,hl=en,siteUrl='http://0ldfox.blogspot.com/',authuser=0,security_token="v_SeT2Tv8vVdKRCcG9CCW-ZdIfQ:1429878696275"/> Old Fox KM Journal : Big Brother

Sunday, August 02, 2015

Big Brother

link

"Today, Friday 31 July 2015, 9am CEST, WikiLeaks publishes "Target Tokyo", 35 Top Secret NSA targets in Japan including the Japanese cabinet and Japanese companies such as Mitsubishi, together with intercepts relating to US-Japan relations, trade negotiations and sensitive climate change strategy.
The list indicates that NSA spying on Japanese conglomerates, government officials, ministries and senior advisers extends back at least as far as the first administration of Prime Minister Shinzo Abe, which lasted from September 2006 until September 2007. The telephone interception target list includes the switchboard for the Japanese Cabinet Office; the executive secretary to the Chief Cabinet Secretary Yoshihide Suga; a line described as "Government VIP Line"; numerous officials within the Japanese Central Bank, including Governor Haruhiko Kuroda; the home phone number of at least one Central Bank official; numerous numbers within the Japanese Finance Ministry; the Japanese Minister for Economy, Trade and Industry Yoichi Miyazawa; the Natural Gas Division of Mitsubishi; and the Petroleum Division of Mitsui."


The Spyfiles 4

2014-09-15
Today, 15 September 2014, WikiLeaks releases previously unseen copies of weaponised German surveillance malware used by intelligence agencies around the world to spy on journalists, political dissidents and others.
FinFisher (formerly part of the UK based Gamma Group International until late 2013) is a German company that produces and sells computer intrusion systems, software exploits and remote monitoring systems that are capable of intercepting communications and data from OS X, Windows and Linux computers as well as Android, iOS, BlackBerry, Symbian and Windows Mobile devices. FinFisher first came to public attention in December 2011 when WikiLeaks published documents detailing their products and business in the first SpyFiles release.
https://www.gammagroup.com/default.aspx


https://wikileaks.org/spyfiles3
"Documents in Spy Files #3 include sensitive sales brochures and presentations used to woo state intelligence agencies into buying mass surveillance services and technologies. Spy Files #3 also includes contracts and deployment documents, detailing specifics on how certain systems are installed and operated.
Internet spying technologies now being sold on the intelligence market include detecting encrypted and obfuscated internet usage such as Skype, BitTorrent, VPN, SSH and SSL. The documents reveal how contractors work with intelligence and policing agencies to obtain decryption keys.
The documents also detail bulk interception methods for voice, SMS, MMS, email, fax and satellite phone communications. The released documents also show intelligence contractors selling the ability to analyse web and mobile interceptions in real-time."
[The site IS safe.  Google is warning because authorities have warned Google to make this material unavailable by posting a warning.  If you click "more details" there is an open link to the material there, which is entirely safe, but which they want to scare you about. Doubtless, your visit to that link will be reported to the NSA.]

If you trust the USG, the ATF, the IRS, etc., you still might not like that customers of FinFisher could be ANY government anywhere in the world including Mongolia, Oman, Dubai, Estonia, Pakistan, Vietnam, and even Nigeria.   Everyone in Nigeria is part of a criminal enterprise or two so your data could go into the hands of such crooks.  If you think Nigeria wouldn't allow that to happen, ask yourself "how many arrests have ever been made in Nigeria for the infamous 419 Advance Fee Fraud racket.


No comments: