Category Archives: spying

hogwash in the self-signed cert arena for OEMs

bad journalism and self-centered experts. That’s all I see http://www.cnet.com/news/superfish-torments-lenovo-owners-with-more-than-adware/ It was always intended that OEMs and browser distributors should insert their own trust points into the windows trust stores. If Sprint licensed the original netscape browser and tune things … Continue reading

Posted in spying, ssl

google, moffet, me, Google and USA’s historical spying triumvirate

http://www.cnet.com/news/google-to-lease-historic-bay-area-airfield-from-nasa/ The article prompts me to have nostalgia – since I worked at the site in question. A fixture of silicon valley for sure, the hanger is worth a visit – particularly when understanding what it was used for after … Continue reading

Posted in spying

US wireless exfil of the data espied

So how does the CIA get back to the US the data that its illegal taps on German routers obtain? One assume that its by radio link – in high-burst mode, at very high bandwidth. So assuming next that what … Continue reading

Posted in spying

cia/nsa interception of my phone

Let’s assume there is a compromised firmware/software in a phone – and then someone orders a new one, expecting next day delivery. How do the “exceptionals” think? First of all, you have to intercept the fedex package (which is not … Continue reading

Posted in spying

From sequency to modern acoustic device identification–Berlin Embassy

Back at https://yorkporc.wordpress.com/2012/02/23/fundamenta-of-keystream-generation/ we took a look the sequency. Having created an additive signal from a set of individual weighted walsh functions taken from the hadamard matrix (or orthonormal basis functions), one learns how the inverse WHT identifies the weightings. … Continue reading

Posted in colossus, spying

NSA/GCHQ packet staining vs crypto staining

There  seem to be 2 ways to exploit staining: 1) The method of http://cryptome.org/2013/10/packet-stain/packet-staining.htm in which IPv4 packets from “intelligence sources” are stained by putting them within an IPv6 tunnel whose headers are processed by carriers supporting NSA mission. Of … Continue reading

Posted in spying

UK is rattled over home router ssl; wavering public confidence; BBC malfeasance

  photo credit: withheld at the request of multiple national security agencies. In a major if somewhat technically embarrassing puff piece FOR GCHQ and co, the BBC does its duty as a state broadcaster: push the government line and cow … Continue reading

Posted in spying

my heart bleeds for NSA and GCHQ, wholly still able to steal your passwords

So folks are happily patching the exploit-laden openssl NSA engineered into open source  couple of years ago. Of course, it dumped memory. Now, folks are happily upgrading to the new openssl NSA engineered exploit, since the old one is widely … Continue reading

Posted in spying

when nsa/gchq attacks, it comes in different forms

Sometimes the goal is to learn WHERE you first go (once you have your [failed] tunnel). That is, there desire is to learn the intent to network securely (vs learn nothing from the irrelevant blabber). The goal is to get … Continue reading

Posted in spying

analyzing my phone, for american-insecurity-by-design

Lets continue the thinking line that assigns to those who think themselves inherently exceptional the inclination, of not the impulse, to now double-down – and get even more devious. Nothing in the character of an exceptional will ever stop, back … Continue reading

Posted in spying

cisco anyconnect and nsa ssl vpn exploits

Being a legitimate foreign intelligence target, I watch my computer for obvious signs of snoops, probably us based, doing what they are paid to do: engage in snooping. The latest interesting observation comes from watching how and older, unpatched version … Continue reading

Posted in spying

nsa spying on wifi on coffee shops at the San Francisco RSA Conference

  So lets say you want to “know” the world security professionals, who they talk to, where they network, how drunk they get, their sexual preferences (for use in blackmail)? Where would you MOST CHEAPLY get it? You’d spy on … Continue reading

Posted in spying

battle of the wifi net names–quantum source of randomness (give or take a bit of unshielded electronics)

The (old) empire strikes back in the battle of the “humerous” wifi net names broacast publicly, giving me a “hint”. Presumably the death squads follow. I suppose its just possible, amongst 8 billion humans, there is another that likes Fozzie … Continue reading

Posted in spying

is the typical UK hotel chain wifi subverted (ie spying on its guests)?

2014-0286.pdf cryptome collection   so lets assume that some oldboy military network, founded at the concierge and the bell boys/girls, is a snooping point for GCHQ, keeping their eyes and ears on whomsoever the “old boys” wish to collect dirt … Continue reading

Posted in spying

military/intel fbi surveillance is back on

The traffic cop with the radar gun was pissed, visibily, when their traffic violation setup failed, 3 days ago. The old man who (cheaply) follows me around in Reno, pretending not to, is back. Since they have complete intel on … Continue reading

Posted in spying

windows battery data to NSA

  powercfg /batteryreport

Posted in spying

special source access at Google

http://www.theguardian.com/technology/2013/oct/30/google-reports-nsa-secretly-intercepts-data-links Based on my knowledge of “special source access” programs V***S*** (the CA), back in the days when it was subverted in its public mission by a variety of national players (including X, Y, and I), lets interpret properly what … Continue reading

Posted in spying

Guess what–NSA attacks my PC

suddenly, the documents (pictures…) folders in the windows install don’t work. wonder why! lets assume that NSA are “acting for” GCHQ. B proxy, they are oppressing – having no reason to be doing this (other than to project UK paranoia). … Continue reading

Posted in spying

is snowden and nsa/cia the end of Hilary?

Now we know (what I always knew) that US embassies hold listening stations and engage in unlawful radiation emission in countries (without a license), we can ask: what did Hilary know (as secretary of state) about her embassies, her staff, … Continue reading

Posted in spying

typical individual complicity –untrustworthiness of American tourists

http://cryptome.org/2013/10/nsa-selected-coverage.htm One of the commonest visa frauds committed by Americans is deviating from the tourism purpose of a tourist visa. That starts with having the capacity to deviate – where capacity includes the intent (using local materials, perhaps) to not … Continue reading

Posted in spying

energy norms; guessing GCHQ energy staining

To understand the argument below we need clear mental model of p-norms: http://mathoverflow.net/questions/91188/return-probabilities-for-random-walks-on-infinite-schreier-graphs (fedya) Fortunately, its easy (being entirely about taxi drivers in New York): http://en.wikipedia.org/wiki/Lp_space The wikipedia article makes it clear that p-norms (such as 1-norm…) are only generalizations … Continue reading

Posted in spying

GCHQ implanting knowhow; policy

2013-1353.pdf Obviously my access to the above is NOT a particular national security issue (otherwise why has is not been pulled down)? While the “secret sensitivity” may have been compromised (by merely publication), it still has sensitivity in the sense … Continue reading

Posted in spying

Jack straws argument is American baloney

i.e. counterfeit (since Baloney is Italian). Straw argues that The Guardian is in no position to adjudge (UK? US? Brazilian?) national interest (given expression of UK/US national interest in the mere fact that Snowden document were marked secret, etc by … Continue reading

Posted in spying

SRA in Guardian spying notes

http://www.theguardian.com/world/2013/oct/03/edward-snowden-files-john-lanchester   SRA has several meanings. it’s a “acronym of art” at this point. It doesn’t need a formal definition (which changes anyway). Special relationship area, special relationship arrangement, etc. It’s the five eyes “working agreement:” to spy on each … Continue reading

Posted in spying

Why court-related releases on PRISM program are irrelevant–when evaluating Yahoo’s non-culpability in surviellance

Its irrelevant whether there is evidence that firms such as Microsoft or Yahoo are “minimizing” NSA access to metadata and content garned via the PRISM program – by insisting on the equivalent of court orders, individually reviewed by legal staff. … Continue reading

Posted in spying

new windows key management metadata collection behavior

  look at the use of signaling enabling a repurposing of the validation channel (CRLs, OCSP).  

Posted in spying

Subversion of kindle (via gte root-based spoofing)

  notice it’s the CDN. And, note the dates.

Image | Posted on by

SSL Connect metadata–NSA; FBI/GCHQ/DEA covers; NIST subversion

  Add a rule like this inside the OnBeforeRequest function*: if (oSession.HTTPMethodIs(“CONNECT”) && oSession[“X-PROCESSINFO”] && oSession[“X-PROCESSINFO”].StartsWith(“outlook”)) { oSession[“x-no-decrypt”] = “boring process”; } From http://fiddler2.com/documentation/Configure-Fiddler/Tasks/DecryptHTTPS assume the FBI has implanted NSA-malware on the target’s computer.  Or assume some economic spying agency … Continue reading

Posted in spying

cryptome reposts Perry saga

See http://cryptome.org/2012/01/0032.htm. Here is what I believe. And, I think I’m supportive of FBI overall (on this one). I don’t feel like Im dealing with a renegade organization, back to the business of running a general surveillance state or anti-black … Continue reading

Posted in spying

what the guardian is afraid to say….

 

Posted in spying