DEA

New data mining revelations, DEA drawn in quickly; Privacy & Surveillance DICE, PROTON, CRISSCROSS & CLEARWATER partial master programs? Lexis-Nexis on private side

It's a pretty woolly political scene right now & wanted to slam up some docs leading different directions on this. At least the damn narrative is moving along.

More or less we're looking at the merging of criminal investigations with direct military signals intelligence (SIGINT) technology run by the same contractors that recently ran these technocratic social control 'kinetic' programs for the Pentagon in assorted occupied lands around the Middle East etc.

Naturally the war on drugs first brought this war home - special bonus points for the Viktor Bout angle of the DEA SOD/DICE projects story from Reuters earlier...

Latest: Drug Agents Use Vast Phone Trove, Eclipsing N.S.A.’s - NYTimes.com

For at least six years, law enforcement officials working on a counternarcotics program have had routine access, using subpoenas, to an enormous AT&T database that contains the records of decades of Americans’ phone calls — parallel to but covering a far longer time than the National Security Agency’s hotly disputed collection of phone call logs.

The Hemisphere Project, a partnership between federal and local drug officials and AT&T that has not previously been reported, involves an extremely close association between the government and the telecommunications giant.

The government pays AT&T to place its employees in drug-fighting units around the country. Those employees sit alongside Drug Enforcement Administration agents and local detectives and supply them with the phone data from as far back as 1987. ......

Hemisphere covers every call that passes through an AT&T switch — not just those made by AT&T customers — and includes calls dating back 26 years, according to Hemisphere training slides bearing the logo of the White House Office of National Drug Control Policy. Some four billion call records are added to the database every day, the slides say; technical specialists say a single call may generate more than one record. Unlike the N.S.A. data, the Hemisphere data includes information on the locations of callers.

The slides were given to The New York Times by Drew Hendricks, a peace activist in Port Hadlock, Wash. He said he had received the PowerPoint presentation, which is unclassified but marked “Law enforcement sensitive,” in response to a series of public information requests to West Coast police agencies.

The program was started in 2007, according to the slides, and has been carried out in great secrecy.

“All requestors are instructed to never refer to Hemisphere in any official document,” one slide says. A search of the Nexis database found no reference to the program in news reports or Congressional hearings.

The Obama administration acknowledged the extraordinary scale of the Hemisphere database and the unusual embedding of AT&T employees in government drug units in three states.

Oh the war on drugs, will your terrible travesties never end... Nice work exposing this program by all involved!! A spectacular catch for sure.

////

Meanwhile we also have yet to deal with the terrible secret Special Operations Division which as this slide makes clear, subverts the entire concept of criminal defense and discovery. Therefore probably all drug cases should be thrown out, eh?

SOD-DEA-coverup.jpeg

Rules of SOD Photo Source - REUTERS

Exclusive: U.S. directs agents to cover up program used to investigate Americans | Reuters via Cryptogon.com: U.S. COMMUNICATIONS INTELLIGENCE SECRETLY SHARED WITH LAW ENFORCEMENT FOR USE AGAINST AMERICANS IN CRIMINAL INVESTIGATIONS

By John Shiffman and Kristina Cooke

WASHINGTON | Mon Aug 5, 2013 3:25pm EDT

(Reuters) - A secretive U.S. Drug Enforcement Administration unit is funneling information from intelligence intercepts, wiretaps, informants and a massive database of telephone records to authorities across the nation to help them launch criminal investigations of Americans.

Although these cases rarely involve national security issues, documents reviewed by Reuters show that law enforcement agents have been directed to conceal how such investigations truly begin - not only from defense lawyers but also sometimes from prosecutors and judges.

The undated documents show that federal agents are trained to "recreate" the investigative trail to effectively cover up where the information originated, a practice that some experts say violates a defendant's Constitutional right to a fair trial. If defendants don't know how an investigation began, they cannot know to ask to review potential sources of exculpatory evidence - information that could reveal entrapment, mistakes or biased witnesses.

"I have never heard of anything like this at all," said Nancy Gertner, a Harvard Law School professor who served as a federal judge from 1994 to 2011. Gertner and other legal experts said the program sounds more troubling than recent disclosures that the National Security Agency has been collecting domestic phone records. The NSA effort is geared toward stopping terrorists; the DEA program targets common criminals, primarily drug dealers.

"It is one thing to create special rules for national security," Gertner said. "Ordinary crime is entirely different. It sounds like they are phonying up investigations."

THE SPECIAL OPERATIONS DIVISION

The unit of the DEA that distributes the information is called the Special Operations Division, or SOD. Two dozen partner agencies comprise the unit, including the FBI, CIA, NSA, Internal Revenue Service and the Department of Homeland Security. It was created in 1994 to combat Latin American drug cartels and has grown from several dozen employees to several hundred.

Today, much of the SOD's work is classified, and officials asked that its precise location in Virginia not be revealed. The documents reviewed by Reuters are marked "Law Enforcement Sensitive," a government categorization that is meant to keep them confidential.

"Remember that the utilization of SOD cannot be revealed or discussed in any investigative function," a document presented to agents reads. The document specifically directs agents to omit the SOD's involvement from investigative reports, affidavits, discussions with prosecutors and courtroom testimony. Agents are instructed to then use "normal investigative techniques to recreate the information provided by SOD."

.....SOD'S BIG SUCCESSES

The unit also played a major role in a 2008 DEA sting in Thailand against Russian arms dealer Viktor Bout; he was sentenced in 2011 to 25 years in prison on charges of conspiring to sell weapons to the Colombian rebel group FARC. The SOD also recently coordinated Project Synergy, a crackdown against manufacturers, wholesalers and retailers of synthetic designer drugs that spanned 35 states and resulted in 227 arrests.

Since its inception, the SOD's mandate has expanded to include narco-terrorism, organized crime and gangs. A DEA spokesman declined to comment on the unit's annual budget. A recent LinkedIn posting on the personal page of a senior SOD official estimated it to be $125 million.

Today, the SOD offers at least three services to federal, state and local law enforcement agents: coordinating international investigations such as the Bout case; distributing tips from overseas NSA intercepts, informants, foreign law enforcement partners and domestic wiretaps; and circulating tips from a massive database known as DICE.

The DICE database contains about 1 billion records, the senior DEA officials said. The majority of the records consist of phone log and Internet data gathered legally by the DEA through subpoenas, arrests and search warrants nationwide. Records are kept for about a year and then purged, the DEA officials said.

About 10,000 federal, state and local law enforcement agents have access to the DICE database, records show. They can query it to try to link otherwise disparate clues. Recently, one of the DEA officials said, DICE linked a man who tried to smuggle $100,000 over the U.S. southwest border to a major drug case on the East Coast.

"We use it to connect the dots," the official said. ...

//////

OK so let's get to PROTON, CRISSCROSS, CLEARWATER and Lexis-Nexis. I think this covers a lot of new ground. Hard to say if the DOJ side of the story ties in, but the Lexis-Nexis level is pretty clearly documented already but not well known outside of research circles. Also some of this gets to the SCS - Special Collection Service - which I think would have been part of Snowden's tour of duty in CIA.

SOURCE: http://cryptome.org/2013/08/proton-clearwater-lexis-nexis.htm

18 August 2013

PROTON, CLEARWATER and Lexis-Nexis

A Proton/Crisscross job ad below.


A sends:

PROTON, CLEARWATER and LEXIS-NEXIS

Given the use of constitutionally repulsive practices by the Department of Justice, the Internal Revenue Service and other federal agencies, this information is being made public to educate and inform so they might arm themselves against government intrusion and for attorneys as a backgrounder for future appeals.

I suggest American guerillas seek non-Internet modes of communication. If you think Rex Sherwood was pulled over for not using a turn signal, you are wrong.

I was "read on" the PROTON/CRISSCROSS program in late 2006 and was a frequent user of this system for over a year. As part of my duties, I employed PROTON/CRISSCROSS in HUMINT exploitation role. In the Intelligence Community, PROTON/CRISSCROSS is referred to as PROTON. Unless otherwise specified, the same is true in this report.

PROTON is a storage and analysis system of telecommunications selectors at the TS/SI/FISA/ORCON/NOFORN level of classification and handling. PROTON is the program name as well as the name of the technology. It has been described as "SAP-like", and I suspect that PROTON was once a DEA special program. PROTON is well known in HUMINT and DOJ clandestine law enforcement. It remains the primary, if not fundamental, tool of HUMINT and DOJ law enforcement operations, both of which have considerable overlap in phenomenology and methodology. PROTON carries the FISA caveat because Top Secret FISA collection is contained in PROTON's massive database.

Through my professional associations within the Intelligence Community, I became aware of a Department of Justice (DOJ) system called CLEARWATER. CLEARWATER is similar to PROTON but at the SECRET/NOFORN level of classification and exclusively a DOJ program, where PROTON is CIA, DOJ and DOD. Most DOJ Special Agents and analysts do not have Top Secret clearance. Every informant is run through CLEARWATER, every witness gets vetted through the system.

PROTON and CLEARWATER are not just analytic tools, they provide actionable intelligence and both programs are used everyday for target discovery and development. CLEARWATER practically leads FBI and DEA investigations. PROTON is used throughout HUMINT for asset validation, recruitment, background checks on sources, etc. The FBI and DEA as both law enforcement and intelligence community members have resources of both sides and domestic law enforcement by these agencies is more of a HUMINT operation of the type seen in Afghanistan. Find, Fix, Arrest. PROTON and CLEARWATER work so well that Special Agents and Case Officers can't wait to get data into the system and see how it networks together.

Top Secret and FISA mean NSA sensitive sources and foreign collection. NSA resources are unneeded in America---CALEA and the DOJ have that covered for you under Title III, the Patriot Act and opinion from the federal kangaroo judiciary.

FISA is not only used against terrorists and spies but also private and quasi-government organizations . The most impressive network I ever laid eyes upon was the PROTON derived communications network of the Netherlands and Swiss SWIFT. Allot of target discovery there. It's how you find a needle in a haystack. The U.S. hosts one of three SWIFT secure messaging centers. Well, the NSA and CIA have insured SWIFT is allot less secure. SWIFT is a major communications target and the NSA is deep in that This is a modern take on "follow the money." If Americans are wondering how the IRS found their secret bank accounts..well, here 'ya go.

When I read the description of Drug Enforcement Administrations (DEA) DEA Internet Connectivity Environment (DICE) system: the billions of records, partnership with CIA, NSA and DOD, the need to cover sources at the expense of a fair trail--- it struck me that what was described sounded more like PROTON and/or CLEARWATER.

As I read further, DICE was sounding more like a legitimate DEA program that was being used to provide cover for PROTON and/or CLEARWATER---either intentionally or sacrificially. The early descriptions of DICE present it as an information sharing and collaboration tool through the Internet. The recent public descriptions of DICE are awkward and contrived when compared to past information.

DICE is being used to cover PROTON and/or CLEARWATER.

Properly, CRISSCROSS is the database of telecommunications selectors. Selectors are, in NSA terms, that information that selects a target for analysis, investigation or collection. Telephone numbers, email addresses, hexadecimal addresses from INMARSAT telephones, IMEI---really any telecommunications "number" or "address" a person would have as a means to contact another, are contained in CRISSCROSS.

PROTON is the operating software written in JAVA for cross-platform usability and runs on JWICS for connectivity to CRISSCROSS.

PROTON contains the tools for network analysis and would be familiar to anyone who has experience in undergraduate social network analysis, statistics and data visualization.

CRISSCROSS has an interesting and murky history. As it was explained to me by a PROTON Program Officer, CRISSCROSS was originally a very secret DEA program to provide a repository for DEA collected selectors. It was, by every account, an excellent resource. With the post-911 reorganization of the Intelligence Community, everyone was required to share their resources for the "War of Terror." CRISSCROSS was very successful and well-received and ultimately exceeded DEA capabilities to manage. The CIA took over as executive agent---but CRISSCROSS is shared by the DOD and DOJ in a co-ownership manner.

It's uncertain if PROTON received Special Collection Service (SCS) data when it was a solely DEA activity, but PROTON presently receives SCS collection amounting to about 1 one terabyte monthly, and that's just selectors, not content. PROTON also receives data from Computer Network Exploitation (CNE), by the now famous Tailored Access Office (TAO). Included as well is an enormous repository of Title III data from CALEA enabled domestic collection, FISA and an enormous amount of purchased data from various communications providers like Intellius.

PROTON does not contain content, only selectors for targeting. Consider that in the context of one (1) terabyte of just selectors per month (just from the SCS) for over 10 years. I have no idea how much the TAO provides, however the two biggest contributors to PROTON are the SCS and TAO.

An analyst or law enforcement officer can "run" a selector in PROTON and visualize the social network of correspondents associated with that selector in a visual format. The user can select and display most frequent numbers called or have called, duration of call, and other functions familiar to social network analysis. An analyst may choose to look at the network in terms of who called who: persons of importance typically have allot of people calling them so we can build a network based on that to determine centricity. We can build a network based on call duration, frequency, date---pick a variable. Sometimes it's useful to look at the outliers which may be hang-arounds to some drug trafficking organization. We can task NSA or DOJ for collection on these hang-arounds and begin network deconstruction from the ground up.

These calling networks include family, friends and other non-target persons. Non-target persons, like family members, are very useful in developing the target and as leverage. Non-target communications provide intelligence from things spoken between people in confidence who may not be aware of the targets activities or associations, like the location of a fugitive who has ceased using his known selectors, but communicates with his mother through her known selectors.

Another very useful feature is the Bankswitch function, which allows network discovery by the calling pattern, not necessarily by a selector. Often, groups of U.S. government interest will use a cellphone, then dispose of them , preventing further intelligence collection from that group of cellphones. Bankswitch allows the analyst to quickly rediscover the calling network that has switched phones. Humans typically have some constant behavior in who and how they make their calls and persons. Groups and enterprises not having supplicated to the U.S. government avarice will have a whole additional set of behaviors in who and how they call.

This is highly useful for calling networks that dispose and rotate telephones regularly. A fresh cellphone provides enough of a lead to discover the calling pattern of the whole network based on historical calling records. Both the DEA and FBI have found this useful in their activities in Columbia, Mexico and the United States.

I know for certain PROTON contains communications selectors on American Citizens (AMCITS) since I ran a query on a number using only a Maryland area code and a partial prefix. PROTON returned a huge list of "masked" domestic numbers. An NSA masked number is always domestic and reveals only the area code and prefix with the rest of the number obscured. A PROTON user can email the NSA with a request to unmask the number---it's in the database, but a user has to present some justification for a number to be unmasked. Voice cuts are available through a similar process.

PROTON is really well thought out. Not only does it provide a wealth of network investigative tools, it also allows for the easy introduction of data. Let's say you're a DEA Special Agent surveilling local boat captains as part of OPERATION PANAMA EXPRESS (PANEX) in Barranquilla Columbia---a major Port of Origin for drugs to the U.S. and someone gives you a business card. Just run the number and see if it hits. The Special Agent" can take that card and mail it to the PROTON Program Office (PPO). Scans, cell pictures of the information are also acceptable to ingest.

An FBI Case Officer attending a UAV conference in Las Vegas can take all the "grey literature" and hand that to the PROTON office as well. The numbers find their way into the database The PROTON office will also ingest entire phone books---still popular in some parts of Europe and Asia. They use a method similar to Google books to automatically turn pages and scan data from them.

Anything that contains a selector can go into PROTON. Part of the PROTON program is the resource that provides software engineering to order unordered data and otherwise make raw data ingestible. PROTON users can add and edit PROTON data as well. If a user discovers the identity of a previously unidentified selector, one can edit that record or leave notes for other users.

With PROTON, you can see who's talking to whom in a telecommunications relationship context. How you hit that network is up to you.

Network deconstruction techniques vary throughout the 'Community. Domestically, the DOJ prefers the highly publicized raid with the media providing the entertainment backdrop. The DEA prefers covertness. The DOD prefers a Predator strike. Yes, those drone attacks are network deconstruction techniques and target selection is often facilitated, if not provided, by PROTON.

As stated earlier, CLEARWATER is a SECRET/NOFORN version of PROTON. The DEA red herring called DICE reportedly contained NSA collection which rules-out CLEARWATER (a S//NF system) and highlights PROTON (a TS//SI system) as the source of DICE intelligence.

I'm providing information on both since the government is no longer under constitutional restraint and is illegitimate. Parallel Construction. You fuckers. A cornerstone of American law and western culture sacrificed for the security of the Elites.

With the CALEA requirements, TITLE III collection is very simple affair involving a court order and the Cisco routers which, through CALEA legislation, are engineered for surveillance. Cisco is a very enthusiastic partner to the Intelligence Community---one of those sensitive relationships managed through the NSA Special Source Operations office. The NSA finesses such relationships---with the DOJ, you get a thug in a nice suit and the quiet menace of federal law enforcement. If you think the DOJ is a law enforcement agency, you're stupid. Internal security is DOJ Job #1. As we have seen, the DOJ is maintaining internal security by both legal and extralegal means with the full support of the federal judiciary and the lukewarm animus of the U.S. Congress.

Federal judges and congress persons are largely immune to DOJ surveillance. You are not. The "new" counter-insurgency operations by the government concentrate on a Reasonable Suspicion by persons and groups---not on Probable Cause.

CLEARWATER contains selectors from any number of sources: TITLE III, purchased data from telecommunications data brokers, National Security Letters, subpoenas, technical operations by FBI TACOPS, search warrant, informant production, arrests, detentions. If the DOJ has searched you, arrested you or let you go, count on that data being in CLEARWATER. Did you give the Special Agent your telephone number?

Arresting someone to search them without needing consent or court order is not an unheard of means to get a Person of Interests selectors into CLEARWATER. Something laying openly on your desk? A cell-phone snap and email to the program office. How about those utility bills you throw away without shredding? If you're a Person of Interest, somebody is walking away with your trash.

There is a a real motivation by DOJ Special Agents to get telecommunications selectors into PROTON or CLEARWATER to build the networks for analysis and deconstruction.

CLEARWATER has all the features of PROTON and at least one other---mapping. An FBI Case Officer operating domestically can query say, Lahore Pakistan, and place on a map, those locations in the U.S. where those calls originated or terminate---a choropleth map with colored density clusters, all in a spatial context. With that, the DOJ knows where to focus it's domestic security efforts. A DEA Special Agent can run a selector seized in an amphetamine investigation and, within a few minutes, have the calling network and visualize the correspondents locations on a map. That's how DOJ led task forces show up in your neighborhood.

Watching a OWS protester enter a number into their cell phone is perfectly legal without consent or a warrant and once I get that number, we'll look at that calling network, find the node that is you, and walk that back to that moment we shared under the chestnut tree.

If you're visiting the USA from abroad, you may have your wallet and pocket litter photocopied at secondary screening. Then an email to the National Counterrorism Center (NCTC) Terrorist Identities Datamart Environment (TIDE) office, and from there, a Forward to the PROTON office.

PROTON, CLEARWATER and LEXIS-NEXIS all provide data export into Analyst Notebook file format (and PDF for ease of sharing).

All members of the Intelligence Community have access to LEXIS-NEXIS. LEXIS-NEXIS contains biographic information on most Americans having a driver or occupational license. Your state sells the contents of its drivers license database to companies like LEXIS-NEXIS for a profit. They can do this since that information is considered in the public domain---driving is a privilege and if you don't want to be in database then don't get a drivers license. LEXIS-NEXIS contains other highly personal and granular information depending on which state is providing information. Florida provides pretty much everything it can to LEXIS-NEXIS. Automobile information, luxury water craft, occupational licenses---if you submit information to a state agency, it can end up in LEXIS-NEXIS. All domestic law enforcement has access to LEXIS-NEXIS, its a fundamental investigative tool. IRS, DOJ, Treasury, Local PD, Sheriffs Office all have a LEXIS-NEXIS access or the means to pull data from them.

Law Enforcement Officers can have their data removed from LEXIS-NEXIS. An LAPD and NYPD "spokesperson" informed me that this is the case. Imagine your a citizen in New York and you get surveilled by one of the numerous surveillance technicians the NYPD has fielded since 9-11 , a quick look-up via mobile device or WiFi and they know who you are now.

So, a Special Agent or analyst simply runs the selectors in PROTON and CLEARWATER, then runs those names or other biographic/vital information again in LEXIS-NEXIS, all that data related to the TARGET is exported in Analyst Notebook format, those files are imported into the Analyst Notebook application and...viola!...a relatively complete social network and biographics of the TARGET. That could be you of course.

By Supreme Court decision and other judicial misadventures, LEXIS-NEXIS contains public information and you do not have an expectation of privacy. There is no need for Probable Cause or Reasonable Suspicion because this data is, by judicial opinion, public. Something to think about next time you're at the DMV. Citizens are queried regularly in LEXIS-NEXIS. CLEARWATER and PROTON provides network association and the selectors. A subpoena, NSL or search warrant to the telecommunications provider of that selector gives us names and locations. LEXIS-NEXIS provides Pattern of Life, geolocation and personalia. I was able to see my past three residential addresses, past telephone numbers and identifying information about my previous automobile. LEXIS-NEXIS is coupled to Automatic License Plate Recognition Systems (ALPRS) as well. Who you are, where you were and where you are.

The DOJ and Intelligence Community access LEXIS-NEXIS through a VPN and a proxy (government). A DOD proxy is registered to the Virginia Contracting Office, but it's a non-logging proxy so, good luck in your discovery. LEXIS-NEXIS has no idea of the individual accessing it's database and, according to the spokesperson, does not maintain logs of government clients. A subpoena cannot discover what is not there.

Around 2008, LEXIS-NEXIS purchased Choicepoint to start their new product line. I recall some representative, at a promotional meeting, extolling the virtues of Choicepoint---all the data in a easy to use format. A user of Choicepoint could run a query and not only get biographics and addresses but have that information located on a map or satellite image (by Pinpoint, Inc. or a Google map server). The Choicepoint representative giving the presentation said no Social Security Numbers or drivers license pictures would be included in the database in order to protect the rights of the citizen. Such conceits are good ethics in Washington, D.C.

That said, CLEARWATER and PROTON are not omnipotent. Foreign intelligence organizations use the Internet for covert and clandestine communication without detection and you can as well. Do not believe that the NSA or DOJ is all powerful. They are not and they can be defeated. Of the many systems used by NSA and DOJ, CLEARWATER, PROTON and LEXIS-NEXIS are the most significant from a "boots on the ground" investigative prospective.

There is real concern that PROTON may be to widely known for such a program and efforts are being made to walk it back into a compartment.


A Proton/Crisscross job ad:
http://jobs.cgi.com/job/Hanover-SIGINT-Analyst-Job-MD-21075/1184801/

SIGINT Analyst Job

Date: Aug 14, 2013

Location: Hanover, MD, US
Job Order: J0311-0630 - Permanent Full Time
Title: SIGINT Analyst
Category: Consulting / Business / Functional
City: Hanover, Maryland, United States

Job Description: SIGINT Analyst

CGI Federal is seeking a SIGINT Analyst to work in our Hanover, MD office.

Specific Duties:

Applicants will work as a member of a government-contractor team whose primary focus will be providing support to deployed analysts and software developers.

In this capacity, uses an in-depth knowledge of general communications procedures, traffic analysis and reporting formats and vehicles to produce time-sensitive and event-oriented reports

Provide support to force protection, indications and warning and situational awareness; provides target continuity and mentorship to a junior and rotating workforce; conducts research to answer RFIs and produces working aids to support new tool development.

Must be willing to receive and conduct training on new systems, databases, processes and procedures.

Analyst will be supporting deployed US military troops and must understand the military decision making process and miliary doctrine.

Minimum of five (5) years experience with the military or government agency using the collection management cycle, intelligence cycle, targeting cycle, and the SIGINT intelligence fusion process from tactical to national level required.

Additional Requirements:

Experience with Falconview, Analyst Notebook, Arc View, Arc-GIS, Arc-Editor, AIM, Pathfinder, SEAS, STARLIGHT, GCCS and other current analyst tools.

Active TS/SCI security clearance w/ polygraph required.

Preferred:

Experience with NSANET, RTRG tool suite, Global Reach, Proton/Criss Cross, Broom Stick, CW II, Banyan. Geo Bootcamp and knowledge of ArcGIS a plus.

Preferred experience includes analysis in OIF/OEF, NSA, INSCOM, or ACE At CGI, we're a team of builders. We call our employees members because all who join CGI are building their own company - one that has grown to 71,000 professionals located in more than 40 countries. Founded in 1976, CGI is a leading IT and business process services firm committed to helping clients succeed. We have the global resources, expertise, stability and dedicated professionals needed to achieve results for our clients - and for our members. Come grow with us. Learn more at www.cgi.com.

This is a great opportunity to join a winning team. CGI offers a competitive compensation package with opportunities for growth and professional development. Benefits for full-time, permanent members start on the first day of employment and include a paid time-off program and profit participation and stock purchase plans.

We wish to thank all applicants for their interest and effort in applying for this position, however, only candidates selected for interviews will be contacted.

No unsolicited agency referrals please.

WE ARE AN EQUAL OPPORTUNITY EMPLOYER.

Skills

- Analytical Thinking
- Signal Intelligence (SIGINT)

Reference: 137685

//////

Check out the BOLO - be on the lookout - National Guard civil disturbance training program photos here:North Carolina National Guard Rapid Reaction Force Civil Unrest Training Photos | Public Intelligence. Obviously PROTON, DICE, CRISSCROSS, CLEARWATER style database technology would be useful in composing intelligence

Official description: CHARLOTTE, N.C. – Soldiers of the North Carolina National Guard train for Rapid Reaction Force duty at the Catawba River Pump Station here today. The training scenario tests the Soldiers ability to use nonlethal force to disperse a crowd of aggressors from a water plant. This training prepares the Soldiers to support state and local first responders and county emergency management agencies. The RRF is a quick reaction team that, on order, is deployable anywhere in North Carolina within 24 to 36 hours of a critical event. In times of crisis, the RRF may be ordered by the President of the United States or the Governor of North Carolina in order to augment Federal or State Authorities in response to actions such as a known terrorist attack, civil unrest or a natural and/or man-made disaster. (U.S. Army National Guard photo by Sgt. 1s Class Robert Jordan / released)

nc-rrf-3.jpg nc-rrf-9-1024x724.png nc-rrf-8-1024x708.png

/////

Other targetings: Russia Issues International Travel Advisory to Its Hackers | Threat Level | Wired.com

WaPo/Snowden: U.S. spy agencies mounted 231 offensive cyber-operations in 2011, documents show - The Washington Post

Black Budget semi-surfaces: ‘Black budget’ summary details U.S. spy network’s successes, failures and objectives - The Washington Post

Israel listed as major counterintelligence threat in Black Budget: Leaked documents reveal US sees Israel as a spying threat (Video) - The Hill's Global Affairs

WIRED on cryptology cracking in black budget: New Snowden Leak Reports 'Groundbreaking' NSA Crypto-Cracking | Threat Level | Wired.com

Login Lulz for Snowden in Ars Technica Aug 29th: Sysadmin security fail: NSA finds Snowden hijacked officials’ logins | Ars Technica

.... Leaving it there for now...

Syndicate content