Jump to content

NSA whistleblower discusses ‘How the NSA tracks you


Recommended Posts

NSA whistleblower discusses ‘How the NSA tracks you


William Binney, who quit the NSA because it engages in the 'total invasion of the privacy rights of everybody on the planet,' presented ‘How the NSA tracks you’ at the hacker conference SHA2017.


At the outdoor hacker camp and conference SHA2017, which is taking place in the Netherlands, NSA whistleblower William Binney gave the talk, “How the NSA tracks you.”


As a former insider, Binney knew about this long before Snowden dropped the documents to prove it is happening.


Although he didn’t say anything new, Binney is certainly no fan of the NSA’s spying — he calls the NSA the “New Stasi Agency.”


If you are no fan of surveillance, then his perspective from the inside about the “total invasion of the privacy rights of everybody on the planet” will fuel your fury at the NSA all over again.


In today’s cable program, according to Binney, the NSA uses corporations that run fiber lines to get taps on the lines.


If that fails, they use foreign governments to get taps on the lines. And if that doesn’t work, “they’ll tap the line anywhere that they can get to it” — meaning corporations or governments won’t even know about the taps.


The companies are involved at the next step — the PRISM program, which includes collection directly from the servers of U.S. service providers.


 However, Binney said PRISM is the minor program when compared to Upstream, which includes collecting data from the taps on fiber-optic cables in hundreds of places around the world.


“That’s where they are collecting off the fiber lines all the data and storing it.”


PRISM was for show-and-tell purposes, to show Congress and courts what the NSA was doing and to say we have warrants and are abiding by the laws.


Upstream was the one that allowed the NSA to “take everything off the line.”


Regarding worldwide SIGINT, CNE (computer network exploitation) was the big one.


Implants in hardware or software, let’s say switches or servers, make them “do anything they want” because the NSA pwned them.


That feeds the NSA’s Treasure Map, which provides a map of the entire internet in near real-time; “any device, anywhere, all the time” — every minute of every day.


As Binney put it, “So it’s not just collecting what you’re saying — encrypted or not — but it’s also monitoring where you are when you do it.”


Treasure Map is also how intelligence agencies use GPS from cell phones to target drone attack victims.


Binney noted there are at least 1.2 million people on the drone hit list.


He also mentioned the programs that include the input of all phone data, “fixed, mobile, satellite — any kind of phone” — which both the FBI and CIA can directly access “so that when they want to see who did what, they have an index, all, to everything they ever said in their database.”


“All the data is collected without warrants … so it’s a basic violation of the rights of every human,” Binney said.


Other agencies access NSA data


He also covered how other agencies can directly access the NSA’s data, Five Eyes, CIA, FBI, DEA and DIA.


The police can access it via the FBI’s system.


The NSA could choose to look at the right targets, but doesn’t.


The NSA may “collect it all,” but that’s not the same as intelligence, as understanding all of what was collected.


If you use one of the hot keywords in an email, for example, it will get flagged for review.


But planned attacks happen because analysts are so buried beneath the data they can’t see the attacks coming.


Binney previously tried to convince the U.K. that “bulk data kills people.”


While all this data isn’t helping to stop attacks, having all the data gives the intelligence community the “power to manipulate anyone they want.”


It’s like “J. Edgar Hoover on super steroids” — all the collected data gives intelligence agencies the means to target anyone.


Then parallel construction is used after the fact to go back and build a separate basis for an investigation to cover up the fact that the data was obtained unconstitutionally.


Before taking questions from conference attendees, Binney pointed out an icon on a slide as a teaser to his startup, which will “advise on ways you can do privacy and security by design.”


He came to Europe, since they can’t get anything done in the U.S.


“The U.S. and U.K. are too dense to realize it can be done” — it also goes against their agenda for more “money, power and control.”


Can we expect more NSA employees to blow the whistle?


Perhaps, but the people in power there are “corrupt,” Binney said.


During the portion of the talk when attendees could ask questions, he talked about how the NSA has employed a lot of introverts, people with ISTJ personalities, making them easy to threaten.


Binney added that the See Something, Say Something (about your fellow workers) program inside the NSA is “what the Stasi did.


They’re picking up all the techniques from the Stasi and the KGB and the Gestapo and the SS; they just aren’t getting violent yet — that we know of — internally in the U.S.; outside is another story.”








Link to comment
Share on other sites

  • Replies 7
  • Views 1.1k
  • Created
  • Last Reply

Well  we may not know if the  NSA  have not got  violent yet..That's what  the CIA  and FBI  are for and always these 3 letter agencies  have black opt programs were they don't follow the law at all.  And  Obama is not admin up in there no more and the war on whistle blowers is over  and all  these 3 letter agencies are not very show and tell anymore  . It's 2008 again  if you run you're mouth you end up like  James Comey. :D

Link to comment
Share on other sites

9 minutes ago, 0bin said:

And four letters, but the best is six letters, and is not US agency.

When there at war overseas it's the CIA  running the show   the military  cant do anything without orders from above..It's like certain countries that  are rolling back jobs  from the USA  this effects there own people more than does the USA  the spies from the USA dont  follow the law no way and they don't lose there jobs there still in place. They don't never go away no matter what.

Link to comment
Share on other sites

16 hours ago, humble3d said:

NSA whistle-blower discusses ‘How the NSA tracks you'

Isn't a legal obligation prohibiting the revelation of Confidential Info by former Security & Intelligence Staff? :think:

Link to comment
Share on other sites

3 hours ago, pc71520 said:

Isn't a legal obligation prohibiting the revelation of Confidential Info by former Security & Intelligence Staff? :think:


There is, but what did he give away that wasn't already public knowledge, nothing.  He gave no specifics, just suspicion and innuendo.  He makes it seem like tapping a fiber line is everyday child's play when anyone who has ever worked with bundled fiber optic cable would laugh at those statements.  He throws a bunch of accusations without one tidbit of proof concerning how the NSA has pwned your servers and switches.  If that were even partially true then the NSA would be the least of our worries because the Chinese, who build most of the equipment, would have their chips in place and not the NSA's.  It is easy for someone to get up and say I worked at the NSA (he was a janitor) and here are all the things they are doing (because he has had years to read Snowden's releases) and here is how they are doing it (read the Children's Introduction to Computers and Networks)  and then gets up in front of a bunch of tinfoil hat wearing nerds and spews it all out.  Why should an agency stop his diatribe?  It is so far off base that no one is looking for the real means of collection and the techniques used. But the paranoid tinfoil hat wearing crowd eat this crap up.  Next time you watch his speech on youtube you can take off your tinfoil hat, no one wants your useless brainwaves.

Link to comment
Share on other sites

They tracking  you  trough you're  extensions and things  when  the FBI  exploited  the TOR browser  before  they  used flash  too get you're  real ip .... There is so  many back doors in  software  that they found with penetration testing   even they tap into  Windows error reporting too find out weaknesses   to attack.  So the only safe place is not log on at all.


You do know most of the info these whistle blowers provided was based on old stuff right?  If you think the NSA and CIA  are dumb enough too keep running  exposed black opts programs  you dont know nothing  about how they work once  a program is exposed too the public they consider it compromised and shut it down and stat a new one  that no one knows about.


I see were none of this info have exposed  them were they had too pull any agents out of the field?  Snowden  leaks happen in   June 2013 .


This was wrote November 13, 2012 



The U.S. government -- and likely your own government, for that matter -- is either watching your online activity every minute of the day through automated methods and non-human eavesdropping techniques, or has the ability to dip in as and when it deems necessary -- sometimes with a warrant, sometimes without.


That tin-foil hat really isn't going to help. Take it off, you look silly.




If i didn't live  in the USA and i was not trying too do anything illegal  that would get them after you.. I would worry about my own government spying on me because there more likely too come get you than the NSA  or the CIA unless you done something too the USA personally . Snowden didn't tell  people nothing we didn't already know .



Link to comment
Share on other sites


This topic is now archived and is closed to further replies.

  • Recently Browsing   0 members

    • No registered users viewing this page.
  • Create New...