NSA X-Keyscore Member of Cyberespionage Family
     
       
     
     It would be logical for NSA to use US embassies abroad as a family of outposts
     for X-Keyscore harvesting local communications. Embassies have always been
     used for full-spectrum espionage in all its guises and disguises, military,
     political, economic, social, so adding cyber was inevitable. The embassies
     have multiple networks for communications from minimal to highest levels
     of security. To conduct cyber-espionage would be a seamless extension of
     existing technology. 
     
     Further revelations of Snowden's documents could describe how this is done
     with personnel, networks and data-server architecture, not only by PRISM
     and X-Keyscore. Staff of these spy systems may be seen as HUMINT androids
     safely bunkered for intimately wielding their remote-spying apparatus in
     concert with remote-commanding officials and killing-machine operators with
     whom they work to surveil, analyze, target and execute.
     
     LinkedIn and other social media, job recruiters, conference sponsors, have
     since 9/11 rushed to fill burgeoning "intel analyst" positions, many military
     and official spy-trained, now seeking greater pay and perks on the cyberespionage
     market. These "intel analyst" job seekers and holders (happily "endorsing"
     each other) parade the codenames of espionage tools and programs they have
     mastered, XKeyscore only one among these compiled by A's quick overnight
     search of LinkedIn1:
     
     AGILEVIEW, AGILITY, AIRGAP/COZEN, AIGHANDLER, ANCHORY/MAUI, ARCANAPUP, ARTEMIS,
     ASSOCIATION, AUTOSOURCE, BEAMER, BELLVIEW, BLACKPEARL, CADENCE/GAMUT, CHALKFUN,
     CINEPLEX, CLOUD, COASTLINE, COMMONVIEW, CONTRAOCTAVE, CONVERGENCE, COURIERSKILL,
     CREEK, CREST, CROSSBONES, CPE, CULTWEAVE, CYBERTRANS, DISHFIRE, DOUBLEARROW,
     DRAGONFLY, Enhanced WEALTHYCLUSTER (EWC), ETHEREAL (maybe opensource network
     analysis?), FASCIA, FASTSCOPE, FOREMAN, GAMUT/UTT, GISTQUEUE, GJALLER, GLAVE,
     GLOBALREACH, GOLDMINER, GOLDPOINT, GOSSAMER, GROWLER, HERCULES (CIA terror
     database) HIGHTIDE/SKYWRITER, HOMEBASE, INFOSHARE, JOLLYROGER, KINGFISH,
     LIQUIDFIRE, MAINWAY, MARINA, MASTERLINK, MASTERSHAKE, MAUI/ANCHORY, MESSIAH,
     METTLESOME, NEWHORIZONS, NIGHTSURF, NORMALRUN/CHEWSTICK/FALLENORACLE, NUCLEON,
     OCTAVE, PATHMASTER/MAILORDER, PINWALE, PANOPTICON, PRESENTER, PROTON, RAVENWING,
     RENOIR, ROADBED, SCORPIOFORE/CPE, SHARKFINN, SKOPE, SKYWRITER, SNAPE, SPOTBEAM,
     STINGRAY; SURREY, TAPERLAY, TAROTCARD, TEMPTRESS, TRACFIN, TRAILMAPPER,
     TREASUREMAP, TRICKLER, TUNINGFORK/SEEKER, TURMOIL, TUSKATTIRE, TWISTEDPATH,
     UIS/PINWALE, UTT, WEALTHYCLUSTER, WIRESHARK (opensource network analysis?)
     WITCHHUNT, XKEYSCORE, YELLOWSTONE/SPLITGLASS
     
     These manifold programs imply that US embassies operating X-Keystone networks
     and data-servers to tap into global nations' telecommunications hubs for
     cyber spying would require no more than doing what US spy agencies do inside
     the USA: overtly and covertly arranging access through domestic official
     and commercial spying and law enforcement agencies, corporations,
     telecommunications networks, financial institutions, consultants, cyber
     mercenaries, organized criminal organizations, opportunistic patriots,
     informants, educational institutions, all the ancient cooperators, and now
     variable-hatted hackers, cryptographers, anonymizers, freedom of information
     fighters, civil liberties fronts, political organizations, lobbyists, press
     officers, governmental office-holders, donors and funding organizations.
     
 
No comments:
Post a Comment