Amidst current attention on the Federal Court’s attempt to require Apple to install a backdoor allowing the FBI to access a criminal’s iPhone, may we remind ourselves of the NSA’s spectacular access to the same device using DROPOUT JEEP:
“DROPOUT JEEP is a software implant for the Apple iPhone that utilizes modular mission applications to provide specific SIGINT functionality. This functionality includes the ability to remotely push/pull files from the device. SMS retrieval, contact list retrieval, voicemail, geolocation, hot mic, camera capture, cell tower location, etc. Command, control and data exfiltration can occur over SMS messaging or a GPRS data connection. All communications with the implant will be covert and encrypted.”
The flowchart of how the NSA makes your iPhone its iPhone is presented below:
- NSA ROC operator
- Load specified module
- Send data request
- iPhone accepts request
- Retrieves required SIGINT data
- Encrypt and send exfil data
- Rinse repeat
Big Victory: Judge Pushes Jewel v. NSA Forward
We won a groundbreaking legal victory late Friday in our Jewel v. NSA case, which challenges the NSA’s Internet and telephone surveillance. Judge Jeffrey White has authorized EFF, on behalf of the plaintiffs, to conduct discovery against the NSA. We had been barred from doing so since the case was filed in 2008, which meant that the government was able to prevent us from requesting important information about how these programs worked.
This marks the first time a party has been allowed to gather factual evidence from the NSA in a case involving the agency’s warrantless surveillance. The government had fought all our requests to proceed with this lawsuit, arguing that the state secrets privilege protects it against both discovery and liability. Judge White previously rejected that argument for our statutory claims under the Wiretap Act, the Foreign Intelligence Surveillance Act, the Electronic Communications Privacy Act, and the Stored Communications Act. This ruling affirms Judge White’s previous decision and opens the door for discovery.
This is an important step forward to lifting the cloak of secrecy that has thus far shielded the NSA from judicial scrutiny, and EFF looks forward to finally getting to the nuts and bolts of this extraordinarily important lawsuit.
In this, our fifth annual Who Has Your Back report, we took the main principles of the prior reports and rolled them into a single category: Industry-Accepted Best Practices. We’ve also refined our expectations around providing users notice and added new categories to highlight other important transparency and user rights issues.
We designed this report to take the basic principles of Who Has Your Back up a notch and see which companies were still leading the pack. Already, our newest report has had a similar effect on the industry as a whole, encouraging companies large and small to strive for more when it comes to standing by their users. In the months since we first told the companies what this year’s criteria would be, we’ve seen significant improvement in company practices. And we hope—and expect—that over the next year, we’ll see even more.
Download the complete Who Has Your Back? 2015: Protecting Your Data From Government Requests report as a PDF.
Redacted, declassified report released to the press on a Saturday, casts doubt on the effectiveness, while touting the vastly increased use, of NSA warrantless surveillance.
… Another part of the newly disclosed report provides an explanation for a change in F.B.I. rules during the Bush administration. Previously, F.B.I. agents had only two types of cases: “preliminary” and “full” investigations.
But the Bush administration created a third, lower-level type called an “assessment.”
This development, it turns out, was a result of Stellarwind. (The vast collection, storage and review of a large database of the communications of American citizens, including e-mail communications, telephone conversations, financial transactions, and Internet activity.)
F.B.I. agents were asked to scrutinize phone numbers deemed suspicious because of information from the program, but were not told why the data had been deemed suspicious and further, “not to use the information in legal or judicial proceedings.”
That made some agents uncomfortable … it was not clear how such mysterious leads fit into their rules for investigations.
The Justice Department created the new type of investigation, initially called a “threat assessment,” which could be opened with lower-grade tips.
Agents now use them tens of thousands of times a year.
June 16th, 2014 Linda Eneix
Researchers detected the presence of a strong double resonance frequency at 70Hz and 114Hz inside a 5,000-years-old mortuary temple on the Mediterranean island of Malta. The Ħal Saflieni Hypogeum is an underground complex created in the Neolithic (New Stone Age) period as a depository for bones and a shrine for ritual use. A chamber known as "The Oracle Room" has a fabled reputation for exceptional sound behavior.
During testing, a deep male voice tuned to these frequencies stimulated a resonance phenomenon throughout the hypogeum, creating bone-chilling effects. It was reported that sounds echoed for up to 8 seconds. Archaeologist Fernando Coimbra said that he felt the sound crossing his body at high speed, leaving a sensation of relaxation. When it was repeated, the sensation returned and he also had the illusion that the sound was reflected from his body to the ancient red ochre paintings on the walls. One can only imagine the experience in antiquity: standing in what must have been somewhat odorous dark and listening to ritual chant while low light flickered over the bones of one’s departed loved ones.
Credit: Mediterranean Institute of Ancient Civilizations
Sound in a Basso/Baritone range of 70 – 130 hz vibrates in a certain way as a natural phenomenon of the environment in the Hypogeum, as it does in Newgrange passage tomb, megalithic cairns and any stone cavity of the right dimensions. At these resonance frequencies, even small periodic driving forces can produce large amplitude oscillations, because the system stores vibrational energy. Echoes bounce off the hard surfaces and compound before they fade. Laboratory testing indicates that exposure to these particular resonant frequencies can have a physical effect on human brain activity.
What is astounding is that five thousand years ago the builders exploited the phenomenon, intentionally using architectural techniques to boost these "super-acoustics". Glenn Kreisberg, a radio frequency spectrum engineer who was with the research group, observed that in the Hypogeum, "The Oracle Chamber ceiling, especially near its entrance from the outer area, and the elongated inner chamber itself, appears to be intentionally carved into the form of a wave guide."
The same people who created Ħal Saflieni also engineered a complete solar calendar with solstice and equinox sunrise alignments that still function today in one of their above-ground megalithic structures. There is no question that a sophisticated school of architectural, astronomic and audiologic knowledge was already in place a thousand years before the Egyptians started building pyramids.
Full Press Release on Phys.org by Project Organizer, Linda Eneix: Ancient Man Used “Super-Acoustics” …
10:39AM GMT 02 Mar 2015
A US military satellite exploded after detecting an unexplained “sudden spike in temperature”, sending dozens of chunks of debris tumbling into different orbits around Earth.
Air Force Space Command confirmed to SpaceNews.com that the “catastrophic event” came after “a sudden spike in temperature” was detected, followed by “an unrecoverable loss of attitude control”.
The satellite was an ageing component of the Defense Meteorological Satellite Program which the US military began developing the in the 1960s to help plan reconnaissance and surveillance missions.
The lost satellite was the 13th to be launched as part of DMSP, designated DMSP-F13, and had been in Earth orbit since 1995.
Like all DMSP satellites it orbited the earth at an altitude of around 500 miles in a “sun-synchronous orbit” – meaning that they flew in a path taking in the north and south poles.
On each path around the earth, which took roughly 101 minutes, they would see a slightly different part of the planet. This would give each satellite a complete view of the entire planet’s surface twice a day.