans for the coup in his Guatemala City hotel room
The Guatemalan Revolution of 1944-54 overthrew the U.S. backed dictator Jorge Ubico and brought a democratically elected government to power. The government began an ambitious agrarian reform program attempting to grant land to millions of landless peasants. This program threatened the land holdings of the United Fruit Company, who lobbied for a coup by portraying these reforms as communist.
On June 25, a CIA plane bombed Guatemala City, destroying the government's main oil reserves. Árbenz ordered the army to distribute weapons to local peasants and workers.
triggering the brutal Guatemalan Civil War in which some 200,000 people were killed, mostly by the U.S.-backed military
http://img13.deviantart.net/f3f8/i/2010/282/6/3/fruit_killer_executed__by_shothevipa-d30f3cn.png

Foster Dulles, the Secretary of State, and brother of DI Allen Dulles, made a public statement calling for a revolt against communist despotism under Sukarno.
The CIA delivered a quarter of a million dollars to Joseph Mobutu, their favored Congolese political figure. Mobutu delivered Lumumba to the Belgians, the former colonial masters of Congo, who executed him in short order
The CIA's Special group had decided to arm Dominicans in hopes of an assassination.
On December 11, 1959, a memo reached the DI's desk recommending Castro's "elimination". Dulles replaced the word "elimination" with "removal", and set the wheels in motion. By mid-August 1960, Dick Bissell would seek, with the blessing of the CIA, to hire the Mafia to assassinate Castro
The CIA was involved in anti-Communist activities in Burma, Guatemala, and Laos.
During the period of U.S. combat involvement in the Vietnam War, there was considerable argument about progress among the Department of Defense under Robert McNamara, the CIA, and, to some extent, the intelligence staff of Military Assistance Command Vietnam
In 1971, the NSA and CIA were engaged in domestic spying.
Kissinger had been running the CIA since the beginning of Nixon's presidency, but Nixon impressed on Schlesinger that he must appear to congress to be in charge, averting their suspicion of Kissinger's involvement.
Before Helms would leave office, he would destroy every tape he had secretly made of meetings in his office, and many of the papers on Project MKUltra
linking the CIA to the assassination of foreign leaders, the illegal surveillance of some 7,000 U.S. citizens involved in the antiwar movement (Operation CHAOS), the CIA had also experimented on U.S. and Canadian citizens without their knowledge, secretly giving them LSD (among other things) and observing the results
This prompted Congress to create the Church Committee in the Senate, and the Pike Committee in the House. President Gerald Ford created the Rockefeller Commission,
Communication and coordination between the CIA and the DOD would suffer greatly under Defense Secretary Donald Rumsfeld.
William J. Casey, a member of Ford's Intelligence Advisory Board, would press Bush to allow a team from outside the CIA to produce Soviet military estimates as a "Team B". Bush gave the OK. The "B" team was composed of hawks.
The CIA seized the opportunity to arm and finance Chad's Prime Minister, Hissène Habré after he created a breakaway government in Western Sudan, even giving him Stinger missiles.
In Afghanistan, the CIA funneled $40 billion worth of weapons
https://upload.wikimedia.org/wikipedia/commons/6/6d/Afghan_captured_weapons.jpg

During the Iran-Iraq war, the CIA had backed both side
Agency files show that it is believed Osama Bin Laden was funding the Afghan rebels against the USSR in the 1980s ZeroCovertWar - Last Sunday at 1:01 AM
While the CIA insists that those who conducted the attacks on 9/11 were not aware that the agency was operating at 7 World Trade Center under the guise of another (unidentified) federal agency, this center was the headquarters for many notable criminal terrorism investigations
http://www.crystalinks.com/911collage.jpg

pre-9/11 the agency received approximately 500 to 600 applications a week, in the months following 9/11 the agency received that number daily
During a meeting at Camp David George W. Bush agreed to adopt a plan proposed by CIA director George Tenet. This plan consisted of conducting a covert war in which CIA paramilitary officers would cooperate with anti-Taliban guerillas inside Afghanistan.
The new strategy was called the "Worldwide Attack Matrix".
The agency attracted widespread criticism after it used a doctor in Pakistan to set up a vaccination program in Abbottabad in 2011 to obtain DNA samples from the occupants of a compound where it was suspected bin Laden was living.
http://truedemocracyparty.net/wp-content/uploads/Vaccines-BHP-copyneedles.jpg
CIA involvement in Contra cocaine trafficking in Nicaragua
and complicity in the actions of the death squads in El Salvador and Honduras also came to light.
Repercussions from the Iran-Contra affair arms smuggling scandal included the creation of the Intelligence Authorization Act in 1991. It defined covert operations as secret missions in geopolitical areas where the U.S. is neither openly nor apparently engaged. This also required an authorizing chain of command, including an official, presidential finding report and the informing of the House and Senate Intelligence Committees, which, in emergencies, requires only "timely notification."
CIA operatives and U.S. special operations troops have trained and armed nearly 10,000 rebel fighters at a cost of $1 billion a yea
President Donald Trump, who authorized CIA drone strikes on suspected terrorists
"We're looking at YouTube, which carries some unique and honest-to-goodness intelligence," said Doug Naquin, director of the DNI Open Source Center (OSC) at CIA headquarters. "We're looking at chat rooms and things that didn't exist five years ago, and trying to stay ahead."
aiding and abetting terrorist organisations
using torture, funding and training of groups and organizations that would later participate in killing of civilians and other non-combatants and would try or succeed in overthrowing democratically elected governments, human experimentation, and targeted killings and assassinations. The CIA has also been accused of a lack of financial and whistleblower controls which has led to waste and fraud.
Six members of Congress have claimed that Director of the CIA Leon Panetta admitted that over a period of several years since 2001 the CIA deceived Congress, including affirmatively lying to Congress.
The House is expected to support the 2010 Intelligence Authorization Bill including a provision that would require the President to inform more than 40 members of Congress about covert operations. The Obama administration threatened to veto the final version of a bill that included such a provision
On July 16, 2008, the fiscal 2009 Intelligence Authorization Bill was approved by House majority containing stipulations that 75% of money sought for covert actions would be held until all members of the House Intelligence panel were briefed on sensitive covert actions. Under the George W. Bush administration, senior advisers to the President issued a statement indicating that if a bill containing this provision reached the President, they would recommend that he veto the bill
Brennan didn't apologize for spying or doing anything wrong at all, even though his agency had been improperly accessing computers of the Senate Select Intelligence Committee (SSCI) and then, in the words of investigative reporter Dan Froomkin, "speaking a lie".
In March 2017, WikiLeaks has published more than 8,000 documents on the CIA. The confidential documents, codenamed Vault 7 and dated from 2013–2016, include details on CIA's software capabilities, such as the ability to compromise cars, smart TVs, web browsers (including Google Chrome, Microsoft Edge, Mozilla Firefox, and Opera Software ASA
and the operating systems of most smartphones (including Apple's iOS and Google's Android), as well as other operating systems such as Microsoft Windows, macOS, and Linux.
In a 2017 speech addressing CSIS, CIA Director Mike Pompeo referred to Wikileaks as "a non-state hostile intelligence service often abetted by state actors like Russia". He also said: “To give them the space to crush us with misappropriated secrets is a perversion of what our great Constitution stands for. It ends now.
The CIA director spoke in a wide-ranging conversation at the Aspen Security Forum, an annual gathering of intelligence and national security officials and experts in Aspen, Colorado.
Trump Ends CIA Arms Support For Anti-Assad Syria Rebels
President Trump outrageously likened intelligence professionals to Nazis and regularly describes intelligence estimates of the Russian threat as “fake news” or a “witch hunt.”
the CIA is a terrorist organization, funded by the profits of international drug smuggling.(edited)
and JFK's Assassination
ZeroCovertWar - Last Sunday at 2:00 AM
The mob and Mossad have cut a deal with Wall Street and the CIA to run the world as a global plantation for the benefit of the global plutocracy.
How mental patients in Montreal were subjected to CIA-sponsored brainwashing, including the use of LSD and PCP
https://mentalhealthcop.files.wordpress.com/2012/12/forensic-psychiatry.jpg

It is the covert action arm of the President's foreign policy advisers. In that capacity it overthrows or supports foreign governments while reporting "intelligence" justifying those activities. It shapes its intelligence
the CIA's assassination program in Vietnam.
William E. Colby on July 19, 1971, before Senate Subcommittee testified that CIA's Operation Phoenix had killed 21,587 Vietnamese citizens between January 1968 and May 1971.
In 2005 it began to become widely known (to the public) that the CIA routinely practices torture (or rather, outsources this to Syria, Egypt and other countries) and routinely abducts people and flies them around the world to be interrogated in torture centers.
This covers allot http://www.serendipity.li/cia.html
But the key to understanding this system is that these ARE NOT U.S. corporations. Not anymore! They are multinational corporations, on a welfare dole from the U.S. taxpayers, producing MX missiles which are put in holes in the ground, which can never be used, and producing Tomahawk missiles and everything that we're pouring into the desert at a million dollars a shot ...
No more than a handful of men in the world understood completely what Centac was and what it did. Though Centac was controlled from a position within the Drug Enforcement Administration, its operations and power reached far beyond that agency.
But the CIA defied the DEA and they shipped this pure cocaine into the United States in 1990, and they have since acknowledged that they defied the laws of this government and allowed the drugs to be sold on the streets of the United States of America. I challenge anybody to tell me that it did not happen, because it is documented.
CIA created the term "conspiracy theory" with a proviso of how to debunk poeple getting into their operation in 1967 http://img3.rnkr-static.com/list_img_v2/19718/1959718/full/19-conspiracy-theories-that-turned-out-to-be-true-u1.jpg

Central Intelligence Agency

Never have so many done so much that was so bad to so many others for so little discernible benefit to so few.
Toward the end of the war, General William Donovan began floating a proposal to create a super-powerful centralized agency answerable only to the president, which would coordinate intelligence gathering, determine national security objectives and execute "subversive operations" to accomplish said objectives.
The assassination of John F. Kennedy.
Running drugs for profit into U.S. inner cities in order to fund covert operations abroad.
Covering up the reality of UFOs (extra-terrestrial or otherwise).
Leaking selected details of Watergate in order to depose Richard Nixon.
Assassinating Robert F. Kennedy.
Assassinating Martin Luther King.
Assassinating U.S. Commerce Secretary Ron Brown.
Assassinating Malcolm X.
Directors of Central Intelligence (DCI)

Rear Adm. Sidney W. Souers
Lt. Gen. Hoyt S. Vandenberg
Rear Adm. Roscoe Hillenkoetter
Gen. Walter Bedell Smith
Allen Dulles
John McCone
Vice Adm. William Raborn, Jr.
Richard Helms
James R. Schlesinger
William Colby
George HW Bush
Adm. Stansfield Turner
William Casey
William Webster
Robert Gates
R. James Woolsey
John Deutch
George Tenet
Mike Pompeo
Among the executives who lent their cooperation to the Agency were Williarn Paley of the Columbia Broadcasting System, Henry Luce of Tirne Inc., Arthur Hays Sulzberger of the New York Times, Barry Bingham Sr. of the LouisviIle Courier‑Journal, and James Copley of the Copley News Service. Other organizations which cooperated with the CIA include the American Broadcasting Company, the National Broadcasting Company, the Associated Press, United Press International, Reuters, Hearst Newspapers, Scripps‑Howard, Newsweek magazine, the Mutual Broadcasting System, the Miami Herald and the old Saturday Evening Post and New York Herald‑Tribune.

By far the most valuable of these associations, according to CIA officials, have been with the New York Times, CBS and Time Inc.
The CIA even ran a formal training program in the 1950s to teach its agents to be journalists. Intelligence officers were “taught to make noises like reporters,” explained a high CIA official, and were then placed in major news organizations with help from management. “These were the guys who went through the ranks and were told ‘You’re going to he a journalist,’” the CIA official said. Relatively few of the 400‑some relationships described in Agency files followed that pattern, however; most involved persons who were already bona fide journalists when they began undertaking tasks for the Agency.
THE CIA’S USE OF JOURNALISTS CONTINUED VIRTUALLY unabated until 1973 then the Trilateral Commission took over
http://www.zerohedge.com/sites/default/files/images/user51698/imageroot/2016/05/04/20160504_media_0.PNG

ZeroMrWorld - Last Sunday at 11:47 AM
Napolitano: He was arrested for some financial crime – that’s the tip of the iceberg. The real allegation against him is that he had access to the emails of every member of Congress and he sold what he found in there. What did he sell, and to whom did he sell it? That’s what the FBI wants to know. This may be a very, very serious national security situation
(Source: Judge Napolitano: Awans Had Access To Email Of Every Member Of Congress, Sold Information)
Everything speaks to Rep. Wasserman Schultz being a stone-cold MOSSAD agent. If she’s not a card-carrying agent, then certainly she is an exceedingly loyal sayanim. To date she has shown an unusual recklessness and willingness to do whatever she must to protect this black op. Never before have the American people been treated to a crime committed by a member of Congress in real time. And her command and control of the MSM only confirms the political power that she possesses which is rarely, if ever, seen
ZeroMrWorld - Last Sunday at 12:05 PM
stateofthenation2012.com/wp-content/uploads/2017/08/DF5y_GvVoAAYf-N.jpg
ZeroTerroristFunding - Last Sunday at 1:58 PM
According to CIA reports, an eyewitness told investigators that an object "resembling a huge flying pan" landed in a forest clearing in the Soviet zone of Germany in 1952. The eyewitness said once he was closer to the area where it landed, he saw two men dressed in shiny metallic clothing. The men were stooped over looking at a large object but were spooked by the eyewitness. The mysterious men jumped into the large flying pan object and it spun out into the sky.

"The whole object then began to rise slowly from the ground and rotate like a top," the eyewitness told the CIA.(edited)
ZeroTerroristFunding - Last Sunday at 2:03 PM
Limit CIA Role To Intelligence letter 21 December 1963 Harry S. Truman A letter just after the assassination of JFK which was published once and then vanished down the memory hole.
Harry S. Truman “For some time I have been disturbed by the way the CIA has been diverted from its original assignment. It has become an operational and at times a policy-making arm of the government.... I never had any thought that when I set up the CIA that it would be injected into peacetime cloak and dagger operations.”
Operation Mockingbird “there is quite an incredible spread of relationships. You don't need to manipulate Time Magazine, for example, because there are [Central Intelligence] Agency people at the management level.”
They conducted the following air strikes/naval attacks:
- The CIA released a whooping cough virus on Tampa Bay using boats, and so caused a whooping cough epidemic. 12 people died.
- The Navy sprayed San Francisco with bacterial pathogens and in consequence many citizens developed pneumonia.
- Upon Savannah, GA and Avon Park, FL, the army released millions of mosquitoes in the hopes they would spread yellow fever and dengue fever. The swarm left Americans struggling with fevers, typhoid, respiratory problems, and the worst, stillborn children.
http://yvpc.sph.umich.edu/wp-content/uploads/2012/11/virus.jpg

ZeroDeath - Last Sunday at 5:45 PM
“ISIS is funded by the CIA’s heroin trafficking in Afghanistan. There is none of this money that is going to al-Qaeda, it is all lies by the Zionist press” he acknowledged. “Saudi Arabia is also hand in hand with the US, Israel and ISIS, which it buy’s its oil from at ridiculous prices” he continued.
ZeroDeath - Last Sunday at 6:21 PM
http://www.stateofthenation2012.com/wp-content/uploads/2017/08/DF5y_GvVoAAYf-N.jpg(edited)

ZeroISIS - Last Sunday at 9:27 PM
CIA gets the Lions share of the green- 1/3 of the NIP budget
CENTRAL INTELLIGENCE AGENCY
$14.7 billion ZeroChineseWar - Last Tuesday at 6:25 PM
"However, we believe that much of the
analysis that is conducted at NSA today is more properly done under
the auspices of an all-source collection agency such as Defense
Intelligence Agency (DIA) and Central Intelligence Agency (CIA)"
ZeroMrWorld - Last Tuesday at 6:47 PM
http://freepressxpress.files.wordpress.com/2017/07/screen-shot-2017-07-26-at-8-57-09-pm.png?w=269&h=300
CIA/NSA joint Special Collection Service (a highly classified intelligence team) inserts eavesdropping devices
Defense Intelligence Agency (DIA) and the Central Intelligence Agency (CIA), both of which specialize primarily in human espionage Palantir, the CIA-backed startup, is Minority Report come true. It is all-powerful, yet no one knows it even exists. Palantir does not have an office, it has a “SCIF” on a back street in Palo Alto, California. SCIF stands for “sensitive compartmentalised information facility”. Palantir says its building “must be built to be resistant to attempts to access the information within. The network must be ‘airgapped’ from the public internet to prevent information leakage.” ZeroStateRoom - Yesterday at 4:04 PM
CIA cryptogram cheatsheet https://en.wikipedia.org/wiki/CIA_cryptonym
CIA cryptonym
CIA cryptonyms are code names or code words used by the U.S. Central Intelligence Agency (CIA) to refer to projects, operations, persons, agencies, etc.
widespread involvement of CIA and NSA personnel in drugs and human smuggling
ZeroDeath - Last Sunday at 4:25 PM
Everything speaks to Rep. Wasserman Schultz being a stone-cold MOSSAD agent. If she’s not a card-carrying agent, then certainly she is an exceedingly loyal sayanim. To date she has shown an unusual recklessness and willingness to do whatever she must to protect this black op. Never before have the American people been treated to a crime committed by a member of Congress in real time. And her command and control of the MSM only confirms the political power that she possesses which is rarely, if ever, seen
However, "It is not known whether U.S. authorities thought the warning to be credible, or whether it contained enough details to allow counter-terrorism teams to come up with a response." A month later, terrorists struck at the World Trade Center and the Pentagon in the largest terrorist attack in history.
Mossad [Hebrew for �institute�]
sayanim, volunteer Jewish helpers.(edited)
"After the bombing of Libya, our friend Qadhafi is sure to stay out of the picture for some time. Iraq and Saddam Hussein are the next target. We're starting now to build him up as the big villain. It will take some time, but in the end, there's no doubt it'll work."

"But isn't Saddam regarded as moderate toward us, allied with Jordan, the big enemy of Iran and Syria?"
http://www.freakingnews.com/pictures/5500/Saddam-Hussein-5778.jpg

The Mossad leaders knew that if they could make Saddam appear bad enough and a threat to the Gulf oil supply, of which he'd been the protector up to that point, then the United States and its allies would not let him get away with anything, but would take measures that would all but eliminate his army and his weapons potential, especially if they were led to believe that this might just be their last chance before he went nuclear.
“The Mossad chairman explicitly pointed out that the agreement that is being reached with Iran is bad, and may lead to a regional arms race.”
Mossad's assassins routinely witness some of Israel's leading forensic pathologists at work so as to better understand how to make an assassination look like an accident.
Mossad also is charged with inciting disturbances calculated to create mutual distrust among the Arabs and to draw Western sympathy away from the Arab cause, and monitoring and counteracting Arab propaganda and detecting and countering Arab terrorism.
ZeroDeath - Last Sunday at 5:01 PM
Mossad policy directors have co-opted Facebook policy and created anti-semtic groups to stage crack down on anti-Israeli agenda
http://www.renegadetribune.com/wp-content/uploads/2016/01/o-UK-ANTISEMITISM-facebook.jpg

Israeli intelligence services went into action. A detailed process that is too long to elaborate here, hatched a plan. In the third week of February 1993, a truck bomb exploded in the basement of the World Trade Center building. Muslims used as scapegoats took the blame for it, while the real culprits were safely back in Israel. Thus world opinion and pressure was shifted away from Israel.
http://cdn.findhomeremedy.com/wp-content/uploads/2011/07/Premature-Ejaculation2.jpg

Egyptair 990 (MSR990).....1999 Israel planted a bomb in the aircraft tail (unconfirmed). the plane dived 60 miles south of Nantucket Island, Massachusetts, in international waters, killing all 217 people on board. Included in the passenger manifest were over 30 Egyptian military officers; among them were two brigadier-generals, a colonel, major, and four other air force officers. Transatlantic commercial air traffic travels via a system of routes called North Atlantic Tracks, and Flight 990 was the only aircraft at the time assigned to fly North Atlantic Track Zulu. There are also a number of military operations areas over the Atlantic, called "Warning Areas," which are also monitored by New York Center, but records show that these were inactive the night of the accident. Air Traffic Controller Peter Zalewski was responsible for both New York Tower crashes and also was controller for Egypt 990 crash in 1999
Madrid Train ... 2002 Mossad killed 198 in the Madrid bomb blast. Al Queda was blamed.

2004 Mossad bombed two airliners over Russia. Israel claimed it was Al Qaeda.
This information is said to have originated from 1.7 million pages of top-secret documents recently released by National Security Agency whistleblower Edward Snowden and made public by Iranian intelligence. Arabic Internet radio website “Ajyal.com” and the Arabic news website “Egy-press” were also early sources before the news went viral. Although it cannot be conclusively verified at this point, evidence points in that direction.
http://media2.s-nbcnews.com/j/newscms/2014_33/615191/140813-today-snowden-wired-cover_2ee4594674a6885780391939b447f6bd.nbcnews-fp-1200-800.jpg

Al-Qaeda Leader Reveals ISIS Chief Is “Mossad Agent In Disguise”
“Al-Qaeda is the only terrorist organization that truly encompasses the values of Islam […] ISIS are brainwashed mercenaries […] they are funded by the Zionists in Washington and Tel Aviv” he said.
“ISIS is funded by the CIA’s heroin trafficking in Afghanistan. There is none of this money that is going to al-Qaeda, it is all lies by the Zionist press” he acknowledged. “Saudi Arabia is also hand in hand with the US, Israel and ISIS, which it buy’s its oil from at ridiculous prices” he continued.
The al-Qaeda leader also claims that ISIS Caliph, Abu Bakr al-Baghdadi, is none other than a Mossad agent.

“Abu Bakr al-Baghdadi is a Zionist pig” he explained. “We know his background, he has been in the Mossad for over 18 years” he acknowledged. “He is subverting Islam to destroy Islam in the hearts of Muslims” he pleaded. “Muslims must not be fooled by this Zionist project to take control of the resources of the Middle East. We must not let these traitors take over the region or true Islam will disappear and we will become soulless slaves of the Zionist leaders of this world” he pleaded.
Dubai Assassination Was Work of Mossad and Likely Sanctioned by Prime Minister Says Former Intel Officer
After Noriega was taken into custody and tried on drug charges in a widely-publicized trial in Miami, The SPOTLIGHT was the only publication anywhere to reveal that Noriega's defense attorney, Frank Rubino, tried to introduce evidence that Noriega's activities were conducted under joint CIA and Mossad sponsorship. The information was suppressed for reasons of "national security."
http://401f867be03107e6cff9-8cf7b64f1279feaa8c06a2730f278ca7.r95.cf1.rackcdn.com/wp-content/uploads/2010/08/Medellin-Cartel.jpg?84ac17

ZeroDeath - Last Sunday at 6:24 PM
The Mossad’s propaganda focuses on “espionage” ignoring the terrorist work of the organization.
http://smoloko.com/wp-content/uploads/MossadFranceFalseFlagALIVEmeme.jpg

Mossad was behind the Paris Terririst attacks ZeroMrWorld - Last Wednesday at 1:15 PM
X CIA also disclose that Mossad is sexually and otherwise staging blackmail for Congressional controlbefore the Intelligence Reform and Terrorism Prevention Act, the CIA Director concurrently served as the head of the Intelligence Community; today, the CIA is organized under the Director of National Intelligence (DNI).
The CIA acts as the primary US HUMINT and general analytic agency, under the Director of National Intelligence, who directs or coordinates the 16 member organizations of the United States Intelligence Community. ZeroISIS - Last Sunday at 6:34 PM
Direct and oversee the National Intelligence Program(edited)
On July 20, 2010, President Obama nominated retired Lt. (three-star) Gen. James R. Clapper
Senators Dianne Feinstein, Jay Rockefeller and Bob Graham introduced S. 2645 on June 19, 2002, to create the Director of National Intelligence position
DNI position as the designated leader of the United States Intelligence Community
n addition, the law required the CIA Director to "report" his agency's activities to the DNI.
https://weeblr.com/images/products/sh404sef/2015-10-14/medium/joomla-404-error-page.png

Declan McCullagh at News.com wrote on August 24, 2007, that the DNI site was configured to repel all search engines to index any page at DNI.gov.
The Intelligence Reform and Terrorism Prevention Act of 2004 established the Office of the Director of National Intelligence (ODNI) as an independent agency to assist the DNI
$62.8 billion for fiscal year 2014. The ODNI has about 1,750 employees
ZeroISIS - Last Sunday at 7:05 PM
The ODNI is divided into core, enabling, and oversight offices. The Principal Duty Director (PDDNI) to the DNI, in a role similar to that of a Chief Operating Officer, oversees operation of ODNI offices, manages Intelligence Community (IC) coordination and information sharing, reinforces the DNI's intelligence-integration initiatives, and focuses on IC resource challenges
The core mission functions of the ODNI are organized under the Deputy DNI for Intelligence Integration (DDNI/II). The DDNI/II facilitates information sharing and collaboration through the integration of analysis and collection, and leads execution of core mission functions. These include:

Integration Management Council
National Intelligence Council
Mission Integration Division
National Counterterrorism Center
National Counterproliferation Center
Office of the National Counterintelligence Executive
Dan Coats March 16, 2017 – present
The line of succession for the Director of National Intelligence is as follows:

Principal Deputy Director of National Intelligence
Deputy Director of National Intelligence for Intelligence Integration
Director of the National Counterterrorism Center
National Counterintelligence Executive
Inspector General of the Intelligence Community
Mark Ewing November 2010 – present Barack Obama, Donald Trump Director of the Intelligence Staff/Chief Management Officer
Charles McCullough November 2011 – present Barack Obama, Donald Trump Intelligence Community Inspector General(edited)
Dawn Eilenberger April 2017 – present Donald Trump
Deputy Directors of National Intelligence
Assistant Deputy Directors of National Intelligence Deborah Kircher ADNI for Human Capital October 2011 – present Barack Obama
Al Tarasiuk Intelligence Community Chief Information Officer February 2011 – present Barack Obama
Marilyn A. Vacca Chief Financial Officer April 2009 – present Barack Obama
L. Roger Mason, Jr. ADNI for Systems and Resource Analyses May 2009 – present Barack Obama
Dawn Meyerriecks ADNI for Acquisition, Technology and Facilities ??? – present
Andrew Hallman Assistant Deputy Director for Intelligence Integration September 2010 – present Barack Obama, Donald Trump
Clapper became director of the Defense Intelligence Agency in November 1991 and retired from active duty in September 1995
He then spent six years in private industry. From 2001 to June 2006 he was director of the National Geospatial-Intelligence Agency as member of the Defense Intelligence Senior Executive Service
Senator Rand Paul said "The director of national intelligence, in March, did directly lie to Congress, which is against the law." Paul later suggested that Clapper might deserve prison time for his testimony.
ZeroISIS - Last Sunday at 8:14 PM
As the director of national intelligence, Coats leads the vast U.S. intelligence community, which includes the FBI. But that does not mean he has full visibility into the FBI probe.
Created in the wake of the September 11 terrorist attacks, the Director of National Intelligence (DNI) serves as the top intelligence official in the United States government. The DNI oversees what is known as the Intelligence Community, which consists of more than a dozen civilian and military agencies that collect information on threats against the United States. The 16 agencies include Air Force Intelligence, Army Intelligence, Central Intelligence Agency, Coast Guard Intelligence, Defense Intelligence Agency, Department of Energy, Department of Homeland Security, Department of State, Department of the Treasury, Drug Enforcement Administration, Federal Bureau of Investigation, Marine Corps Intelligence, National Geospatial-Intelligence Agency, National Reconnaissance Office, National Security Agency, and Navy Intelligence.
Coats' selection also coincides with reports that the Trump transition is considering ways to limit the power of the director of national intelligence, which some advisers to the President-elect believe gets in the way of the 16 intelligence agencies it represents.
Mike Morell, who was acting CIA director in 2012 and 2013, called Clapper "the best DNI the country has had.”
Director Of National Intelligence: My Fingerprints Were All Over Iraq WMD Report
Behind Russia Hacking Bullshit without hard evidence
THE CHAIRMAN OF THE BOARD OF GOVERNORS OF THE

FEDERAL RESERVE SYSTEM is over

THE DIRECTOR OF NATIONAL INTELLIGENCE
https://estelleryanblog.files.wordpress.com/2013/08/shrug.jpg

http://4.bp.blogspot.com/-O7B8wtrFkSc/UWb-RB1a64I/AAAAAAAAAHA/B5o7FFMd1Xg/s1600/Food-Casino-capitalism-pyramid-scheme.jpg

ZeroISIS - Last Sunday at 9:01 PM
Why Does the United States Have 17 Different Intelligence Agencies?
We have built over thirty building complexes for top-secret intelligence work since 2001—and our security state just keeps growing. ZeroISIS - Last Sunday at 6:35 PM
DNI oversees National Intelligence Program
ZeroISIS - Last Sunday at 7:49 PM
In an agreement between Defense Secretary Robert Gates and Clapper his office assumed administrative control over the National Intelligence Program
ZeroISIS - Last Sunday at 9:19 PM
2016 53 billion
"Any and all subsidiary information concerning the NIP budget, whether the information concerns particular intelligence agencies or particular intelligence programs, will not be disclosed. Beyond the disclosure of the NIP top-line figure, there will be no other disclosures of currently classified NIP budget information, because such disclosures could harm national security. The only exceptions to the foregoing are for unclassified appropriations, primarily for the Community Management Account."
http://exmagazineonline.com/wp-content/uploads/2012/04/Divorce_Hidden-Assets.jpg

fiSCAL YEAR NIP BUDGET MIP BUDGET TOTAL
2016 53.0 billion 17.7 billion 70.7 billion
CLAPPER: Well, RT is essentially a propaganda mouthpiece for the government, since the predominance of its funding comes from the government and the management is close to Putin.
https://i.ytimg.com/vi/XUrxvPWL8ag/maxresdefault.jpg

Director of National Intelligence James R. Clapper
The American Civil Liberties Union and the New York Civil Liberties Union sued Director of National Intelligence James R. Clapper, NSA Director Keith B. Alexander, Secretary of Defense Chuck Hagel, Attorney General Eric H. Holder, and FBI director Robert S. Mueller III for declaratory and injunctive relief from alleged constitutional rights by the NSA's bulk phone call metadata collection program.

SRA International VP and Dir. Intelligence Programs (1998-2001)
Leading threat actor cyber- Russia to blame everything on, China for eventual war and Iran and North Korea for present war
He was appointed Director of the Defense Intelligence Agency by U.S. President George Bush .
Clapper, the 72-year-old retired Air Force lieutenant general in charge of the nation's intelligence departments, caused a commotion last year when he was caught lying during sworn testimony delivered to the Senate.
In Oct. 2003, DNI Nominee James Clapper Said It Was ‘Unquestionably’ True That Iraq Moved WMD To Syria
Clapper has been “evasive and slow to respond to questions and letters from members of the committee.”
"Does the NSA collect any type of data at all on millions or hundreds of millions of Americans?"

Director Clapper responded "No, sir."
7. The complaint was filed about one week after and based on the disclosure. See ACLU v. Clapper, No. 11–cv–7562, DI 1 (Complaint). Although the “leak” led to this litigation, our decision is not about the Snowden disclosures themselves nor should the significance of our rather complex analysis of the statute be confused with the significance vel non of the security breach or the NSA telephone metadata program.
Trump wiretap
In October 2006 as chief operating officer for the British military intelligence company Detica, now DFI and US-based subsidiary of BAE Systems
ZeroF-x - Last Sunday at 11:01 PM
Centcom ISIS scandal
http://s2.quickmeme.com/img/8a/8a39f1b4b945b4d2dd3a872422b386e483d63f1bbb683ed9a86725aa3e68af73.jpg

Clapper also expressed confidence in the integrity of the election process
CLAPPER: A key player with respect to sanctions is of course China. And so if a military option were to be exercised, then obviously we would play very heavily in that process. But that’s not a decision, fortunately, that the intelligence community makes.
CFR backs him
in Sterling.
(703) 222-8942 - Fairfax - VA ...
Senior Fellow, Belfer Center for Science and International Affairs
Clapper played innocent that they were supporting Al Qaeda
http://www.focandoanoticia.com.br/wp-content/uploads/2015/01/al-qaeda.jpg

Going for Trump's impeachgment
ZeroDNIMasots - Last Sunday at 11:41 PM
Director Gen. James Clapper, he was attempting to deflect criticism of his own incompetence. He was discussing the fact that ISIS, right under his own and the general's noses, gained control of nearly half of the landmass of Iraq.
A Hacker Claimed to Get Access to the Clappers’ Private Emails in 2016
They claimed they made all calls to the Clappers’ home forward to the Free Palestine Movement, an American group that supports Palestinians. A spokesman for Clapper confirmed that he was aware of the hack.
5-16 https://www.youtube.com/watch?v=AGYn7ER5U_0
YouTube
StopProgressivism
James Clapper (DNI) Lies to the Senate About the NSA


"The incident is generally framed in terms of whether Clapper mislead Congress. ... But he couldn’t have mislead members of the intelligence committee because they knew what was going on. The people who were misled were the American public
The White House brushed aside House Speaker Paul Ryan’s (R-Wis.) call to block Loser Clinton from receiving classified intelligence briefings as punishment for the FBI’s probe into her use of a private email server while secretary of State.
Evidence of Russian Meddling in Election 'Overwhelming,' Clapper Says at IOP Clapper put in Cardillo
to run the NGA ZeroDNIMasots - Last Sunday at 11:57 PM
Geospatial intelligence, GEOINT (GEOspatial INTelligence) is intelligence about the human activity on earth derived from the exploitation and analysis of imagery and geospatial information that describes, assesses, and visually depicts physical features and geographically referenced activities on the Earth. GEOINT, as defined in US Code, consists of imagery, imagery intelligence (IMINT) and geospatial information.(edited)
Geospatial intelligence, GEOINT (GEOspatial INTelligence) is intelligence about the human activity on earth derived from the exploitation and analysis of imagery and geospatial information that describes, assesses, and visually depicts physical features and geographically referenced activities on the Earth. GEOINT, as defined in US Code, consists of imagery, imagery intelligence (IMINT) and geospatial information.(edited)
GEOINT reveals how human intent is constrained by the physical landscape and human perceptions of Earth.
GEOINT seeks to anticipate patterns of life through time.
Data and technical systems used by analysts are human creations and reflect human biases. ZeroDNIMasots - Last Monday at 12:00 AM
Generally, geospatial intelligence can be more readily defined as, data, information, and knowledge gathered about entities that can be referenced to a particular location on, above, or below the earth's surface. The intelligence gathering method can include imagery, signals, measurements and signatures, and human sources, i.e., IMINT, SIGINT, MASINT, and HUMINT, as long as a geo-location can be associated with the intelligence.
"anticipating a target's mental map."
http://173.248.170.120/wp-content/uploads/2013/05/GEOINT-Capabilties.jpg
. The activities of foraging and sensemaking in geospatial analysis have been incorporated in the Structured Geospatial Analytic Method.
GEOINT Agencies[edit]
Australia: Defence Imagery and Geospatial Organisation (DIGO)
Canada: Canadian Forces Joint Imagery Centre (CFJIC)
European Union: European Union Satellite Centre (EUSC)
Portugal: Army Geospatial Intelligence Center (CIGeoE)
United Kingdom: Defence Geographic Centre (DGC) and the Defence Geospatial Intelligence Fusion Centre (DGIFC)
USA: National Geospatial-Intelligence Agency (NGA)
US Service Fusion/GEOINT Centers
USA: Army Geospatial Center (AGC)
USA: National Air and Space Intelligence Center (NASIC)
USA: National Ground Intelligence Center (NGIC)
USA: National Maritime Intelligence-Integration Office (NMIO)(edited)
GEOINT Units[edit]
Australian Army: 1st Topographical Survey Squadron (1 TOPO SVY SQN)[14] (Homeland Security: Army Spatial Information Capabilities)
United States Army: United States Army Space and Missile Defense Command - Army Forces Strategic Command - Advanced Geospatial Intelligence (AGI) Node[15]
United States Marine Corps: 1st Topographic Platoon (1st TOPO)[16] (1st Marine Expeditionary Force - Marine Headquarters Group - 1st Intelligence Battalion - Production and Analysis Company)
United States Marine Corps: 2nd Topographic Platoon (2nd TOPO)[17] (2nd Marine Expeditionary Force - Marine Headquarters Group - 2nd Intelligence Battalion - Production and Analysis Company)
United States Marine Corps: 3rd Topographic Platoon (3rd TOPO)[18] (3rd Marine Expeditionary Force - Marine Headquarters Group - 3rd Intelligence Battalion - Production and Analysis Company)
United States Army:
ELINT – electronic intelligence
Bringing together more than 3,500 attendees and 265 exhibiting organizations, USGIF hosted its GEOINT 2016 Symposium for the global GEOINT Community to discuss opportunities and solve challenges.
Past classified briefings focused on GEOINT crowd sourcing, the South China Sea, and the use of GEOINT in the Syrian conflict.
The United States Geospatial Intelligence Foundation (USGIF)
Robert B Murrett funtional manager
BAE Systems is at the forefront of the GEOINT
ZeroDNIMasots - Last Monday at 1:28 AM
Geographic information systems (GIS) play a constantly evolving role in geospatial intelligence (GEOINT) and United States national security. These technologies allow a user to efficiently manage, analyze, and produce geospatial data, to combine GEOINT with other forms of intelligence collection, and to perform highly developed analysis and visual production of geospatial data. Therefore, GIS produces up-to-date and more reliable GEOINT to reduce uncertainty for a decisionmaker. Since GIS programs are Web-enabled, a user can constantly work with a decision maker to solve their GEOINT and national security related problems from anywhere in the world. There are many types of GIS software used in GEOINT and national security, such as Google Earth, ERDAS IMAGINE, GeoNetwork opensource, and Esri ArcGIS.
Some of the sources of collected imagery information for GEOINT are imagery satellites, cameras on airplanes, Unmanned Aerial Vehicles (UAV) and drones, handheld cameras, maps, or GPS coordinates
http://marketingland.com/wp-content/ml-loads/2014/06/shutterstock_119724181-mobile-location.jpg

Recently the NGA and IC have increased the use of commercial satellite imagery for intelligence support, such as the use of the IKONOS, Landsat, or SPOT satellites. These sources produce digital imagery via electro-optical systems, radar, infrared, visible light, multispectral, or hyperspectral imageries
http://wise.ssl.berkeley.edu/gallery_images/infraned.jpg

GIS extracts real world geographic or other information into datasets, maps, metadata, data models, and workflow models within a geodatabase that is used to solve GEOINT-related problems.
GIS is its ability to fuse geospatial data with other forms of intelligence collection, such as signals intelligence (SIGINT), measurement and signature intelligence (MASINT), human intelligence (HUMINT), or open source intelligence (OSINT).
Stewardship: Geospatial intelligence
The DGInet technology allows military and national security intelligence customers to access large multi-terabyte databases through a common Web-based interface. This gives the users the capability to quickly and easily identify, overlay, and fuse georeferenced data from various sources to create maps or support geospatial analysis. Esri designed the technology for inexperienced GIS users of national security intelligence and defense organizations in order to provide a Web-based enterprise solution for publishing, distributing, and exploiting GEOINT data among designated organizations
According to Esri, the DGInet technology "uses thin clients to search massive amounts of geospatial and intelligence data using low-bandwidth Web services for data discovery, dissemination, and horizontal fusion of data and products
Esri Defense Mapping programs that provide quality control, easier and consistent map production, database sharing, and efficient workflow management for each program's specific type of mapping or charting
. The program allows the national security intelligence or defense user to track assets (such as vehicles or personnel), monitor sensors, visualize change over time, play back events, and analyze historical or real-time temporal data.
http://crossvillenews1st.com/wp-content/uploads/2016/10/replay-1.jpg

Military Overlay Editor (MOLE)
MOLE is a set of command components that enables national security intelligence and defense users to easily create, display, and edit U.S. Department of Defense MIL-STD-2525B and the North Atlantic Treaty Organization APP-6A military symbology in a map. This allows for easier and faster identification, understanding, and movement of ally and hostile forces on a map by combining GIS spatial analysis techniques with common military symbols. MOLE provides a clearer visualization of mission planning and goals for the decisionmaker, and allows a user to import, locate, and display order of battle databases.
25-29 https://www.youtube.com/watch?v=1s30jbCi4Ag
YouTube
Luaggz
The City of Copenhagen (Time Lapse)


USGIF has confirmed two GEOINT 2017 keynote speakers. Robert Cardillo, director of the National Geospatial-Intelligence Agency, and Dr. Todd Lowery, acting under secretary of defense for intelligence, will address the audience during the general session. More keynote speakers will be announced in the coming weeks.
USAF’s Perspective towards the Collection and Processing of Geospatial Intelligence
- Latest initiatives being undertaken by the Air Force to exploit GEOINT
- Collaboration with NGA: greatest successes and challenges
- How Air Force utilizes GEOINT to accomplish its unique intelligence goals
John Burkert , Director, Air Force GEOINT Office, USAF (confirmed)
ZeroDNIMasots - Last Monday at 2:03 AM
Applying Technological Innovation to Accomplish NASIC’s Tactical GEOINT Mission
- Accessibility of advanced technology in the commercial sector as a driving force for innovation
- Greatest challenges in keeping intelligence technology at the tactical edge
- Utilizing predictive analytics to understand threats to US air and space operations
Col Sean Larkin, Commander, NASIC
Army Geospatial Center's Activities
- Incorporating open-source data into traditional GEOINT analysis workflows
- Current research activities towards moving geospatial data to disconnected, intermittent and
low- bandwidth environments
- Viewpoint towards the growing role of automation in GEOINT and open sources analysis
Dr. Joseph Fontanella, Director, US Army Geospatial Center
The Role of GEOINT and Open Source for Marine Corps Intelligence at The Tactical Edge
- Open source data & Marine Corps Intelligence, Surveillance, and Reconnaissance Enterprise
- Current technical challenges at the tactical edge
- Update on activities with the Marine Corps GEOINT International Engagement program
Dr. Melissa Burn, OSINT Lead, Marine Corps Intelligence Activity, USMC
Leveraging Web-Based Global M&S Terrain Repositories for Scenario Development
- Ensuring analytic integrity with open-source data
- Challenges with extracting actionable intelligence from open-source data
- The automation challenge: understanding the role of AI & deep learning in getting value from
GEOINT data
Samuel Chambers, M&S Data Services Lead, Environment Architecture Division, Joint
Staff J7
Enhancing Homeland Security through Open Source Intelligence Collection, Analysis and
Sharing
- Challenges with extracting actionable intelligence from open-source data
- How DHS is utilizing an all-source approach to accomplish its GEOINT objectives
- DHS GMO’s near term initiatives towards automating geospatial data analysis
Dave Lilley Jr., Director, Geospatial Management Office, DHS
Enhancing Homeland Security through Open Source Intelligence Collection, Analysis and
Sharing
- Challenges with extracting actionable intelligence from open-source data
- How DHS is utilizing an all-source approach to accomplish its GEOINT objectives
- DHS GMO’s near term initiatives towards automating geospatial data analysis
Dave Lilley Jr., Director, Geospatial Management Office, DHS
Army OSINT and Related Support to GEOINT
- Army G-2’s lessons learned: optimizing OSINT & GEOINT utilization
- Why OSINT is neither free nor an additional duty
- Balancing the risk and uncertainty against the benefits of open source
Patricia Guitard, Deputy CIO, Senior Technical Advisor for OSINT & Office of the Deputy
Chief of Staff, G-2, US Army
Understanding NRO’s Perspective on Commercial GEOINT Activity
- Utilizing commercial space to help inform acquisition of GEOINT data & technology
- Making sense of commercial proposals: what are the current needs?
- Exploiting commercial geospatial assets & incorporating the data into existing workflows
Pete Muend, Commercial GEOINT Activity (CGA) Lead, NRO
Tech Talk: GeoSpark Analytics
John Googlasian, Associate Partner, Geospatial Analytics, GeoSpark Analytics
GEOINT Pathfinder 2 & Lessons Learned
- Understanding NGA’s efforts to fill the skills gap for succeed with/in the open work
- Incorporating openly available information into GEOINT analysis workflows & processes
- Will classified data become supplementary as the quality & analysis of OSINT improves?
- Utilizing automation to decrease processing time for GEOINT and OSINT analysis
Chris Rasmussen, PM, Unclassified GEOINT Pathfinder PM & Public Open Source
Software Development Lead, NGA
Kurt R. Bauer, Deputy Division Chief, GEOINT Intelligence Division (GID),
USSOUTHCOM
Utilizing Open Source Data for Foreign Policy and Diplomacy
- Mapping foreign policy: boundaries, sovereignty, and geographic names
- The role of imagery and mapping in achieving the Nation’s diplomatic objectives
- State Department support for GEOINT activities
Leo Dillon, Chief, Geographic Information Unit, Office of the Geographer and Global
Issues, Bureau of Intelligence and Research, US Department of State
Looking Forward – How GEOINT Will Support DIA’s Future Mission
- Why GEOINT has become an increasingly important part of the all-source mission at DIA
- How sources and data dissemination methods have become more available, numerous & open
- All-source mission benefits from using GEOINT to fuse and bind disparate data sources
- How modernization of foundational intelligence relies on GEOINT to provide decision
advantage, deliver content and make sense of a sensor-driven world
Terry Busch, Chief Data Officer, DIA
Sponsored by Leidos ZeroDNIMasots - Last Monday at 2:15 AM
Leveraging Web-Based Global M&S Terrain Repositories for Scenario Development
- Ensuring analytic integrity with open-source data
- Challenges with extracting actionable intelligence from open-source data
- The automation challenge: understanding the role of AI & deep learning in getting value from
GEOINT data
Samuel Chambers, M&S Data Services Lead, Environment Architecture Division, Joint
Staff J7
ZeroMrWorld - Last Monday at 3:09 PM
Current
Joint Staff
Previous
Joint Warfare Analysis Center, Virginia Tech, Draper Aden Associates
Education
Virginia Polytechnic Institute and State University
samuel.d.chambers2.civ@mail.mil
Suffolk, VA
His DoD experienced has included creating and maintaining Geospatial databases, supporting Enterprise
level Geographic Information Systems (GIS), and managing web services to support Modeling & Simulation for
Training. He currently manages the Joint Staff’s Joint Training Data Services (JTDS) system, which provides Order
of Battle and Terrain Data services to support Joint and Service Training. Mr. Chambers received a Bachelors of
Science in Geology from Elizabeth City State University (Elizabeth City, NC) and a Masters in Geography from
Virginia Tech (Blacksburg, VA), and served in the Marine Corps Reserves (Norfolk, VA).
TGS was fielded in September of 2016 on NIPR with a web-based repository of correlated M&S ready terrain data.
Key TGS capabilities provided include:
1. The ability to view terrain data in an interactive, global 2D/ 3D web map.
2. Leveraging Defense Discovery Metadata Standard (DDMS) 5.0 to define the terrain data in terms of pedigree,
resolution, and limitations.
3. Terrain streaming and dissemination of OGC CDB 1.0 terrain data via OGC Web Service Standard for WMS,
WFS, WCS, and WPS.
4. The user ability to define an area of interest/ playbox by:
a. Downloading the playbox to the user’s local machine in either the OGC CDB 1.0 format or
compiling the database into the proprietary Joint Conflict and Tactical Simulation (JCATS) terrain
format (Figure 3: Defining a playbox in TGS for terrain export to CDB and JCATS). In this figure,
the orange and magenta user defined rectangles represent two examples of terrain areas to be
downloaded.
b. Adding 3D models to the playbox by selecting from an existing repository, or creating a custom 3D
model (Figure 4: Building a 3D Model in TGS)
Terrain Generation Service- they can look at you from any angle
https://c2.staticflickr.com/6/5244/5225949004_5c02607cd5_b.jpg

US Military to leverage Modeling & Simulation software
Joint Warfare Analysis Center The Directorate of Science & Technology was established to research, create, and manage technical collection disciplines and equipment. Many of its innovations were transferred to other intelligence organizations, or, as they became more overt, to the military services.

For example, the development of the U-2 high-altitude reconnaissance aircraft was done in cooperation with the United States Air Force. The U-2's original mission was clandestine imagery intelligence over denied areas such as the Soviet Union. It was subsequently provided with signals intelligence and measurement and signature intelligence capabilities, and is now operated by the Air Force.

Imagery intelligence collected by the U-2 and reconnaissance satellites was analyzed by a DS&T organization called the National Photointerpretation Center (NPIC), which had analysts from both the CIA and the military services. Subsequently, NPIC was transferred to the National Geospatial-Intelligence Agency ZeroISIS - Last Sunday at 6:48 PM
In particular, the law left the United States Department of Defense in charge of the National Security Agency (NSA), the National Reconnaissance Office (NRO), and the National Geospatial-Intelligence Agency (NGA)
ZeroISIS - Last Sunday at 7:23 PM
Clapper became director of the Defense Intelligence Agency in November 1991 and retired from active duty in September 1995
He then spent six years in private industry. From 2001 to June 2006 he was director of the National Geospatial-Intelligence Agency as member of the Defense Intelligence Senior Executive Service
and was an executive on the boards of three government contractors, two of which were doing business with the NGA while he was there
ZeroISIS - Last Sunday at 8:08 PM
In 2003, Clapper, then head of the National Geospatial-Intelligence Agency, attempted to explain the absence of weapons of mass destruction in Iraq by asserting that the weapons materials were “unquestionably” shipped out of Iraq to Syria and other countries just before the American invasion, a “personal assessment” that Clapper’s own agency head at the time, David Burpee, “could not provide further evidence to support.
ZeroF-x - Last Sunday at 9:57 PM
Mr. Clapper returned to the government two days after 9/11 as the first civilian director of the National Imagery and Mapping Agency (NIMA). He served in this capacity for almost five years, transforming it into the National Geospatial-Intelligence Agency (NGA) as it is today.
August 7, 2017
ZeroDNIMasots - Last Monday at 12:42 AM
NATIONAL GEOSPATIAL-INTELLIGENCE AGENCY
4600 Sangamore Road
Bethesda, Maryland 20816-5003
ZeroDNIMasots - Last Monday at 1:22 AM
MEMORANDUM FOR PRINCIPAL DEPUTY DIRECTOR OF NATIONAL
INTELLIGENCE
products produced by space-based national
intelligence reconnaissance systems; and
(ii) likenesses and representations produced by
satellites, airborne platforms, unmanned aerial vehicles, or
other similar means.
(B) Such term does not include handheld or clandestine
photography taken by or on behalf of human intelligence
collection organizations.
(3) The term "imagery intelligence" means the technical,
geographic, and intelligence information derived through the
interpretation or analysis of imagery and collateral materials.
U-132-05/0GM
SUBJECT: Statutory Definition of Geospatial Intelligence
and its Amplification
) The term "geospatial intelligence" means the
exploitation and analysis of imagery and geospatial information
to describe, assess, and visually depict physical features and
geographically referenced activities on the Earth. Geospatial
intelligence consists of imagery, imagery intelligence, and
geospatial information.
2. The following amplifies the statutory definition and
represents the full manifestation of NGA's missions per section
442(a) Title 10. The relevance of this amplification derives
from the "terms of art" unique to the GEOINT discipline.
GEOINT encompasses all aspects of imagery (including
capabilities formerly referred to as Advanced
Geospatial Intelligence and imagery-derived MASINT)
and geospatial information and services (GI&S;
formerly referred to as mapping, charting, and
geodesy). It includes, but is not limited to, data
ranging from the ultraviolet through the microwave
portions of the electromagnetic spectrum, as well as
information derived from the analysis of literal
imagery; geospatial data; and information
technically derived from the processing,
exploitation, literal, and non-literal analysis of
spectral, spatial, temporal, radiometric, phase
history, polarimetric data, fused products (that is,
products created out of two or more data sources),
and the ancillary data needed for data processing
SUBJECT: Statutory Definition of Geospatial Intelligence
and its Amplification
and exploitation, and signature information (to
include development, validation, simulation, data
archival, and dissemination). These types of data
can be collected on stationary and moving targets by
electro-optical (to include IR, MWIR, SWIR TIR,
Spectral, MSI, HSI, HD), SAR (to include MTI) ,
related sensor programs (both active and passive) ,
and non-technical means (to include geospatial
information acquired by personnel in the field).
The National Geospatial-Intelligence Agency (NGA), who has overall responsibility for GEOINT in the U.S. Intelligence Community (IC), defines GEOINT as "information about any object—natural or man-made—that can be observed or referenced to the Earth
Keynote Remarks:
Meeting the Increasing Demand for Geospatial Imagery and Automation
- NGA’s efforts to exploit commercial solutions to accomplish its GEOINT mission
- Increasing NGA’s capability to process & analyze data being collected by small satellites
- Understanding the role of AI & deep learning in getting value from GEOINT data
Dr. Anthony Vinci, Director of Plans and Programs, NGA
ZeroDNIMasots - Last Monday at 2:01 AM
ABI and Human Domain Analytics Advancements at NGA
- Leveraging human geography in support of NGA priorities
- Improving structured observation management
- Activity Based Intelligence and enterprise search and discovery updates
David Eldridge, Human Geographer, NGA
GEOINT Pathfinder 2 & Lessons Learned
- Understanding NGA’s efforts to fill the skills gap for succeed with/in the open work
- Incorporating openly available information into GEOINT analysis workflows & processes
- Will classified data become supplementary as the quality & analysis of OSINT improves?
- Utilizing automation to decrease processing time for GEOINT and OSINT analysis
Chris Rasmussen, PM, Unclassified GEOINT Pathfinder PM & Public Open Source
Software Development Lead, NGA
ZeroMrWorld - Last Monday at 3:19 PM
Boundless has been awarded a $36 million contract by the National Geospatial-Intelligence Agency (NGA), the primary source of GEOINT for the U.S. Department of Defense and the U.S. Intelligence Community. The new contract supports NGA GEOINT services and purchases services required to package, deliver, maintain and patch accredited open source geospatial software packages.
ZeroTGS - Last Monday at 4:21 PM
“I think a lot of people here today will know what NGA is from a big perspective, but when you get down to the safety of navigation and some of the foundational GEOINT stuff we do, it’s not as well known,” said Frank Cooper, director of NGA’s Geomatics Office. “(NGA on the Hill) is just a great opportunity for us to share that knowledge.”
This brief was the first unclassified presentation in the series, which began in April, said Christina McDonnell, deputy director of NGA’s Congressional Affairs Division. Past classified briefings focused on GEOINT crowd sourcing, the South China Sea, and the use of GEOINT in the Syrian conflict.
NATIONAL GEOSPATIAL-INTELLIGENCE AGENCY
7500 GEOINT Drive
Springfield, Virginia 22150
571-557-5400
NGA headquarters, also known as NGA Campus East, is located at Fort Belvoir in Springfield, Virginia. The agency also operates major facilities in the St. Louis, Missouri area, as well as support and liaison offices worldwide. The NGA headquarters, at 2.3 million square feet (214,000 m2), is the third-largest government building in the Washington metropolitan area after The Pentagon and the Ronald Reagan Building
As a part of the 2005 Base Realignment and Closure (BRAC) process, all major Washington, D.C.-area NGA facilities, including those in Bethesda, Maryland; Reston, Virginia; and Washington, D.C., would be consolidated at a new facility at the Fort Belvoir proving grounds. This new facility, called the NGA Campus East houses several thousand people and is situated on the former Engineer Proving Ground site near Fort Belvoir.
2001–2006 Lieutenant General (Lt Gen) James R. Clapper Jr
Keyhole investment: NGA contributed approximately 25% of In-Q-Tel's funding of Keyhole Inc, whose Earth-viewing software became Google Earth
Google and GeoEye: In 2008 the NGA partnered with Google and GeoEye. Google would be allowed to use GeoEye spy satellite imagery with reduced resolution for Google Earth
Public Affairs, MS N73-OCCAE
7500 GEOINT Dr.
Springfield, VA 22150-7500
Parent Agency

U.S. Department of Defense
Mattis is overseeing- fucking Clapper then Mattis
http://img04.deviantart.net/c96e/i/2007/097/6/f/bloodthirsty_by_mk01.jpg

ZeroTGS - Last Monday at 5:40 PM
The National Geospatial-Intelligence Agency (NGA) is a combat support agency of the Department of Defense (DoD), supporting the Secretary of Defense, the Director of National Intelligence (DNI), and other national-level policymakers in the areas of imagery, imagery intelligence, and geospatial information. NGA is a member of the U.S. Intelligence Community.
Budget is entirely redacted https://fas.org/irp/agency/nga/fy2016cbjb.pdf
API https://github.com/ngageoint
GitHub
National Geospatial-Intelligence Agency
Official organizational account for the NGA

NGA has issued the Record of Decision (ROD) selecting St. Louis City site for Next NGA West Campus.
U.S. Army Corps of Engineers Kansas City District, Room 529
Attn: Amy Snively
601 E. 12th Street
Kansas City, MO 64106
nextNGAwest@usace.army.mil
gender, and even their heights in all buildings
use facial recognition software to identify people in the area.
http://mybroadband.co.za/news/wp-content/uploads/2016/08/Facial-recognition.jpg

UNMANNED AERIAL VEHICLES PROVIDE MUCH OF THEIR DATA
Before it was the National Geospatial-Intelligence Agency, it was the National Imagery and Mapping Agency. Before that, it was a series of loosely affiliated agencies, to include the Defense Dissemination Program Office and the Central Imagery Office, as well as the National Photographic Interpretation Center and the Defense Mapping Agency (the latter of which was a reorganization of disparate military imagery intelligence assets). This is a bit of a complicated family tree, but as imagery intelligence (IMINT) grew in importance
One of Ike's final acts as president was creating the National Photographic Interpretation Center, which would later be absorbed into the NGA.
ZeroTGS - Last Monday at 7:45 PM
Early in the war on terror, the National Security Agency and the National Geospatial-Intelligence Agency worked together on a program called GEOCELL
laser radar and imagery to construct a 3D rendering
The NGA employs 15,400 people. It is headquartered at Ft. Belvoir in Virginia, and has two additional facilities in St. Louis, Missouri. Don’t bother trying to visit either place, though. While the NGA is quite generous in providing maps, charts, and imagery to the public, unless you work for the agency, you’re not getting in the door.
NAVAREA IV 656/2017(12).
WESTERN NORTH ATLANTIC.
VIRGINIA.
1. HAZARDOUS OPERATIONS, ROCKET LAUNCHING
120900Z TO 121445Z AUG, ALTERNATE 0900Z TO 1445Z
DAILY 13 AND 14 AUG, 0900Z TO 1130Z DAILY
15 THRU 18 AUG IN AREAS BOUND BY:
A. 37-50-37N 075-28-54W, 37-51-04N 075-26-15W,
37-51-18N 075-22-40W, 37-51-19N 075-20-11W,
37-50-23N 075-16-05W, 37-48-59N 075-16-08W,
37-47-37N 075-16-33W, 37-47-33N 075-20-44W,
37-48-04N 075-23-12W, 37-49-04N 075-26-55W,
37-50-00N 075-29-18W.
B. 37-56-23N 074-42-22W, 38-08-22N 074-28-44W,
38-05-44N 074-02-52W, 37-50-24N 073-51-59W,
37-27-17N 073-56-22W, 37-15-32N 074-13-00W,
37-17-49N 074-36-46W, 37-33-45N 074-47-12W.
2. CANCEL THIS MSG 181230Z AUG 17.
The effort has come with a hefty price. So far, the state has committed $131 million to the project: $95 million in tax-increment financing, a portion of which would include diverting state income tax payments of NGA employees; and $36 million in brownfield tax credits — an amount higher than originally expected.
ZeroTGS - Last Monday at 8:01 PM
We've got a motto in our career field," said Cox. "'Know the earth, show the way.'"
ZeroFacialRecognition - Last Monday at 9:56 PM
Major focus is mapping cyber threat
https://cyberarms.files.wordpress.com/2014/04/kaspersky-real-time-map.png

zerotrace - Last Tuesday at 2:18 AM
The NGA, is a little known Pentagon spy service whose motto is “Know the earth, show the way, understand the world.” It provides imagery intelligence based on spy satellites and aircraft and explains what the pictures show. The agency works closely with another spy agency, the National Reconnaissance Office, that builds and operates intelligence satellites.
ZeroEyes - Last Wednesday at 1:06 AM
US has the National Reconnaissance Office to launch and operate satellites, with the National Geospatial-Intelligence Agency (NGA) analyzing the imagery ZeroDNIMasots - Last Monday at 2:00 AM
Dr. Anthony Vinci, Director of Plans and Programs, NGA
ZeroFacialRecognition - Last Monday at 9:38 PM
Dr. Vinci is the founder and former CEO of Findyr
1:42-1:49 https://vimeo.com/220258010
Anthony Vinci
Chief Executive Officer
Findyr
HQ Phone: (855) 935-5997
“[NGA has] data,” Vinci said. “Having come out of the tech startup world, it’s a wonderland. … If data was oil, NGA would be Saudi Arabia.”
To tech companies, data is oil.
Dr. Anthony Vinci, NGA Director of Plans and Programs, will lead a discussion about the intersection of his experiences as a technology entrepreneur and intelligence officer, and he will offer perspectives on innovative ways in which startup business in the GEOINT Community can build relationships with government. If you are looking for ways to work with the large government agencies, this discussion is a must see.
ZeroFacialRecognition - Last Monday at 10:37 PM
He was previously a strategic management consultant at Toffler Associates and managed e-commerce at a Prague-based media firm with operations throughout the former Soviet Union and the Balkans.
Cardillo added that Vinci will support NGA’s agile acquisition, modeling, crowdsourcing, code development, disparate data sets and anticipatory analysis efforts.

Vinci previously served as a Defense Department staff officer and worked for a global management firm, a machine learning company and a private equity firm. ZeroFacialRecognition - Last Monday at 9:40 PM
Dr. Vinci is the founder and former CEO of Findyr
ZeroFacialRecognition - Last Monday at 10:22 PM
Findyr Provides a Competitive Advantage to Enterprises
Validated information from an on-demand network of data collectors


OBSERVABLE
Information that can only be obtained in person


VERIFIABLE
All data is GPS tracked and time/date stamped


REAL TIME
Timely and accurate information at your fingertips


SEAMLESS
Seamless integration into your workflows


COST EFFECTIVE
Faster and more cost-effective than traditional methods of data collection


ACCESS
Hyper-local access across emerging markets
collecting data money for spying private sector
(347) 791-7296
Share a photo of your city through the Findyr app for a chance to be featured in our next #findyrworldview blast!
At the center of most conversations throughout the Smart Cities NYC 2017
http://images.mapsofindia.com/my-india/2017/08/Key-Technologies-in-future-smart-cities.jpg

. The company collects raw data, tailored data, geographical data and servery data of natural resources such as oil, aluminum, cacao and other natural resources.
Primary Office
122 West 26th Street
5th Floor
New York, NY 10001
United States
The world’s most valuable resource is no longer oil, but #data http://buff.ly/2qRLGMs via @TheEconomist
The Economist
The world’s most valuable resource is no longer oil, but data
The data economy demands a new approach to antitrust rules

17-22 https://www.youtube.com/watch?v=SDajqLIkoDQ
YouTube
Findyr
Findyr Overview


Company Size
11
enabling multinationals, marketers, agencies and media companies to request and quickly receive hyper- local, hyper- relevant data, information and content from around the world
collect hyper-local economic data in emerging markets
Field Interviewer
7 salaries reported
$11.93 per hour
Size 1
Findyr serves those who need access to hyper-local, bespoke data sets.
They do not have the 100k people downloading they profess(edited)
It's built then now that they are working for the government Software Engineering Jobs
Senior Engineer
Washington · Full Time · $100K
The company’s FINDYR is used by companies, brands, and the media. The company was formerly known as Frontier Data Corp and changed its name to Findyr in 2014. Findyr was founded in 2012 and is based in New York, New York
ZeroFacialRecognition - Last Monday at 11:02 PM
The website's html version is html3, IP Address is 23.23.162.100 and Alexa Rank is 883416
Site Categories : market research, geospatial data, custom photo, custom video, task , asia, africa, middle east, south asia, emerging markets, surveys, polling, mystery shopping, economic data, local data, global data
This is a reproduction of the email Findyr sent out..
Earning Up to $270
New Findyr Project: Looking Up Prices of Food Items in Stores(edited) ZeroDNIMasots - Last Monday at 2:02 AM
David Eldridge, Human Geographer, NGA ZeroTGS - Last Monday at 4:22 PM
“I think a lot of people here today will know what NGA is from a big perspective, but when you get down to the safety of navigation and some of the foundational GEOINT stuff we do, it’s not as well known,” said Frank Cooper, director of NGA’s Geomatics Office. “(NGA on the Hill) is just a great opportunity for us to share that knowledge.” zerotrace - Last Tuesday at 1:13 AM
Frank Cooper
Director, Office of Geomatics, NGA
NGA Delta State University
Wentzville, Missouri 108 108 connections
Staff Officer
Company NameStellar Solutions
Dates EmployedMar 2006 – Oct 2006 Employment Duration8 mos
LocationDenver, Colorado
Supported the NGA-Denver Business Executive Office and the NGA-Denver Executive Leadership Group. Day-to-day responsibilities were focused on maintaining and developing the necessary processes to support the NGA-Denver mission. These responsibilities ranged from operational and engineering service support, human development, resource and facilities management. In addition, served as the NGA-Denver point of contact for all actions originating from NGA Headquarters.
Task Force Observe Detect Identify Neutralize-Enhanced (ODIN-E), assumed the mission on behalf of INSCOM from Frank Cooper, of the NGA.
Col. Adam R. Hinsdale, commander of Task Force Observe Detect Identify Neutralize-East, assumed the mission on behalf of the U.S. Army and INSCOM from Frank Cooper, former director of the NGA's Saturn Arch program, following a ceremony at Kandahar Airfield, Afghanistan, March 1. zerotrace - Last Tuesday at 1:17 AM
Task Force Observe Detect Identify Neutralize-Enhanced (ODIN-E), assumed the mission on behalf of INSCOM from Frank Cooper, of the NGA.
Col. Adam R. Hinsdale, commander of Task Force Observe Detect Identify Neutralize-East, assumed the mission on behalf of the U.S. Army and INSCOM from Frank Cooper, former director of the NGA's Saturn Arch program, following a ceremony at Kandahar Airfield, Afghanistan, March 1.
"I was able to witness an impressive group of operators and analysts using amazing technology to make a difference," said Cooper, director of Saturn Arch from November 2012 to March 2013. "So from my perspective, I believe the SA Program will continue to provide invaluable contributions not only in Afghanistan, but around the world."
TF ODIN-E
ODIN is the Army's only unit that flies the MQ-1B Warrior-Alpha unmanned aerial vehicle.
On 23 February 2009, Task Force ODIN performed the first MQ-1B Warrior-Alpha combat missile launch
Transfered to INSCOM
The Task Force ODIN deployed to Iraq used a combination of Medium Altitude Reconnaissance and Surveillance System (MARSS) the Airborne Reconnaissance Multisensor System (ARMS) aircraft.
Unit Identification Code: W6KQA0
contract employees from ASKII Technology, Inc. Not surprisingly, on its website, this New Jersey-headquartered firm proudly declares past support for SOCOM, Task Force ODIN, and the Multi Sensor Aerial Intelligence Surveillance Reconnaissance (MAISR) program, which supplied contractor support for Task Force ODIN-E. ZeroTGS - Last Monday at 4:24 PM
This brief was the first unclassified presentation in the series, which began in April, said Christina McDonnell, deputy director of NGA’s Congressional Affairs Division. Past classified briefings focused on GEOINT crowd sourcing, the South China Sea, and the use of GEOINT in the Syrian conflict.


robert-cardillo



Search



14+ new messages since 1:51 AM on August 7, 2017
MARK AS READ
Welcome to the beginning of the #robert-cardillo channel.
NEW MESSAGES
ZeroDNIMasots - Last Monday at 1:51 AM
USGIF has confirmed two GEOINT 2017 keynote speakers. Robert Cardillo, director of the National Geospatial-Intelligence Agency, and Dr. Todd Lowery, acting under secretary of defense for intelligence, will address the audience during the general session. More keynote speakers will be announced in the coming weeks.
“We want to bring in your technology to reduce the human component and elevate analysts to where they should be—looking at not the ‘what’ but the ‘why,’” Cardillo said, addressing the industry partners in attendance.
ZeroTGS - Last Monday at 5:35 PM
Robert Cardillo, the 31-year intelligence community veteran, most recently worked in close consult with the White House—Customer No. 1, in intelligence parlance—to compile and present the top-secret Presidential Daily Brief.
ZeroTGS - Last Monday at 7:52 PM
“I am deeply concerned about the security of the St. Louis site and I do not believe we have received acceptable answers from Director Cardillo,” said Durbin. “His decision today is short-sighted and ignores not only safety issues, but also legitimate concerns about cost overruns which will hurt taxpayers in the long-term.”
Cardillo, upper management, mission talent alignment, ITPs
The current process to advance in this agency is a joke.




zerotrace - Last Tuesday at 1:42 AM
Robert Cardillo is the sixth Director of the National Geospatial-Intelligence Agency and was sworn in October 3, 2014
Put in by Clapper
Cardillo resides in Alexandria, Virginia.
Cardillo expects the data to flow seamlessly into NGA’s architecture.
zerotrace - Last Tuesday at 2:02 AM
“We are standing where the SIGINT community stood when the internet became the digital fabric of the planet,” Cardillo said. “In five years, there may be a million times more than the amount of geospatial data that we have today.”
Director Robert Cardillo said at the GEOINT Symposium in Orlando, Fla. "This summer, we’ll create a presence there, what we call NGA Outpost Valley. This...will leverage the organic capabilities and energy of the Valley’s open, vibrant, geospatial community."
Cardillo stated that the NGA is playing a key support role for the Pentagon’s diplomatic and military pivot to Asia that involves increased intelligence-gathering in addition to moving military forces to the region.
NGA has debunked the Chinese claim that the new islands are purely commercial and concluded they are being built for future military operations.
https://openhousebcn.files.wordpress.com/2013/05/openhouse-magazine-building-islands-art-design-architecture-new-concordia-island-by-alexander-laing-and-francesco-matteo-belfiore.jpg

’’ whereby NGA and NRO work
more closely than ever before to identify, consider, and evaluate
emerging commercial GEOINT data ZeroDNIMasots - Last Monday at 12:03 AM
Generally, geospatial intelligence can be more readily defined as, data, information, and knowledge gathered about entities that can be referenced to a particular location on, above, or below the earth's surface. The intelligence gathering method can include imagery, signals, measurements and signatures, and human sources, i.e., IMINT, SIGINT, MASINT, and HUMINT, as long as a geo-location can be associated with the intelligence. zerotrace - Last Tuesday at 2:03 AM
“We are standing where the SIGINT community stood when the internet became the digital fabric of the planet,” Cardillo said. “In five years, there may be a million times more than the amount of geospatial data that we have today.”
ZeroChineseWar - Last Tuesday at 4:23 PM
Signals intelligence is a subset of intelligence collection management.
cryptanalysis to decipher
Traffic analysis
the study of who is signaling whom and in what quantity—is also used to derive information.
The Government Code and Cypher School (GC&CS) was the first peace-time codebreaking agency
The US Cipher Bureau was established in 1919
ryptanalysis for the whole of the British forces in World War II came under the code name "Ultra" managed from Government Code and Cypher School at Bletchley Park(edited)
The United States Department of Defense has defined the term "signals intelligence" as:

A category of intelligence comprising either individually or in combination all communications intelligence (COMINT), electronic intelligence (ELINT), and foreign instrumentation signals intelligence, however transmitted.
Second, locating the transmitter's position is usually part of SIGINT. Triangulation and more sophisticated radio location techniques, such as time of arrival methods, require multiple receiving points at different locations.
GPS or a similar method to have precise time synchronization. Receivers can be on ground stations, ships, aircraft, or satellites, giving great flexibility.
electronic order of battle (EOB) requires identifying SIGINT emitters
The Defense Intelligence Agency maintains an EOB by location. The Joint Spectrum Center (JSC) of the Defense Information Systems Agency supplements this location database with five more technical databases:

FRRS: Frequency Resource Record System
BEI: Background Environment Information
SCS: Spectrum Certification System
EC/S: Equipment Characteristics/Space
TACDB: platform lists, sorted by nomenclature, which contain links to the C-E equipment complement of each platform, with links to the parametric data for each piece of equipment, military unit lists and their subordinate units with equipment used by each unit.
The EOB buildup process is divided as following:

Signal separation
Measurements optimization
Data Fusion
Networks build-up
process depends on the complexity of the transmission methods (e.g., hopping or time division multiple access (TDMA)).
Retrospective analysis of telephone calls can be made from Call detail record (CDR) used for billing the calls.
If communications security than true intelligence collection, SIGINT units still may have the responsibility of monitoring one's own communications or other electronic emissions, to avoid providing intelligence to the enemy. For example, a security monitor may hear an individual transmitting inappropriate information over an unencrypted radio network, or simply one that is not authorized for the type of information being given.(edited)
the monitor will call out one of the BEADWINDOW codes
Position: (e.g., disclosing, in an insecure or inappropriate way, "Friendly or enemy position, movement or intended movement, position, course, speed, altitude or destination or any air, sea or ground element, unit or force."
Capabilities: "Friendly or enemy capabilities or limitations. Force compositions or significant casualties to special equipment, weapons systems, sensors, units or personnel. Percentages of fuel or ammunition remaining."
Operations: "Friendly or enemy operation – intentions progress, or results. Operational or logistic intentions; mission participants flying programmes; mission situation reports; results of friendly or enemy operations; assault objectives."
Electronic warfare (EW): "Friendly or enemy electronic warfare (EW) or emanations control (EMCON) intentions, progress, or results. Intention to employ electronic countermeasures (ECM); results of friendly or enemy ECM; ECM objectives; results of friendly or enemy electronic counter-countermeasures (ECCM); results of electronic support measures/tactical SIGINT (ESM); present or intended EMCON policy; equipment affected by EMCON policy."
Friendly or enemy key personnel: "Movement or identity of friendly or enemy officers, visitors, commanders; movement of key maintenance personnel indicating equipment limitations."
Communications security (COMSEC): "Friendly or enemy COMSEC breaches. Linkage of codes or codewords with plain language; compromise of changing frequencies or linkage with line number/circuit designators; linkage of changing call signs with previous call signs or units; compromise of encrypted/classified call signs; incorrect authentication procedure."
Wrong circuit: "Inappropriate transmission. Information requested, transmitted or about to be transmitted which should not be passed on the subject circuit because it either requires greater security protection or it is not appropriate to the purpose for which the circuit is provided."
See HF/DF for a discussion of SIGINT-captured information with a MASINT flavor, such as determining the frequency to which a receiver is tuned, from detecting the frequency of the beat frequency oscillator of the superheterodyne receiver.
international consensus has been that the radio-waves are no one's property, and thus the interception itself is not illegal.
http://stromonster12.weebly.com/uploads/1/1/3/2/11326737/7510905.png

ZeroChineseWar - Last Tuesday at 5:30 PM
SIGINT is a category of intelligence comprising either individually or in combination all COMINT, ELINT, and FISINT
ARMY TCAE (ATCAE)
8-7. The ATCAE, established at the national level, plays a significant role in TCAE operations by providing technical support oversight and providing access to national databases: in coordination with the NSA and other intelligence organizations.
ZeroChineseWar - Last Tuesday at 6:17 PM
The success of the SIGINT system has been in large part due to
NSA's formally established technical control over the discipline,
which has resulted in the development of a coherent architecture
for collection, processing, exploitation, analysis and reporting.
However, this very strength has become also a weakness, as the
resources required to maintain the Consolidated Cryptologic Program
(CCP) infrastructure are now competing with investment in the core
missions of NSA.
The ability to filter through the huge volumes of
data and to extract the information from the layers of formatting,
multiplexing, compression, and transmission protocols applied to
each message is the biggest challenge of the future
we believe that the rest of the
technical collection community would benefit from the application
of a variant of the DIRNSA's (Director of NSA) technical control
over SIGINT.
http://cdn.c.photoshelter.com/img-get/I0000ft7PKgOLes8/s/600/600/TK113721.jpg

UNITED KINGDOM
GCHQ Bude
June 29, 2010

GCHQ Bude, formerly known as the the GCHQ Composite Signals Organisation Station (CSOS) Morwenstow, is a satellite ground station located on the north Cornwall coast between the small villages of Morwenstow and Coombe, UK operated by the British signals intelligence service (GCHQ) on the site of the former World War II airfield, RAF Cleave. Staff are drawn from GCHQ (UK) and the NSA (U.S.) and the station is operated under the UKUSA agreement, gathering data for the ECHELON signals intelligence (SIGINT)
U.S. Army Signal Intelligence Service (SIS)
"Be part of the software development teams which find the needle in the haystack to stop the next 9-11 and Paris attacks."- found it: Mossad
At PROTEUS we build the SIGINT
ZeroChineseWar - Last Tuesday at 7:10 PM
SIGINT Collection System (TSCS) family of systems (FoS) is a modular, semi-automated, multi-platform transportable and man packable system capable of conducting signals intercept, collection, exploitation, direction finding, and precision geo-location against threat communications. ZeroEyes - Last Wednesday at 1:00 AM
Sweden operates the HMS Orion and plans to rebuild the HMS Carlskrona as a SIGINT ship
Northrop Grumman developed the SIGINT package for the Global Hawk UAV. An upgraded version of the same SIGINT payload is flown on U-2. Boeing has proposed a SIGINT variant of the P-8 multimission maritime patrol aircraft it has under development. Raytheon and Northrop Grumman would be the partners for the actual SIGINT electronic
ZeroEconmicHitmen - Last Wednesday at 1:26 AM
NSA specializing in SIGNIT
ZeroChineseWar - Last Tuesday at 4:26 PM
electronic signals not directly used in communication (electronic intelligence—abbreviated to ELINT)
order of battle. EOB covers both COMINT and ELINT
An inventory of ELINT sources might identify the medium- and long-range counter-artillery radars in a given area.

Signals intelligence units will identify changes in the EOB, which might indicate enemy unit movement, changes in command relationships, and increases or decreases in capability.
A very common area of ELINT is intercepting radars and learning their locations and operating procedures. Attacking forces may be able to avoid the coverage of certain radars, or, knowing their characteristics, electronic warfare units may jam radars or send them deceptive signals. Confusing a radar electronically is called a "soft kill", but military units will also send specialized missiles at radars, or bomb them, to get a "hard kill". Some modern air-to-air missiles also have radar homing guidance systems, particularly for use against large airborne radars.

Knowing where each surface-to-air missile and anti-aircraft artillery system is and its type means that air raids can be plotted to avoid the most heavily defended areas and to fly on a flight profile which will give the aircraft the best chance of evading ground fire and fighter patrols. It also allows for the jamming or spoofing of the enemy's defense network (see electronic warfare). Good electronic intelligence can be very important to stealth operations; stealth aircraft are not totally undetectable and need to know which areas to avoid. Similarly, conventional aircraft need to know where fixed or semi-mobile air defense systems are so that they can shut them down
Electronic support measures (ESM) or Electronic Surveillance Measures are really ELINT techniques using various Electronic Surveillance Systems, but the term is used in the specific context of tactical warfare. ESM give the information needed for electronic attack (EA) such as jamming, or directional bearings (compass angle) to a target in signals intercept such as in the HUFF-DUFF Radio Direction Finding (RDF) systems
EA is also called electronic counter-measures (ECM). ESM provides information needed for electronic counter-counter measures (ECCM), such as understanding a spoofing or jamming mode so one can change one's radar characteristics to avoid them.
Meaconing is the combined intelligence and electronic warfare of learning the characteristics of enemy navigation aids, such as radio beacons, and retransmitting them with incorrect information.
Foreign instrumentation signals include (but not limited to) telemetry (TELINT), tracking systems, and video data links. TELINT is an important part of national means of technical verification for arms control.
ZeroEyes - Last Tuesday at 7:31 PM
Electronic Intelligence (ELINT) at the National Security Agency
(NSA)
US DoD set up the Army-Navy Electronics
Evaluation Group (ANEEG) to be housed at the Navy’s Nebraska
Avenue Naval Security Station (NSS) — by coincidence the
headquarters of NSA
The Strategic Air Command (SAC) was
long accustomed to doing ELINT business “their way,” which was
tailored to fulfill their mission. SAC soon developed a productive
and cooperative set of arrangements with NSA.
https://upload.wikimedia.org/wikipedia/commons/7/77/Shield_Strategic_Air_Command.png

Since the early 1960s, NSA had been a participant in the NRO
and US Navy-led GRAB and POPPY efforts to collect ELINT
Another response by NSA related to the expansion of NSA
ELINT responsibilities was the creation in 1967 of a special group
called DAGER, the Director’s Advisory Group on ELINT and
Reconnaissance. It was a small group headed by Mr. Charles Tevis,
who originated the idea and was a strong proponent and technical
leader of NSA’s stewardship of ELINT.
One of the offices in the group
concentrated on TechELINT, one on OpELINT, and one on
TELINT
ELINT is defined as: "the collection (observation and recording), and the technical processing for later intelligence purposes
ZeroEyes - Last Tuesday at 8:19 PM
That TENCAP and TIARA complement one another, and benefit tactical and strategic units.
NSA, with NRO cooperation, operates a number of National Security Agency/Central Security Service (NSA/CSS) sites and other support activities
Dagger Complex. The INSCOM European Cryptologic Center (ECC) - Darmstadt, also comprising the ICEBOX facility at 49°51'20"N 8°35'12" E and the TENCAP facility at 49°51'18"N 8°35'43"E. All are assigned 66th Military Intelligence Brigade - Wiesbaden.
ZeroEyes - Last Tuesday at 9:05 PM
Consolidated Intelligence Center - Wiesbaden, Germany
GCHQ Bude - Morwenstow, United Kingdom
Geraldton-Australia
Pine Gap
Shoal Bay
Misawa Air Force Base, Japan (USMC Support Company E)
NSA/CSS Colorado
NSA/CSS Georgia
NSA/CSS Hawaii
ZeroEyes - Last Tuesday at 11:37 PM
Prophet Block II adds electronic attack (EA) capability to Prophet, while Block III upgrades the Prophet receiver to collect against advanced and special signals. These enhancements will be coordinated with UAVs and tactical aircraft with expanded SIGINT capability. Blocks IV (expected IOC 2008) and V (expected IOC 2015) [28] add MASINT along with micro-and robotic receivers to the Prophet Ground system.
Prophet Air will begin in a UAV. ZeroCovertWar - 08/05/2017
The Special Collections Service is a joint CIA and National Security Agency (NSA) office that conducts clandestine electronic surveillance in embassies and hostile territory throughout the world. ZeroISIS - Last Sunday at 6:47 PM
In particular, the law left the United States Department of Defense in charge of the National Security Agency (NSA), the National Reconnaissance Office (NRO), and the National Geospatial-Intelligence Agency (NGA)
ZeroISIS - Last Sunday at 7:58 PM
Andy Greenberg of Forbes said that NSA officials along with Clapper, in the years 2012 and 2013 “publicly denied–often with carefully hedged words–participating in the kind of snooping on Americans that has since become nearly undeniable.” ZeroDNIMasots - Last Monday at 2:12 AM
NSA’s Open Source GIS Development Efforts
- Why use open source geospatial software
- A focus on QGIS and it use at NSA
- QGIS enhancement through plugin development at NSA
Calvin Hamilton, Senior Open Source Geospatial Researcher & Developer, NSA
August 8, 2017
ZeroChineseWar - Last Tuesday at 6:24 PM
However, we believe that much of the
analysis that is conducted at NSA today is more properly done under
the auspices of an all-source collection agency such as Defense
Intelligence Agency (DIA) and Central Intelligence Agency (CIA)
ZeroEyes - Last Tuesday at 7:32 PM
US DoD set up the Army-Navy Electronics
Evaluation Group (ANEEG) to be housed at the Navy’s Nebraska
Avenue Naval Security Station (NSS) — by coincidence the
headquarters of NSA
Another response by NSA related to the expansion of NSA
ELINT responsibilities was the creation in 1967 of a special group
called DAGER, the Director’s Advisory Group on ELINT and
Reconnaissance. It was a small group headed by Mr. Charles Tevis,
who originated the idea and was a strong proponent and technical
leader of NSA’s stewardship of ELINT.
TELINT attained its status as a separate “INT” in 1971 with the
publication of the revised DoD Directive 5100.20, which gave NSA
its updated charter. TELINT activities were focused in the NSA
organization as the Advanced Weapons and Space Systems Office
within the new group.
NSA also continued to modernize and expand its ELINT
signals processing and analysis equipment “positions.” The
Agency likewise upgraded positions at selected field facilities with
emphasis on more timely reporting of ELINT results.
NSA also developed and operated special-purpose telemetry
processing equipment, often computer-based, in the National
Telemetry Processing Center (using the abbreviation NTPC).
ZeroEyes - Last Tuesday at 9:29 PM
That TENCAP and TIARA complement one another, and benefit tactical and strategic units.
NSA, with NRO cooperation, operates a number of National Security Agency/Central Security Service (NSA/CSS) sites and other support activities
Dagger Complex. The INSCOM European Cryptologic Center (ECC) - Darmstadt, also comprising the ICEBOX facility at 49°51'20"N 8°35'12" E and the TENCAP facility at 49°51'18"N 8°35'43"E. All are assigned 66th Military Intelligence Brigade - Wiesbaden.
ZeroSignalLaws - Today at 9:05 PM
Consolidated Intelligence Center - Wiesbaden, Germany
GCHQ Bude - Morwenstow, United Kingdom
Geraldton-Australia
Pine Gap
Shoal Bay
Misawa Air Force Base, Japan (USMC Support Company E)
NSA/CSS Colorado
NSA/CSS Georgia
NSA/CSS Hawaii
ZeroEyes - Last Tuesday at 10:07 PM
he Marine units report National SIGINT Operations Center at NSA headquarters at Ft. Meade, MD. "The newest threats we face, and perhaps the fastest growing, are those in cyberspace."
http://images.8tracks.com/cover/i/009/341/954/44854-7887.jpg?rect=0,0,500,500&q=98&fm=jpg&fit=max

"Cyber criminals, hackers"
"especially social media, to spread their messages of hate "
http://2.bp.blogspot.com/-k9by2i4PgRo/ThNYd35IJoI/AAAAAAAAAPs/-8ujA_s_7YU/s1600/Lexi+St.+George+-+Dancing+to+the+Rhythm.bmp

specializing in a discipline known as signals intelligence (SIGINT)
The NSA is also tasked with the protection of U.S. communications networks and information systems
http://az616578.vo.msecnd.net/files/2016/06/23/636023168398956016-1836745540_No-Wifi.jpeg

formed as the NSA by President Harry S. Truman in 1952
mass data collection
bug electronic systems
CIA/NSA joint Special Collection Service (a highly classified intelligence team) inserts eavesdropping devices
ZeroEyes - Last Wednesday at 1:43 AM
NSA is entrusted with providing assistance to, and the coordination of, SIGINT elements for other government organizations - which are prevented by law from engaging in human espionage
co-located organization called the Central Security Service (CSS) does
the NSA Director simultaneously serves as the Commander of the United States Cyber Command and as Chief of the Central Security Service.
participation in economic espionage
NSA had many of its secret surveillance programs revealed to the public by Edward Snowden, a former NSA contractor
ZeroEconmicHitmen - Last Wednesday at 2:01 AM
NSA intercepts and stores the communications of over a billion people worldwide, including United States citizens.
NSA tracks hundreds of millions of people's movements using cellphones metadata.
The NSA is currently facing litigation from the Wikimedia Foundation for its potential violation of millions of Americans' constitutional rights, including users of the site Wikipedia, during the government's use of mass collection methods such as Upstream
The origins of the National Security Agency can be traced back to April 28, 1917
It was headquartered in Washington, D.C. and was part of the war effort under the executive branch without direct Congressional authorization.
US Army cryptographic section of Military Intelligence, known as MI-8, in 1919, the United States government created The Cipher Bureau, also known as the Black Chamber.
the Cipher Bureau was disguised as a New York City commercial code company
http://i.imgur.com/aQcSeaY.jpg
Imgur
Black Chamber logo

The Black Chamber successfully persuaded Western Union
to illegally give the Black Chamber access to the cable traffic
it was disbanded but continued on through various names
The agency was formally established by Truman in a memorandum of October 24, 1952
as the NSA
he U.S. intelligence community referred to the NSA as "No Such Agency".
http://image.spreadshirt.com/image-server/v1/compositions/108783968/views/1,width=280,height=280,appearanceId=66.png/men-s-t-shirt-nsa-no-such-agency-nsaswag_design.png

A secret operation, code-named "MINARET", was set up by the NSA to monitor the phone communications of Senators Frank Church and Howard Baker, as well as major civil rights leaders, including Martin Luther King, Jr
https://decolonizechris.files.wordpress.com/2013/02/mlk_prisoner.jpg

internal review by the NSA concluded that its Minaret program was "disreputable if not outright illegal"
he NSA, in collaboration with Britain's SIGINT intelligence agency Government Communications Headquarters (GCHQ), had routinely intercepted the international communications of prominent anti-Vietnam war leaders such as Jane Fonda and Dr. Benjamin Spock.
https://www.vul.ca/sites/default/files/HIPPIES.jpg

The investigation also uncovered NSA's wiretaps on targeted American citizens
the Foreign Intelligence Surveillance Act of 1978 was passed into law. This was designed to limit the practice of mass surveillance in the United States.
http://www.terrainfirma.co.uk/blog/wp-content/uploads/2011/08/law.jpg

Trailblazer Project ramped up in 2002 and was worked on by Science Applications International Corporation (SAIC), Boeing, Computer Sciences Corporation, IBM, and Litton Industries.
Some NSA whistleblowers complained about it then- was closed down in 2004- maybe as a joke bc then the Patriot Act went into effect
ZeroEconmicHitmen - Last Wednesday at 1:34 PM
Turbulence started in 2005. It was developed in small, inexpensive "test" pieces, rather than one grand plan like Trailblazer. It also included offensive cyber-warfare capabilities, like injecting malware into remote computers.
http://kbc.co.ke/wp-content/uploads/2016/07/malware.jpg

Congress criticized Turbulence in 2007
The massive extent of the NSA's spying began 2013 with Snowden(edited)
every day, collection systems at the National Security Agency intercept and store 1.7 billion e-mails, phone calls and other types of communications. The NSA sorts a fraction of those into 70 separate databases
part of the National Security Presidential Directive 54/Homeland Security Presidential Directive 23 (NSPD 54), signed on January 8, 2008 by President Bush, the NSA became the lead agency to monitor and protect all of the federal government's computer networks from cyber-terrorism-
And listens in on and "commercial secrets"
http://cuckoo.ie/assets/images/blog/euro-money-coins.jpg

ZeroEconmicHitmen - Last Wednesday at 2:40 PM
n 2004, NSA Central Security Service and the National Cyber Security Division of the Department of Homeland Security (DHS) agreed to expand NSA Centers
A dedicated unit of the NSA locates targets for the CIA for extrajudicial assassination in the Middle East
] The government has made, in 2015, slight changes in how it uses and collects certain types of data
tapping phone calls made to persons outside the country, without obtaining warrants from the United States Foreign Intelligence Surveillance Court, a secret court created for that purpose under the Foreign Intelligence Surveillance Act (FISA)
Directive 18 of President George Bush, was the Highlander Project undertaken for the National Security Agency by the U.S. Army 513th Military Intelligence Brigade. NSA relayed telephone (including cell phone) conversations obtained from ground, airborne, and satellite monitoring stations to various U.S. Army Signal Intelligence Officers, including the 201st Military Intelligence Battalion. Conversations of citizens of the U.S. were intercepted,
https://cdn.theatlantic.com/assets/media/img/mt/2016/03/23_select/lead_960.jpg?1459458371

some argued that FISA was implicitly overridden by a subsequent statute, the Authorization for Use of Military Force
which outlines "necessary and appropriate force" against those whom he determined "planned, authorized, committed or aided"
however the ruling in Hamdan v. Rumsfeld, says United States Congress may pass legislation preventing the Supreme Court from hearing the case of an accused combatant before his military commission takes place
In the August 2006 case ACLU v. NSA, U.S. District Court Judge Anna Diggs Taylor concluded that NSA's warrantless surveillance program was both illegal and unconstitutional. On July 6, 2007, the 6th Circuit Court of Appeals vacated the decision on the grounds that the ACLU lacked standing to bring the suit
http://abovethelaw.com/wp-content/uploads/2013/09/atl-podcast-img.png

ZeroEconmicHitmen - Last Wednesday at 3:31 PM
Center for Constitutional Rights filed a lawsuit, CCR v. Bush
September 2008, the Electronic Frontier Foundation (EFF) filed a class action lawsuit against the NSA and several high-ranking officials of the Bush administration
"illegal and unconstitutional program of dragnet communications surveillance,"
USA Freedom Act passed by Congress in June 2015, the NSA had to shut down its bulk phone surveillance program on November 29 of the same year. The USA Freedom Act forbids the NSA to collect metadata and content of phone calls unless it has a warrant for terrorism investigation. In that case the agency has to ask the telecom companies for the record, which will only be kept for six months.
Mark Klein, a former AT&T employee, alleged that his company had cooperated with NSA in installing Narus hardware to replace the FBI Carnivore program, to monitor network communications including traffic between American citizens.
2005 IRS training document showed that NSA intelligence intercepts and wiretaps, both foreign and domestic, were being supplied to the Drug Enforcement Administration (DEA) and Internal Revenue Service (IRS)
http://3.bp.blogspot.com/-fmVp0vDXF6c/VXAIBPbTnOI/AAAAAAAAAIM/U8PZfu5Mwz8/s1600/shutterstock_158845502.jpg

and were illegally used to launch criminal investigations of US citizens.
Rasmussen Reports found that 59% of Americans disapprove
NSA obtained a court order requiring Verizon's Business Network Services to provide metadata on all calls
http://i.kinja-img.com/gawker-media/image/upload/s--m4o-eAPB--/18hujd0q7vflnjpg.jpg

"the numbers of both parties on a call ... location data, call duration, unique identifiers, and the time and duration of all calls"
the majority of emails into or out of the United States are captured at "selected communications links" and automatically analyzed for keywords(edited)
https://basichackingskills.files.wordpress.com/2013/06/email.jpg

ZeroEconmicHitmen - Last Wednesday at 5:25 PM
the NSA "had no discernible impact on preventing acts of terrorism."
ZeroEyes - Last Wednesday at 5:35 PM
as of 2015, the collection process remains legal and grounded in the ruling from Smith v. Maryland (1979).(edited)
: "I cannot imagine a more 'indiscriminate' and 'arbitrary invasion' than this systematic and high tech collection and retention of personal data on virtually every single citizen for purposes of querying and analyzing it without prior judicial approval...Surely, such a program infringes on 'that degree of privacy' that the founders enshrined in the Fourth Amendment".
- which have purportedly challenged Americans' Fourth Amendment rights; including Upstream collection, a mass of techniques used by the Agency to collect and store American's data/communications directly from the Internet backbone
Under programs like PRISM, the NSA paid billions of dollars to telecommunications companies in order to collect data from them
telecommunications companies maintain bulk user metadata on their servers for at least 18 months, to be provided upon request to the NSA
made the mass storage of specific phone records at NSA datacenters illegal, but it did not rule on Section 215's constitutionality.
http://cxmagblog.com/wp-content/uploads/2013/05/sham.jpg

17,835 phone lines were on an improperly permitted "alert list" from 2006 to 2009 in breach of compliance, which tagged these phone lines for daily monitoring.
The NSA has been reported to have access to all communications made via Google, Microsoft, Facebook, Yahoo, YouTube, AOL, Skype, Apple and Paltalk,
and collects hundreds of millions of contact lists from personal email and instant messaging accounts each year
It has also managed to weaken much of the encryption used on the Internet (by collaborating with, coercing or otherwise infiltrating numerous technology companies to leave "backdoors" into their systems), so that the majority of encryption is inadverently vulnerable to different forms of attack.
https://blogs-images.forbes.com/davelewis/files/2014/11/broken-lock.jpg

he Patriot Act whereby the entirety of US communications may be considered "relevant" to a terrorism investigation
The NSA also spies on influential Muslims to obtain information that could be used to discredit them, such as their use of pornography. The targets, both domestic and abroad, are not suspected of any crime but hold religious or political views deemed "radical" by the NSA.
http://www.animefeminist.com/wp-content/uploads/2017/04/Clockwork13.png

90% of those placed under surveillance in the U.S. are ordinary Americans, and are not the intended targets.
The United States Foreign Intelligence Surveillance Court, the secret court charged with regulating the NSA's activities is, according to its chief judge, incapable of investigating or verifying how often the NSA breaks even its own secret rules.
http://feministsindia.com/wp-content/uploads/2013/02/Justice-denied.jpg

t the NSA violated its own rules on data access thousands of times a year, many of these violations involving large-scale data interceptions
NSA officers have even used data intercepts to spy on love interests
this critical element of the overall ... regime has never functioned effectively
Email contact lists (including those of US citizens) are collected at numerous foreign locations to work around the illegality of doing so on US soil
U.S. District Judge William Pauley ruled that the NSA's collection of telephone records is legal and valuable in the fight against terrorism
ZeroMrWorld - Last Wednesday at 6:17 PM
placing economists at private companies in order to increase the debt of foreign countries.
- Opt out of global data surveillance programs like PRISM, XKeyscore and Tempora.
Darknet thyself
ZeroEyes - Last Wednesday at 7:37 PM
PRISM surveillance program were published, showing that "the NSA apparently can gain access to the servers of nine Internet companies for a wide range of digital data."
The U.S. government has aggressively sought to dismiss and challenge Fourth Amendment cases raised against it, and has granted retroactive immunity to ISPs and telecoms participating in domestic surveillance
, EternalBlue, which is believed to have been created by the NSA, was used in the unprecedented worldwide WannaCry ransomware attack in May 2017.
NSA Hacking operations, which falls under the responsibility of the Tailored Access Operations (TAO) division
Domestic collection, which falls under the responsibility of the Special Source Operations (SSO) division.
ZeroEyes - Last Wednesday at 8:01 PM
CAPRI OS is a National Security Agency codename for a project that is sent SSH and SSL intercepts for post-processing.
Of Eschalon In November 3, 1999 the BBC reported that they had confirmation from the Australian Government of the existence of a powerful "global spying network" code-named Echelon, that could "eavesdrop on every single phone call, fax or e-mail, anywhere on the planet" with Britain and the United States as the chief protagonists.
The NSA was also involved in planning to blackmail people with "SEXINT", intelligence gained about a potential target's sexual activity and preferences. Those targeted had not committed any apparent crime nor were they charged with one.
http://spyarchive.com/tour/thumbs/sex_tour/50.jpg

In order to support its facial recognition program, the NSA is intercepting "millions of images per day"
http://www.socialistalternative.org/wp-content/uploads/2014/04/141816-facial-recognition.jpg

Edward Snowden revealed in June 2013 that between February 8 and March 8, 2013, the NSA collected about 124.8 billion telephone data items and 97.1 billion computer data items throughout the world
as was displayed in charts from an internal NSA tool codenamed Boundless Informant.(edited)
Edward Snowden claims that the NSA often bypasses encryption altogether by lifting information before it is encrypted or after it is decrypted
XKeyscore rules (as specified in a file xkeyscorerules100.txt, sourced by German TV stations NDR and WDR, who claim to have excerpts from its source code) reveal that the NSA tracks users of privacy-enhancing software tools, including Tor; an anonymous email service provided by the MIT Computer Science and Artificial Intelligence Laboratory (CSAIL) in Cambridge, Massachusetts; and readers of the Linux Journal.[
on September 18, 2013, that the NSA, who are the founder of SELinux, wanted a backdoor in the kernel.
boomerang routing has raised new concerns about the NSA's ability to surveil the domestic Internet traffic of foreign countries
Boomerang routing occurs when an Internet transmission that originates and terminates in a single country transits another. Research at the University of Toronto has suggested that approximately 25% of Canadian domestic traffic may be subject to NSA surveillance activities as a result of the boomerang routing of Canadian Internet service providers
The appearance of a 'Domestic Surveillance Directorate' of the NSA was soon exposed as a hoax in 2013(edited)
On March 11, 2004, President Bush signed a new authorization for mass surveillance of Internet records, in addition to the surveillance of phone records. This allowed the president to be able to override laws such as the Foreign Intelligence Surveillance Act, which protected civilians from mass surveillance. In addition to this, President Bush also signed that the measures of mass surveillance were also retroactively in place
ZeroEyes - Last Wednesday at 9:05 PM
Structure: Director, Deputy Director, NSA also has an Inspector General, head of the Office of the Inspector General (OIG), a General Counsel, head of the Office of the General Counsel (OGC) and a Director of Compliance, who is head of the Office of the Director of Compliance (ODOC)
Unlike other intelligence organizations such as CIA or DIA, NSA has always been particularly reticent concerning its internal organizational structure
As of 2013, NSA has about a dozen directorates, which are designated by a letter, although not all of them are publicly known. The directorates are divided in divisions and units starting with the letter of the parent directorate, followed by a number for the division, the sub-unit or a sub-sub-unit.

The main elements of the organizational structure of the NSA are:
F – Directorate only known from unit F6, the Special Collection Service (SCS), which is a joint program created by CIA and NSA in 1978 to facilitate clandestine activities such as bugging computers throughout the world, using the expertise of both agencies
G – Directorate only known from unit G112, the office that manages the Senior Span platform, attached to the U2 spy planes
J2- Cybersec- Counter Intelligence
Q – Security and Counterintelligence
R – Research Directorate, which conducts research on signals intelligence and on information assurance for the U.S. Government.
S – Signals Intelligence Directorate (SID), which is responsible for the collection, analysis, production and dissemination of signals intelligence. This directorate is led by a director and a deputy director. The SID consists of the following divisions:
S1 – Customer Relations
S2 – Analysis and Production Centers, with the following so-called Product Lines:
S2A: South Asia, S2B: China and Korea, S2C: International Security, S2E: Middle East/Asia, S2F: International Crime, S2G: Counter-proliferation, S2H: Russia, S2I: Counter-terrorism, S2J: Weapons and Space, S2T: Current Threats
S3 – Data Acquisition, with these divisions for the main collection programs:
S31 – Cryptanalysis and Exploitation Services (CES)
S32 – Tailored Access Operations (TAO), which hacks into foreign computers to conduct cyber-espionage and reportedly is "the largest and arguably the most important component of the NSA's huge Signal Intelligence (SIGINT) Directorate, consisting of over 1,000 military and civilian computer hackers, intelligence analysts, targeting specialists, computer hardware and software designers, and electrical engineers."
S33 – Global Access Operations (GAO), which is responsible for intercepts from satellites and other international SIGINT platforms.[190] A tool which details and maps the information collected by this unit is code-named Boundless Informant.
S34 – Collections Strategies and Requirements Center
S35 – Special Source Operations (SSO), which is responsible for domestic and compartmented collection programs, like for example the PRISM program.[190] Special Source Operations is also mentioned in connection to the FAIRVIEW collection program
ZeroEyes - Last Wednesday at 10:01 PM
T – Technical Directorate (TD)
NSANet stands for National Security Agency Network and is the official NSA intranet(edited)
It is a classified network,
for information up to the level of TS/SCI
top secret Sensitive compartmented information (SCI)
In the year 2000, a leadership team was formed, consisting of the Director, the Deputy Director and the Directors of the Signals Intelligence (SID), the Information Assurance (IAD) and the Technical Directorate (TD). The chiefs of other main NSA divisions became associate directors of the senior leadership team
After president George W. Bush initiated the President's Surveillance Program (PSP) in 2001, the NSA created a 24-hour Metadata Analysis Center (MAC), followed in 2004 by the Advanced Analysis Division (AAD), with the mission of analyzing content, Internet metadata and telephone metadata. Both units were part of the Signals Intelligence Directorate.
to support the use and sharing of intelligence data between NSA and the signals intelligence agencies of the four other nations of the Five Eyes partnership. The management of NSANet has been delegated to the Central Security Service Texas (CSSTEXAS)
NSANet is a highly secured computer network consisting of fiber-optic and satellite communication channels which are almost completely separated from the public Internet. The network allows NSA personnel and civilian and military intelligence analysts anywhere in the world to have access to the agency's systems and databases. This access is tightly controlled and monitored. For example, every keystroke is logged, activities are audited at random and downloading and printing of documents from NSANet are recorded
The thousands of Top Secret internal NSA documents that were taken by Edward Snowden in 2013 were stored in "a file-sharing location on the NSA's intranet site" so they could easily be read online by NSA personnel. Everyone with a TS/SCI-clearance had access to these documents and as a system administrator, Snowden was responsible for moving accidentally misplaced highly sensitive documents to more secure storage locations
The NSA maintains at least two watch centers:

National Security Operations Center
NSA/CSS Threat Operations Center (NTOC)
world's largest single employer of mathematicians.
some NSA employees form part of the workforce of the National Reconnaissance Office (NRO), the agency that provides the NSA with satellite signals intelligence(edited)
The NSA received criticism early on in 1960 after two agents had defected to the Soviet Union
security breaches reoccurred only a year later when in an issue of Izvestia of July 23, 1963, a former NSA employee published several cryptologic secrets.
ZeroEyes - Last Wednesday at 11:05 PM
necessity of surveillance by the Congress to prevent abuse of power ZeroEyes - Last Thursday at 12:24 AM
historically EPQs or "embarrassing personal questions" about sexual behavior had been included in the NSA polygraph
NSA's brochure states that the average test length is between two and four hours
"It appears that the NSA [National Security Agency] (and possibly CIA) use the polygraph not to determine deception or truthfulness per se, but as a technique of interrogation to encourage admissions."
(3.4%) confessed to previous felony crimes; almost all of those crimes had been undetected.
the NSA-produced video omits some information about the polygraph process
accused the NSA polygraph video of being "Orwellian"
In September 1986, the Operations 2A and 2B buildings, both copper-shielded to prevent eavesdropping, opened with a dedication by President Ronald Reagan
The four NSA buildings became known as the "Big Four."
The OPS2A building
"dark glass Rubik's Cube"
NSA headquarters has its own post office, fire department, and police force
The employees at the NSA headquarters reside in various places in the Baltimore-Washington area, including Annapolis, Baltimore, and Columbia in Maryland and the District of Columbia, including the Georgetown community.
BGE provided NSA with 65 to 75 megawatts at Ft. Meade in 2007, and expected that an increase of 10 to 15 megawatts would be needed later that year.
In 2011, NSA at Ft. Meade was Maryland's largest consumer of power
In 2007, as BGE's largest customer, NSA bought as much electricity as Annapolis, the capital city of Maryland
Called Site M, the center has a 150 megawatt power substation, 14 administrative buildings and 10 parking garages
It cost $3.2 billion and covers 227 acres (92 ha; 0.355 sq mi)
and initially uses 60 megawatts of electricity
Increments II and III are expected to be completed by 2030, and would quadruple the space, covering 5,800,000 square feet (54 ha; 0.21 sq mi) with 60 buildings and 40 parking garages
Defense contractors are also establishing or expanding cybersecurity facilities near the NSA and around the Washington metropolitan area.
NSA had facilities at Friendship Annex (FANX) in Linthicum, Maryland, which is a 20 to 25-minute drive from Ft. Meade
the Aerospace Data Facility at Buckley Air Force Base in Aurora outside Denver, Colorado; NSA Texas in the Texas Cryptology Center at Lackland Air Force Base in San Antonio, Texas; NSA Georgia at Fort Gordon in Augusta, Georgia; NSA Hawaii in Honolulu; the Multiprogram Research Facility in Oak Ridge, Tennessee, and elsewhere.
On January 6, 2011, a groundbreaking ceremony was held to begin construction on NSA's first Comprehensive National Cyber-security Initiative (CNCI) Data Center, known as the "Utah Data Center" for short. The $1.5B data center is being built at Camp Williams, Utah, located 25 miles (40 km) south of Salt Lake City, and will help support the agency's National Cyber-security Initiative
n 2012, NSA began to move some of its operations at Yakima Research Station, Yakima Training Center, in Washington state to Colorado,
NSA also intended to close operations at Sugar Grove, West Virginia
In 2013, a new Consolidated Intelligence Center, also to be used by NSA, is being built at the headquarters of the United States Army Europe in Wiesbaden, Germany
NSA's partnership with Bundesnachrichtendienst
One is at the US Embassy in Bangkok, a joint NSA-CIA Special Collection Service (SCS) unit. It presumably eavesdrops on foreign embassies, governmental communications, and other targets of opportunity
The second installation is a FORNSAT (foreign satellite interception) station in the Thai city of Khon Kaen. It is codenamed INDRA, but has also been referred to as LEMONWOOD
ZeroEyes - Last Thursday at 1:08 AM
Palantir watches everything you do and predicts what you will do next in order to stop it. As of 2013, its client list included the CIA, the FBI, the NSA, the Centre for Disease Control, the Marine Corps, the Air Force, Special Operations Command, West Point and the IRS. Up to 50% of its business is with the public sector. In-Q-Tel, the CIA’s venture arm, was an early investor.
NSA unlawfully surveiled Kim Dotcom in New Zealand
Dotcom was surveilled by the NSA and the GCSB in a joint intelligence operation named Operation Debut. According to the Herald, that surveillance was scheduled to end in January 2012, but the United States continued to use New Zealand's technology.
Dotcom is facing charges of copyright infringement and money laundering related to Megaupload, a file-sharing website shut down in 2012. He is currently fighting U.S. attempts to extradite him from New Zealand.
http://thehill.com/sites/default/files/styles/thumb_small_article/public/blogs/dotcomkim_051415getty.jpg?itok=FQIhTHtq

Utah Data Center massive data center mdc
Today, it continues to spy on a vast but unknown number of Americans’ international calls, text messages, web-browsing activities, and emails.(edited)
show just how thoroughly US intelligence has compromised elements of the global banking system. The new leak includes evidence that the NSA hacked into EastNets, a Dubai-based firm that oversees payments in the global SWIFT transaction system for dozens of client banks and other firms, particularly in the Middle East. The leak includes detailed lists of hacked or potentially targeted computers, including those belonging to firms in Qatar, Dubai, Abu Dhabi, Syria, Yemen, and the Palestinian territories.
today's leak is the first indication of targets of that sophisticated hacking in the global banking system.
many of the listed targets are in US-friendly countries like Dubai and Qatar. "A big shitstorm is to come," says Suiche. "You can expect the leadership of key organizations like banks and governments are going to be quite irritated, and they’re going to react."
http://i.dailymail.co.uk/i/pix/2010/04/07/article-0-09077628000005DC-613_468x344.jpg

warrantless-wiretapping program. “They violated the Constitution setting it up,” he says bluntly. “But they didn’t care. They were going to do it anyway, and they were going to crucify anyone who stood in the way. When they started violating the Constitution, I couldn’t stay.” Binney says
The software, created by a company called Narus that’s now part of Boeing, is controlled remotely from NSA headquarters at Fort Meade in Maryland and searches US sources for target addresses, locations, countries, and phone numbers, as well as watch-listed names, keywords, and phrases in email. Any communication that arouses suspicion, especially those to or from the million or so people on agency watch lists, are automatically copied or recorded and then transmitted to the NSA.
ZeroEyes - Last Thursday at 2:22 AM
In an NSA presentation slide on “Google Cloud Exploitation,” however, a sketch shows where the “Public Internet” meets the internal “Google Cloud” where their data reside. In hand-printed letters, the drawing notes that encryption is “added and removed here!” The artist adds a smiley face, a cheeky celebration of victory over Google security.
Because digital communications and cloud storage do not usually adhere to national boundaries, MUSCULAR and a previously disclosed NSA operation to collect Internet address books have amassed content and metadata on a previously unknown scale from U.S. citizens and residents.
NSA’s authorized housing company is ORCHID EVENT SOLUTIONS, located in Salt Lake City, Utah.
the NSA could use 'traffic-shaping' techniques to deliberately send traffic from within the US to points of interception on foreign territory, where it could be swept up as part of operations that would be illegal if conducted on US territory," Goldberg said.
The U.S. National Security Agency has figured out how to hide spying software deep within hard drives made by Western Digital, Seagate, Toshiba and other top manufacturers, giving the agency the means to eavesdrop on the majority of the world’s computers, according to cyber researchers and former operatives.
ZeroNSA - Last Thursday at 6:54 PM
FISA is reconsidered and pointed questions are rightfully asked of the National Security Agency — about what its quantum computers can and cannot do, and what its massive data centers do and do not store —ZeroStateRoom - Yesterday at 4:17 PM
widespread involvement of CIA and NSA personnel in drugs and human smuggling
ZeroWindows - Last Thursday at 4:33 PM
ETERNALROMANCE — Remote privilege escalation (SYSTEM) exploit (Windows XP to Windows 2008 over TCP port 445)
Later on, researchers at Kaspersky Lab publish a larger analysis of NotPetya. They reveal that the ransomware does use EternalBlue, as well as EternalRomance, another exploit targeting some Windows machines as infection vectors
Lateral movement using EternalBlue and EternalRomance
The new ransomware can also spread using an exploit for the Server Message Block (SMB) vulnerability CVE-2017-0144 (also known as EternalBlue), which was fixed in security update MS17-010 and was also exploited by WannaCrypt to spread to out-of-date machines. In addition, this ransomware also uses a second exploit for CVE-2017-0145 (also known as EternalRomance, and fixed by the same bulletin).
ZeroWanna - Last Thursday at 5:52 PM
Before we can run the Eternalromance exploit we need to generate shellcode with DoublePulsar. The output file that contains the shellcode will be used by the Eternalromance exploit to infect the target with the DoublePulsar backdoor. When the backdoor is installed on the target system we can use it to run a reverse Meterpreter shell.

Let’s start Fuzzbunch and supply the requested information about the target IP and the call back IP. Choose not to use redirection and keep the base log directory default:
http://www.hackingtutorials.org/wp-content/uploads/2017/05/4-DoublePulsar-settings.jpg

In the case of the ETERNALROMANCE exploit, the subverted function pointer would lead to a security fault when invoked, making the exploit non-functional in its current form. The same applies for ETERNALBLUE, which also relies on a corrupted function pointer to achieve code execution.
Patch EternalRomance
MS17-010
auxiliary/scanner/smb/smb_ms17_010 ZeroEyes - Last Wednesday at 7:50 PM
EternalBlue, which is believed to have been created by the NSA, was used in the unprecedented worldwide WannaCry ransomware attack in May 2017.
The exploit had been leaked online by a hacking group, The Shadow Brokers, nearly a month prior to the attack. A number of experts have pointed the finger at the NSA's non-disclosure of the underlying vulnerability, and their loss of control over the EternalBlue attack tool that exploited it. Edward Snowden said that if the NSA had "privately disclosed the flaw used to attack hospitals when they found it, not when they lost it, [the attack] might not have happened"
the moment the NSA found it, they should have notified Microsoft so they could quietly issue a patch and really chivvy people along, long before it became a huge problem. ZeroEconmicHitmen - Last Thursday at 2:38 PM
EternalBlue, sometimes stylized as ETERNALBLUE, is an exploit generally believed to be developed by the U.S. National Security Agency (NSA). It was leaked by the Shadow Brokers hacker group on April 14, 2017, and was used as part of the worldwide WannaCry ransomware attack on May 12, 2017.(edited)
The exploit was also used to help carry out the 2017 NotPetya cyberattack on June 27, 2017
ZeroEconmicHitmen - Last Thursday at 3:08 PM
EternalBlue exploits a vulnerability in Microsoft's implementation of the Server Message Block (SMB) protocol.
This vulnerability is denoted by entry CVE-2017-0144[7][8] in the Common Vulnerabilities and Exposures (CVE) catalog. The vulnerability exists because the SMB version 1 (SMBv1) server in various versions of Microsoft Windows mishandles specially crafted packets from remote attackers, allowing them to execute arbitrary code on the target computer
Many Windows users had not installed the patches when, two months later on May 12, 2017, the WannaCry ransomware attack used the EternalBlue vulnerability to spread itself
According to Microsoft, it was the US's NSA that was responsible, by dint of its controversial strategy of "stockpiling of vulnerabilities", for, at the least, preventing Microsoft from timely public patching of this, and presumably other, hidden bugs
EternalRocks or MicroBotMassiveNet is a computer worm that infects Microsoft Windows. It uses seven exploits developed by the NSA
Comparatively, the WannaCry ransomware program that infected 230,000 computers in May 2017 only uses two NSA exploits, making researchers believe EternalRocks to be significantly more dangerous
EternalBlue was among the several exploits used, in conjunction with the DoublePulsar backdoor implant tool
EternalBlue, exploits MS17-010
a Windows SMB vulnerability.
The Metasploit module - developed by contributors zerosum0x0
https://twitter.com/zerosum0x0
zerosum0x0:owl: (@zerosum0x0)
:owl::owl::owl:🧙‍♂️:owl::owl::owl:
Tweets
499
Followers
5691

Twitter
And https://twitter.com/jennamagius
Jenna Magius (@JennaMagius)
Cute girl. Loves 2x speed playback. Not representing my employer. Try not to know who my employer is TBH. https://octodon.social/@jennamagius
Tweets
12434
Followers
1466

Twitter
designed specifically to enable security professionals to test their organization's vulnerability and susceptibility to attack via EternalBlue. It does not include ransomware like WannaCry does and it won't be worming its merry way around the internet.
They both reverse engineered EternalBlue
Zerosum0x0 and JennaMagius both work at as security researchers at RiskSense
https://pbs.twimg.com/profile_images/693286666568531968/LLwxOAgc_400x400.png

https://pbs.twimg.com/profile_images/538164874157645824/cz9rXWB__400x400.jpeg

It is important to note that to our knowledge no code from the Metasploit module was ever used in the WannaCry attacks.
To be successful, the attackers independently implemented sending the network traffic in C; constructed additional code to interact with DoublePulsar
whoever wrote the original exploits did a lot of experimentation to find the best path to turn that crash into code execution. They’ve done all the hard work, so now it’s about what’s changed between different versions of Windows to fix it up
https://pbs.twimg.com/media/C_omQ0gXkAQkWsT.jpg

https://blogs-images.forbes.com/thomasbrewster/files/2017/05/Screen-Shot-2017-05-12-at-17.23.46-1200x681.jpg?width=960

The most concerning aspect of WannaCry is its use of the worm-like EternalBlue exploit, added Meyers.
The full list of tools documented by Hickey are:

ETERNALROMANCE — Remote privilege escalation (SYSTEM) exploit (Windows XP to Windows 2008 over TCP port 445)
ENTERNALCHAMPION, ETERNALSYSTEM — Remote exploit up to Windows 8 and 2012
ETERNALBLUE — Remote Exploit via SMB & NBT (Windows XP to Windows 2012)
EXPLODINGCAN — Remote IIS 6.0 exploit for Windows 2003
EWORKFRENZY — Lotus Domino 6.5.4 and 7.0.2 exploit
ETERNALSYNERGY — Windows 8 and Windows Server 2012
FUZZBUNCH — Exploit Framework (Similar to Metasploit) for the exploits.
http://orig10.deviantart.net/f4d9/f/2010/340/3/3/windows_sucks_wallpaper_by_hockeygeek21-d34czpp.png
ZeroEconmicHitmen - Last Thursday at 2:42 PM
EternalBlue The exploit was also used to help carry out the 2017 NotPetya cyberattack on June 27, 2017
ZeroWindows - Last Thursday at 4:29 PM
Kaspersky Lab tweets out a statement clarifying that the ransomworm is not a variant of Petya but is actually a new ransomware they named “NotPetya.” They also reveal the threat has affected approximately 2,000 organizations at the time of their posting.
This is definitely not designed to make money. This is designed to spread fast and cause damage, with a plausibly deniable cover of ‘ransomware.'”
Later on, researchers at Kaspersky Lab publish a larger analysis of NotPetya. They reveal that the ransomware does use EternalBlue, as well as EternalRomance, another exploit targeting some Windows machines as infection vectors.
reveal administrators can stop NotPetya from writing/executing by creating a file “C:Windowsperfc.dat”.
The ransomware looks for this file on an infected computer. If it discovers it, it exits its encryption routine. Administrators must install this file on every computer to forestall encryption, however. As a result, the file proves to be more of a vaccine than a killswitch.
https://www.extremetech.com/wp-content/uploads/2017/06/notpetya-640x353.jpg

NotPetya/GoldenEye
hit around 65 countries worldwide, including Belgium, Brazil, France, Germany, India, Russia, and the United States.
Petrwrap, NotPetya, exPetr, and GoldenEye, is in fact overwriting MBR sectors without saving them elsewhere.
The malware supposedly saves the original first sector (MBR) elsewhere, but trashes the next 24 sectors
“designed as a wiper pretending to be ransomware,”
the idea that the main goal of the attack “was not financially motivated, but destructive.”
The name Petya is a reference to the 1995 James Bond film GoldenEye, wherein Petya is one of two weapon satellites that carries a "Goldeneye"
Petya utilizes a payload that infects the computer's master boot record (MBR), overwriting the Windows bootloader, and then triggering a restart. On the next startup, the payload is executed, which encrypts the Master File Table of the NTFS file system, and then displays the ransom message demanding a payment made in Bitcoin.(edited)
During the attack initiated on 27 June 2017, the radiation monitoring system at Ukraine's Chernobyl Nuclear Power Plant went offline
attacks based on malware created by the NSA.
simply to render systems unusable and cause economic damage
https://pbs.twimg.com/media/DG3U044XUAAI-cH.jpg

Diskcoder.C
http://docs.ismgcorp.com/files/images_articles/tax-id-cookie-04jul2017.png

he Washington D.C. office of the law firm DLA Piper was also hit
Merck, based in New Jersey, said on Twitter, “We confirm our company’s computer network was compromised today as part of global hack.
'Petya' Ransomware Hits At Least 65 Countries
All you need to do is copy and rename the c drive
Make it read only
Lateral movement using EternalBlue and EternalRomance
The new ransomware can also spread using an exploit for the Server Message Block (SMB) vulnerability CVE-2017-0144 (also known as EternalBlue), which was fixed in security update MS17-010 and was also exploited by WannaCrypt to spread to out-of-date machines. In addition, this ransomware also uses a second exploit for CVE-2017-0145 (also known as EternalRomance, and fixed by the same bulletin).
Unlike most other ransomware, this threat does not append a new file name extension to encrypted files. Instead, it overwrites the said files.

The AES key generated for encryption is per machine, per fixed drive, and gets exported and encrypted using the embedded 2048-bit RSA public key of the attacker.
https://cointelegraph.com/images/725_Ly9jb2ludGVsZWdyYXBoLmNvbS9zdG9yYWdlL3VwbG9hZHMvdmlldy83MjNhYTU4NGJhY2EwZDdmYzU5OGY4ZDUxMzQ1YjgyZS4=.jpg
ZeroEconmicHitmen - Last Thursday at 3:13 PM
EternalRocks or MicroBotMassiveNet is a computer worm that infects Microsoft Windows. It uses seven exploits developed by the NSA
Comparatively, the WannaCry ransomware program that infected 230,000 computers in May 2017 only uses two NSA exploits, making researchers believe EternalRocks to be significantly more dangerous.
The worm was discovered via honeypot
EternalRocks first installs Tor, a private network that conceals Internet activity, to access its hidden servers. After a brief 24 hour "incubation period", the server then responds to the malware request by downloading and self-replicating on the "host" machine.
The malware even names itself WannaCry to avoid detection from security researchers. Unlike WannaCry, EternalRocks does not possess a kill switch and is not ransomware
How to scan for wannacry https://community.rapid7.com/community/nexpose/blog/2017/05/17/scanning-and-remediating-wannacry-in-insightvm-and-nexpose
ZeroWanna - Last Thursday at 5:38 PM
The worm, which Stampar calls EternalRocks, currently has no payload and spreads in two stages over a 24-hour period. Heimdal Security has also seen a similar sample, which it calls BlueDoom.
EternalRock has two stages, and there’s a long delay between the moment the malware sends a signal to the control server to confirm infection and the reply being received from the server,” Kaspersky Lab said. “Such behavior is not unusual and seems to be a sandbox mitigation technique.”
“The analysis done on BlueDoom hints that cyber criminals may be preparing to integrate an array of different exploits for an attack that combines a full set of digital weapons,” Heimdal Andra Zaharia said. “BlueDoom is different from WannaCry because it shows a long-term intent to make use of vulnerabilities stemming from virtually all Shadow Brokers leaks containing Windows exploits.”
https://www.pcmarket.com.hk/wp-content/uploads/2017/05/title-16.png
lready, the NSA’s SMB exploits have been used, not only to spread ransomware, but also a cryptocurrency miner and a remote access Trojan. And unlike WannaCry, Stampar said EternalRocks does not include a so-called killswitch
Minor patch https://github.com/stamparm/EternalRocks/commit/47ef509b32fbec4b367a6327193fb221d7f3dd19
GitHub
Minor patch · stamparm/EternalRocks@47ef509

https://blog.varonis.com/wp-content/uploads/2017/05/eternalrocks-featured.png

After a delay, currently set to 24 hours, the C&C server responds and an archive containing the 7 SMB exploits are downloaded. This delay is likely to avoid sandboxing techniques
Next the worm scans the internet for open SMB ports – to spread the infection to other organizations.
Block external access to SMB ports on the public internet

Patch all SMB vulnerabilities
Block access to C&C servers (ubgdgno5eswkhmpy.onion) and block access to Torproject.org while you are at it
Monitor for any newly added scheduled tasks
A DOUBLEPULSAR detection script is available on Github
Make sure DatAlert Analytics is up to date monitoring your organization for insider threats
EternalRocks will proceed to scan the internet for systems with open 445 ports, which serve as the gateway for the worm’s infection. Some of the vulnerabilities exploited by EternalRocks
EternalRocks uses EternalBlue, DoublePulsar, EternalChampion, EternalRomance, EternalSynergy, ArchiTouch and SMBTouch -- all tools leaked by the Shadow Brokers. Stampar said he found the packed hack after it infected his honeypot, a trap set to monitor incoming malware.
It even names itself WannaCry in an attempt to hide from security researchers, Stampar said. Like variants of WannaCry
When the worm is executed, it creates the following folders:
%ProgramFiles%Microsoft UpdatesSharpZLib
%ProgramFiles%Microsoft UpdatesTempDataTorgeoip
%ProgramFiles%Microsoft UpdatesTempDataTorgeoip6
%ProgramFiles%Microsoft UpdatesTorlock
%ProgramFiles%Microsoft UpdatesTortorrc
%ProgramFiles%Microsoft UpdatesTorstate
%ProgramFiles%Microsoft UpdatesTorhidden_servicehostname
%ProgramFiles%Microsoft UpdatesTorhidden_serviceprivate_key

The worm also creates the following files:
%ProgramFiles%Microsoft Updatesinstalled.fgh
%ProgramFiles%Microsoft UpdatesSharpZLib.zip
%ProgramFiles%Microsoft UpdatesICSharpCode.SharpZipLib.dll
%ProgramFiles%Microsoft UpdatesMicrosoft.Win32.TaskScheduler.dll
%ProgramFiles%Microsoft Updatessvchost.exe
%ProgramFiles%Microsoft Updatestaskhost.exe
%ProgramFiles%Microsoft Updatestorunzip.exe
%ProgramFiles%Microsoft UpdatesTemptor.zip
%ProgramFiles%Microsoft UpdatesTorlibeay32.dll
%ProgramFiles%Microsoft UpdatesTorlibevent-2-0-5.dll
%ProgramFiles%Microsoft UpdatesTorlibevent_core-2-0-5.dll
%ProgramFiles%Microsoft UpdatesTorlibevent_extra-2-0-5.dll
%ProgramFiles%Microsoft UpdatesTorlibgcc_s_sjlj-1.dll
%ProgramFiles%Microsoft UpdatesTorlibssp-0.dll
%ProgramFiles%Microsoft UpdatesTorssleay32.dll
%ProgramFiles%Microsoft UpdatesTortor.exe
%ProgramFiles%Microsoft UpdatesTorzlib1.dll
%ProgramFiles%Microsoft Updates
equired.glo
The worm then creates the following mutexes so that only one instance of the threat executes on the computer:
{8F6F00C4-B901-45fd-08CF-72FDEFF}
{8F6F0AC4-B9A1-45fd-A8CF-72FDEFF}
20b70e57-1c2e-4de9-99e5-69f369006912 ZeroEconmicHitmen - Last Thursday at 3:16 PM
EternalBlue was among the several exploits used, in conjunction with the DoublePulsar backdoor implant tool
“The DoublePulsar backdoor is kind of a red herring for researchers and defenders to focus on,” Dillon said. “We demonstrated that by creating a new payload that can load malware directly without having to first install the DoublePulsar backdoor. So people looking to defend against these attacks in the future should not focus solely on DoublePulsar. Focus on what parts of the exploit we can detect and block.”
ZeroPatient - Last Thursday at 6:00 PM
The Trojan communicates with the attacker using one or more of the following protocols:
RDP
SMB

The Trojan may perform the following actions:
Test to see if itself is already present
Inject a DLL into a user mode process and call the specified export function of the injected DLL
Execute shellcode from the attacker
Drop shellcode to a file on disk
Uninstall itself
NSA exploits are "10 times worse" than the Heartbleed security bug, and use DoublePulsar as the primary payload. DoublePulsar runs in kernel mode
https://trtpost-wpengine.netdna-ssl.com/files/2017/04/doublepulsar.png

Exploits such as EternalBlue, EternalChampion, EternalSynergy and EternalRomance that are part of the Fuzzbunch exploit platform all drop DoublePulsar onto compromised hosts.
. DoublePulsar is a sophisticated memory-based kernel payload that hooks onto x86 and 64-bit systems and allows an attacker to execute any raw shellcode payload they wish.
DoublePulsar works on older Windows Server versions with older versions of PatchGuard kernel protection; modern versions of Windows such as Windows 10 have better kernel checks that could help block or prevent these hooks deep into the OS.
It does not open new ports. Once the backdoor is present, it can do one of four things: either it responds to a specific ping request (such as a heartbeat), it can uninstall itself, load shellcode, or run a DLL on the host. That’s it,” Tentler said. “It’s only purpose is to provide a covert channel by which to load other malware or executables.”

One drawback for the attacker is that since the attack lives in memory, once a machine is rebooted, it’s gone. DoublePulsar also comes with a kill or burn command that won’t remove the infection, but does prevent others from making use of the backdoor.
https://www.renditioninfosec.com/wp-content/uploads/2017/04/Screen-Shot-2017-04-27-at-9.23.38-AM.png

doublepulsar detection script https://github.com/countercept/doublepulsar-detection-script/blob/master/detect_doublepulsar_smb.py
GitHub
countercept/doublepulsar-detection-script
doublepulsar-detection-script - A python2 script for sweeping a network to find windows systems compromised with the DOUBLEPULSAR implant.
ZeroEyes - Last Wednesday at 1:40 AM
CIA/NSA joint Special Collection Service (a highly classified intelligence team) inserts eavesdropping devices
SCS collection tactics allegedly encompass "close surveillance, burglary, wiretapping, [and] breaking and entering"
ZeroEyes - Last Wednesday at 9:08 PM
F – Directorate only known from unit F6, the Special Collection Service (SCS), which is a joint program created by CIA and NSA in 1978 to facilitate clandestine activities such as bugging computers throughout the world, using the expertise of both agencies ZeroNSA - Last Thursday at 6:36 PM
The Special Collection Service (SCS) is a highly classified joint U.S. Central Intelligence Agency–National Security Agency program charged with inserting eavesdropping equipment in difficult-to-reach places
"Mission Impossible force"
According to documents leaked by Edward Snowden, the SCS is part of a larger global surveillance program known as STATEROOM
responsible for "close surveillance, burglary, wiretapping, breaking and entering"
The SCS is a U.S. black budget program
It is headquartered in Beltsville, Maryland, in an obscured building that was at one time labeled simply "CSSG". Next door is the U.S. Department of State's Beltsville Messaging Center, to which the SCS is linked via fiber optic cable. The SCS is jointly staffed by the Central Intelligence Agency (CIA) and the National Security Agency (NSA).
Their mission is to intercept sensitive information on espionage, weapons and drugs (except for those being sold by the CIA)
the SCS was born, combining the communications intelligence capabilities of the NSA with the covert action capabilities of the CIA
The U.S. government has never officially acknowledged its existence, and little is known about the technologies and techniques it employs
account of SCS comes from a Canadian, Mike Frost, whose 1994 book Spyworld revealed that the program was known to insiders at the time as "College Park"
The SCS program was established in the late 1970s
Around this time, SCS operatives reportedly hid eavesdropping devices in pigeons perched on the windowsills
https://zafarsahi.files.wordpress.com/2015/05/spy-pigeon.jpg?w=656

SCS operatives covertly entered Afghanistan to place eavesdropping devices within range of Al-Qaeda
planted 27 satellite-controlled bugs in the Boeing 767-300ER that was to be used as Chinese President Jiang Zemin's official jet.
He further reported that "this was a massive intelligence collection operation—one that was not in accordance with what UNSCOM was supposed to be doing" at the time.
NSA contractor Edward Snowden led to the unveiling of the SCS having systematically wiretapped Chancellor of Germany Angela Merkel's private cell phone over a period of over 10 years, which among other activities to wiretap and systematically record large amounts of European and South American leaders' and citizens' communication by the NSA led to a distinct diplomatic backlash at the United States governmen
"When you think of NSA, you think satellites. When you think CIA, you think James Bond and microfilm. But you don't really think of an agency whose sole purpose is to get up real close and use the best technology there is to listen and transmit. That's SCS."
Officially, the Special Collection Service doesn't exist, and isn't headquartered in a guarded complex on a densely forested 300-acre lot
the Special Collection Service was invading communications networks of friend and foe alike
One such known system is ORATORY, first used extensively during the Gulf War, and likely still operational in some variation. After locating mission objectives, Special Collection Elements place antennas in nondescript locations and ORATORY goes "up" on the target. The device is given key words to listen for, and when those topics come up by phone or in person, the system captures the conversations for analysis.
it's easier to simply break into a building and install a hidden microphone, whereupon intelligence can be gathered and voices recorded before encryption ever takes place. Sensitive listening devices can be dropped into computer keyboards, recording the unique clicks of each key for use in reconstructing everything typed. When a lock pick is too risky, however, locals are sometimes bribed to do the dirty work. Agents might be tasked with something as small as planting a bug, or as large as compromising a nation's entire information infrastructure.
signals intelligence has always been a cat-and-mouse game.
Are there methods to better identify and survey VPN's to provide CES
the data they need?
• Can we leverage MIRROR, DARKQUEST, PANOPLY survey
information to quickly identify and report the presence of VPN's in
surveyed signals?
• Can we use BIRDWATCHER or other means to automatically
resurvey for key exchanges and obtain paired collect?

ZeroNSA - Yesterday at 4:09 AM
The secret list reveals that its agents are active worldwide in around 80 locations, 19 of which are in Europe — cities such as Paris, Madrid, Rome, Prague and Geneva. The SCS maintains two bases in Germany, one in Berlin and another in Frankfurt. That alone is unusual. But in addition, both German

ZeroF6 - Ye

Advertisement

Disable Third Party Ads