NSA X-Keyscore Member of Cyberespionage Family
It would be logical for NSA to use US embassies abroad as a family of outposts
for X-Keyscore harvesting local communications. Embassies have always been
used for full-spectrum espionage in all its guises and disguises, military,
political, economic, social, so adding cyber was inevitable. The embassies
have multiple networks for communications from minimal to highest levels
of security. To conduct cyber-espionage would be a seamless extension of
existing technology.
Further revelations of Snowden's documents could describe how this is done
with personnel, networks and data-server architecture, not only by PRISM
and X-Keyscore. Staff of these spy systems may be seen as HUMINT androids
safely bunkered for intimately wielding their remote-spying apparatus in
concert with remote-commanding officials and killing-machine operators with
whom they work to surveil, analyze, target and execute.
LinkedIn and other social media, job recruiters, conference sponsors, have
since 9/11 rushed to fill burgeoning "intel analyst" positions, many military
and official spy-trained, now seeking greater pay and perks on the cyberespionage
market. These "intel analyst" job seekers and holders (happily "endorsing"
each other) parade the codenames of espionage tools and programs they have
mastered, XKeyscore only one among these compiled by A's quick overnight
search of LinkedIn1:
AGILEVIEW, AGILITY, AIRGAP/COZEN, AIGHANDLER, ANCHORY/MAUI, ARCANAPUP, ARTEMIS,
ASSOCIATION, AUTOSOURCE, BEAMER, BELLVIEW, BLACKPEARL, CADENCE/GAMUT, CHALKFUN,
CINEPLEX, CLOUD, COASTLINE, COMMONVIEW, CONTRAOCTAVE, CONVERGENCE, COURIERSKILL,
CREEK, CREST, CROSSBONES, CPE, CULTWEAVE, CYBERTRANS, DISHFIRE, DOUBLEARROW,
DRAGONFLY, Enhanced WEALTHYCLUSTER (EWC), ETHEREAL (maybe opensource network
analysis?), FASCIA, FASTSCOPE, FOREMAN, GAMUT/UTT, GISTQUEUE, GJALLER, GLAVE,
GLOBALREACH, GOLDMINER, GOLDPOINT, GOSSAMER, GROWLER, HERCULES (CIA terror
database) HIGHTIDE/SKYWRITER, HOMEBASE, INFOSHARE, JOLLYROGER, KINGFISH,
LIQUIDFIRE, MAINWAY, MARINA, MASTERLINK, MASTERSHAKE, MAUI/ANCHORY, MESSIAH,
METTLESOME, NEWHORIZONS, NIGHTSURF, NORMALRUN/CHEWSTICK/FALLENORACLE, NUCLEON,
OCTAVE, PATHMASTER/MAILORDER, PINWALE, PANOPTICON, PRESENTER, PROTON, RAVENWING,
RENOIR, ROADBED, SCORPIOFORE/CPE, SHARKFINN, SKOPE, SKYWRITER, SNAPE, SPOTBEAM,
STINGRAY; SURREY, TAPERLAY, TAROTCARD, TEMPTRESS, TRACFIN, TRAILMAPPER,
TREASUREMAP, TRICKLER, TUNINGFORK/SEEKER, TURMOIL, TUSKATTIRE, TWISTEDPATH,
UIS/PINWALE, UTT, WEALTHYCLUSTER, WIRESHARK (opensource network analysis?)
WITCHHUNT, XKEYSCORE, YELLOWSTONE/SPLITGLASS
These manifold programs imply that US embassies operating X-Keystone networks
and data-servers to tap into global nations' telecommunications hubs for
cyber spying would require no more than doing what US spy agencies do inside
the USA: overtly and covertly arranging access through domestic official
and commercial spying and law enforcement agencies, corporations,
telecommunications networks, financial institutions, consultants, cyber
mercenaries, organized criminal organizations, opportunistic patriots,
informants, educational institutions, all the ancient cooperators, and now
variable-hatted hackers, cryptographers, anonymizers, freedom of information
fighters, civil liberties fronts, political organizations, lobbyists, press
officers, governmental office-holders, donors and funding organizations.
No comments:
Post a Comment