We already live in a police state. Amazing how many "cool" guys willing to sell us out to the gub. NWO Gates is a given. But the Google guys, yahoo, AT&T, Qwest, Apple, Verizon and Facebook also on board. Just too tempting to stand over the servile masses I guess.
Everything is already monitored. I expect things just going to get worse. Current headline "New Obama Push for Internet Rules". It's ALL ABOUT CONTROL. Setting up the police state for when they foist the North American Union on us. Christians and patriots will be the "terrorists".
China is a huge threat and it's a no brainer we need to do something about it. It's the unconstitutional surveillance of every single American that's a problem.
Pg64 American security experts have given the Chinese cyber horde a name the advanced persistent threat, or APT. It is responsible for a global spread of malware that has infected or attempted to infect every computer system of consequence in the United States, US officials say. Any American company operating abroad doing business with or in China or with any of its competitors can safely assume that it has been a target. Many of them don’t even know that. On average, at least a month passes before most companies ever learn they have an intruder on their networks.
The precise number of Chinese cyber warriors is not known, but experts uniformly agree on two things: it is very large, likely in the tens of thousands, and unlike those in the United States, the Chinese cyber warriors are mostly focused on offences.
Joe Steard, director of malware research at Dell Secure Works, had tracked twenty-four thousand internet domains that he believe Chinese cyber spies have either rented or hacked and use as bases of operations against the US gov and American companies, he told Bloomberg Businessweek in 2013. The precise number of hackers in hard to gauge, but Stewart identified three hundred types of malware and hacking techniques that the Chinese used, double the number he saw in 2012. “There is a tremendous amount of manpower being thrown at this from their side.”
In 2013 the computer security research firm Mandiant released a groundbreaking report that identified and gave the location of one suspected APT group, known as Unit 61398-a Chinese military cover name-based in Shanghai. One of its main centers of operations is a twelve-story, 130,000-square foot building capable of holding as many as two thousand people. The security company studied Unit 61398 going back to 2006 and discovered it had broken in to the systems of nearly 150 “victims.” Mandiant judged the unit to be one of the most prolific cyber spying outfits in China. And other computer security experts linked the group to an incursion in 2012 on the networks of the Canadian arm of Telvent, which designs industrial control software used to regulate valves and security systems for oil and gas pipeline companies in North America. Telvent has acknowledged that the intruder stole project files. Hackers could use those to map out the networks of oil and gas companies and find their weaknesses. Unit 61398 was formidable, and clearly interested in potential attacks on critical infrastructure. But it was just one of twenty hacker groups that Mandiant was tracking. Chinese hackers in general are mostly engaged in espionage. But it would be easy for its members to switch into cyber warfare mode and start taking down systems, corrupting data and information, or launching malware against critical infrastructure, such as power plant and communications facilities. If each of those twenty groups was just half as large as Unit 61398, the Chinese APT would consist of more than Twenty thousand people.
The United States has a long way to go to match the size of China’s cyber force. In 2013 there were only about three hundred people working for Tailored Access Operations , the NSA’s elite hacker core. The US Cyber Command, which is responsible for coordinating all the cyber components of the military services, employed only about nine hundred people total in 2013, including administrators and officers who aren’t actively engaged in hacking. The Defense Department plans to grow the ranks to six thousand by the end of 2016. If the Chinese military stopped growing its cyber forces today it would still be at least five times larger than the Americans.
How many computer networks were hacked by the Chinese after the NSA did this? Government helping us?
Pg 178 China plays a longer game. Its leaders want the country to become a first-tier economic and industrial power in a single generation, and they are prepared to steal the knowledge they need to do it, US officials say.
That’s where the “persistent” part comes into play. Gathering that much information, from so many sources, requires a relentless effort, and the will and financial resources to try many different kinds of intrusion techniques, including expensive zero day exploits. Once the spies find a foothold inside an organizations’; networks, they don’t let go unless they’re forced out. And even then they quickly return. The “threat” such spying poses to the US economy takes the form of lost revenue and strategic position. But also the risk that the Chinese military will gain hidden entry points into critical infrastructure control systems in the United States. US intelligence officials believe that the Chinese military has mapped out infrastructure control networks so that if the two nations ever went to war, the Chinese could hit American targets such as electrical grids or gas pipelines without having to launch a missile or send a fleet of bombers.
Operation Aurora was the first glimpse into the breadth of the ATP’s exploits. It was the first time that names of companies had been attached to Chinese espionage. “The scope of this is much larger than anybody has ever conveyed,” Kevin Mandia, CEO and president of Mandiant, a computer security and forensics company located outside Washington, said at the time or Operation Aurora. The APT represented hacking on a national, strategic level. “There [are] not 50 companies compromised. THERE ARE THOUSANDS OF COMPANIES COMPROMISED. Actively right now,” said Mandia, a veteran cyber investigator who began his career as a computer security officer in the air force and worked there on cybercrime cases. Mandiant was becoming a go to outfit that companies called whenever they discovered spies had penetrated their networks. Shortly after the Google breach, Mandiant disclosed the details of its investigations in a private meeting with Defense Department officials a few days before speaking publicly about it.
The APT is not one body but a collection of hacker groups that include teams working for the Peoples Liberation Army, as well as so-called patriotic hackers, young, enterprising geeks who are willing to ply their trade in service of their country. Chinese universities are also stocked with computer science students who work for the military after graduation. The APT hackers put a premium on stealth and patience. They use zero days and install backdoors. They take time to identify employees in a targeted organization, and send them carefully crafted spear-phishing emails laden with spyware. They burrow into an organization , and they often stay there for months or years before anyone finds them, all the while siphoning off plans and designs, reading emails and their attachments, and keeping tabs on the coming and goings of employees-the hackers’ future targets.
Here's a taste of the information in this book.
ENCRYPTION CORRUPTED Pg88 For the past ten years the NSA has led an effort in conjunction with its British counterpart, the Government Communications Headquarters, to defeat the widespread use of encryption technology by inserting hidden vulnerabilities into widely used encryption standards….The NSA is home to the world’s best code makers, who are regularly consulted by public organizations, including government agencies, on how to make encryption algorithms stronger. That’s what happened in 2006-a year after Alexander arrived-when the NSA helped develop an encryption standard that was eventually adopted by the National Institute of Standards and Technology, the US government agency that has the last word on weights and measure used for calibrating all manner of tools, industrial equipment, and scientific instruments. NIST’s endorsement of an encryption standard is a kind of Good Housekeeping Seal of approval. It encourages companies advocacy groups, individuals, and government agencies around the world to use the standard. NIST works through an open, transparent process, which allows experts to review the standard and submit comments. That’s one reason its endorsement carries such weight. NIST is so trusted that it must approve any encryption algorithms that are used in commercial products sold to the US government.
But behind the scenes of this otherwise open process, the NSA was strong-arming the development of an algorithm called a random number generator, a key component of all encryption. Classified documents show that the NSA claimed it merely wanted to “finesse” some points in the algorithm’s design , but in reality it became the “sole editor” of it and took over the process in secret. Compromising the number generator, in a way that only the NSA knew, would undermine the entire encryption standard. It gave the NSA a backdoor that is could use to decode information or gain access to sensitive computer systems.
The NSA’s collaboration on the algorithm was not a secret. Indeed the agency’s involvement lent some credibility to the process. But less than a year after the standard was adopted, security researches discovered an apparent weakness in the algorithm and speculated publicly that it could have been put there by the spy agency. Bruce Schneier zeroed in on one of four techniques for randomly generating numbers that NIST had approved. One of them, he wrote in 2007 , “is not like the others.”
For starters, it worked three times more slowly than the others, Schneier observed. It was also “championed by the NSA, which first proposed it years ago in a related standardization project at the American National Standards Institute.”
Schneier was alarmed that NIST would encourage people to use an inferior algorithm that had been enthusiastically embraced by an agency whose mission is to break codes. But there was no proof that the NSA was up to no good. And the flaw in the number generator didn’t render it useless. As Schneier noted, there was a workaround, though it was unlikely anyone would bother to use it. Still, the flaw set cryptologists on edge. The NSA was surely aware of their unease, as well as the growing body of work that pointed to its secret intervention, because it leaned on an international standards body that represents 163 countries to adopt the new algorithm. The NSA wanted it out in the world, and so widely used that people would find it hard to abandon.
Schneier, for one, was confused as to why the NSA would choose as a backdoor such an obvious and now public flaw. “The weakness had first been pointed out a year earlier by employees at Microsoft.”) Part of the answer may lie in a deal that the NSA reportedly struck with one of the world’s leading computer security vendors, RSA, a pioneer in the industry. According to a 2013 report by Reuters, the company adopted the NSA built algorithm “even before NIST approved it. The NSA then cited the early use…inside the government to argue successfully for NIST approval.” The algorithm became “the default option for producing random numbers” in an RSA security product called the bSafe toolkit, Reuters reported. “No alarms were raised, former employees said, because the deal was handled by business leaders rather than pure technologists.” For its compliance and willingness to adopt the flawed algorithm, RSA was paid $10 million, Reuters reported.
It didn’t matter that the NSA had built an obvious backdoor. The algorithm was being sold by one of the world’s top security companies, and it had been adopted by the an international standards body as well as NIST, The NSA’s campaign to weaken global security for its own advantage was working perfectly.
When news of the NSA’s efforts broke in 2013, in documents released by Edward Snowden, RSA and NIST both distanced themselves from the spy agency-but neither claimed that the backdoor hadn’t been installed.
In a statement following the Reuters report, RSA denied that it had entered into a “secret contact” with the NSA, and asserted that “we have never entered into any contract or engaged in any project with the intention of weakening RSA’s products, or introducing potential ‘backdoors’ into our products for anyone’s use.” But it didn’t deny that the backdoor existed, or may have existed. Indeed, RSA said that years earlier, when it decided to start using the flawed number generator algorithm, “the NSA had trusted role in the community-wide effort to strengthen, not weaken, encryption.” Not so much anymore. When documents leaked by Snowden confirmed the NSA’s work, RSA encouraged people to stop using the number generator-as did NIST.
The standards body issued is own statement following the Snowden revelations. It was a model of carefully calibrated language. “NIST would not deliberately weaken a cryptographic standard,” the organization said in a public statement, clearly leaving open the possibility-without confirming it-that the NSA had secretly installed the vulnerability or done so against NIST’s wishes. “NIST has a long history of extensive collaboration with the world’s cryptography experts to support robust encryption. The [NSA] participates in the NIST cryptography development process because of its recognized expertise. NIST is also required by statue to consult the NSA.”
The standards body was effectively telling the world that it had no way to stop the NSA. Even if it wanted to shut the agency out of the standards process, by law it couldn’t. A senior NSA official later seemed to support that contention. In an interview with the national security blog Lawfare in December 2013, Anne Neuberger, who manages the NSA’s relationships with technology companies, was asked about reports that the agency had secretly handicapped the algorithm during the development process. She neither confirmed nor denied the accusation. Neuberger called NIST “an incredibly respected close partner on many things.” But she noted, it “is not a member of the intelligence community.”
“All the work they do it…pure white hat,” Neuberger continued, meaning not malicious and intended solely to defend encryption and promote security. “Their only responsibility is to set standards” and “to make them as strong as they can possibly be”.
That is not the NSA’s job. Neuberger seemed to be giving the NIST a get-out-of –jail-free card, exempting it from any responsibility for inserting the flaw.
Amazing how many companies willing to sell out our country for the right price.
Pg 124 DITU/FBI
It’s called the Data Intercept Technology Unit, but insiders refer to it as the DITU (pronounced “Dih-too”) It’s the FBI’s equivalent of the NSA, a signals intelligence operation that has barely been covered in the press and mentioned in congressional testimony only a few times in the past fifteen years. The DITU is located on a large compound at the Marine Corps base in Quantico, Virginia, which is also home to the FBI’s training academy. The DITU intercepts telephone calls and emails of terrorist and spies from inside the United State. When the NSA wants to gather mounds of information from Google, Facebook, Yahoo, and other technology giants, DITU is sent to retrieve it. The unit maintains the technological infrastructure for the agency’s Prism program, which collects personal information from the large tech companies. In fact, it’s the DITU’s job to make sure that all American companies are building their networks and software applications in a way that complies with US surveillance law, so they can be easily tapped by the government, And if they’re not, the DITU will construct a bespoke surveillance device and do it for them.
The NSA couldn’t do its job without the DITU. The unit works closely with the biggest American telecommunications companies-AT&T, Verizon, and Sprint. “The DITU is the main interface with providers on the national security side,” says a technology industry representative who has worked with the unit on many occasions. It ensures that telephone and Internet communications can easily be siphoned off the massive network of fiber-optic cables those companies run. In recent years, it has helped construct a date-filtering software program that the FBI wants installed on phone and internet networks, so that the gov can collect even larger volumes of data than in the past, including routing information for emails, data on traffic flow, internet addresses, and port numbers, which handle incoming and outgoing communications and can detect what applications and operating system a computer is running.
Magic Lantern was one of the unit’s early triumphs. Developed in the late 1990’s, it was a companion to the better known email mining program Carnivore, which stripped the header information-the “to,” “from”, and date lines-out of an email so that investigators could piece together members of a criminal network by their communication patterns. Both devices, along with other spying programs with names such as CoolMiner, Packeteer, and Phiple Troenix, were developed to help the bureau snare drug dealers, terrorists, and child porn peddlers, But when Carnivore was revealed in new reports, it became synonymous with Big Brother style government surveillance, and civil liberties groups said the FBI’s efforts would undermine encryption for legitimate purposes, such as protecting financial data and patient privacy. The same arguments echoes more than a decade later, when the NSA was revealed to be secretly handicapping encryption algorithms
The FBI’s cyber spying programs began years BEFORE the 9/11 attacks and any attempts by the NSA to broaden its surveillance nets to cover the United States. FBI agents have been in the domestic cyber spying business for longer than their friends at Fort Meade. And today they are physically joined in those efforts. A fiber-optic connection runs between Quantico and NSA headquarters, so that the information the DITU collects from companies can be instantly transferred. FBI agents and lawyers from the Justice Department review the NSA’s request to gather emails from Google or monitor Facebook posts. They represent the agency before the secret Foreign Intelligence Surveillance Court, which also reviews request to spy on Americans. It was the FBI that petitioned the court to order telephone companies to give the NSA records of all the calls placed in the United States. When journalists and lawmakers say that the NSA “spies on Americans,” what they really mean is that the FBI helps them do it, providing a technical and legal infrastructure for domestic intelligence operations. Having the DITU act as a conduit also gives technology companies the ability to say publicly that they do not provide any information about their customers directly to the NSA.
And that’s true. They give it to the DITU, which then passes it to the NSA.
Pg126 The DITU has negotiated with major US technology companies to get privileged access to their systems. For instance, on behalf of the NSA, it worked with Microsoft to ensure that a new feature in Outlook that allowed users to create email aliases would not pose an obstacle to surveillance. The arrangement helped the government circumvent Microsoft’s encryption and ensure that Outlook messages could be read by government analysts.
We ALREADY live in a police state.