12/31/2014

In the absence of truth…



In the absence of truth


Tuesday morning this side of the pond; everyone is getting ready to do whatever they must do, some of us were stuck in a classroom, some others already at work, and some are still sleeping or enjoying a healthy and tasty breakfast (hopefully). Some of us saw it "live"; some others felt the terror in the flesh.  No matter the years that have passed since that event, we all share the consequences of that morning, of Tuesday, September 11th.

 

 The first national security measure was to shut down borders and entry points. The second national security measure was the then ominous and controversial Patriot Act , the one that allows the American government; to do whatever is necessary to guarantee national security, and the protection of various interests. 

Months passed by, then a few years later some media outlets reported that an agency called the NSA was being accused by civil organizations of  "violating certain human rights”. Edward Snowden was in charge of lighting a candle that allowed some more information into the public eye, so the people could see a glimpse of this voracious monster that feeds with our information, even while it watches us sleep… but in reality, many people do not really know (don't want to know) what the NSA is and is not... and this is when things get really interesting.

“Events”

1791, December 15… "The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no warrants shall issue, but upon probable cause, supported by oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized." - Fourth Amendment of the Constitution of the United States of America (“Each man’s home is his castle”)

1952- Considering that it evolved into a behemoth-type of agency, it is difficult to imagine that at the beginning it was composed of a few groups of specialists that survived WWII. In 1952, the NSA is created by order of President Truman. 

1975- The investigation of the "Church Committee" of the Senate discovers a network of domestic espionage by the NSA and recommends certain reforms.

1978 - It is signed as a Foreign Intelligence Surveillance Act Law (FISA) that protects American citizens from any type of domestic espionage.

2000 - NSA “expresses its wish to live in the grid”

 

 2001, September 11 - 8:46 a.m. American Airlines Flight 11 crashes against the North Tower of the World Trade Center (1 WTC). The official version says that on that day 3.000 people in the WTC Complex died; 227 passengers and 19 "kidnappers".

 

Post 9-11... the White House asks the NSA: “That could you do with more legal power”

2001, October 4 - President Bush signs the order starts the domestic espionage program by the NSA
2001, October 26 - The USA PATRIOT ACT becomes Law when signed by President George W. Bush.

2005, December 16th. The New York Times exposes the NSA publicly and for the first time, because espionage.

2005, December 17th. President Bush confirms the existence of the espionage program by the NSA

2010, January 6th. The NSA begins the construction of a Massive Data Center to store intercepted communications from all over the world.

2012, June 6th. PRISM program is exposed: NSA connects to internet providers' systems, compiling massive amounts of information.

2012, June 13th. The New York Times reveals that the NSA monitors Skype, the name of this project is: “Project Chess”.

2012, June 21th. The Guardian reveals that the British counterpart of the NSA is called: GCHQ (Government Communications Headquarters).

2012, July 11th. The Guardian reveals that Microsoft cooperates with the North American Government.

2012, July 11th. The existence of XKEYSCORE is revealed (it is a secret computer system designed for the search and analysis of data in the Internet. XKeyscore detects the nationality of foreigners by means of the analysis of the language used on intercepted emails, and it has been applied in Latin America, specifically in Colombia, Ecuador, Mexico and Venezuela. The purpose is to allow the analysts to look for metadata, contents of emails, BROWSING HISTORY, names, telephone numbers, IP addresses, language and certain key words of any activity that has conducted through the Internet.)

2012, August 9th. The White House publishes “a legal justification” under section 215 of the PATRIOT ACT.

2012, October 4th. The Guardian reveals that the NSA has the ability to hack Tor.

2012, December 4th. The Washington Post reveals that the NSA collects 5 billion records of phone calls a day.

2013, January 27th. The NSA spies on mobile phone users thanks to the "apps with a leak".

2013, February 27th. The Guardian exposes the “Optic Nerve” program of the GCHQ. It compiles photos taken with webcams and feeds a data base that will be used for several face recognition programs.

2013, March 18th. The Washington Post reveals the existence of the MYSTIC program; that helps the NSA to record telephone calls.

Panopticon

 
 The Crypto-Mathematician Bill Binney, catalogued as “one of the best analysts in history”, leader of SARC (Signals Intelligence Automation Research Center) and creator of the “ThinThread” (an algorithm that helps to accommodate and make sense of the massive amounts of information that the American spies send. It was designed to track foreign enemies through a digital fingerprint. Binney was terrified when he realized that his algorithm also processed domestic information, without a court order, illegally. Later on, Binney implemented an encryption system that “erased” domestic data, unless there was an order signed by a Judge.) 


The supercomputers that Narus makes are not available for the public; in fact, they do not even sell them to state governments. But they do sell them to the NYPD (because of the amounts of data being handled) and obviously, to their favorite clients: the NSA.



The Narus systems help to automate the data collection around the world, including those through the Internet and VoIP calls such as Skype; as well as most of the telephone conversations and mobile communications; also transactions that are carried out through these technologies. Narus created a called technology “deep packet inspection” that allows the geo-location, tracking and extensive monitoring of the internet traffic. Bill Binney thinks that the NSA keeps a copy from all emails that are transmitted within the United States and that Narus is probably the computer that "catches and keeps that information".


The NSA, its British counterpart, the GCHQ; their different projects such as PRISM and XKEYSCORE; plus all the things that we cannot see and are perhaps more horrifying, are already here and are real. They will not go away, in fact they will grow in power and reach since mobile devices are becoming more popular, to the point of becoming a "vital organ" for most users; they will become more invasive due to the “increasing threats to national and international security” on behalf of ISIS in the Middle East, the phantom menace of the drug cartels, networks of illegal traffic of weapons, slaves, prostitution, organs... and all those delicious nontaxable goods. 

 
 In 2013, the Record #20130430 created by Citizenlab; reports that there are two “vendors” selling monitoring software (Trojans) assigned to work only in Mexico.

GAMMA/FINFISHER see Report
20130430 in Citizenlab.
HACKINGTEAM see Report
20130425 in Citizenlab.

But there are ways to protect yourselves…


Evolution of the NSA by EFF

Bonus:

The Secret Sentry by Matthew M. Aid, presents a more "real" version of the NSA, do not expect to read about UFOs, who killed Kennedy, etc.

@feexitmx
www.feexit.mx

rp@feexit.mx

12/17/2014

One that Sees from Afar



One that Sees from Afar... Originally published on 10/10/14


Stylometry… stylometry is the way in which a person writes; and that style allows it to be quantified and identified. It is the way in which a person creates a paragraph, the length of sentences, the use of vocabulary… all this contributes to obtain a scientific perspective of the style of writing of any single person using an electronic device. In OPSEC terms (Operations Security), stylometrics are a subject that deserves full attention because it is very difficult to defend and protect ourselves from them.


One of the operational safety measures that Edward Snowden applied involved writing small paragraphs and short sentences, but never full and well-structured texts. The reason for this measure was that regardless of the types of anonymity systems being used, if any kind of spyware or governmental agency were able to extract a plaintext, this action could expose him and relate it to some other documents previously written. The NSA´s repertoire is massive, but Semantic Analysis is by far the scariest.




Any good story must have dreamers and geniuses, villains and visionaries… the first company that came out with this type of software was not the exception to this rule and obtained the whole and undivided attention from governmental agencies, mainly the CIA. 




Palantiri (One that Sees from Afar) is “a fictitious” artifact of the legendarium created by Daddy J.R.R. Tolkien and is a spherical stone that serves to see distant events or places or to communicate with the user of another stone. 




"Reality is stranger than fiction..."

 
  “They're in a scary business”. –Lee Tien, EFF.


 

Palantir, which is very real, was founded back in 2004 by Peter Thiel (PayPal), Alex Karp, Joe Lonsdale, Stephen Cohen and Nathan Gettings… with an initial investment of $2 million USD through one of the CIA´s main companies, In-q-Tel

 




But it does not stop there because its main clients are the NSA, the CIA, the FBI, NewsCorp and JPMorgan Chase. Their advisers are Condoleezza Rice, George Tenet & General David Petraeus.


 "Any war against humanity is betrayal"


 "I do not expect to see home again¨. –Edward Snowden

In five years Palantir became the company to which “The Dark One” goes when in need of “Massive Data Mining”, and unlike other agencies and companies Palantir realized that the single use of Artificial intelligence would work against an “adaptable adversary”, that´s when they started using teams of human analysts to explore data being originated from different sources, this process is called intelligence augmentation



In 2007 The University of Arizona sneaked into blogs, forums and any platform in the Deep Web that allowed them to gather information, the idea was to compile and analyze all that delicious data… obviously using stylometrics.



 "How?”

There are two types of analysis: Supervised and Unsupervised. In Supervised Analysis, there is a text with a totally identifiable author and different "anonymous texts", they compare them and look for matching fingerprints (writing style).  For Unsupervised Analysis, the computer reviews complete blocks of anonymous texts and it piles them up according to different parameters in writing styles: A, B, C…

"Feexit, save us!” 



The document presented by Michael Brennan, Sadia Afroz & Rachel Greenstadt at 28C3 shows 2 ways to avoid “being labeled”:
1.    Obfuscation: To make a text resemble something that is definitely not your style… for example, translate the text to one language and back to the language of origin using google translate.
2.    Imitation: Make your style resemble someone else´s… Donald Trump, you are so screwed!





Anonymouth
Anonymouth is simply beautiful… once you have mastered it. Anonymouth is a Java-based tool, so always keep in mind that requires constant updating. The way it works is by comparing the desired text to other documents written by the same author; the outcome is a neat breakdown of used common words among all texts, sentence structure and proper suggestions for modifications.


 

Stylometrics are this century's version of phrenology.

“Bonus... yes, even in this economy”



PRISM is a government code name for a data-collection effort known officially by the SIGAD US-984XN, PRISM allows the NSA to connect itself directly to the central servers of “The Big 9”: Microsoft, Yahoo, Google, Facebook, PalTalk, AOL, Skype, YouTube, Apple… in the meanwhile, Palantir keeps growing.




@Feexitmx

www.feexit.mx
rp@feexit.mx

12/02/2014

When we were happy XP



When we were happy XP, originally published on September 22nd, 2014.



Turns out that after seeing all the "technological advances and miracles (that we enjoy and obviously pay a high price for); people just realized that during a period of several years, these advancements have increased and improved their capabilities, functions and therefore their reach... and grasp.
 

Do you remember when you bought your first computer (if its the case) back in the year 2001? In that year we entered a new era, where we left our beloved Windows 98 and Windows ME. Well, I believe that in that year we started living in a complete technological dependency. We became groupies to Windows XP and then, with the passage of time, Windows Vista... The latter promised a different design and interface, and it was so! but not that many people liked it. We preferred to keep our beloved Windows XP.

Over the years we have consumed many Operating Systems from every single developer. In your computer, in your Tablet, in your mobile... your gaming consoles and even in cars. I have had the opportunity of visiting clients that are not in the technological vogue, but their businesses are working properly with their current computers, even with Pentium 4 processors and Windows XP.

Here's the interesting part. Most of the electronic components have a lifespan of up to 6 years, and even more than that if we are careful. There is something called Planned  Obsolescence, and is nothing more than defining the life span of things. That planned life, may not be accurate for the physical components, but it is precise when it comes to Software.


When you buy a computer, in our case we acquired an Ultrabook with a Core i3 processor, 8GB in RAM, SSD of 120GB with Windows 8. The device works just fine, but we know that its life span is of no more than 3 years (because of its characteristics we know its good to go as far as 2017 or 2018... probably more) because the new Windows versions make you have a more powerful processor, better graphics, and a never ending list of requirements.

This also applies to phones. A few days ago iPhone 6 and iOS8 appeared. I don't know about you, but my iPhone 4* began to experience certain problems... coincidence or planned obsolescence? It is worth mentioning that I have not downloaded any updates. Couldit be true that the conspiracies in which app developers and network carries work along with Apple to "slowdown" the old devices whenever there is a new release?.
 
 
 
 Note. IOS 8 does not work in iPhone 4; and to be honest, we are not amazed. iOS 8 is in fact iPhone 4's deathbed. Although it seems like it was yesterday when they announced the brand new iPhone 4, now Apple announces that the old devices and previous IOSs, won't get any support or updates, matter of fact, as of September 17th, they are discontinued. We saw it last year, iPhone 3GS died when it wasn't able to hold iOS 7, so we are not surprised to see iOS 8 doing the same. 

A few months ago Apple discontinue iPhone 4 in several countries, including India and Brazil. But it has kept sales in developing countries as “a cheap” option of smartphone, while the old versions are disappearing quickly.



P.S. Take a look at “The Lightbulb Conspiracy”by Cosima Dannoritzer.

@feexitmx
www.feexit.mx
id@feexit.mx