Methods of work of secret service

Here are some examples how secret service work, for those who don’t have experience with them. Of course, it has nothing with national security. In the West, they follow you on the basis of nationality, color of skin and religion. They make paranoia and create fears about immigrants in order to spread racism and justify repression (imprisoning and deportation) against immigrants.

Hitler made propaganda several years before he created Auschwitz, etc. Secret service serve government in creating consent in population for politics of the gov. Therefore secret service need journalists and editors in medias who will work for them, owners of media will also always cooperate with them. They need also cops and prosecutors and judges who will work for them, so, they can make political court process against immigrants, they can arrest you for any stupid thing to prosecute you but real reason is ethnic cleaning of the country. Danish medias published information that now 10% of prison population are immigrants. Danish secret service (PET) spy poor Romanians, Bulgarians and others, with aim to imprison and deport them, it means PET is misused for criminal things and they never touch Danish criminals about such things. So, they don’t follow immigrants about putting bomb in metro than about stealing and similar. Shortly, they give money to Romanian to work for them and snitch other Romanians, after they get information what people do (burglaries for example), they follow them and call police patrol to come when they see they broke some house. Domestic criminals do much bigger things than burglaries, and secret service don’t follow them and don’t call police to arrest them. They are true fascists and they are really misusing secret service to arrest more and more immigrants and to deport them. It is true ethnic cleaning, always with story “we do nice things, we clean country from criminals”, yes, fascists always represent themselves like good people who fight against bad people. Just they forget to say: but we like our criminals, it is about foreign criminals, so, it is ethnic cleaning. Really, domestic criminals have no problem if their girlfriends work for secret service, they fuck with spies and they know their secret service will not touch them, “they just make business, they are not interested for politics”, but the same can be said for Romanian or African criminal, they don’t care for politics but politics “care” for them because of their nationality, color of skin, etc. It is like in Germany in the time of Hitler, fascists hunted Slavic, homosexuals, Jewish and others, and they had beliefs that they do good thing and not bad thing, Germans who were good, they stayed passive and fascists did what they wanted. They eliminated also mentally sick people because they believed in strong race and “all weak people should be eliminated like some kind of garbage”. You can meet and fascists from your country, as I met, who say that homeless or other people are genetically bad and garbage and they should be eliminated, such people are liked by Danish secret service, they are the same. But such kids come from rich families and they are connected with secret service in Serbia and they speak always against poor people. Their patriotism is: I kiss in ass secret service and gov, to profit for myself. Their patriotism is not: majority of Serbs are poor, let’s help to some people to get normal life. They don’t care for people, they pretend they are patriots because they want privileges which secret service can give them (to do something criminal and to stay free). That’s how rich kids become brave, they make shit and never finish in the prison, so, they make more and more shit, they saw that they are privileged. In this moment, medias in Serbia write about leaders of football hooligans, they are arrested million times by cops but never sentenced by the judge. It means they don’t know to do job professionally, but they have connections with secret service and judges and they can’t be sent in the prison. Now after media stories, politicians started to speak they will be arrested. The most comic thing is, before several days, one man from football club Red Star got position to be chef of secret service. Result will be: Red Star hooligans will kill others without problem and they will become “the strongest”. Without help from secret service, many would be arrested and imprisoned because they are amateurs who have privileges and because of privileges they got balls to do something in their life. When I am at balls, let’s mention and department for propaganda.

Every secret service has department for propaganda, beside disinformation through medias, they have their people in many groups (in average, every 4th person in society work for secret service) and they use them to make bad picture about somebody who is not good for secret service. For example, if they want to stop that somebody get job from criminals or if they want to kill some criminal, they will use their people among criminals to make bad picture about this person who is their target. So, first they make propaganda and after that they make repression or killing or whatever else. What means bad picture? Everything what criminals dislike (no courage to do something, snitch, pedophile, etc), in the case of Muslims, everything what Muslims dislike (he is not believer, unbelievers should stay without head, blabla, snitch take a roll of the most radical Muslim, his aim is to get trust and he tries to convince others to give up from you, if he succeed he will get something from secret service, money or whatever else).

So, let’s say, you speak or fight against government or their colonial corporate wars, by the law secret service should follow you only if you want to use bomb in metro or to kill politicians, they should not make any private problem in your life. But it is theory, in reality, they will follow you because you are (just verbal) opponent to the gov, they will produce problems for you at school, job or anywhere else. Technically, secret service will follow you, they will see with whom you are friend and what you do in your life, they will turn people against you to isolate you, to make your influence on other people smaller and without help from other people it is easier for them to arrest you when “time comes for that”, you will not have place to hide yourself. They will also send their snitches to befriend with you, not only one than more of them, they will try to set you up girlfriend, and they will try to be with you 24 hours per day. Friends during the day and girl during the night, they spy you 100% of your time. Of course, they will use and electronic surveillance, so, your phone, internet and the rest will help them to spy you. Therefore, don’t use phone, etc. You can recognize snitch very simple, they try to befriend with you at any price, like that their life depend from that, they are always there where you come, etc. The aim is to know your habits and your way of thinking and to inform secret service if you plan to protest or to use any violent method against government. Your girlfriend snitch will support you verbally, to get your trust but she will forward information to secret service who finance her life (give her degree, good job place or whatever else). Secret service use women also to snitch criminals but as I said, they don’t touch domestic criminals, only those who have different nationality and color of skin.

And today there is cooperation between countries, usually fascists from the west give a lot of money to politicians in East Europe and Africa, for example, Serbian criminal can be snitched by Serbian woman who work for Serbian embassy in Denmark and Serbian embassy help to Danish fascists to arrest Serbian criminals. And some criminals who came from Serbia, they worked for Serbian secret service before they came to the West, so, they don’t need any woman to spy you and to arrest you, they can use their criminals who work for them, but don’t forget they will make propaganda before they arrest you, that’s how they work. There is no problem for secret service to find recommendation for their criminals, one criminal from Belgrade “escaped” to Brazil, after one year, the whole group from Yugoslavia was arrested and only this one from Belgrade escaped. First, he could not get position of big criminal in Belgrade if he was not good for secret service, he worked for them 100%, then he really had to escape or they made it false to send him to South America, they helped him to get recommendation if it was necessary, and there he spied people for the bill of Serbian secret service.

Secret service can arrest you for any stupid thing, just to harass you, to make shit, as they did to me in the library in Hamburg, after one night in custody they set me free. Fascists are happy even if they keep immigrant just one night in custody, fascists have no other reason to live in this world than to make shit for people who have different nationality. They are lunatics and they don’t have what else to do. Norway fascists spied immigrants while Breivik planned how to kill 70 people. German fascist secret service financed national socialist underground, group that killed 12 immigrants in last 10 years. Danish fascist secret service charged leftists (Redox) who published information about secret fascist group, it is clear that nobody makes something secret to watch movies than to shoot people (immigrants). There are many examples of connection between European fascists groups and secret services.

So, if you are followed by fascist secret service, logically, first you must escape from secret service and after that you must find job without to be registered, so, you can make a living without to be inside of system. If you just move to the other country but you get registered job, they will find you. Even if you just make bank account, bank will inform your home country (tax office) about it and they will find you. You can escape from secret service if you change all your cloths (and of course you forget all your electronic devices) and you escape with Enduro motorcycle in the nature. If you don’t trust to anyone with motorcycle, you must buy GPS/GSM jammer, to block signal if you escape with your own motorcycle. In the nature you must change vehicle, you must travel with some friend from other country in his car. But again all communication must be from mouth to mouth, without any phone or internet. When you come to the other country, find some job until you collect money to buy fake (duplicate identity) documents. Then you can live with another identity but such life must have some rules too. And for the end, I forgot to say, you can see that you are followed because they repeat the same thing many times, if you see repeating of the same thing around you every day, give more attention to such things. They have schema how they follow people, they repeat it million times. And you will not be alone even 2 o’clock in the night in some dark park when it is raining. Secret service also spend money how much they want and they say “it was national security”, but in fact they follow you to know everything about you and make bad picture about you. They will do everything to disturb you to get job, if you are an immigrant, they hope you will go out from the country, etc. I was in Germany 8 months last year, Germans got advices from Danish fascists how to make shit for me, so, German snitches produce conflicts between me and other people and they drove car on me when I ride a bike, several times per day, Danish did the same, so, Danish gave them advise to do it. There is no big science about it, they are lunatics and they produce hate between domestic people and immigrants and they profit if anyone make some shit. After crazy Breivik killed people, secret service surely got more money from budget and nobody in secret service lost job. Even if immigrants don’t do anything, they produce fear and demand more money from budget. In the end, everything is about money. That’s capitalism and security in capitalism, it is about business and profit, if there are no terrorists, they will imagine some of them, they can say you are terrorist even if you make peaceful protest against corporations, so, they get more money in their pockets. That was next level in building totalitarianism, they made already “preventive arrests” in Copenhagen at anti climate protests in Dec.2009. After 2 years activists won court process, but government don’t care, for them was important to destroy protest, what will say some judge after 2 years, they don’t give a shit. Politicians and cops will not pay for damage from their pockets. But preventive arrests are based on work of secret service and their snitches. Preventive arrest is presumption that people will do something against the law, even they didn’t do anything. It is clear martial law, dictatorship and abolishing human rights to show opinion. They prevented even Swedish students to come to university in Copenhagen because they believe they come to protest and protest is just showing publicly your opinion. When they forbid you to say your opinion, it is dictatorship, it doesn’t matter if they misuse some believes that you will do something criminal. In any case, welcome to totalitarianism, that's more concrete term than dictatorship, but more important is that you open your eyes and organize with others and fight against repression. They target different people in different time, one day Muslim, another day immigrants, another day criminals, another day domestic people who protest... They work against society, to keep their position of privileges and money, politicians, prosecutors, judges, cops, secret service and their snitches even between criminals, all of them like privileges and money and they are organized against society.

Zeige Kommentare: ausgeklappt | moderiert

Hitler made propaganda several years before he created Auschwitz, etc.

This is the moment (line 4) when I stopped reading this piece of spam.

Here is one article about true public enemies, not state enemies than enemies of society. Companies and people and their products that are created to build totalitarianism in the time of global capitalism. Their aim is to control people and companies and politicians globally, everything with aim to make bigger profit for rich Americans. So, yes, on the top of the list should be billionaires (owners of Shell, Chevron and similar) but this article is more about their servants (political, military, security system) that hunt people and disturb our life. They don’t spy only politicians and ordinary people, they hunted Silk Road and they continue. Wide spectrum of people should be aware of totalitarian lunatics. Don’t forget: even if you see that companies financed by NSA/CIA produce some ordinary software, you should be aware that their software contain bugs or backdoors which help them to spy users of software. Open Source doesn’t mean that software has no bug or backdoor, even open source is good for them, software code is public and they get code contribution from different developers without to pay them and rarely programmers who don’t work for CIA check software. Only those financed by the state, they have time to check so many software, other programmers must find work for a living.
Beside it, if you believe that there is internet paradise like Assange believed in Sweden, you should read this: British investigative journalist Duncan Campbell has claimed that Sweden collaborated with the USA on the internet monitoring FRA law and that the country is on the same level of surveillance as Israel. Sweden is one of America’s key partners in efforts to monitor internet communications across the globe. The surveillance is mostly conducted by the direct tapping of fibre optic cables and the development of “secret relationships” with telecommunications companies. British GCHQ had been delighted when Sweden’s Riksdag/parliament in 2008 clubbed through the law that gives the National Defence Radio Establishment (FRA) the right to monitor traffic in fiber optic cables. FRA is a Swedish Government Agency organised under the Ministry of Defense, the two main tasks of FRA are signals intelligence (COMINT and SIGINT/ELINT) and support to government authorities and state owned companies regarding IT security. The main headquarters is located on the island of Lovön in Stockholm County. FRA was assigned a budget of 562 million SEK in 2008 and has around 650 employees. Interception of signals is done from fixed sites on Swedish territory, from the SIGINT ship HMS Orion (operated by the Swedish Navy, and soon to be replaced by another vessel that meets safety regulations) and from two Gulfstream IV aircraft (operated by the Swedish Air Force). Ingvar Åkesson is Director-General and Christina Malm is Deputy Director-General. The only difference between FRA and NSA is that FRA outsource only strictly technical jobs to subcontractors, so, level of neoliberal ideology in their work is smaller than in the U.S. and FRA doesn’t have 1.6 billion dollar storage facility and supercomputer like NSA.
Sweden is not the only one, Spain, France and Germany also developed surveillance of Internet and Frankfurt has international backbone (Internet exchange points) so they can spy very much. Over 580 customers from 60+ countries are creating more than 2.6 Terabits of peak traffic through the public peering platform of DE-CIX Frankfurt. This makes DE-CIX Frankfurt the world’s largest Internet Exchange Point.
I found official NSA co-operation information:
 
The 5-Eyes: The US, the UK, Canada, New Zealand and Australia
The 9-Eyes: The ’5-Eyes’ group plus Denmark, Norway, the Netherlands and France
The 14-Eyes: The two above groups plus Germany, Sweden, Belgium, Spain, and Italy
The NSA was collecting data from Verizon thanks to a secret court order. The Washington Post revealed an even broader program of surveillance code-named PRISM (this software was produced by company called Palantir, which involved data collection from the web’s largest players — including Google, Facebook and Apple — and then the Wall Street Journal said data is also being gathered from ISPs and credit-card companies.
General Keith Alexander is director of the world’s largest intelligence service, the National Security Agency (NSA); chief of the Central Security Service; and commander of the US Cyber Command. As such, he has his own secret military, presiding over the Navy’s 10th Fleet, the 24th Air Force, and the Second Army. He brought the entire Internet, our private life, under surveillance. Alexander has now the capability to physically destroy equipment and infrastructure of an enemy of American corporations, and even to kill. Michael Hastings died in car crash, he was a 33-year-old investigative reporter for Rolling Stone magazine, whose June 2010 article, “The Runaway General,” exposed the behind-the-scenes failure of top U.S. General Stanley McChrystal’s counterinsurgency strategy in Afghanistan—and, even more damagingly, revealed McChrystal’s mocking attitude toward the Obama administration, which ultimately led to the general’s resignation. In Hastings’s 2012 book, “The Operators: The Wild and Terrifying Inside Story of America’s War in Afghanistan,” Hastings wrote about being approached by one of Gen. McChrystal’s aides. “We’ll hunt you down and kill you if we don’t like what you write.” Military is interconnected with dogs of war (so-called mercenaries, people paid to go in war and kill), so, they can hire them as paid killers and eliminate somebody.
NSA first cyber-weapon that came to be known is Stuxnet, this worm was created and built by the NSA in partnership with the CIA and Israeli intelligence in the mid-2000s. The first known piece of malware designed to destroy physical equipment, Stuxnet was aimed at Iran’s nuclear facility in Natanz.
But Stuxnet is only the beginning. Alexander’s agency has recruited thousands of computer experts, hackers, and engineering PhDs to expand US offensive digital capabilities. When you employ programmers, think twice whom you employ, 99% they are snitches, better choose programmers from anti American countries. The Pentagon has requested $4.7 billion for “cyberspace operations,” even as the budget of the CIA and other intelligence agencies could fall by $4.4 billion. It is pouring millions into cyber-defense contractors. Yes. yes, contractors and Alexander and his co-workers surely steal taxpayers money when they give it to private subcontractors.
When DEFCON [world’s largest computer hacker’s convention] started in Las Vegas [in 1993], it was primarily attended by true hackers. Now it’s commercialized. Big corporations have taken it over. And law enforcement [agencies], which used to attend undercover, have booths set up and are actively looking for hackers as cybersecurity experts.
If you check ads for jobs, you can find out that consulting and engineering firms such as Invertix and Parsons are among dozens posting online want ads for “computer network exploitation specialists.” And many other companies, some unidentified, are seeking computer and network attackers. “Firm is seeking computer network attack specialists for long-term government contract in King George County, VA,” one recent ad read. Another, from Sunera, Tampa, Florida, company, said it was hunting for “attack and penetration consultants.” All these companies are working for NSA and they are looking for professionals who will work for NSA. Unfortunately, many programmers have technical skill but not political education and they sell themselves for money. Will they get money from Saddam or NSA, they don’t care, they work for money and they will work against society.
One of the most secretive of these contractors is Endgame Systems, Endgame funding was led by Paladin Capital, a venture firm with roots both the security and government sectors (companies and products they invested money: http://www.paladincapgroup.com/sectors/cyber-security/), with participation from Kleiner Perkins Caufield & Byers, Bessemer Ventures, TechOperators, and Columbia Capital.
Established in Atlanta in 2008, Endgame is transparently antitransparent. “We’ve been very careful not to have a public face on our company,” former vice president John M. Farrell wrote to a business associate in an email that appeared in a WikiLeaks dump. “We don’t ever want to see our name in a press release,” added founder Christopher Rouland. Endgame is also adding ex-National Security Agency director Lieutenant General Kenneth A. Minihan to its board. Minihan currently serves as the managing director of Paladin Capital. The company also recently included Christopher A. R. Darby, the chief executive officer of the CIA’s venture arm In-Q-Tel as its newest chairman. Darby is also President, Chief Executive Officer, and Director in company called Sarvega, Inc. So, don’t use products of these companies.
By the way, Endgame’s clients will be able to observe in real time as hardware and software connected to the Internet around the world is added, removed, or changed and Endgame will get a lot of money for it: $2.5 million for 25 zero-day exploits. And at other side, private contractors means also that companies in the cyber-industrial complex are free to sell to whomever they wish, not only to NSA.
Edward Snowden worked for Booz Allen Hamilton, an American technology consulting firm in Virginia with 80 offices across the US. Its core business is the provision of management, technology and security services, primarily to civilian government agencies and as a security and defense contractor to defense and intelligence agencies, as well as civil and commercial services. Booz Allen Hamilton is majority owned by private equity firm The Carlyle Group, they have 26000 employees, turnover US$ 5.859 billion and NET profit 240 millions. Anonymous accused Booz Allen of working with HB Gary Federal (HB Gary was purchased by ManTech International) by creating a project for the manipulation of social media. In 2013 Snowden published that Booz Allen support developing the NSA’s classified mass surveillance and data collection program PRISM. Some of the documents taken by Anonymous show HBGary Federal was working on behalf of Bank of America to respond to Wikileaks’ planned release of the bank’s internal documents. “Potential proactive tactics against WikiLeaks include feeding the fuel between the feuding groups, disinformation, creating messages around actions to sabotage or discredit the opposing organization, and submitting fake documents to WikiLeaks and then calling out the error. Emails indicate Palantir Technologies, Berico Technologies, and the law firm Hunton & Williams (recommended to Bank of America by the US Justice Department) all cooperated on the project. Other e-mails appear to show the U.S. Chamber of Commerce contracted the firms to spy on and discredit unions and liberal groups.
In 2013 David Sirota of Salon said that Booz Allen and parent company Carlyle Group make significant political contributions to the Democratic Party and the Republican Party as well as individual politicians, including Barack Obama and John McCain, Sirota concluded that “many of the politicians now publicly defending the surveillance state and slamming whistleblowers like Snowden have taken huge sums of money from these two firms“. Booz Allen helped the Government of the United Arab Emirates create an equivalent of the National Security Agency for that country.
Here is the list of projects of NSA:

 

Before 2001: ECHELON, Main Core, MINARET, PROMIS
2001: BLARNEY, RAGTIME, Turbulence, PINWALE (NSA internet database), MAINWAY (NSA call database), Upstream (incl. Room 641A)
2007: PRISM, Boundless Informant, X-Keyscore, Dropmire, Fairview, Surveillance Detection Unit, Bullrun
British GCHQ collaboration: IMP, Tempora, Mastering the Internet, Global Telecoms Exploitation
Discontinued projects: Trailblazer Project, ThinThread, President’s Surveillance Program

For every of this mentioned projects can be written especial article, so, you can follow links to read about it.
For example, Echelon was created to snitch satellite communication of Soviet Union but later it became misused to snitch private and commercial communication with aim to help to American corporations to become stronger in international market competition (global capitalism). Second example, in 2005, NSA director Michael Hayden told a Senate hearing that the Trailblazer program was several hundred million dollars over budget and years behind schedule. In 2006 the program was shut down, after having cost billions of US Dollars, the new project replacing Trailblazer is called Turbulence. The conclusion in Congress was that Turbulence was over budget, not delivering and poorly led, and that there was little or no strategy to pull it all together.
XKeyscore is project for analysys of data gathered by NSA but it collects so many data (Terabytes) that content is kept 3 days and metadata 30 days. According to O Globo, XKeyscore detects the nationality of foreigners by analyzing the language used within intercepted emails, which the paper claims has been applied to Latin America and specifically to Colombia, Ecuador, Mexico and Venezuela. XKeyscore may be instrumental in the process of identifying VPNs and machines that can potentially be hacked via TAO (TAO is a cyber-warfare intelligence-gathering unit of the NSA, TAO identifies, monitors, infiltrates, and gathers intelligence on computer systems being used by entities hostile to the United States). Further capabilities of XKeyscore include Google Maps and web searches. But TAO has over 1,000 military and civilian computer hackers, intelligence analysts, targeting specialists, computer hardware and software designers, and electrical engineers, TAO’s headquarters are termed the Remote Operations Center (ROC) and are based at Fort Meade, Maryland. Known targets are China and Tor/Firefox users. So, before 2001, NSA tried to break the code with supercomputers, but it was expensive and long process, today, they use TAO (in collaboration with CIA and FBI) to implement spying devices in remote places (far away from America), it can be keylogger in your computer or at university, or some physical device, they spy computers and routers, and they implement backdoors (bad code) in computers people buy and in networks. So, when you buy PC, maybe it is already infected with NSA backdoors. Many computer manufacturers make billions from contracts with American government, they don’t care for individual customers, they do what NSA tell them to do. Already when you connect PC to internet, they get info that you are online.
The NSA’s has and secret FISA Court which is located at third floor of the E. Barrett Prettyman Courthouse in downtown Washington, last 30-years they were located within the Justice Department. This court reviews government applications to conduct electronic surveillance and physical searches in terrorism and espionage investigations but obviously they became gridy for money and started to serve NSA against society. Chief Judge Royce Lamberth of the U.S. District Court for the District of Columbia, who served on the FISA court from 1995 through 2002, and Colleen Kollar-Kotelly, the current chief FISA judge, were the driving forces behind the move. This court gave secret order to FBI to attack Lavabit, email service used by Edward Snowden, FBI demanded from Lavabit to hand over its private SSL key, to use it to monitor Lavabit’s users. Owner of Lavabit, Ladar Levinson, destroyed all servers and refused cooperation with FBI.
The F.B.I., Levison says, “sold its soul” to the N.S.A. to acquire its technologies and become a “counter-intelligence agency” rather than a domestic police force. The result is an agency with somewhat stunning technical capabilities—it was the F.B.I. that used malware to identify users of the Tor network in the course of its investigation of Freedom Hosting, the anonymous service provider, an incident that disturbed Levison because it put legitimate users at risk, even if he doesn’t agree with the illegal content that Freedom Hosting was allegedly housing. More about his case you can read here and here.
The Silent Circle followed Lavabit and did the same, they abolished email service.
Computer Sciences Corporation (CSC) is an American multinational corporation from Virginia that provides information technology (IT) services and professional services. CSC bought cloud management company ServiceMesh. CSC has 98 000 employees in 90 countries, revenue US$ 22 billion and it is acknowledged as the world’s fourth most admired IT Services company. The company has been accused of breaching human rights by arranging several illegal rendition flights for the CIA between 2003 and 2006, which also has led to criticism of shareholders of the company, including the governments of Norway and Britain. CSC include North American Public Sector (NPS): a leading federal contractor that provides IT-related and mission/operations-related services to the U.S. federal government (since 1961) and is one of its major IT service providers. Managed Services Sector (MSS): provides information systems outsourcing services to clients in a broad array of industries, including aerospace and defense, automotive, chemical and natural resources, consumer goods, financial services, healthcare, manufacturing, retail and distribution, telecommunications, and technology. In June 2013, Margaret Hodge, chair of the Public Accounts Committee, a Select Committee of the British House of Commons, described CSC as a “rotten company providing a hopeless system”, with reference to their multi-billion pound contract to deliver the National Programme for IT Lorenzo contract (an initiative by the Department of Health in England to move the National Health Service (NHS) in England towards a single, centrally-mandated electronic care record for patients and to connect 30,000 General practitioners to 300 hospitals). J. Michael Lawrie “Mike” is President & Chief Executive Officer.
USIS is a private company From Virginia that conducts background checks. As of June 2013 it had 100 federal contracts, and it does background checks for over 95 federal agencies. The company was originally known as U.S. Investigations Services Inc. USIS is a part of Altegrity Inc., a company owned by Providence Equity Partners. In 2008 USIS had about 7,000 employees, in the fiscal year 2012 the company received $253 million for the contract work of the OPM (the United States Office of Personnel Management). In 2011 the firm conducted a background check on Edward Snowden, who leaked classified documents in June 2013. Michelle B. Schmitz, the assistant inspector general for investigations, testified that USIS had been under a federal investigation since late 2011, stating that it involves a “complicated contract fraud case.”
* Here is the list of some companies, I can’t list them all, it would be very big article.
Invertix Corporation and Near Infinity Corporation are now Altamira Technologies Corporation (McLean, Virginia). The merger was precipitated by an investment in both companies by Columbia Capital and Razor’s Edge Ventures. Invertix is the top “open-source” technology company in the national security space. Columbia Capital invested in Altamira, Endgame and Digital Signal. Be aware of all these companies and their products. Mark Spoto is a Managing Director at Razor’s Edge.
Altamira Technologies Corporation is a top open source technology company in the national security space. Headquartered in McLean, Virginia, Altamira provides engineering and analytic services to the defense, intelligence, and homeland security communities.
Altamira leadership: Chris D’Agostino is President & Chief Technology Officer, Wayne Cliburn is Executive Vice President & Chief Operating, Officer, Art Hurtado is also Altamira’s President and CEO. Altamira’s Chief Strategy Officer is Craig Parisot. Bryan Judd is Executive Vice President & Chief Financial Officer, Wayne Cliburn is Executive Vice President & Chief Operating Officer.
Thales Alenia Space is a French-Italian aerospace company formed after the Thales Group bought the participation of Alcatel in the two joint-ventures between Alcatel and Finmeccanica, Alcatel Alenia Space and Telespazio. From 2013 CEO is Dominique Giannoni, he is 15 years inside of military and commercial aerospace markets. Operating income of company was 1.8 billion euro (2004) and they have 7200 employees. Thales Alenia Space is a strategic supplier of military satellite communications systems in Europe, as prime contractor for three generations of the Syracuse system in France and two generations of its Italian counterpart Sicral, and space segment prime for the German system Satcom BW. The company also produced dual communications (civil/military) payloads for Turkey, Brazil and South Korea. Thales Alenia Space is prime contractor for the Italian radar satellite constellation Cosmo-SkyMed, and supplied radars for the German SAR-Lupe system and Kompsat 5 in South Korea. Furthermore, our high-performance optical instruments are the key to the French observation systems Helios, Pleiades and CSO, as well as the Göktürk 1 satellite for Turkey, delivered as a turnkey system. HQ is located at: Cannes la Bocca, 100 boulevard du Midi, 06156 Cannes la Bocca, France, they have subsidaries in Touluse, Madrid, Belgium and Italy.
Astrium is an aerospace subsidiary of the European Aeronautic Defence and Space Company (EADS) that provides civil and military space systems and services. In 2012, Astrium had a turnover of €5.8 billion and 18,000 employees in France, Germany, the United Kingdom, Spain and the Netherlands. On July 31st, 2013, EADS announced a change of name to the Airbus Group. Astrium will be merged with Cassidian, the defence division of EADS, to form Airbus Defence & Space. EADS generated revenues of € 49.1 billion and employed a workforce of over 133,000. Owners are SOGEADE (22 %), Daimler AG (15 %), SEPI (5 %). Corporation is registered in NL, but HQ is in Toulouse, France and Leiden, Netherlands. Denis Ranque is Chairman and Tom Enders is CEO. In 2005 the Norwegian Government Pension Fund recommended the exclusion of several companies producing cluster bombs or components. EADS and its sister company EADS Finance BV were among them, arguing that EADS manufactures “key components for cluster bombs”. In August 2012 the UK Serious Fraud Office opened a criminal investigation into an EADS subsidiary, GPT Special Project Management Ltd, in connection with bribery allegations. Foxley alleged that luxury cars were bought for senior Saudis, and that millions of pounds sterling was paid to mysterious Cayman Islands companies, and that this may have been done to secure a £2 billion contract to renew the Saudi Arabian National Guard’s military telecommunications network.
Gamma International Ltd in Andover, England, and a Germany-based branch Gamma International GmbH in Munich are producing surveillance software called FinSpy or FinFisher. FinSpy has been found to affect computers through fake software update prompts, and by hiding in what appears to be an image file that is relevant to the person being phished. The software suite, which the company calls “Remote Monitoring and Deployment Solutions” has the ability to take control of target computers and capture even encrypted data and communications. Using “enhanced remote deployment methods” it can install software on target computers. The surveillance suite is installed after the target accepts installation of a fake update to commonly used software. The software, which is designed to evade detection by antivirus software, has versions which work on mobile phones of all major brands. The security flaw in iTunes that FinFisher is reported to have exploited was first described in 2008 by security software commentator Brian Krebs. Apple did not patch the security flaw for more than three years, until November 2011. Apple officials have not offered an explanation as to why the flaw took so long to patch. FinFisher is capable of masquerading as other more legitimate programs, such as Mozilla Firefox. On April 30, 2013, Mozilla announced that they had sent Gamma a cease-and-desist letter for trademark infringement. Gama Company is owned by William Louthean Nelson through a shell corporation in the British Virgin Islands. His son John Alexander Louthean Nelson is born 13.07.1961 and is living at Passonage mead, Tanners lane, Wintersbourne earls, Salisbury SPH 6HA, Wiltshire, United Kingdom, he is 100% owner of the british Gamma International Limited and CEO of Gamma Germany. He is also involved in PK Electronic International from Germany which produce Bugs, Phone Interception Tools, Jammer, Detection Radios. Egyptian dissidents who ransacked the offices of Egypt’s secret police following the overthrow of Egyptian President Hosni Mubarak reported they discovered a contract with Gamma International for €287,000 for a license to run the FinFisher software. FinSpy has been found to be in use in 25 countries, including many with dubious human rights records. The FinSpy software is made by Gamma Group International in Munich, Germany, but is sold through a subsidiary in the United Kingdom. Their software has been used to target opposition groups and activists. The servers of FinSpy were located in Australia, Bahrain, Bangladesh, Brunei, Canada, Czech Republic, Estonia, Ethiopia, Germany, India, Indonesia, Japan, Latvia, Malaysia, Mexico, Mongolia, Netherlands, Qatar, Serbia, Singapore, Turkmenistan, the United Arab Emirates, the United Kingdom, the United States, and Vietnam. More about Gama you can read at Wikileaks.
Hacking Team is company from Italy, they employ around 40 people in Milan, it was founded in 2003 by David Vincenzetti (President of the Board, Chief Executive) and Valeriano Bedeschi (Managing Director) with purpose of “fighting crime”. Board members are also Emanuele Levi, Daniele Munari, Alberto Trombetta. They started business with selling software to the police. They have also offices in Annapolis, USA, and Singapore. Hacking Team’s “DaVinci” Remote Control System is able, the company says, to break encryption and allow law enforcement agencies to monitor encrypted files and emails (even ones encrypted with PGP), Skype and other Voice over IP or chat communication. It allows identification of the target’s location and relationships. It can also remotely activate microphones and cameras on a computer and works worldwide. Hacking Team claims that its software is able to monitor hundreds of thousands of computers at once, all over the country. Trojans are available for Windows, Mac, Linux, iOS, Android, Symbian and Blackberry. Remote Control System (RCS) is a solution designed to evade encryption by means of an agent (trojan) directly installed on the device to monitor. Evidence collection on monitored devices is stealth and transmission of collected data from the device to the RCS server is encrypted and untraceable. Hacking Team is able to monitor how their software is being used by customers. Hacking Team software was identified on the office computers of the Moroccan news website Mamfakinch. The malware was transmitted via an infected Word document that purportedly contained important confidential information. The address of Hacking Team is: HT S.r.l., via della Moscova 13, 20121 Milano. David Vincenzetti is also network admin at Milano university, so, he can snitch students, earlier he was partner in cloud company Intesis and Cryptonet.it (antimalware company).
Originally called i2e, Amesys is a French firm that was taken over by the French technology company Bull in 2010. they developed EAGLE System that allows government agencies to analyse web traffic, store the data and process it for later use by police or intelligence agencies. The system consists of a network probe, storage systems and monitoring centres for the purpose of analysis. EAGLE is based on Deep Packet Inspection technology and can analyse all kinds of web-related activities. The Amesys documentation lists the various kinds of online activity that can be inspected, including email (SMTP, POP, IMAP as well as webmail), Voice over IP, different chat protocols as well as http-web traffic and search engine queries. In 2013, Amesys divested its EAGLE System to another company, Nexa Technologies. EAGLE is now being developed and marketed by a group of former Amesys employees led by Stéphane Salies, a former Bull SAS director (Bull, rue Jean Jaurès, 78340 Les Clayes sous Bois, France).
Blue Coat is a large IT company based in Sunnyvale, California, that is best known for providing filtering and censorship devices for countries like Burma. The company also provides network analysis systems called “Intelligence Centres,” which are used by companies and governments to monitor online traffic and individual online behaviour. Blue Coat offers Deep Packet Inspection technology, which can be used to survey and censor the Internet. With DPI, it is possible to look into every single Internet Protocol packet and subject it to special treatment based on content (censored or banned words) or type (email, VoIP or BitTorrent Protocol). Their products include WebPulse and PacketShaper. Blue Coat sells to government agencies as well as individual companies. Egypt, Kuwait, Qatar, Saudi Arabia and the United Arab Emirates all reportedly use a Blue Coat system.
Trovicor is one of the largest providers of lawful interception equipment worldwide, claiming to equip more than 100 countries. The company has been questioned, in particular during a hearing before the European Parliament Subcommittee on Human Rights in 2010. Trovicor is formerly known as Nokia Siemens Networks (until 2009) and Siemens AG, Division for Voice and Data recording. Owned by Johann Preinsberger through Ickehorn Asset Management (Rohbognerweg 9, 83707 Bad Wiessee). Johann is born 30.10.1969 in Austria and his address in 2007 was 83707 Bad Wiessee, Germany. Company known branches: Switzerland, Dubai, Islamabad, Kuala Lumpur, Prague. Trovicor is a lead sponsor of 2013 ISS World, the world’s biggest fair for surveillance and censorship equipment. Trovicor monitoring centres are capable of intercepting all ETSI-standard communications. That means phone calls, text messages, Voice over IP calls (like Skype) and Internet traffic. Spying on hard drives is not possible. Trovicor also offers solutions that allow processing and analysis of vast amounts of data (intelligent platforms). Media reports as well as research by human rights groups around the world suggests that monitoring centres have been delivered to Bahrain and led to imprisonment and torture of activists and journalists. Trovicor is also involved in Germany, where it is providing lawful interception for the state police of Bavaria (Landeskriminaltamt Bayern).
To mention again In-Q-Tel. Founder of In-Q-Tel is Gilman Louie, he is also partner of company Alsop Louie Partners, known investments of Alsop Louie Partners include Ribbit, Smith & Tinker, Redux, Zephyr Technologies, Gridspeak, Netwitness, Centripetal Networks and Lookingglass Cyber Solutions. Louie has served on a number of boards of directors, including Wizards of the Coast, Total Entertainment Network, Direct Language, FASA Interactive, Netwitness, Moonshoot, Smith and Tinker, Framehawk, New Mentor, Gridspeak, the National Venture Capital Association (NVCA), Zephyr Technologies, the CIA Officers Memorial Foundation, GreatSchools and the Chinese American International School in San Francisco. He serves on the board of the Markle Foundation and is a member of the Defense Intelligence Agency’s Advisory Board. Louie is chairman of the Federation of American Scientists as well as the Mandarin Institute. As you see, CIA control scientists and their career, they finance IT start up companies, and so on, and so on. The Markle Task Force has been co-chaired by Markle’s president, Zoë Baird Budinger, and by former Netscape Chief Executive Officer, Jim Barksdale. In-Q-Tel financed:
Huddle – cloud-based content collaboration software
Destineer -games FPS training simulation
Palantir Technologies – data integration, search and discovery, knowledge management, and secure collaboration
ArcSight – secure software
Zaplet – email
Authentica -secure messaging and secure document sharing
Visible Technologies – social media monitoring
Recorded Future – web intelligence and predictive analytics
FMS -analysis, visualization, and knowledgebase to the Federal Intelligence Community
Geosemble – unstructured data analytics and geospatial software
Adapx – Microsoft Office & GIS
CallMiner – phone speech analytics software
Carnegie Speech -speech recognition
AzTE PRISM – handwriting recognition
A4Vision – 3D facial imaging
oculis labs – computer vision, facial recognition and detection with webcam
Mohomine mohoClassifier – organises mass data
Stratify – organizes mass data
Inxight – search engine
Convera RetrievalWare – search engine
MetaCarta – search engine
Attensity – search engine
NetBase – search engine
Platfora – big data analytics and visualization
Intelliseek – search engine
FireEye – malware protection
ReversingLabs – malware detection and analysis

"You can escape from secret service if you change all your cloths (and of course you forget all your electronic devices) and you escape with Enduro motorcycle in the nature."

 

Super Satz!