Security

UnicornRiot Deprogram: Episode 23 interview covers information security and mobile encryption

My colleagues with the new activist oriented news service UnicornRiot.ninja interviewed me about encryption and privacy/security and it went pretty well overall. Check out the video and please support their efforts!! (original post) Deprogram airs every Wednesday night around 8PM central.


Ep. 23: #NSA #GCHQ #TPP #AirFrance #Kunduz #Calais #NoBorders #HaciBirlik #Turkey #Brazil #ClimateChange #MMIW #Palestine #DariusPinex #SouthCarolina #SCFloods #IndigenousResistance #Surveillance #Encryption

After the 12 topic rundown and music video, we had two interviews. In the first interview, we were graced with the presence of Kanahus Manuel to discuss Indigenous environmental issues in so-called Canada.

For our second interview, we were joined by Dan Feidt, who discussed privacy protection options for computer and phone users in the growing surveillance state.

“Deprogram”, a live show hosted by Zo and Niko that attempts to examine the roots of the struggles that preside throughout different communities. “Deprogram” airs live every Wednesday night at 9pmEST.

Fascinating Greek parallel euro payment network nearly activated in crisis, after hacking into EU-controlled systems to clone tax IDs

It can't be emphasized enough that the global debt complex we are all trapped in is reproduced daily by sophisticated (and in many cases quite old & deteriorated) computers. There is no magic man behind the curtain, just a bunch of nasty computer systems whose authority is enforced by central banking authorities like the Troika, IMF, World Bank, Bank for International Settlements and the Federal Reserve System.

This is one of the biggest stories at this level I have seen in ages, perhaps ever. Fascinating story very worth reading: A secret lolcat team in Greece's finance ministry hacked into their own EU-controlled systems and had a parallel financial network ready to go, but it all got wound down. Apparently FM Varoufakis resigned as a result of the plan being halted - and overall it was a pretty cool plan under dire national circumstances of emergency survival vs austerity.

Varoufakis reveals cloak and dagger 'Plan B' for Greece, awaits treason charges - Telegraph;

VFakDrak_0.png

A secret cell at the Greek finance ministry hacked into the government computers and drew up elaborate plans for a system of parallel payments that could be switched from euros to the drachma at the "flick of a button" .

The revelations have caused a political storm in Greece and confirm just how close the country came to drastic measures before premier Alexis Tsipras gave in to demands from Europe's creditor powers, acknowledging that his own cabinet would not support such a dangerous confrontation.

Yanis Varoufakis, the former finance minister, told a group of investors in London that a five-man team under his control had been working for months on a contingency plan to create euro liquidity if the European Central Bank cut off emergency funding to the Greek financial system, as it in fact did after talks broke down and Syriza called a referendum.

People really need to pay more attention to the crappy computers running the whole financial system, see also very important here: Bank IT, Grexit, and Systemic Risk | naked capitalism - lots of gory details:

On the IT front, the challenge is vastly larger due to the state of financial firm IT systems. We intend to return to this topic, because we see bank IT systems as an unrecognized source of systemic risk. They are required to run to mission critical standards: enormous transaction volumes, extremely high demands for accuracy of end output, high uptimes. Yet the code base is an agglomeration, with many important operations relying in meaningful ways on legacy systems. Thus, as our expert with relevant experience stressed, changes that seem simple are anything but.

VaroufakisStare_0.pngThis is precisely why it is so important to understand these systems and come up with intermediate replacements, as your local version of the ECB is always waiting to make its next move for artificial austerity & assorted lethal games all taking place inside these computers…

More: Reports Of Secret Drachma Plots Leave Tsipras Facing Fresh Crisis | Zero Hedge, Syriza "Rebels" Planned To Ransack Greek Mint, Seize Cash Reserves, Arrest Central Bank Governor | Zero Hedge.

Varoufakis claims had approval to plan parallel banking system | News | ekathimerini.com

Former Finance Minister Yanis Varoufakis has claimed that he was authorized by Alexis Tsipras last December to look into a parallel payment system that would operate using wiretapped tax registration numbers (AFMs) and could eventually work as a parallel banking system, Kathimerini has learned.

In a teleconference call with members of international hedge funds that was allegedly coordinated by former British Chancellor of the Exchequer Norman Lamont, Varoufakis claimed to have been given the okay by Tsipras last December – a month before general elections that brought SYRIZA to power – to plan a payment system that could operate in euros but which could be changed into drachmas "overnight" if necessary, Kathimerini understands.

Varoufakis worked with a small team to prepare the plan, which would have required a staff of 1,000 to implement but did not get the final go-ahead from Tsipras to proceed, he said.

The call took place on July 16, more than a week after Varoufakis left his post as finance minister.

The plan would involve hijacking the AFMs of taxpayers and corporations by hacking into General Secretariat of Public Revenues website, Varoufakis told his interlocutors.This would allow the creation of a parallel system that could operate if banks were forced to close and which would allow payments to be made between third parties and the state and could eventually lead to the creation of a parallel banking system, he said.

As the general secretariat is a system that is monitored by Greece’s creditors and is therefore difficult to access, Varoufakis said he assigned a childhood friend of his, an information technology expert who became a professor at Columbia University, to hack into the system. A week after Varouakis took over the ministry, he said the friend telephoned him and said he had “control” of the hardware but not the software "which belongs to the troika."

….

"The prime minister before he became PM, before we won the election in January, had given me the green light to come up with a Plan B. And I assembled a very able team, a small team as it had to be because that had to be kept completely under wraps for obvious reasons. And we had been working since the end of December or beginning of January on creating one.

"What we planned to do was the following. There is the website of the tax office like there is in Britain and everywhere else, where citizens, taxpayers go into the website they use their tax file number and they transfer through web banking monies from the bank account to their tax file number so as to make payments on VAT, income tax and so on and so forth.

“We were planning to create, surreptitiously, reserve accounts attached to every tax file number, without telling anyone, just to have this system in a function under wraps. And, at the touch of a button, to allow us to give PIN numbers to tax file number holders, to taxpayers.

"That would have created a parallel banking system while the banks were shut as a result of the ECBs aggressive action to deny us some breathing space.

"This was very well developed and I think it would have made a very big difference because very soon we could have extended it, using apps on smartphones and it could become a functioning parallel system and of course this would be euro denominated but at the drop of a hat it could be converted to a new drachma.

"But let me tell you - and this is quite a fascinating story - what difficulties I faced. The General Secretary of Public Revenues within my ministry is controlled fully and directly by the troika. It was not under control of my ministry, of me as minister, it was controlled by Brussels.

Ok, so problem number one: The general secretary of information systems on the other hand was controlled by me, as minister. I appointed a good friend of mine, a childhood friend of mine who had become professor of IT at Columbia University in the States and so on. I put him in because I trusted him to develop this……


a week or so after we moved into the ministry, he calls me up and says to me: 'You know what? I control the machines, I control the hardware but I do not control the software. The software belongs to the troika controlled General Secretary of Public Revenues. What do I do?'

…..

"So we decided to hack into my ministry’s own software program in order to be able break it up to just copy just to copy the code of the tax systems website onto a large computer in his office so that he can work out how to design and implement this parallel payment system.

"And we were ready to get the green light from the PM when the banks closed in order to move into the General Secretariat of Public Revenues, which is not controlled by us but is controlled by Brussels, and to plug this laptop in and to energize the system.


Obviously it was a disappointment to many sane people that Syriza seems to have mostly folded to the Troika but perhaps the Secret Team tactic could be used when the next big one hits the fan and an entrapped debtor nation decides to quickly assert technical sovereignty.

But how to pull this again without tipping the hand? And could it be used again by Greece, now that the word is out? What will happen to Varoufakis' rather exposed techie friend, assuming it's accurate? A fascinating and very pertinent story, I can only hope gets dramatized in some fashion.

Get these computers because one way or another, they are definitely gonna getcha, getcha, getcha…


Update: worth pointing out the Federal Reserve drama over banks wanting their electronically created money kicked back from the Fed. Interesting because it unravels a 100-year-old pact between Congress and banks, as well as highlighting the bizarre secretive and lucrative bank membership in Fed regional entities. Great source of electronic "money" to put into the roads, Ace work whoever managed to slide this policy under the nose of the bank lobbyist fleet.

The Hill, 7/25/2015 - Banks revolt over plan to kill $17B Fed payout by Peter Schroeder

Industry lobbyists say they were blindsided by the inclusion of the provision, which would help policymakers cover the bill’s cost by cutting the regular dividend the Federal Reserve pays to its member banks.

One lobbyist went so far as to reread the Federal Reserve Act of 1913 after getting wind of the proposal to determine what was at stake.
“I think it took everyone by surprise,” said Paul Merski with the Independent Community Bankers of America. “There was no study of the issue, no hearings, no consultation with the Federal Reserve itself.”

“It came on very quickly,” said James Ballentine of the American Bankers Association, who said he first caught wind of the idea a little over a week ago. “It’s certainly a scramble.”

In a Congress where lawmakers are always hunting for politically palatable ways to raise revenue or cut costs to cover the expenses of additional legislation, the Fed provision was a novel, and rich, one. The proposal is estimated to raise $17 billion over the next decade, and is by far the richest “pay for” included in the bill.

Lobbyists said they were not aware of any previous time when lawmakers had attached the language to a piece of legislation, which would scrap a perk banks have come to expect for over a century.

When banks join the Federal Reserve system, they are required to buy stock in the central bank equal to 6 percent of their assets. However, that stock does not gain value and cannot be traded or sold, so to entice banks to participate, the Fed pays out a 6 percent dividend payment.

The Senate proposal says it would slash that “overly generous” payout to 1.5 percent for all banks with more than $1 billion in assets. While the summary language outlining the proposal said that change would only impact “large banks,” industry advocates argued that banks most would identify as small community shops could easily have assets in excess of that amount.

Banks are working to mobilize against the provision, even as lawmakers are pushing to pass a highway bill before program funding expires at the end of the month.

Merski said ICBA had launched a “nationwide grassroots effort,” enlisting its numerous member banks and bankers and told them to call Senate offices to oppose the provision.

And Ballentine said his group was engaged in a concerted education effort for members, outlining why the industry believes the policy change would be disruptive and has no place in highway legislation.

Five major industry groups also sent a letter to lawmakers blasting the provision, saying it “undermines a key agreement that has underpinned the United States banking system for 100 years.”

Senate Banking Committee Chairman Richard Shelby (R-Ala.) opposes the provision, and invited Fed Chairwoman Janet Yellen to opine on it when she appeared before his panel earlier this month.

She told lawmakers that if the dividend payment is reduced, some banks may not want to buy into the Fed.

“This is a change that likely would be a significant concern to the many small banks that receive the dividend,” she said.

Donald Kohn, the former vice chair of the Fed, told House lawmakers Wednesday that the proposal would be one directly felt by banks.

“Let’s recognize that by lowering it to, say, 1.5 percent on the proposal, in effect you are placing a tax on banks,” he told the House Financial Services Committee.

A review of previous policy proposals suggests that the idea may have first been thought up by House liberals. The 2014 budget proposal from the Congressional Progressive Caucus put forward the idea to raise revenue, and a CPC aide said he believed it was the first time someone in Congress proposed the idea. But the Senate highway bill apparently marks the first time members have actually placed it in actual legislation.

This all reminds me that the Federal Reserve Bank [Atlanta] branch in Miami would have some fascinating figures benefiting its busy member banks from the 1980s in the Iran Contra cocaine salad days, but that's another story... [Jeb Bush's angle in the Miami Dade Republican Party/Cartel days is treated in this hilarious Daily Beast limited hangout, spurring hope of awesome JebCokeCIA campaign stories (or videos?) yet to come.]

EXCLUSIVE: Such Critical Infrastructures: FBI feeds Anonymous IRC channels to CIA, Pentagon intel, NSA, NORTHCOM in 2012 Intel memo

An FBI "IIR" intelligence report, dated April 12 2012 entitled "Identification of Internet Relay Chat (IRC) Channels Used by Anonymous Members, as of 12 April 2012" surfaces a dicey realm between US military & intelligence and electronic activists. The full report is at scribd.com/doc/246922867/FBI-FOIA-IRC-Chat-Channels-used-by-Anonymous // (Mobile) /// UPDATE: Upvote this post on Reddit & Thanks to YAN for amplifying!

FBI FOIA IRC Chat Channels used by Anonymous by Smiley Hill

A tiny peek into a huge deal: the potential fracas between assorted would-be American military cyberwar commandoes and international (and domestic!) computer activists. This lower-level report (Unclassified//For Official Use Only) (U//FOUO) perhaps is more interesting for its "metadata" rather than thoroughly censored content. Below I also included some other domestic military operations documents below to draw a wider context than just this "cyberwar" stuff, as Ferguson has prompted Gov. Nixon in Missouri to activate the state militia, it's good to read up on what federal legal doctrine for "civil disturbances" is.

fbi-iir1.png
fbi-iir2.png
fbi-iir3.png

Such recipients: In order, it says it is from "DIRECTOR FBI" to:

All FBI field offices

INFO AFOSI DET 331 Andrews AFB Maryland, Headquarters Air Force Office of Special Investigations (also cited in this case http://www.dod.mil/pubs/foi/homeland_defense/intelligence/EFF_vs_DOD_Bates_997_1096.pdf )

CDR USSTRATCOM Offutt AFB Nebraska, Strategic Command commander

CDR USTRANSCOM Scott AFB Illinois, United States Transportation Command commander

CDR1STIO Ft Belvoir Virginia, First Information Operations Command commander - https://www.1stiocmd.army.mil/ (wat? "CDR1STIO" pops in a bunch of other FOIA'd IIRs as well if you googlize it)

CIA WASHINGTON DC - always down for a good time

DEPT OF HOMELAND SECURITY WASHINGTON DC - yes, this hot info wasn't stovepiped away from rivals

DEPT OF JUSTICE WASHINGTON DC - fetching banhammer

DEPT OF STATE WASHINGTON DC

DIA WASHINGTON DC - Defense Intelligence Agency which is huge and low profile - http://www.dia.mil/

DIRNAVCRIMINVSERV - Probably HEADQUARTERS. NAVAL CRIMINAL INVESTIGATIVE SERVICE.

DNI WASHINGTON DC - Director of National Intelligence. (Clapper at the time)

HQ AFOSI Andrews AFB Maryland - Air Force Office of Special Investigations. Tip, if you have some message for them, use their unencrypted contact form to let them know about fraud or etc. What could possibly go wrong? > http://www.osi.af.mil/main/contactus.asp

HQ NORAD USNORTHCOM INTEL PETERSON AFB - US Northern Command located near Colorado Springs was created as Dept of Homeland Security's military counterpart for "Homeland Defense", an elastic concept extending Pentagon involvement with "critical infrastructure," namely the machinery of major corporations. They also revised "GARDEN PLOT" into CONPLAN 3502 Civil Disturbance Operations," relevant in a Ferguson type context under federal mobilization. (see 2010 story) They were also written into Superman's plot.

JOINT STAFF Washington DC - J2 - Director for Intelligence (J2) on the Joint Chiefs of Staff (now this guy)

JWAC DAHLGREN Virginia - Joint Warfare Analysis Center a "premier science and engineering institution" under Strategic Command (USSTRATCOM), which also hosts Cyber Command. see http://www.stratcom.mil/functional_components/

NGA HQ Bethesda Maryland. The National Geospatial Intelligence Agency, like DIA, is up to a lot of things off the radar. They have domestic satellite spying (GEO INT) responsibilities at National Special Security Events which require a special domestic military intel privacy waiver. http://www.stratcom.mil/functional_components/ . Big spenders.

NSA FT GEORGE G MEADE Maryland - National Security Agency at the oddly spelled out Ft Meade. I wonder how many land in this inbox - and how many times "George G" is stored in their databases.

US SECRET SERVICE WASHINGTON DC

USCYBERCOM FT GEORGE G MEADE Maryland - Cyber Command in ur router, sniffin ur packets

WHITE HOUSE SITUATION ROOM WASHINGTON DC.

BT . … I am fairly sure this is a closing list tag like </UL>

////

Serial IIR 4 213 4003 12, "WARNING (U): This is an information report, not finally evaluated intelligence. It is being shared for informational purposes but has not been fully evaluated, integrated with other information, interpreted or analyzed. Receiving agencies are requested not to take action based on this raw reporting without prior coordination with the FBI. Unless a conviction in a criminal proceeding occurs, a presumption of innocence exists for any person being reported on in this IIR." Declassification date appears 20370607, as this hot stuff needs to lay low for a couple more decades.

What is an IIR? It is pretty low level stuff for the FBI. For a bit of info see FBI Intelligence Information Report Handbook | Electronic Frontier Foundation. That document interestingly, at the very end includes a statutory info pipeline from Grand Jury operations to various feds. Patriot Act Section 203(a)(1)( C )(i)(V) certainly makes for an industrious star chamber circuit, but they don't want grand jury info going out in IIRs without asking the HQ attorney.

This document was obtained by Smiley Hill via FOIA. Please follow https://twitter.com/smilyus for more smileable FOIAs on a regular basis.

////

The use of the military - and these contractors in the game now - to police corporate systems labeled as Critical Infrastructure is significant. After all, Missouri Gov Nixon just activated the state militia because of Ferguson.

ferguson-crop2.png ferguson-crop1.png

In the recent FBI writeup freeking out about Ferguson protesters, I took the "critical infrastructure" references to allude to authorizing military activity around corporate electronic assets that might get poked at by angry activists.

“The announcement of the grand jury’s decision … will likely be exploited by some individuals to justify threats and attacks against law enforcement and critical infrastructure,” the FBI says in an intelligence bulletin issued in recent days. “This also poses a threat to those civilians engaged in lawful or otherwise constitutionally protected activities.”

fergusoncrop.png

////

Background on Executive Order 13636:

See NSA's cybersecurity program to protect critical infrastructure revealed - Military & Aerospace Electronics

Feb 2013: Executive Order -- Improving Critical Infrastructure Cybersecurity | The White House

CRS analysis on Executive Order: http://fas.org/sgp/crs/misc/R42984.pdf

Feb 2013: Pentagon will require security standards for critical infrastructure networks - Nextgov.com

This is actually a word? Cyberinfrastructure - Wikipedia, the free encyclopedia

Nov 2012: Cyber Order Puts DHS In Charge Of Oversight, Sets Deadlines « Breaking Defense - Defense industry news, analysis and commentary

USA TODAY: Feb 2013: Cybersecurity executive order fosters information sharing for greater good

As for the legal ramifications of domestic military operations and targeting electronic activists with tools like STRATCOM / CYBERCOM retain for battling Al Qaeda servers or whatever, most people say "But, Posse Comitatus!" In reality a vast area of domestic military operations has been expanded and operated by JAGs. See : www.loc.gov/rr/frd/Military_Law/pdf/operational-law-handbook_2012.pdf

This Domestic Operational Law Cyber Realm has a Handbook, People!

DomesticOperationalLaw2011.png

The domestic version of this JAG manual is extremely recommended reading for everyone. See Domestic Operational Law Handbook for Judge Advocates 2011 | Public Intelligence.

Also the newer 248 page Domestic Operational Law Handbook for Judge Advocates 2013 | Public Intelligence is available. You will definitely know moar about WTF is up with weird meshes of civilian/military authority in the US by skimming over this.

PI highlighted a bunch of good 2011 stuff, since we are talking Ferguson anyway, it's worth noting again:

G. The Department of Defense Civil Disturbance Plans

Formerly, DoD’s Civil Disturbance Operations (CDO) plan was known as “GARDEN PLOT.” Since the creation of the Department of Homeland Security and USNORTHCOM however, DoD has delegated to geographic combatant commanders responsibility for developing CDO Contingency Plans (CONPLANs). These geographic commanders’ CONPLANs provide guidance and direction for planning, coordinating, and executing military operations during domestic civil disturbances.

1. Civil Disturbance Operations Mission

Broadly stated, the CDO mission assists civil authorities in restoring law and order in the United States and its territories.58 This mission statement, while not duplicating the language in the Insurrection Act allowing for the use of federal forces to “suppress” insurrection, provides wide latitude to the President to use federal forces to assist civil law enforcement in “restoring” law and order.

The restoration of law and order must be distinguished from the preservation of law and order. CDO mission statements do not allow the joint civil disturbance task force commander to undertake preservation missions. It is generally agreed that missions to restore law and order include dispersing unauthorized assemblages, patrolling disturbed areas, maintaining essential transportation and communications systems, setting up roadblocks, and cordoning off areas. Care should be taken before a military commander accepts missions that are routine maintenance of civil order.

2. Combatant Commanders’ CONPLANs

The CONPLANs provide the basis for all preparation, deployment, employment, and redeployment of Department of Defense component forces, including National Guard forces called to active federal service, for use in domestic civil disturbance operations, in support of civil authorities as directed by the President. The concept of a civil disturbance operation is multi-phased: Phase 0, Shape; Phase I, Anticipate; Phase II, Respond (deployment can occur in either Phase I or Phase II); Phase III, Operate; Phase IV, Stabilize; and Phase V, Transition (redeployment). Prior to deployment, military forces maintain five preparedness postures, called Civil Disturbance Conditions (CIDCONS) in order to alert and react to potential civil disturbance operations. Changes in the CIDCON level are directed by the JDOMS.

3. The Standing Rules for the Use of Force for U.S. Forces

Civil disturbance operations are conducted in accordance with Appendix L of the Standing Rules of Engagement/Standing Rules for the Use of Force for U.S. Forces (SRUF). Guidance on how and when forces can use force in a CDO mission are detailed in that annex. Although the CJCSI is classified, Annex L is not and can be shared with our mission partners.

a. Custody and Detention

All apprehensions should be made by the civil police force unless they are not available or require assistance. Military forces have the authority to detain rioters, looters, or other civilians committing criminal offenses. Civilians taken into custody should be transferred to civilian law enforcement authorities as soon as possible.

All members of the force must remember that state and federal criminal law and procedure govern apprehension. Apprehension is justified only on the basis of probable cause to believe that an offense has been committed and that the person to be apprehended committed the offense. Soldiers should not question detainees beyond basic pedigree such as name and address. If formal questioning of an offender is necessary, civilian police should conduct the interview. If civilian police are not available, CID agents or military police may conduct interviews only if the interview is essential to the civil disturbance mission. Actions taken by Soldiers that do not conform to criminal law constitutional standards could jeopardize future prosecution and subject Soldiers and their Commanders to criminal and/or civil liability.

b. Search and Seizure

CDO CONPLANs anticipate that military forces will generally not be involved in searches unless there is “an immediate danger of violence, destruction of evidence, or escape of violent persons unless the search is conducted without delay.” In all other cases, local authorities should conduct searches. When required to perform searches, federal armed forces may conduct warrantless searches under the same constitutional parameters imposed upon law enforcement officials. Joint Civil Disturbance Task Force forces conducting a warrantless search will fully document the reasons for the search as soon as is reasonably convenient.69 Generally these searches are limited to the following incidents.

(1) Stop and Frisk

If there is a reasonable suspicion based upon articulable facts that a person has committed, is committing, or is about to commit a crime, that person may be temporarily stopped and questioned about his activities. The stop must be limited in duration to that which is reasonably necessary to investigate the suspicion. If there is a reasonable suspicion based on articulable facts that a person is armed or is carrying instruments of violence and that the individual presents an immediate risk of harm, members of the armed force may conduct a “frisk” (an external “patdown” of the clothing) for weapons. Any weapons found during a frisk may be removed from the individual and seized.

(2) Search Incident to Lawful Apprehension

A person lawfully detained may be searched for weapons or destructible evidence. A search for weapons or destructible evidence may also be conducted in the area where the detained person could reach with a sudden movement to obtain a weapon or destroy evidence.

(3) Exigent circumstances

Military forces assisting law enforcement may make a search without a warrant when they have reason to believe (probable cause) that weapons, objects related to criminal activity, or persons believed to have committed an offense, are in the place to be searched; and they have reason to believe that the delay necessary to obtain a search warrant would result in removal of the weapons or destruction of the objects related to criminal activity. For example, Joint Civil Disturbance Task Force forces may stop and search an automobile without a warrant when there is reason to believe that the automobile contains weapons or instruments of violence and/or contains an individual reasonably believed to have committed violence.

(4) Emergency

Military forces in a civil disturbance operation may make an immediate entry into a building when there is reason to believe that entry is necessary to prevent injury to persons, serious damage to property, loss of evidence, to protect public safety, or to render aid to someone who is in danger.

(5) Hot pursuit

Military forces pursuing a person who they have reason to believe has just committed a serious crime, may enter a vehicle or building believed to be entered by the suspect and search the building or vehicle for the person or any weapons that might be used to further his escape.

(6) Plain View

During the course of otherwise lawful activity, military forces may seize any unlawful weapons or objects related to criminal activity which they observe in plain view. When conducting warrantless searches that require a probable cause determination, military forces can obtain advice from a judge advocate; however, the probable cause determination must be made personally by the individual desiring to conduct the search.

If a search warrant is required, local civil authorities should obtain judicially issued search warrants. If local civilian authorities are not available, judge advocates need to be prepared to provide advice on probable cause to military authorities before they approach a local judge or magistrate for a search warrant.

When feasible, all searches conducted by military personnel will be conducted by two personnel with the actual search performed by someone of the same sex.76 A hand receipt or some similar document should be prepared when items of personal property are seized from an individual.

c. Confinement Facilities

The Joint Civil Disturbance Task Force should not operate a detention facility. Any person apprehended should be turned over to the police for detention. Military correctional facilities cannot be used to detain civilians. If available civilian detention facilities cannot accommodate the number of detained persons who are awaiting arraignment, the Joint Civil Disturbance Task Force commander must seek the approval of the SCRAG and Combatant Commander to set up a temporary detention facility.

Should the Task Force be required to operate a detention facility, the detention facility standards and operations should conform, to the maximum extent possible, to current DoD confinement facility operations and will be under the professional supervision and control of Military Police personnel. The establishment and operation of military detention facilities is a temporary expedient and is authorized only until such time as the custody of detained persons can be transferred to civil authorities.

d. Riot Control Agents

Normally, for CDO the deployment and use of riot control agents is allowed as a matter of U.S. policy. However, initial approval authority for its deployment and use may be retained at a level higher than the Joint Civil Disturbance Task Force Commander and may require a specific request.

This is not the same as a state-level activation, but it is the doctrine that is crafted at the federal level these days so I think it's pretty relevant to Ferguson.

timthumb.png

The federal government hasn't taken kindly to people that expose these types of relationships. Barrett Brown's sentencing just got delayed again - but at least the Barrett Brown Review of Arts and Letters and Jail is awesome. For more info FreeBarrettBrown.org.

Canada's Parliament Hill like The Alamo? Canadian Security Crisis Continuum coincides with push for expanded powers

Canada has usually followed a Bush-lite foreign policy under Stephen Harper for what seems like forever. Besides South Park jokes, Canada seems to usually be virtually invisible in US news. That has suddenly changed and it is already being pegged on ISIS for a much-welcome burst of World War 3 media fearporn.

Glenn Greenwald wrote up a recent attack on Canadian soldiers. See: Canada, At War For 13 Years, Shocked That 'A Terrorist' Attacked Its Soldiers - The Intercept

Anyway I was struck by this column from Ian MacLeod as I feel like it represents the angle of high-level circles in Ottowa formulating their preferred narrative. I recognized the name from somewhere and indeed he is a grizzled veteran journalist of the intel beat, and if anyone can lay down the “here’s how it’s gonna be eh” from the Canadian military-industrial security gang it’s MacLeod.

Analysis: Effects on Ottawa will be lasting and far-reaching | Ottawa Citizen

This is a game changer.

Wednesday’s attacks in Ottawa strongly suggest the Islamic State (ISIL) or other foreign jihadist influences have the ability to inspire, recruit or possibly even task Canadian sympathizers to launch domestic assaults, however unsophisticated.

With details still emerging Wednesday night, ISIL was the leading suspect. The terrorist group has publicly called on supporters to kill military personnel and civilians in Canada and other countries — including by running them over with cars. In just three days, two soldiers have been murdered on Canadian soil, one run down by a car in St-Jean-sur-Richelieu and another shot in cold-blood at one of the country’s most sacred sites, the Tomb of the Unknown Soldier. [….]

Both Canadians alleged to have carried out this week’s atrocities were reportedly identified as “high-risk travellers” who’d had their passports seized by the RCMP.

As more details emerge, immediate questions mount:

  • What specific details of a domestic ISIL threat were known to federal officials and when?
  • Did they foreshadow Wednesday’s events?
  • What was the operational response?
  • If Wednesday’s gunman was on authorities radar, as reported, why was he still able to launch his attack?

It seems certain Parliament Hill will become less welcoming, more fortified. But will it become any safer?

Complaints and official reviews of Parliament Hill security date back almost to its founding.

The wrought-iron fence along Wellington Street was an early security feature, as was the wide expanse of open lawn, a 19th century military practice developed by the Royal Engineers. Turf battles between the RCMP and Commons and Senate security services have gone on for years.

The House of Commons Security Services, whose officers have long been allowed to carry guns, is responsible for buildings under the jurisdiction of the House.

The Senate Protective Service is responsible for the east portion of Centre Block and East Block. Its officers were given permission to carry arms this summer, but it’s not known how many were armed Wednesday.

The RCMP is responsible for the grounds, as well as the security of the prime minister and visiting dignitaries when outside the buildings. The areas under the jurisdiction of the three security forces extend across a number of city blocks. The streets, including Wellington Street, are the responsibility of Ottawa police.

Though they operate under a co-ordinated “master security plan,” a 2012 review by the Office of the Auditor-General recommended a unified security force guard not only Parliament Hill but the entire precinct.

On another front, it wasn’t long ago that the death of Osama bin Laden and demise of core al-Qaida as inspiration and organizer for global jihadists movements led to calls for Canada’s security intelligence apparatus to recalibrate and shift focus to issues such as climate change, resource conflicts and failed states.

There’ll be no such transition now.

The Conservative government’s push to legislate new powers for police and security services will almost certainly gain steam and additional public support.

Already, the federal government was to unveil new measures Thursday to give federal security agents more power to track suspected terrorists.

Further moves to legislate in the face of this emergency may also trigger calls for caution to ensure that any additional state counter-terrorism powers are true to the aspirations of the democracy they are supposed to protect.

In other words, simply ensuring that such measures are consistent with the Charter of Rights is not always the same as saying they are necessary, wise or even just.

continuum.jpg

Speculative angles spurred by this rather candid post from MacLeod: So many times we have heard about a "gunman was on authorities radar” that turned out to be a sketchier player or asset connected to other organizations.

The scheduled rollout of security measures adds to further skepticism. Even if they find an ISIS angle that they really run with, this incident seems tainted from the start.

So many parties benefit from sudden escalation in conflict, it’s hard to see why intelligence agencies would benefit from preventing incidents like the attack in Ottawa.

It seems like RCMP is set up to take the blame, so we will get a super RCMP — and of course even less freedom of movement than the NAFTA’ized Canadian border currently affords anyone deemed politically “unpalatable”. I wonder if Canadian security ops would invade Minnesota?

It seems like a good point to start watching more episodes of Continuum, chronicling the time traveling adventures of anticorporate neo-luddite terrorists battling a moralizing cyborg cop from the Canadian Future...

Ian MacLeod is indeed someone from the firmament that would be the one to put out that major message locking in the Conservative plan right now.

For example: PODCAST: Broken Mirrors, Episode 1: "we sit with Ian MacLeod who has 30 year’s experience as a reporter in the intelligence, national security, military and terrorism fields. The discussion occurs over several glasses of wine. In the third segment, Tom’s risk assessment looks at what damage has occurred as a result of the Snowden revelations.”

Anyway it is always unfortunate when these events occur, and hopefully Canada will be willing to face its geopolitical problems through something besides ever-more military interventionism — which is clearly the goal of so many parties involved.

Terrible proposed shield law spells doom for journalists, in particular me :[

mediashieldlawdifi.jpg

Here is some horrible news. I am inquiring further since of course it's people like me that this is intended to chill and/or enable grand juries to throw in prison without charges…. I have put in inquiries with MN Sens. Klobuchar and Franken offices to determine if they believe reporters should be divided into classes, and what is the deal with grand juries here and etc.

Full report by Kevin Gosztola, another non-journalist: Media Shield Law, Which Aims to Protect Only ‘Real Reporters,’ Moves Onward to the Senate | The Dissenter

The Senate Judiciary Committee passed legislation that would establish a federal shield law for reporters or journalists in the United States. The legislation was amended, before passing out of committee, to define who would be a “covered journalist” under the proposed shield legislation.

The proposed shield legislation, the Free of Flow of Information Act of 2013, was introduced by Sen. Chuck Schumer as news of the Justice Department seizing an overly broad set of the Associated Press’ phone records for a leak investigation and of an FBI agent labeling Fox News reporter James Rosen an “aider, abettor and co-conspirator” in a leak investigation were making headlines. However, there is nothing immediately obvious in the proposed media shield that would protect the press from an agency in government committing those kind of abuses. It would not protect someone like New York Times reporter James Risen, who the administration of President Barack Obama has tried to force to testify against his source in a leak case despite protest from media organizations.[….]

MOAR: Why Sen. Feinstein Is Wrong About Who’s a “Real Reporter” | Electronic Frontier Foundation && Why “Members of the News Media” Should Welcome a Shield for the Act of Journalism | emptywheel

PASSED SENATE JUDICIARY: Text of S. 987: Free Flow of Information Act of 2013 (Introduced version) - GovTrack.us

S 987 IS

113th CONGRESS

1st Session

S. 987

To maintain the free flow of information to the public by providing conditions for the federally compelled disclosure of information by certain persons connected with the news media.

IN THE SENATE OF THE UNITED STATES

May 16, 2013

Mr. SCHUMER (for himself and Mr. GRAHAM) introduced the following bill; which was read twice and referred to the Committee on the Judiciary


A BILL

To maintain the free flow of information to the public by providing conditions for the federally compelled disclosure of information by certain persons connected with the news media.

Be it enacted by the Senate and House of Representatives of the United States of America in Congress assembled,

SECTION 1. SHORT TITLE.

This Act may be cited as the ‘Free Flow of Information Act of 2013’.

SEC. 2. COMPELLED DISCLOSURE FROM COVERED PERSONS.

(a) Conditions for Compelled Disclosure- In any proceeding or in connection with any issue arising under Federal law, a Federal entity may not compel a covered person to comply with a subpoena, court order, or other compulsory legal process seeking to compel the disclosure of protected information, unless a Federal court in the jurisdiction where the subpoena, court order, or other compulsory legal process has been or would be issued determines, after providing notice and an opportunity to be heard to such covered person--

(1) that the party seeking to compel disclosure of the protected information has exhausted all reasonable alternative sources (other than a covered person) of the protected information; and

(2) that--

(A) in a criminal investigation or prosecution--

(i) if the party seeking to compel disclosure is the Federal Government, based on public information or information obtained from a source other than the covered person, there are reasonable grounds to believe that a crime has occurred;

(ii) based on public information or information obtained from a source other than the covered person, there are reasonable grounds to believe that the protected information sought is essential to the investigation or prosecution or to the defense against the prosecution;

(iii) the Attorney General certifies that the decision to request compelled disclosure was made in a manner consistent with section 50.10 of title 28, Code of Federal Regulations, if compelled disclosure is sought by a member of the Department of Justice in circumstances governed by section 50.10 of title 28, Code of Federal Regulations; and

(iv) the covered person has not established by clear and convincing evidence that disclosure of the protected information would be contrary to the public interest, taking into account both the public interest in gathering and disseminating the information or news at issue and maintaining the free flow of information and the public interest in compelling disclosure (including the extent of any harm to national security); or

(B) in a matter other than a criminal investigation or prosecution, based on public information or information obtained from a source other than the covered person--

(i) the protected information sought is essential to the resolution of the matter; and

(ii) the party seeking to compel disclosure of the protected information has established that the interest in compelling disclosure clearly outweighs the public interest in gathering and disseminating the information or news at issue and maintaining the free flow of information.

(b) Limitations on Content of Information- A subpoena, court order, or other compulsory legal process seeking to compel the disclosure of protected information under subsection (a) shall, to the extent possible, be narrowly tailored in purpose, subject matter, and period of time covered so as to avoid compelling disclosure of peripheral, nonessential, or speculative information.

SEC. 3. EXCEPTION RELATING TO CRIMINAL CONDUCT.

(a) In General- Section 2 shall not apply to any information, record, document, or item obtained as the result of the eyewitness observations of, or obtained during the course of, alleged criminal conduct by the covered person, including any physical evidence or visual or audio recording of the conduct.

(b) Exception- This section shall not apply, and, subject to sections 4 and 5, section 2 shall apply, if the alleged criminal conduct is the act of communicating the documents or information at issue.

SEC. 4. EXCEPTION TO PREVENT DEATH, KIDNAPPING, SUBSTANTIAL BODILY INJURY, SEX OFFENSES AGAINST MINORS, OR INCAPACITATION OR DESTRUCTION OF CRITICAL INFRASTRUCTURE.

Section 2 shall not apply to any protected information that is reasonably necessary to stop, prevent, or mitigate a specific case of--

(1) death;

(2) kidnapping;

(3) substantial bodily harm;

(4) conduct that constitutes a criminal offense that is a specified offense against a minor (as those terms are defined in section 111 of the Adam Walsh Child Protection and Safety Act of 2006 (42 U.S.C. 16911)), or an attempt or conspiracy to commit such a criminal offense; or

(5) incapacitation or destruction of critical infrastructure (as defined in section 1016(e) of the USA PATRIOT Act (42 U.S.C. 5195c(e))).

SEC. 5. EXCEPTION TO PREVENT TERRORIST ACTIVITY OR HARM TO THE NATIONAL SECURITY.

(a) In General- Section 2 shall not apply to any protected information if--

(1) the party seeking to compel disclosure is the Federal Government; and

(2)(A) in a criminal investigation or prosecution of the allegedly unlawful disclosure of properly classified information, the court finds by a preponderance of the evidence that the protected information for which compelled disclosure is sought would materially assist the Federal Government in preventing or mitigating--

(i) an act of terrorism; or

(ii) other acts that are reasonably likely to cause significant and articulable harm to national security; or

(B) in any other criminal investigation or prosecution, the court finds by a preponderance of the evidence that the protected information for which compelled disclosure is sought would materially assist the Federal Government in preventing, mitigating, or identifying the perpetrator of--

(i) an act of terrorism; or

(ii) other acts that have caused or are reasonably likely to cause significant and articulable harm to national security.

(b) Deference- In assessing the existence or extent of the harm described in subsection (a), a Federal court shall give appropriate deference to a specific factual showing submitted to the court by the head of any executive branch agency or department concerned.

(c) Relationship to Section 2- Subsection (a) shall not apply, and, subject to sections 3 and 4, section 2 shall apply, to any criminal investigation or prosecution of the allegedly unlawful disclosure of properly classified information other than one in which the protected information is sought by the Federal Government to prevent or mitigate the harm specified in subsection (a)(2)(A). In considering the extent of any harm to national security when applying section 2 to such cases, a Federal court shall give appropriate deference to any specific factual showing submitted to the court by the head of any executive branch agency or department concerned.

(d) Subsequent Unlawful Disclosure- The potential for a subsequent unlawful disclosure of information by the source sought to be identified shall not, by itself and without any showing of additional facts beyond such potential disclosure, be sufficient to establish that compelled disclosure of the protected information would materially assist the Federal Government in preventing or mitigating--

(1) an act of terrorism; or

(2) other acts that are reasonably likely to cause significant and articulable harm to national security.

SEC. 6. COMPELLED DISCLOSURE FROM COMMUNICATIONS SERVICE PROVIDERS.

(a) Conditions for Compelled Disclosure-

(1) IN GENERAL- Except as provided in paragraph (2), if any document or other information from the account of a person who is known to be, or reasonably likely to be, a covered person is sought from a communications service provider, sections 2 through 5 shall apply in the same manner that such sections apply to any document or other information sought from a covered person.

(2) EXCEPTION- If any document or other information from the account of a person who is known to be, or reasonably likely to be, a covered person is sought from a communications service provider under section 2709 of title 18, United States Code, the provisions of sections 2 through 5 governing criminal investigations and prosecutions shall apply in the same manner that such sections apply to any document or other information sought from a covered person in the course of a criminal investigation or prosecution, except that clauses (i) and (iii) of section 2(a)(2)(A) and the phrase ‘particularly with reference to directly establishing guilt or innocence’ in section 2(a)(2)(A)(ii) shall not apply.

(b) Notice and Opportunity Provided to Covered Persons- A Federal court may compel the disclosure of a document or other information described in this section only after the covered person from whose account the document or other information is sought has been given--

(1) notice from the party seeking the document or other information through a subpoena or other compulsory request, not later than the time at which such subpoena or request is issued to the communications service provider; and

(2) an opportunity to be heard before the court before compelling testimony or the disclosure of a document.

(c) Exception to Notice Requirement- Notice under subsection (b)(1) may be delayed for not more than 45 days if the Federal court involved determines by clear and convincing evidence that such notice would pose a substantial threat to the integrity of a criminal investigation, a national security investigation, or intelligence gathering, or that exigent circumstances exist. This period may be extended by the court for an additional period of not more than 45 days each time the court makes such a determination.

(d) Notice to Communications Service Provider- In all cases in which notice is required to be provided to the covered person under this section, a copy of such notice shall be provided simultaneously to the communications service provider from whom disclosure is sought. Once it has received such notice, the communications service provider shall not comply with the request for disclosure unless and until disclosure is either ordered by the court or authorized in writing by the covered person.

SEC. 7. SOURCES AND WORK PRODUCT PRODUCED WITHOUT PROMISE OR AGREEMENT OF CONFIDENTIALITY.

Nothing in this Act shall supersede, dilute, or preclude any law or court decision compelling or not compelling disclosure by a covered person or communications service provider of--

(1) information identifying a source who provided information without a promise or agreement of confidentiality made by the covered person as part of engaging in journalism; or

(2) records, other information, or contents of a communication obtained without a promise or agreement that such records, other information, or contents of a communication would be confidential.

SEC. 8. PROCEDURES FOR REVIEW AND APPEAL.

(a) Conditions for Ex Parte Review or Submissions Under Seal- With regard to any determination made by a Federal court under this Act, upon a showing of good cause, that Federal court may receive and consider submissions from the parties in camera or under seal, and if the court determines it is necessary, ex parte.

(b) Contempt of Court- With regard to any determination made by a Federal court under this Act, a Federal court may find a covered person to be in civil or criminal contempt if the covered person fails to comply with an order of a Federal court compelling disclosure of protected information.

(c) To Provide for Timely Determination- With regard to any determination to be made by a Federal court under this Act, that Federal court, to the extent practicable, shall make that determination not later than 30 days after the date of receiving a motion requesting the court make that determination.

(d) Expedited Appeal Process-

(1) IN GENERAL- The courts of appeal shall have jurisdiction--

(A) of appeals by a Federal entity or covered person of an interlocutory order of a Federal court under this Act; and

(B) in an appeal of a final decision of a Federal court by a Federal entity or covered person, to review any determination of a Federal court under this Act.

(2) EXPEDITION OF APPEALS- It shall be the duty of a Federal court to which an appeal is made under this subsection to advance on the docket and to expedite to the greatest possible extent the disposition of that appeal.

SEC. 9. RULE OF CONSTRUCTION.

Nothing in this Act may be construed to--

(1) preempt any law or claim relating to defamation, slander, or libel;

(2) modify the requirements of section 552a of title 5, United States Code, or Federal laws or rules relating to grand jury secrecy (except that this Act shall apply in any proceeding and in connection with any issue arising under that section or the Federal laws or rules relating to grand jury secrecy);

(3) create new obligations, or affect or modify the authorities or obligations of a Federal entity with respect to the acquisition or dissemination of information pursuant to the Foreign Intelligence Surveillance Act of 1978 (50 U.S.C. 1801 et seq.); or

(4) preclude voluntary disclosure of information to a Federal entity in a situation that is not governed by this Act.

SEC. 10. AUDIT.

(a) In General- The Inspector General of the Department of Justice shall perform a comprehensive audit of the use of this Act during the period beginning on the date of enactment of this Act and ending on December 31, 2016. The audit shall include an examination of each instance in which a court failed to compel the disclosure of protected information under this Act, and whether this Act has created any procedural impediments that have had a detrimental operational impact on the activities of the Federal Bureau of Investigation.

(b) Report- Not later than June 30, 2017, the Inspector General of the Department of Justice shall submit to the Committee on the Judiciary and the Select Committee on Intelligence of the Senate and the Committee on the Judiciary and the Permanent Select Committee on Intelligence of the House of Representatives a report containing the results of the audit conducted under subsection (a).

(c) Review- Not later than 30 days before the submission of the report under subsection (b), the Inspector General of the Department of Justice shall provide the report to the Attorney General and the Director of National Intelligence. The Attorney General or the Director of National Intelligence may provide such comments to be included in the report submitted under subsection (b) as the Attorney General or the Director of National Intelligence may consider necessary.

(d) Form- The report submitted under subsection (b) and any comments included under subsection (c) shall be in unclassified form, but may include a classified annex.

SEC. 11. DEFINITIONS.

In this Act:

(1) COMMUNICATIONS SERVICE PROVIDER- The term ‘communications service provider’--

(A) means any person that transmits information of the customer’s choosing by electronic means; and

(B) includes a telecommunications carrier, an information service provider, an interactive computer service provider, and an information content provider (as such terms are defined in section 3 or 230 of the Communications Act of 1934 (47 U.S.C. 153 and 230)).

(2) COVERED PERSON- The term ‘covered person’--

(A) means a person who--

(i) with the primary intent to investigate events and procure material in order to disseminate to the public news or information concerning local, national, or international events or other matters of public interest, regularly gathers, prepares, collects, photographs, records, writes, edits, reports or publishes on such matters by--

(I) conducting interviews;

(II) making direct observation of events; or

(III) collecting, reviewing, or analyzing original writings, statements, communications, reports, memoranda, records, transcripts, documents, photographs, recordings, tapes, materials, data, or other information whether in paper, electronic, or other form;

(ii) has such intent at the inception of the process of gathering the news or information sought; and

(iii) obtains the news or information sought in order to disseminate the news or information by means of print (including newspapers, books, wire services, news agencies, or magazines), broadcasting (including dissemination through networks, cable, satellite carriers, broadcast stations, or a channel or programming service for any such media), mechanical, photographic, electronic, or other means;

(B) includes a supervisor, employer, parent company, subsidiary, or affiliate of a person described in subparagraph (A); and

(C) does not include any person who is or is reasonably likely to be--

(i) a foreign power or an agent of a foreign power, as those terms are defined in section 101 of the Foreign Intelligence Surveillance Act of 1978 (50 U.S.C. 1801);

(ii) a member or affiliate of a foreign terrorist organization designated under section 219(a) of the Immigration and Nationality Act (8 U.S.C. 1189(a));

(iii) designated as a Specially Designated Global Terrorist by the Department of the Treasury under Executive Order No. 13224 (50 U.S.C. 1701);

(iv) a specially designated terrorist, as that term is defined in section 595.311 of title 31, Code of Federal Regulations (or any successor thereto);

(v) a terrorist organization, as that term is defined in section 212(a)(3)(B)(vi)(II) of the Immigration and Nationality Act (8 U.S.C. 1182(a)(3)(B)(vi)(II));

(vi) committing or attempting to commit the crime of terrorism, as that offense is defined in section 2331(5) or 2332b(g)(5) of title 18, United States Code;

(vii) committing or attempting the crime of providing material support, as that term is defined in section 2339A(b)(1) of title 18, United States Code, to a terrorist organization; or

(viii) aiding, abetting, or conspiring in illegal activity with a person or organization defined in clauses (i) through (vii).

(3) DOCUMENT- The term ‘document’ means writings, recordings, and photographs, as those terms are defined by rule 1001 of the Federal Rules of Evidence (28 U.S.C. App.).

(4) FEDERAL ENTITY- The term ‘Federal entity’ means an entity or employee of the judicial or executive branch or an administrative agency of the Federal Government with the power to issue a subpoena or issue other compulsory process.

(5) PROPERLY CLASSIFIED INFORMATION- The term ‘properly classified information’ means information that is classified in accordance with any applicable Executive orders, statutes, or regulations regarding classification of information.

(6) PROTECTED INFORMATION- The term ‘protected information’ means--

(A) information identifying a source who provided information under a promise or agreement of confidentiality made by a covered person as part of engaging in journalism; or

(B) any records, contents of a communication, documents, or information that a covered person obtained or created--

(i) as part of engaging in journalism; and

(ii) upon a promise or agreement that such records, contents of a communication, documents, or information would be confidential.

////

This is Washington-Speak for "SILENCE PEONS - CHILLING EFFECTS ARE THE NEW FREEDOM". Ughhhh terrible. More to follow.

Bezos "saves" Washington Post as Feinstein et al plan to obliterate indy journalism w new shield law; Plus: Linkdump on ancient site, HAARP, UFOs & lulz!

The root of the latest story: Sen. Feinstein During 'Shield' Law Debate: 'Real' Journalists Draw Salaries | Techdirt - Aug 8 2013

EFF: Why Sen. Feinstein Is Wrong About Who’s a “Real Reporter” | Electronic Frontier Foundation - Aug 9 2013

Great summary of the issue: Media Lens - All Journalism Is 'Advocacy Journalism'. Covers how being happy about Bezos is its own form of chummy advocacy journalism. Also Matt Taibbi: Hey, MSM: All Journalism is Advocacy Journalism | Matt Taibbi | Rolling Stone June 27 2013.

The Fear of moar Greenwalds and Snowdens runs deep with the Establishment this year. i.e. Hey, Washington Post: Print that forbidden NSA interview! - Salon.com

Feinstein is catching the heat on this, the GOP is right there too but for the moment its mostly snarky Republicans pouncing on the story. She already has been clear she hates journalists with her handling of Wikileaks etc - tons of summer 2012 stories on this. But the new round is just as bad. Check it:

The American Spectator : Sen. Feinstein Threatens Press Freedom - new

Feinstein wants to limit who can be a journalist « Watchdog.org - These guys kinda do rightwing hatchet jobs but they have points here. Aug 12 2013. There is a

Dianne Feinstein targets press freedom - Salon.com Jul 2 2012. Glenn Greenwald! (also)

Feinstein: Assange is not a journalist - Los Angeles Times July 9 2012

Sen. Feinstein Pushes Restrictive "Journalist" Definition Under Shield Law - Reason 24/7 : Reason.com - Aug 13 2013

Federal Media Shield Law Should Extend to Unpaid Bloggers and Citizen Journalists | Larry Atkins - Aug 13 2013. Schumer says Wikileaks gets targeted like it should:

SEN SCHUMER: "The world has changed. We're very careful in this bill to distinguish journalists from those who shouldn't be protected, WikiLeaks and all those, and we've ensured that. But there are people who write and do real journalism, in different ways than we're used to. They should not be excluded from this bill."

Senator Feinstein Is Misguided In Her Attempt To Narrowly Define A Journalist :: Fox&Hounds - Aug 16 2013

Dianne Feinstein backs Media Shield Law to protect only ‘real reporters’ - The Global Dispatch - Aug 11 2013

» Feinstein: You’re Not a Real Journalist Unless You Draw a Salary Alex Jones' Infowars: There's a war on for your mind! - Aug 9 2013 - BAN INFOWARS they don't count as journalists!

For fack's sake - these days usually I do journalism for free -- in part because believe it or not the big organizations in the Twin Cities HARDLY EVER POST THE DAMN PDF FILES & PRIMARY SOURCES OF THE STUFF THEY REPORT ON. DANG IT!!

So many of the best journalists I know are anything but salaried - the radical publishers like Wikileaks and Cryptome.org, the livestreamers out there getting teargassed etc. In other words people connected to the real narratives of our time - and publishing about it. And so our responsible political figures are getting ready to nuke the whole concept of journalism because the full-timers with salary - the what, quarter of them that still exist compared to 20 years ago - are the only "real journalists." Bug off - journalism is publishing. It's research and God forbid sometimes it's also advocacy.

/////

Honestly this is my favorite headline all week and really highlights the interesting verb "govern" : Kerry Says Internet "Makes it Much Harder to Govern" and "Organize" People - | Intellihub.com via:

John Kerry: 'This Little Thing Called the Internet ... Makes It Much Harder to Govern' | CNS News

"Well, folks," he said, "ever since the end of the Cold War, forces have been unleashed that were tamped down for centuries by dictators, and that was complicated further by this little thing called the internet and the ability of people everywhere to communicate instantaneously and to have more information coming at them in one day than most people can process in months or a year.

"It makes it much harder to govern, makes it much harder to organize people, much harder to find the common interest," said Kerry, "and that is complicated by a rise of sectarianism and religious extremism that is prepared to employ violent means to impose on other people a way of thinking and a way of living that is completely contrary to everything the United States of America has ever stood for. So we need to keep in mind what our goals are and how complicated this world is that we’re operating in."

- See more at: http://www.cnsnews.com/news/article/john-kerry-little-thing-called-inter...

/////

For the Unofficial or OutLaw Journalists - those outside the Bezos Funded Bubble/Shield Law of Feinstein: I want to add Security in a Box - this is some stuff that can include necessary security for journalists as governments increasingly turn to surveillance to whack the civil service into compliance with the whims of political hacks... About Security in-a-box | Security In A Box and Quick Guide to Alternatives

Also neat: Hacktivists Want to Free the Net by Building a New One From Scratch | Motherboard

WTF: Sigurdur Thordarson: Icelandic WikiLeaks volunteer turned FBI informant. - Slate Magazine (aug 9)

These damn Lenco Bearcats are all over the counrty and always put on display in Minneapolis now: www.lencoarmor.com

/////

FEDERAL GOVERNMENT PERPETUAL EMERGENCY! One level of bureaucratic arcana I find interesting is the long running "perpetual national emergency" of the federal government that seemingly has been going since the "deeply weird" credit reorganization and specifically March 9th 1933. Just bumped into the 1973 Congressional report about finally terminating that national emergency, which of course never happens and nowadays Pres. Obama re-issues the emergency once a year with vague references to wars and things. 1973 doc here - rarely does the third paragraph of anything from Congress speak frankly about martial law! https://www.dropbox.com/s/jp0gow6krzhdvtb/Senate-Report-93-549.pdf

/////

FED GOV CONPLAN 3501 DSCA: Here is the latest from July 2013 public version of US Defense Support of Civil Authorities. Just posted by PublicIntelligence.net: Joint Publication 3-28 Defense Support of Civil Authorities July 2013 | Public Intelligence. You definitely need to know about this to understand CONPLAN 3502 Civil Disturbance Operations which is the off-the-shelf modern martial law-style concept of operations plan for domestic crackdowns. Follow PI on Fedbook.

/////

Just creepy: Defense Science Board Report: Unconventional Operational Concepts and the Homeland | Public Intelligence. Go away you people.

/////

I don't really buy the idea that the Obama administration blew up that Texas fertilizer plant but there is some odd new Executive Order involving fertilizers that I'm sure will work out in Monsanto' interest anyway... Obama Signs Executive Order Signifying Previous Texas Plant Fertilizer Explosion Might Have Been Orchestrated - | Intellihub.com. The real EO is here: http://www.whitehouse.gov/the-press-office/2013/08/01/executive-order-improving-chemical-facility-safety-and-security

/////

Solar tariff mess in Spain: Spaniards rebel against solar panel levy | Reuters. Check this insanity out:

Spaniards who have generated power independently for their own homes under a system known as "autoconsumo" are among the hardest hit by policies which they say punish, rather than encourage, energy efficiency.

Industry Minister Jose Manuel Soria accepts the measures are painful but says they are needed to plug the energy deficit.

"I support 'autoconsumo' ... but the power system has infrastructure, grids that the rest of us Spaniards who are in the system have to pay for. And we pay for it through our electricity bill," said Soria.

That is a pretty classic example of "why civilization is doomed, or at least feels that way" amirite??

/////

Misc items today:

best misc headline: NRL Scientists Produce Densest Artificial Ionospheric Plasma Clouds Using HAARP - U.S. Naval Research Laboratory - http://www.nrl.navy.mil/media/news-releases/2013/nrl-scientists-produce-... NRL Scientists Produce Densest Artificial Ionospheric Plasma Clouds Using HAARP - yes weather is experimented upon as a surface for tactics in the HAARP array. Any questions you skeptics? :D

Coinbase now lets you send, buy or sell Bitcoin via SMS - The Next Web

CIA crushes UFO conspiracy theorists’ hopes and dreams with Area 51 documents | The Raw Story - Aug 16

Christie gives conditional OK to broader medicinal marijuana use - NBC Politics - Aug 16

World's oldest temple built to worship the dog star - space - 16 August 2013 - New Scientist - that headline not hedged enough of course - Aug 16. Awesome!

This solar flare thing was a joke!! Dammit Fetzer come on man: Edward Snowden: Solar-Flare ‘Killshot’ Cataclysm Imminent | Veterans Today

On the other hand this General James Mattis took a swipe at Israeli settlement as apartheid: Top American General Cites Israel as Unsustainable and Apartheid | Veterans Today

Israeli security contractor Magal lurking all over the place into who knows what: http://www.fromthetrenchesworldreport.com/israeli-firm-magal-helping-to-provide-security-at-us-prisons/49331#more-49331

Cool LA gallery opening: Fear and Loathing in Los Angeles | Totally Gonzo - The Hunter S. Thompson and Gonzo Journalism Community

Lol this guy: Orson Scott Card Worries About Obama Turning "Urban Gangs" Into His Personal Police Force

Guillermo del Toro's sketches reveal his At the Mountains of Madness LOVECRAFT!

This internet ISP guy Nicholas Merrill another one who has had long nights after being forcibly turned by the NSA into a honeypot I think : http://www.democracynow.org/2013/8/13/former_internet_provider_gagged_by_national

This is phenomenal and interactive: http://www.mindmeister.com/308518551/the-national-security-agency-operates-more-than-500-separate-signals-intelligence-platforms-employs-roughly-30-000-civilians-and-military-budget-10-billion - full story: What the NSA’s Massive Org Chart (Probably) Looks Like - Defense One

THE KLAN WOW: http://www.slate.com/blogs/behold/2013/08/13/anthony_s_karen_a_photojournalist_s_unrestricted_access_to_the_ku_klux_klan.html - see also links between KKK and Freemasonry - in these pics you see traces of similar thinking. The Scottish Rite and KKK - with all the ritualism both also reminds me a little of the Muslim Brotherhood as well - a complex subject not really well written about by anyone I've yet seen?

Hm: Socialists And Libertarians Have More In Common Than They'd Like To Think

The Bearcat thing in NH: Police State Too Much? Send in a Marine! - YouTube

Chinese Hacking Team Caught Taking Over Decoy Water Plant | MIT Technology Review !!

Good guy Einstein: Einstein's Circle of Compassion | Brainwash Update - YouTube - Congrats to Abby Martin for a totally decent show.

Backstories & Backbones; Security of US Emergency Alert System (EAS) is crap & spoof zombie apocalypses not very difficult apparently; #OpNSA NSA PRISM tunnel servers may be getting noticed; Joe Naccio & NSA revisited

Oh For Facks Sake. All this big government/police state techno-crap is so often easily hacked in some way, which means the Awesome Emergency Powers of Teh Govmints are easily subverted by the Baba Booey fans of the world, or zombie apocalypses as the case may be. Indeed quite possibly all this NSA crap is starting to get hacked (and not just by activists but cynical commercial weasels) and since it's all backdoored to everything and everyone's mom, everyone gets screwed. Well played. Truth tellers keep publishing before it's too late :/

Much of this is old news but why not batch some of it in one place?

On the newer lulz front at least some people are claiming to poke around including determining which servers run in-between points for PRISM mass surveillance for the NSA. And I don't know anything about these IOActive guys who posted on the EAS hack but they seem worth keeping an eye on….

Before the EAS info, here is a good place to look at alternative, well polished and much open source apps : https://prism-break.org/ - bookmark this and use it when setting up any new computer :)

Emergency Alert System Fail: Also covered in ars technica. See this video's crazy audio message for hacked Montana Emergency Alert System clip from this February: http://gawker.com/5983516/montana-tv-stations-emergency-alert-system-hac...

So more or less a main contractor mailed out the damn master login keys to their products controlling the national Emergency Alert System, exactly the opposite of what you're supposed to do.

Clearly in the event of some adverse network screwing with things, it will probably be a mess. Let's say a Jimmy Carter tries to cut off SAIC and Blackwater, triggering an epic new Iran Contra type Ollie North conspiracy scene -- all these dumb horrible systems like the EAS DASDEC will behave horribly.

/////

http://www.ioactive.com/news-events/ioactive_uncovers_vulnerabilities_in...

Press contact:
Craig Brophy
Global PR Manager, IOActive, Inc.
E: PR@ioactive.com
T: +1 206 462 2291

Press Release

IOActive Uncovers Vulnerabilities in United States Emergency Alerting System

Digital Alerting Systems DASDEC application servers found to be vulnerable to remote attack

Seattle, WA July 8, 2013IOActive, Inc., a leading provider of application security, compliance and smart grid security services, today announced that is has discovered vulnerabilities in the Emergency Alerting System (EAS) which is widely used by TV and radio stations across the United States.

IOActive's principal research scientist, Mike Davis, uncovered the vulnerabilities in the digital alerting systems - DASDEC - application servers. The DASDEC receives and authenticates EAS messages. Once a station receives and authenticates the message, the DASDEC interrupts the broadcast and overlays the message onto the broadcast with the alert tone containing some information about the event. The affected devices are the DASDEC-I and DASDEC-II appliances.

“Earlier this year we were shown an example of an intrusion on the EAS when the Montana Television Network's regular programming was interrupted by news of a zombie apocalypse. Although there was no zombie apocalypse, it did highlight just how vulnerable the system is,” said Mike Davis, principal research scientist for IOActive. “These DASDEC application servers are currently shipped with their root privileged SSH key as part of the firmware update package. This key allows an attacker to remotely log on in over the Internet and can manipulate any system function. For example, they could disrupt a station's ability to transmit and could disseminate false emergency information. For any of these issues to be resolved, we believe that re-engineering needs to be done on the digital alerting system side and firmware updates to be pushed to all appliances.”

The EAS is designed to enable to the President of the United States to speak to US citizens within 10-minutes of a disaster occurring. In the past these alerts were passed from station to station using the Associate Press (AP) or United Press International (UPI) “wire services” which connected to television and radio stations around the US. Whenever the station received an authenticated Emergency Action Notification (EAN), the station would disrupt its current broadcast to deliver the message to the public. On Wednesday 26 June, the Cyber Emergency Response Team (CERT) published an advisory providing details of the vulnerability.

IOActive has also issued its own IOActive Labs Advisory outlining the affected products, the impact and the solution.

About IOActive
Established in 1998, IOActive is an industry leader that offers comprehensive computer security services with specialisations in smart grid technologies, software assurance, and compliance. Boasting a well-rounded and diverse clientele, IOActive works with a majority of Global 500 companies including power and utility, hardware, retail, financial, media, aerospace, healthcare, high-tech, and software development organizations. As a home for highly skilled and experienced professionals, IOActive attracts talented consultants who contribute to the growing body of security knowledge by speaking at such elite conferences as Black Hat, Ruxcon, Defcon, BlueHat, CanSec, and WhatTheHack. For more information, visit www.ioactive.com.

////////////

http://ics-cert.us-cert.gov/advisories/ICSA-13-184-02

Advisory (ICSA-13-184-02)

Monroe Electronics DASDEC Compromised Root SSH Key

Original release date: July 03, 2013

OVERVIEW

This advisory provides mitigation details for a vulnerability that impacts the Monroe Electronics DASDEC.

Mike Davis, a researcher with IOActive, reported a compromised root SSH key vulnerability to CERT Coordination Center (CERT/CC). This vulnerability is in Monroe Electronics DASDEC‑I and DASDEC-II appliances. ICS-CERT coordinated with CERT/CC and Monroe Electronics to resolve the vulnerability. Monroe Electronics has produced an update that mitigates this vulnerability.

This vulnerability could be exploited remotely.

AFFECTED PRODUCTS

The following Monroe Electronics products are affected:

  • DASDEC-I
  • DASDEC-II

IMPACT

An attacker who exploits this vulnerability could gain root access to the device and affect the availability, integrity, and confidentiality of the system.

Impact to individual organizations depends on many factors that are unique to each organization. ICS‑CERT recommends that organizations evaluate the impact of this vulnerability based on their operational environment, architecture, and product implementation.

BACKGROUND

Monroe Electronics is a US-based company that maintains offices and research facilities in Lyndonville, New York. Monroe Electronics develops and distributes worldwide electrostatic measuring instruments including electrostatic voltmeters, electrostatic field meters, coulomb meters, and resistivity meters.

The affected products, DASDEC-I and DASDEC-II are emergency alert system (EAS) encoder/decoder (endec) devices that are used to broadcast EAS messages over digital and analog channels. According to Monroe Electronics, DASDEC-I and DASDEC-II are deployed across broadcast radio and television in the communication sector. Monroe Electronics estimates that these products are used primarily in the United States.

VULNERABILITY CHARACTERIZATION

VULNERABILITY OVERVIEW

COMPROMISED ROOT SSH KEYhttp://cwe.mitre.org/data/definitions/321.html, Web site last accessed July 03, 2013." href="http://ics-cert.us-cert.gov/advisories/ICSA-13-184-02#footnotea_ixegenr" name="footnoterefa_ixegenr">a

DASDEC-I and DASDEC-II had publicly available firmware images for these devices that included a private SSH key that authorizes remote logins to the devices. For software versions prior to 2.0-2, where the default SSH keys have not already been changed, an attacker can then log into a device with root privileges.

CVE-2013-0137http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2013-0137, Web site last accessed July 03, 2013." href="http://ics-cert.us-cert.gov/advisories/ICSA-13-184-02#footnoteb_ya73jua" name="footnoterefb_ya73jua">b has been assigned to this vulnerability. A CVSS v2 base score of 10.0 has been assigned; the CVSS vector string is (AV:N/AC:L/Au:N/C:C/I:C/A:C).http://nvd.nist.gov/cvss.cfm?version=2&vector=AV:N/AC:L/Au:N/C:C/I:C/A:C, Web site last accessed July 03, 2013." href="http://ics-cert.us-cert.gov/advisories/ICSA-13-184-02#footnotec_6n5eegx" name="footnoterefc_6n5eegx">c

VULNERABILITY DETAILS

EXPLOITABILITY

This vulnerability could be exploited remotely.

EXISTENCE OF EXPLOIT

No known public exploits specifically target this vulnerability.

DIFFICULTY

An attacker with a moderate skill level could exploit this vulnerability.

MITIGATION

Monroe Electronics has produced a software update, Version 2.0-2 that resolves this vulnerability. DASDEC users can obtain the DASDEC v2.0-2 software update and release notes by contacting support@digitalalertsystems.com.

ICS‑CERT encourages asset owners to take additional defensive measures to protect against this and other cybersecurity risks.

  • Minimize network exposure for all control system devices. Critical devices should not directly face the Internet.
  • Locate control system networks and remote devices behind firewalls, and isolate them from the business network.
  • When remote access is required, use secure methods, such as Virtual Private Networks (VPNs), recognizing that VPN is only as secure as the connected devices.

ICS-CERT also provides a section for control systems security recommended practices on the ICS-CERT Web page. Several recommended practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.http://ics-cert.us-cert.gov/content/recommended-practices, Web site last accessed July 03, 2013." href="http://ics-cert.us-cert.gov/advisories/ICSA-13-184-02#footnoted_t8orqgw" name="footnoterefd_t8orqgw">d ICS‑CERT reminds organizations to perform proper impact analysis and risk assessment prior to taking defensive measures.

Additional mitigation guidance and recommended practices are publicly available in the ICS‑CERT Technical Information Paper, ICS-TIP-12-146-01B—Targeted Cyber Intrusion Detection and Mitigation Strategies,http://ics-cert.us-cert.gov/tips/ICS-TIP-12-146-01B, Web site last accessed July 03, 2013." href="http://ics-cert.us-cert.gov/advisories/ICSA-13-184-02#footnotee_wn76bab" name="footnoterefe_wn76bab">e that is available for download from the ICS-CERT Web page (http://ics-cert.us-cert.gov/).

Organizations observing any suspected malicious activity should follow their established internal procedures and report their findings to ICS‑CERT for tracking and correlation against other incidents.

///////////

http://www.kb.cert.org/vuls/id/662676

Vulnerability Note VU#662676

Digital Alert Systems DASDEC and Monroe Electronics R189 One-Net firmware exposes private root SSH key

Original Release date: 26 Jun 2013 | Last revised: 02 Jul 2013

Overview

Digital Alert Systems DASDEC and Monroe Electronics One-Net E189 Emergency Alert System (EAS) devices exposed a shared private root SSH key in publicly available firmware images. An attacker with SSH access to a device could use the key to log in with root privileges.

Description

The Digital Alert Systems DASDEC-I and DASDEC-II and Monroe Electronics R189 One-Net/R189SE One-NetSE are Linux-based EAS encoder/decoder (ENDEC) devices that are used to broadcast EAS messages over digital and analog channels. IOActive has reported several security issues affecting these devices. The most severe of these issues is the public disclosure of the default private root SSH key. The less severe issues could also contribute to an attacker's ability to compromise a vulnerable device.

Compromised root SSH key (CVE-2013-0137)
Publicly available firmware images for these devices included a private root SSH key that was authorized to log in to the devices (CWE-798, CWE-321). The fingerprint for the compromised SSH key is 0c:89:49:f7:62:d2:98:f0:27:75:ad:e9:72:2c:68:c3. Although this key is not hard-coded, it may be impractical for less technical users to manually disable or change they key prior to firmware version 2.0-2.

Predictable session ID
IOActive reports that the administrative web server uses a predictable, monotonically increasing session ID. This finding is based on running the web server in a test environment. Testing on a variety of firmware versions on devices both at the factory and in the field, Monroe Electronics could not reproduce this finding.

Log information disclosure
Logs available via the web server provide a variety of information about the configuration, operation, and status of the device (CWE-532). Some of the log information is public and may be required by regulation.

Predictable password generation
The dasdec_mkuser script generates passwords in a deterministic way (CWE-341), however these passwords are not for administrative access, and the script is not used for general user account configuration.

Default password
Like many similar devices, the DASDEC and One-Net ENDECs use default administrative credentials. Some sites fail to change the default administrative password and allow unrestricted internet access.

Impact

An attacker with the private key and SSH access can log in to a device with root privileges.

Predictable session IDs could allow an attacker to take control of an existing administrative web session.

Predictable and unchanged default passwords can allow an attacker to log in to a device with root privileges. Devices exposed to the internet are at particularly high risk, for example, see Secure EAS Codecs Prevent Zombie Attacks and US-CERT Alert TA13-175A.

Logs may disclose configuration information that can benefit an attacker.

Solution

Apply an update

On April 24, 2013, Monroe Electronics and Digital Alert Systems released firmware version 2.0-2 that disables the compromised SSH key, provides a simplified user option to install new unique keys, and enforces a new password policy. Monroe Electronics has taken considerable effort to provide update information to DASDEC and One-NetSE users.

DASDEC users can obtain updated firmware and release notes by contacting <support@digitalalertsystems.com>. R189 One-Net users can contact <eas@monroe-electronics.com>.

Disable compromised SSH key

The compromised root SSH key should be disabled immediately, especially if the SSH service is exposed to untrusted networks such as the internet. If SSH connectivity is required, generate, install, and test new SSH keys before disabling the compromised key. The fingerprint for the compromised SSH key is 0c:89:49:f7:62:d2:98:f0:27:75:ad:e9:72:2c:68:c3.

Manually inspect SSH keys

To identify a compromised key, examine the authorized_keys file at /root/.ssh/authorized_keys2.dasdec and use the ssh-keygen command to show SSH key fingerprints. The following example shows the fingerprint for the compromised key:

$ ssh-keygen -l -f authorized_keys2.dasdec
1024 0c:89:49:f7:62:d2:98:f0:27:75:ad:e9:72:2c:68:c3 wood@endec1 (DSA)

Note that ssh-keygen only shows the fingerprint for the first key/line in the file. If authorized_keys2.dasdec contains multiple keys (multiple lines, one key per line), it will be necessary to extract each key (line) to a separate file and run the ssh-keygen command on each key/file. These shell scripts can be used to list and test multiple SSH keys in an authorized_keys file:

To generate new SSH keys, use ssh-kegen.

Restrict access

If for some reason you are not able to remove and replace the compromised SSH key, restrict access to the SSH service to highly trusted hosts and networks only. As a general good security practice, restrict access to all services to trusted hosts and networks.

Change default passwords

Change any default passwords, and do not deploy production systems without changing default passwords. Search engines like Shodan can index systems exposed to the internet and default passwords are usually documented and well-known. It is often trivial for an attacker to identify and access systems on the internet using default passwords.

/////

#OpNSA: Some infos has been coming out about possible probing into the NSA PRISM system. Here are copies of some pastebins about all this. Start here: https://twitter.com/Op_NSA . It is indeed branded Anonymous and they said that two anons got searched over the weekend. What's cooking? Will the now-more-infamous NSA Q Group catch these cats?

#OpNSA claiming to have doxed some NSA officials and posting their phone numbers on interwebs. Something big may be taking off here -- if it turns out to be a honeypot there still better be lulz!

statement here:

Twitter: http://www.twitter.com/op_nsa

IRC: https://webchat.anonops.com/?channels…

Transcript below:

Greetings Citizens of the World, we are Anonymous. It is understood that the recent exposé of the national security agency has angered you. Anger caused by the realization that your own elected representatives promised to vote for your best interests but changed their minds when the price was right, in favor of increased surveillance on your normal everyday life. You hate them for voting your freedom and privacy away, and you have every right to. There are those that say you have nothing to fear if you have nothing to hide, but these are the same people who won’t tell you any of their own personal information upon your request. Complacent cowards like these have made it easier for this enormous surveillance operation to come to fruition. Eventually enough legislation will pass in favor of the evolving police state that will make every citizen a potential terrorist by default, and the NSA is at the core of it all. But you wonder to yourself, what can be done about all of this injustice and corruption? The answer is simple. Raise your voice so loud that no one can ignore it. Create such an overwhelming public outcry that the government and the media will be forced to acknowledge the issue. We need to show those directly responsible for all of this that there will be consequences for betraying us, and it will be the last time they do. In accordance with this we will be initiating stage two of operation national security agency and releasing the personal information of one politician each week that slandered Edward Snowden as a criminal and was involved with supporting the NSA and PRISM. We will make visible to everyone the depth of their violations against our freedom, privacy and well-being. We will expose the precise amount of money it took for them to turn their backs on us and we will show them how it feels to have their privacy abused and their personal information mined, collected and analyzed. But we won’t stop there. Since this affects not just Americans but everyone around the world, it is only right that we give this information as much exposure as possible. Spam the emails of your local representatives voicing your opposition to these surveillance measures along with president obama. Spread flyers regarding the NSA’s data mining and organize protests to inform the public. We will all need to work together in spreading this information as far and wide as we can so that the world is fully aware of what has been orchestrated at their expense. We are all in this together and have an obligation to awaken the masses to see how their rights are being stripped away one by one leaving themselves, their friends, their family and their children vulnerable to government manipulation and control. This will spark an awakening that cannot be stopped.

We are Anonymous.
We are Legion.
We do not forgive.
We do not forget.
Expect us.

This one is interesting, I don't know why anyone would trust any VPN in particular tho :/

/////

http://pastebin.com/BzN9aUkq By: luminary on Jun 29th, 2013 | OpNSA VPN services.

Want to defeat PRISM?

Do you like the idea of free internet usage?

Well here is a list of Virtual Private Network providers recommended by Anonymous.

These services claim explicitly in their Terms of Service that they don't keep connection

logs on their customers, though it's always best to do some SERIOUS digging into a company's

history before you commit your freedom.

If you don't plan on doing anything illegal and you're merely trying to avoid snoopers

or circumvent censorship, free VPNs will likely suffice, but if you're going for a more

shady flavor of activism, don't leave home without these.

All of these accept Bitcoin, so that's a very helpful attribute. Bitcoin is a highly secure

payment method used if you don't want people to know who you are when you buy things over the internet.

BTGuard VPN

Private Internet Access VPN

Air VPN

PRQ VPN

Mullvad VPN

///////

http://pastebin.com/TpGTHDSy By: luminary on Jul 7th, 2013 | syntax: None | size: 2.45 KB | hits: 2,365 | expires: Never

PRETENTIOUS MINIATURE PRESS RELEASE:

Greetings, National "Security" Agency -- and our followers whom we love so much:

This may look like a small release, but it's actually huge. See, we hacked the NSA yet again because we just love doing that. These are DNS tunnels that are sending encrypted data to and from the PRISM databases. We have the IP's of those servers. If you crash these servers with DDoS, you literally render PRISM "broken". We are also planning to release some of that data (which we have access to) if we can decrypt it. So anyway. Hit these -- you hit PRISM. And die in the Matrix, you die in real life, etc etc.

SLIGHTLY TECHNICAL INFORMATION THAT MEANS NOTHING TO A LOT OF PEOPLE:

ns3-194.akamaiedge.net 56923 IN A 23.61.199.194

lar7.akamaiedge.net 64613 IN A 222.122.64.131

la11.akamaiedge.net 90000 IN A 213.254.238.131

lac1.akamaiedge.net 90000 IN A 193.108.88.1

la6.akamaiedge.net 70352 IN A 96.7.50.192

ns6-194.akamaiedge.net 90000 IN A 95.100.168.194

ns7-194.akamaiedge.net 90000 IN A 96.7.49.194

lar2.akamaiedge.net 84886 IN A 2.16.40.192

la1.akamaiedge.net 53942 IN A 184.26.161.192

lar6.akamaiedge.net 54809 IN A 195.59.44.137

la7.akamaiedge.net 39448 IN A 96.17.144.197

ns5-194.akamaiedge.net 35282 IN A 184.85.248.194

la3.akamaiedge.net 39672 IN A 96.7.251.131

Acquired by:

Restless

R00tsh3ll - @r00tsh3ll1 (twitter)

Intro Written and Info PASTED by:

Luminary - @aluminary (twitter)

PS:

There's TONS more information to release. We're going through some folders to see what we can and can't release before July 11th, 2013 (DDoS day). There's more to come. For those that have been asking for "proof of a hack", we're releasing some more as we go, but remember: this is the NSA. We have to be very careful about what goes public before we're done actually UTILIZING that information. For those that are understanding of this, you are the people that will receive the best information first! ^___^

//////

http://pastebin.com/X3siNZRC By: luminary on Jul 8th, 2013 | syntax: None | size: 3.64 KB | hits: 120 | expires: Never

Tor Tutorial

By: @aluminary

Greetings, faithful supporters of Anonymous and haters of PRISM. We are Anonymous, and for a moment, we're going to take time off from destroying things we don't like and teach you how to secure yourself and hide your identity while online. Naturally, this will be a benefit to you in the long run. Most people have no doubt heard of “TOR”, or “The Onion Router”. In basic terms, Tor is a routing network that sends all of your internet traffic through many different nodes all scattered about around the world. So imagine you've got a message you want to pass to a friend who's standing 100 meters from you. Whereas your standard internet traffic would be like walking over to your friend and handing him that note, Tor puts many different people between you two. So rather, in this situation, you'd hand the note to one of those people, they'd pass it to a random person, who'd pass that on, again and again until it gets to your friend. This allows the actual source of the traffic to be hidden after it comes through the exit node. Fortunately, Tor is very easy to acquire.

It can be downloaded from here: https://www.torproject.org/

For windows users, that download comes with the Tor browser bundle, which, when used, routes all of your traffic through a series of nodes as mentioned previously. Likely Linux users will know how to properly configure a client or program to use Tor, so we won't waste their time.

Once downloaded, that package will come with Vidalia Control Panel, an .exe file which acts as a sort of mothership. Once opened, a socks5 proxy server will begin running on local host. Your computer is the only computer on the network that will be able to use it unless others are also running Tor. The Tor browser will begin running on its own, so all you'll really need to do once in that browser is simply start searching away like a pro. If you want to verify your privacy because of paranoia, you can visit cmyip.com while using the Tor browser and be assured that your real IP is in fact hidden.

Tor itself is generally considered trust worthy. The thing is, even if nodes are run by undesirable parties, not only would said parties have to own that node, but they'd have to own the entire random path to... well... backtrace you. A downside of this entire thing, though, is that Tor is a high latency network. Because your traffic is being routed all around, it's also a bit slower. You will certainly notice slower internet speeds in applications using Tor (regular browsers not on the proxy won't be any slower). Then again, such a trivial matter is certainly worth the amount of protection Tor will offer you. Tor is a widely used and completely free project available at the aforementioned link.

Remember though, nobody is completely invincible. And human error can play into your traffic, or worse, your identity, being revealed. If, however, you take precautions to make sure Tor is operating and so forth, you will be fine. One more downside of Tor – that is one of the reasons a lot of us use VPN services – is that it's blocked in a lot of places. Because it's so easy and so anonymous, many websites, services, IRCs and networks will block Tor Exit Nodes to eliminate or crack down on abuse. In these cases, you'll probably need special permission to use the Tor server, as is the case with the AnonOps IRC network, which is one widely used meeting place for Anons.

Stay Anonymous. Stay safe.

Keep it up and defeat PRISM. Together, we are strong.

Together, we are Legion.

Twitter: https://twitter.com/op_nsa

IRC: webchat.anonops.com

channel: #opnsa.

^^You cannot use Tor with webchat. J/s

/////////////

Something ought to be said here ^ about the importance of other tracking links in browsers, time attacks, recent tor vulnerabilities that have come up etc. More caution and other layers are pretty surely necessary. Stuff like Ghostery to block various web tracker bugs for example.

A recent tor security example, you would need to keep javascript shut off to be safer from this, as but one example http://tedjonesweb.blogspot.com/2013/06/torbroker-security-vulnerability...

Another recent discussion http://seclists.org/fulldisclosure/2013/Jul/31

"I run 5 tor nodes. I can tell that 5 nodes on the network are save for me. Trust tor. I will not run dsniff or tcpdump. Its save. I will never abuse the logins you gave me for free. Afk now, that one guy is surfing on xhamster, nice video choice" -- "Alex"

Lol well put I suppose. Concise anyway.

Good tor network data source http://torstatus.blutmagie.de/

Router name agentAdrianLamo is doing well lol http://torstatus.blutmagie.de/router_detail.php?FP=ba7385668e2386246f2fb...

Tor vuln paper http://www.syverson.org/tor-vulnerabilities-iccs.pdf

http://www.blackhatlibrary.net/Tor

also for listserv activity https://lists.torproject.org/pipermail/tor-censorship-events/

Tor activity very much logged by NSA as shown recently http://nakedsecurity.sophos.com/2013/06/24/using-tor-and-other-means-to-...

Anyway it's just a normal hesitation in pointing out that Tor or given VPNs are not magically perfect for sure. There are merits to both technologies but magic boxes they are not! Of course one should assume the FBI is listening closely to IPs like webchat.anonops.com etc. 141.101.120.67 & 141.101.120.66

//////

For more on the Op_NSA situation check out

https://twitter.com/Op_NSA

https://twitter.com/aluminary

https://twitter.com/dickfacerax

///////

Email encryption in general:

For basics of encrypting email see Riseup.net: https://help.riseup.net/en/encrypting-email-with-thunderbird

Cryptome.org has had interesting stuff about PGP keys lately as well! http://cryptome.org/2013/07/mining-pgp-keyservers.htm & many posts on PGP keys registered to assorted federal departments! 2013-0744.htm 2013-0746.htm 2013-0741.htm etc

///////

More backstories and Backbones:

Here is a possible explanation of the Company A / B / C listings in the NSA Inspector General report. MCI, AT&T & Sprint:

Date: Wed, 03 Jul 2013 16:05:20 -0400
From: "James M. Atkinson" <jmatk[at]tscm.com>
Organization: Granite Island Group
To: TSCM-L Mailingin List <tscm-l2006[at]googlegroups.com>
Subject: Presidents Surveillance Program of 14 September 2001

On September 14, 2001 the NSA initiated a program on eavesdropping of all or the telephone and internet traffic of all U.S. Citizens, and concealed this quite unlawful program under many layers of secrecy, not because it as in the interests of national security, but rather to hide the violation of the Fourth Amendment.

These are the "initial three backbones" that the NSA tapped into (with the consent of the companies, each of whom gave the NSA full, unrestricted access):

The attached PDF file is a list of all of the funds spent by the program... do the math, and closely observe the date ranges (they perfectly match up, to the day with all of the dates in the Snowden document leaks).

MCI COMMUNICATIONS SERVICES INCORPORATED/MCI TELECOMMUNICATIONS CORPORATION
AMERICAN TELEPHONE & TELG COMPANY/AT&T
SPRINT COMMUNICATIONS COMPANY

In the IG report these aforementioned companies at listed at Company A, B, and C.

There are four additional companies (and others) to include Verizon, Nextel, Microsoft, Yahoo, Google, and so on.

See also procurement code: DAAB0701DH802 for Booze Allen Hamilton (Snowdens employer)

The project and procurement code as: DXXXXX01XXXXX

The program office as listed at:

2011 CRYSTAL DRIVE STE 911 (One Crystal Park Bldg "Crystal City 2" see also: http://cryptome.org/rummy-op2.htm)
ARLINGTON , VA , 22202-3732
USA

19.1 Billion Dollar Series of Contract initiated on the same day that the president authorized the Presidents Surveillance System for the NSA, and ending on the day it as shutdown.

Using a DUNS# of 790238638

The persons name under whom this was all listed is:

GRAFTON THOMAS BIGLOW
1312 Rhode Island Ave NW
Washington, DC 20005
(202) 483-8707

At the same address is:
Hope L Biglow

Grafton Bigelow is also listed at various addresses in:
414 Second
Cape May, NJ and West Cape May, NJ
(609) 884-4346

Plus several addresses in:
Hyattsville, MD
West Palm Beach, FL

But, the name Grafton Biglow also turns up:

FEDERAL PROCUREMENT DATA CENTER
7th & D Street SW, Room 5652
Washington, DC 20407
Director: Mr. Graffton Biglow
Fax: (202) 401-1546
Internet e-mail: grafton.biglow[at]gsa.gov

Curious coincidence.

Hopefully he had his own phone checked for bugs.

Maybe they can use the "Nuremberg defense"or claim "Befehl ist Befehl"

Very, very carefully look at the attached document, and take very deep and very slow breathes as you read it.

The bottom line is the Rainmaker system captured and indexed 1.17 racks per day of communications, bridging all major service providers, all fiber optic choke points, and eavesdropping mostly on U.S. Citizens (unlawfully) in what is called a "General Warrant" which is explicitly prohibited under U.S. Law.

The President of the United State is just a fucking moron, and utter and complete moron.

--- FUCK THE PIGS ---

-jma

--
James M. Atkinson. President and Sr. Engineer
"Leonardo da Vinci of Bug Sweeps and Spy Hunting"
http://www.linkedin.com/profile/view?id=15178662

Granite Island Group          http://www.tscm.com/
(978) 546-3803                jmatk[at]tscm.com
(978) 381-9111


Presidents-Spy-Program-Sept14-2001.pdf (342pp, 679KB)

/////////

The NSA Naccio Qwest case!

So there have been interesting developments. This bit about the contract hookups reminds me of Qwest's former CEO Joseph Naccio.

Here is what Naccio filed while fighting charges -- unlike virtually every white collar weasel ever, he ultimately got convicted of insider trading, no doubt with only the finest SIGINT available. Redacted PDF :: http://www.wired.com/images_blogs/threatlevel/files/512.pdf

http://www.denverpost.com/breakingnews/ci_22918125/former-qwest-ceo-joe-nacchio-moved-halfway-house - April 2013 he is getting out of jail soon with enormous fines as well. Many posts at Denver Post.

Nacchio, who turns 64 in June, was convicted in 2007 on 19 counts of illegal insider trading connected to his sale of $52 million in Qwest stock. A federal jury in Denver found that he sold the shares based on nonpublic information about the company's deteriorating financial condition.

Lucrative secret contracts indeedly doodley.

http://usatoday30.usatoday.com/news/washington/2006-05-10-nsa_x.htm 5-11-2006

The NSA, which needed Qwest's participation to completely cover the country, pushed back hard. ...

... the agency suggested that Qwest's foot-dragging might affect its ability to get future classified work with the government.

//////

Oct 15 2007: WSJ story: http://webcache.googleusercontent.com/search?q=cache:http://online.wsj.com/article/SB119240248793758652.html

Nacchio Alleges Reprisal

Qwest Ex-CEO Says Firm Denied Pacts After Spurning NSA

By

DIONNE SEARCEY

and

EVAN PEREZ

Contentions from former telecommunications executive Joseph Nacchio that the government retaliated against his company because he didn't comply with National Security Agency requests could add to the renewed debate over the NSA's secret surveillance of telephone records.

Once-classified documents that were unveiled in the insider-trading case of Mr. Nacchio, the former chief of Qwest Communications International Inc., Q +1.60% suggest the U.S. government didn't offer lucrative contracts to the company after Mr. Nacchio refused to cooperate with what the documents call "improper government requests" in February 2001. The documents, submitted as part of Mr. Nacchio's defense in the insider-trading case, don't elaborate on the government requests. Mr. Nacchio has said in the past he didn't comply when asked by the NSA for access to the private phone records of Qwest customers.

Mr. Nacchio in April was convicted in federal court in Denver of insider trading for selling $52 million of stock in the spring of 2001 as Qwest's outlook was deteriorating. He was sentenced to six years in prison but remains free pending his appeal. His attorneys suggested in pretrial filings that Mr. Nacchio believed the company was about to win secret government contracts that would keep it in the black, despite warnings from his executive team that the company was in financial trouble. The judge at his trial didn't allow much of the classified defense, and Mr. Nacchio's appeal disputes that decision. The latest revelations were in pretrial briefs filed months ago that were unsealed last week.

A spokesman for the Director of National Intelligence office, which oversees the NSA and other intelligence agencies, declined to comment on the allegations in the court filings.

The revelations emerge as the White House is in negotiations with Congress on long-term changes to the 1978 Foreign Intelligence Surveillance Act. Democrats, and some Republicans, in Congress are at odds with the Bush administration's demand that lawmakers preserve the secrecy of the NSA program by granting telecommunications companies immunity from lawsuits for any aid they gave to the government surveillance without a court order.

The administration has balked at giving Congress documents detailing the legal justifications for the NSA program, and says that the secrecy is necessary to protect national security.

Speaking on Fox News channel yesterday, House Majority Leader Steny Hoyer (D., Md.) restated his position that Democrats were willing to pass such immunity, if the administration turned over documents about the NSA program.

Write to Dionne Searcey at dionne.searcey@wsj.com and Evan Perez at evan.perez@wsj.com

///////////

The Daily Caller is trying to get this narrative bounced again: http://dailycaller.com/2013/06/13/jailed-qwest-ceo-claimed-that-nsa-retaliated-because-he-wouldnt-participate-in-spy-program/

CBS news in 2009: http://www.cbsnews.com/2100-250_162-1616326.html

Naccio's argument was not allowed in open court. Of course that Denver judge also had the NSA all over his phone too I would hazard to guess.

But who cares what the NSA does to judge's phones anyway? (see NSA whistleblower Russ Tice specifying NSA space asset surveillance vs Justice Alito for example)

Don't forget Israel re NSA contractors: read up on James Bamford on Israeli contractors & the NSA: http://www.wired.com/threatlevel/2012/04/shady-companies-nsa/ . A few salient snippets on the pervasive role of the spinoff companies of Israel's NSA equivalent, Unit 8200:

Like Narus, Verint was founded by in Israel by Israelis, including Jacob “Kobi” Alexander, a former Israeli intelligence officer. Some 800 employees work for Verint, including 350 who are based in Israel, primarily working in research and development and operations, according to the Jerusalem Post. Among its products is STAR-GATE, which according to the company’s sales literature, lets “service providers … access communications on virtually any type of network, retain communication data for as long as required, and query and deliver content and data …” and was “[d]esigned to manage vast numbers of targets, concurrent sessions, call data records, and communications.”

In a rare and candid admission to Forbes, Retired Brig. Gen. Hanan Gefen, a former commander of the highly secret Unit 8200, Israel’s NSA, noted his former organization’s influence on Comverse, which owns Verint, as well as other Israeli companies that dominate the U.S. eavesdropping and surveillance market. “Take NICE, Comverse and Check Point for example, three of the largest high-tech companies, which were all directly influenced by 8200 technology,” said Gefen. “Check Point was founded by Unit alumni. Comverse’s main product, the Logger, is based on the Unit’s technology.”

According to a former chief of Unit 8200, both the veterans of the group and much of the high-tech intelligence equipment they developed are now employed in high-tech firms around the world. “Cautious estimates indicate that in the past few years,” he told a reporter for the Israeli newspaper Ha’artez in 2000, “Unit 8200 veterans have set up some 30 to 40 high-tech companies, including 5 to 10 that were floated on Wall Street.” Referred to only as “Brigadier General B,” he added, “This correlation between serving in the intelligence Unit 8200 and starting successful high-tech companies is not coincidental: Many of the technologies in use around the world and developed in Israel were originally military technologies and were developed and improved by Unit veterans.”

Equally troubling is the issue of corruption. Kobi Alexander, the founder and former chairman of Verint, is now a fugitive, wanted by the FBI on nearly three dozen charges of fraud, theft, lying, bribery, money laundering and other crimes. And two of his top associates at Comverse, Chief Financial Officer David Kreinberg and former General Counsel William F. Sorin, were also indicted in the scheme and later pleaded guilty, with both serving time in prison and paying millions of dollars in fines and penalties.

Anyway that's enough stuff for now. Figure better to get a hard reference of it for those interested!

BREAKING: NSA whistleblower Russ Tice says Obama spied on by NSA; Colin Powell's telecoms tracked by NSA satellite tech

///// UPDATE Friday 2pm Central: Tice got squelched by shady NBC lawyers at the last second according to BoilingFrogsPost.com:

Today MSNBC aired an interview with Mr. Tice disclosing “some” of his revelations, thanks to the vigilant activists who tirelessly shared and disseminated Mr. Tice’s revelations and interview audio. Interestingly, at the last minute, MSNBC told Mr. Tice that they would NOT include his revelations on NSA’s targeting of Obama, elected officials, attorneys, judges and activists. Basically, they censored his entire testimony on these stunning allegations!
In a correspondence with Boiling Frogs Post immediately following his censored interview with MSNBC Mr. Tice stated: “When they were placing the ear-phone in my ear with less than ten minutes left till my air time, the producer in New York said that their lawyers were discussing the material, and at this time, they did not want me to mention anything about the NSA wiretaps against all the people and organizations that I mentioned. That is how it went down. I did say on the air that I know it is much worse and would like to talk about that some time.”
- See more at: http://www.boilingfrogspost.com/2013/06/21/msnbc-censors-nsa-whistleblow...

The heat is on and the squirrels are getting squirrelly!!! /////

shit-just-got-real.jpg

Been waiting to hear more material from Russ Tice, one of the earlier NSA whistleblowers. Fortunately one of our ol' underdogs BoilingFrogsPost.com & Sibel Edmonds got Tice to lay out a lot of new stuff. Tice was a major source for NSA revelations including the 2005 NY Times warrantless wiretapping story.

Named NSA targets by Tice include current Supreme Court Justice Alito, Sen. Dianne Feinstein, Hillary Clinton, Rep. Henry Waxman, then-Sen. Evan Bayh, Sen. John McCain, Sen. Jay Rockefeller, then-US Rep. Kucinich. And of course President Obama.

Here is a quick clip: via very big on FiredogLake: BREAKING: NSA Whistleblower Russ Tice Alleges NSA Wiretapped Then-Sen. Candidate Barack Obama | MyFDL

In this bombshell episode of the Boiling Frogs Post Podcast Show NSA whistleblower Russ Tice joins us to go on record for the first time with new revelations and the names of official culprits involved in the NSA’s illegal practices. Mr. Tice explains in detail how the National Security Agency targets, sucks-in, stores and analyzes illegally obtained content from the masses in the United States. He contradicts officials and the mainstream media on the status of the NSA’s Utah facility, which is already operating and “On-Line.” He reveals the NSA as a Deep State that targets and wiretaps US political candidates for its own purposes. We discuss the latest controversies involving the NSA, PRISM, Edward Snowden, and the spins and lies that are being floated by the US mainstream and pseudo-alternative media. Do NOT miss this revelatory interview.

Listen to the preview Here - See more at: http://www.boilingfrogspost.com/2013/06/19/podcast-show-112-nsa-whistleb...

DOWNLOAD HERE > http://www.boilingfrogspost.com/podpress_trac/web/20927/0/BF.0112.Tice_2... - you may want to skip to about 50 minutes to catch the name dropping space spying going on.

bfp_podcast_version.gif"Here's the big one ... this was in summer of 2004, one of the papers that I held in my hand was to wiretap a bunch of numbers associated with a 40-something-year-old wannabe senator for Illinois," he said. "You wouldn't happen to know where that guy lives right now would you? It's a big white house in Washington, D.C. That's who they went after, and that's the president of the United States now."

There was a lot of specific references to space-based platforms - that is National Security Agency satellite technology - which was Tice's specialty to which he has now apparently turned The Blowtorch with excellent timing.

The story is getting out now. Bush-era whistleblower: Obama was NSA wiretap victim in 2004 | The Daily Caller. Huffpo did a quick post: Russ Tice, Bush-Era Whistleblower, Claims NSA Ordered Wiretap Of Barack Obama In 2004. Duly flagged on Cryptogon: Russ Tice on Boiling Frogs Podcast

Iran's press service flagged it: PressTV - NSA spied on Obama: Whistleblower

At the Guardian: Procedures used by NSA to target non-US persons: Exhibit A – full document | World news | guardian.co.uk && Revealed: the top secret rules that allow NSA to use US data without a warrant | World news | guardian.co.uk

Vast discretion vested in NSA analysts -- Glenn Greenwald http://www.guardian.co.uk/commentisfree/2013/jun/19/fisa-court-oversight-process-secrecy

The vast amount of discretion vested in NSA analysts is also demonstrated by the training and briefings given to them by the agency. In one such briefing from an official with the NSA’s general counsel’s office – a top secret transcript of which was obtained by the Guardian, dated 2008 and then updated for 2013 – NSA analysts are told how much the new Fisa law diluted the prior standards and how much discretion they now have in deciding whose communications to intercept:

“The court gets to look at procedures for saying that there is a reasonable belief for saying that a target is outside of the United States. Once again – a major change from the targeting under Fisa. Under Fisa you had to have probable cause to believe that the target was a foreign power or agent of a foreign power. Here all you need is a reasonable belief that the target is outside of the United States …

“Now, all kinds of information can be used to this end. There’s a list in the targeting procedures: phone directories, finished foreign intelligence, NSA technical analysis of selectors, lead information. Now, you don’t have to check a box in every one of those categories. But you have to look at everything you’ve got and make a judgment. Looking at everything, do you have a reasonable belief that your target is outside the United States? So, cast your search wide. But don’t feel as though you have to have something in every category. In the end, what matters is, ‘Does all that add up to a reasonable belief that your target is outside the United States?’”

So vast is this discretion that NSA analysts even have the authority to surveil communications between their targets and their lawyers, and that information can be not just stored but also disseminated. NSA procedures do not ban such interception, but rather set forth procedures to be followed in the event that the NSA analyst believes they should be “disseminated”.

The decisions about who has their emails and telephone calls intercepted by the NSA is made by the NSA itself, not by the Fisa court, except where the NSA itself concludes the person is a US citizen and/or the communication is exclusively domestic. But even in such cases, the NSA often ends up intercepting those communications of Americans without individualized warrants, and all of this is left to the discretion of the NSA analysts with no real judicial oversight.

Also: FBI Admits That Obeying The Constitution Just Takes Too Much Time | Techdirt

And: Skype Provided Backdoor Access to the NSA Before Microsoft Takeover [NYT]

Plus: Straight Outta Government: GSA Mulls Deal With Rap Genius - Nextgov.com (wat?)

And: Obama’s crackdown views leaks as aiding enemies of U.S. | McClatchy

Wowww… busy days people. It's amazing to see a suppressed narrative like the NSA domestic spying apparatus suddenly catch such traction in so many quarters!

The other heinous thing - well one other thing - is the secret TPP treaty. I'm glad reelected Rep. Alan Grayson is going to kick at it. First Congressman Allowed to Read Secret Treaty Says “This ... Hands The Sovereignty of Our Country Over to Corporate Interests” | Zero Hedge

The TPP is nicknamed “NAFTA on steroids.” Now that I’ve read it, I can see why. I can’t tell you what’s in the agreement, because the U.S. Trade Representative calls it classified. But I can tell you two things about it.

1) There is no national security purpose in keeping this text secret.

2) This agreement hands the sovereignty of our country over to corporate interests.

3) What they can’t afford to tell the American public is that [the rest of this sentence is classified].

……..

It is ironic in a way that the government thinks it's alright to have a record of every single call that an American makes, but not alright for an American citizen to know what sovereign powers the government is negotiating away.

***

Having seen what I’ve seen, I would characterize this as a gross abrogation of American sovereignty. And I would further characterize it as a punch in the face to the middle class of America. I think that’s fair to say from what I’ve seen so far. But I’m not allowed to tell you why!

Also: Warren on Trans-Pacific Partnership: If people knew what was going on, they would stop it | The Raw Story

Alright leaving this here for now. Get tuned in and look around - the truth is out there! SAIC, Booz Allen Hamilton, the grip of your sorts on all our lives is in for its createst challenge yet. The infosec praetorians are overdue for a fall in their space-age egos!

Make Great Hack Cartel: CyberWar Afloat!! DIB to 2511 Wiretap All Da Networks! SAIC signs deal with Homeland Security, to get Feds' classified hoarded zero-day exploits

"10 providers serve 80 percent of the market. We have classified relationships with a good number of them." -- US Rep Mike Rogers, reminding us how the government creates cartel structures [source Reuters]

One of the more interesting news elements concerns how the federal goverment is going to hand out teh very tastiest candy to contractors - specifically SAIC it now appears - in the form of classified undisclosed hacker attack goodies.

Interestingly AT&T would get get very very important info about vulnerabilities on Apple and other major corporate rivals, providing them with a colossal competitive edge in the so-called "marketplace".

Basically you have the introduction of a cartel system for hacking, reminiscent perhaps of the cartel system for distributing drugs so profitably for the powers-that-be. And of course Homeland Security in the middle, the keystone.

The government/contractor class is entering a more demented, less sound phase of the information age by hoarding important software bugs instead of getting them fixed.

Foreign spooks will surely get their hands on tons of hacks and way more systems will end up getting seriously assaulted. Putting up large cash bounties for responsible disclosure (i.e. telling people who can issue security patches to the public, then telling the public) is almost certainly a better way to approach the problem.

This current policy direction will probably cause far more havoc on the Internet than it will prevent, shocking an outcome as that may be.

Executive Order -- Improving Critical Infrastructure Cybersecurity | The White House

[...] Sec. 2. Critical Infrastructure. As used in this order, the term critical infrastructure means systems and assets, whether physical or virtual, so vital to the United States that the incapacity or destruction of such systems and assets would have a debilitating impact on security, national economic security, national public health or safety, or any combination of those matters.[......]

Sec. 4. Cybersecurity Information Sharing. (a) It is the policy of the United States Government to increase the volume, timeliness, and quality of cyber threat information shared with U.S. private sector entities so that these entities may better protect and defend themselves against cyber threats. Within 120 days of the date of this order, the Attorney General, the Secretary of Homeland Security (the "Secretary"), and the Director of National Intelligence shall each issue instructions consistent with their authorities and with the requirements of section 12(c) of this order to ensure the timely production of unclassified reports of cyber threats to the U.S. homeland that identify a specific targeted entity. The instructions shall address the need to protect intelligence and law enforcement sources, methods, operations, and investigations.

(b) The Secretary and the Attorney General, in coordination with the Director of National Intelligence, shall establish a process that rapidly disseminates the reports produced pursuant to section 4(a) of this order to the targeted entity. Such process shall also, consistent with the need to protect national security information, include the dissemination of classified reports to critical infrastructure entities authorized to receive them. The Secretary and the Attorney General, in coordination with the Director of National Intelligence, shall establish a system for tracking the production, dissemination, and disposition of these reports.

(c) To assist the owners and operators of critical infrastructure in protecting their systems from unauthorized access, exploitation, or harm, the Secretary, consistent with 6 U.S.C. 143 and in collaboration with the Secretary of Defense, shall, within 120 days of the date of this order, establish procedures to expand the Enhanced Cybersecurity Services program to all critical infrastructure sectors. This voluntary information sharing program will provide classified cyber threat and technical information from the Government to eligible critical infrastructure companies or commercial service providers that offer security services to critical infrastructure.

(d) The Secretary, as the Executive Agent for the Classified National Security Information Program created under Executive Order 13549 of August 18, 2010 (Classified National Security Information Program for State, Local, Tribal, and Private Sector Entities), shall expedite the processing of security clearances to appropriate personnel employed by critical infrastructure owners and operators, prioritizing the critical infrastructure identified in section 9 of this order.

/////

So "critical infrastructure" includes plenty of big corporate interests and anything that would affect their economic well-being is a threat. As always, regulations which make institutions more permanent, as opposition to the "critical" elements of society becomes blended with "terrorism".

U.S. gives big, secret push to Internet surveillance | Politics and Law - CNET News - April 24, Declan McCullaugh (who probably doesn't talk to sources on the f&!!ing telephone that much these days)

Senior Obama administration officials have secretly authorized the interception of communications carried on portions of networks operated by AT&T and other Internet service providers, a practice that might otherwise be illegal under federal wiretapping laws.

The secret legal authorization from the Justice Department originally applied to a cybersecurity pilot project in which the military monitored defense contractors' Internet links. Since then, however, the program has been expanded by President Obama to cover all critical infrastructure sectors including energy, healthcare, and finance starting June 12.

Those documents show the National Security Agency and the Defense Department were deeply involved in pressing for the secret legal authorization, with NSA director Keith Alexander participating in some of the discussions personally. Despite initial reservations, including from industry participants, Justice Department attorneys eventually signed off on the project.

The Justice Department agreed to grant legal immunity to the participating network providers in the form of what participants in the confidential discussions refer to as "2511 letters," a reference to the Wiretap Act codified at 18 USC 2511 in the federal statute books.

The Wiretap Act limits the ability of Internet providers to eavesdrop on network traffic except when monitoring is a "necessary incident" to providing the service or it takes place with a user's "lawful consent." An industry representative told CNET the 2511 letters provided legal immunity to the providers by agreeing not to prosecute for criminal violations of the Wiretap Act. It's not clear how many 2511 letters were issued by the Justice Department.

In 2011, Deputy Secretary of Defense William Lynn publicly disclosed the existence of the original project, called the DIB Cyber Pilot, which used login banners to inform network users that monitoring was taking place. In May 2012, the pilot was turned into an ongoing program -- broader but still voluntary -- by the name of Joint Cybersecurity Services Pilot, with the Department of Homeland Security becoming involved for the first time. It was renamed again to Enhanced Cybersecurity Services program in January, and is currently being expanded to all types of companies operating critical infrastructure.

//////

So you have a pilot program that covered the "Defense Industrial Base" or DIB. The security measures used to keep tabs on contractor computers are now rolled out across the interwebs. More on DIB below.

But military-style wiretapping America with fancy 2511 loopholes isn't enough! Let's hand out hacks too! Not surprisingly the NSA's main digital plumbing people, specifically SAIC, are jumping aboard the classified Goodie Gravy train.

//////

SAIC, Inc. : SAIC Signs Agreement With Department of Homeland Security To Be A Commercial Service Provider

05/15/2013| 04:10pm US/Eastern

MCLEAN, Va., May 15, 2013 /PRNewswire/ -- Science Applications International Corporation (SAIC) (NYSE: SAI) signed a Memorandum of Agreement (MOA) with the Department of Homeland Security (DHS) Enhanced Cybersecurity Services (ECS) program to become a Commercial Service Provider (CSP) of approved ECS services that will strengthen protection of U.S. critical infrastructure against imminent cyber attacks. In accordance with the MOA, SAIC is developing the capability and security certifications to utilize threat indicators for securing critical infrastructure customers against cyber threats.

Securing the Future is a guiding mission for SAIC. For decades, SAIC professionals have served the U.S. government and corporate America with expertise and technology to better protect our citizens, our military and our networks. SAIC is currently collaborating with community leaders and building key technologies and architectures that enable trusted sharing of threat information in real-time to protect against both the known and unknown threat landscape.

ECS is a voluntary information sharing program that assists critical infrastructure owners and operators as they improve the protection of their systems from unauthorized access, exploitation, or data exfiltration. DHS works with cybersecurity organizations from across the federal government to gain access to a broad range of sensitive and classified cyber threat information. DHS develops indicators based on this information and shares them with qualified CSPs, thus enabling them to better protect their customers who are critical infrastructure entities.

Key Quotes:

John Thomas, National Security Sector Acting President
"We must work together to protect our infrastructure, our economy, and our security from cyber attacks. If we don't work together, we won't succeed. This is why SAIC is proud to be a part of this endeavor to share valuable threat information between government and critical infrastructure providers."

Julie Taylor, Cybersecurity Operation Manager for National Security Services
"This collaboration between SAIC and DHS puts in place a new approach to threat sharing across public and private sectors that offers a positive shift in the threat landscape. Each step we take to cultivate our cyber ecosystem with trusted information sharing relationships will have a direct return on stabilizing our national security and our economy. Now that the doors of communication are open, we can further the cyber mission with valuable action as a team. "

David Lacquement, Cybersecurity Program Director
"As a former government executive in cyber threat management, I have seen firsthand the immense value that threat information sharing at network speed can offer to sustaining trusted channels for online transactions and communications. This public-private collaboration is strategically vital to significantly raising the level of cyber awareness, vigilance, and protection across our nation's critical infrastructure."

About SAIC
SAIC is a FORTUNE 500(®) scientific, engineering, and technology applications company that uses its deep domain knowledge to solve problems of vital importance to the nation and the world, in national security, energy and the environment, critical infrastructure, and health. The Company's approximately 40,000 employees serve customers in the U.S. Department of Defense, the intelligence community, the U.S. Department of Homeland Security, other U.S. Government civil agencies and selected commercial markets. Headquartered in McLean, Va., SAIC had annual revenues of approximately $11.2 billion for its fiscal year ended January 31, 2013. For more information, visit www.SAIC.com. SAIC: From Science to Solutions®

Statements in this announcement, other than historical data and information, constitute forward-looking statements that involve risks and uncertainties. A number of factors could cause our actual results, performance, achievements, or industry results to be very different from the results, performance, or achievements expressed or implied by such forward-looking statements. Some of these factors include, but are not limited to, the risk factors set forth in SAIC's Annual Report on Form 10-K for the period ended January 31, 2013, and other such filings that SAIC makes with the SEC from time to time. Due to such uncertainties and risks, readers are cautioned not to place undue reliance on such forward-looking statements, which speak only as of the date hereof.

Contact: Melissa Koskovich Jennifer Gephart

(703) 676-6762 (703) 676-6389

Melissa.l.koskovich@saic.com Jennifer.a.gephart@saic.com

SOURCE SAIC

/////

Here is the Department of Homeland Security page on it: Enhanced Cybersecurity Services | Homeland Security. See also Office of Cybersecurity and Communications and Stakeholder Engagement and Cyber Infrastructure Resilience. I wonder if someone gets applause for these titles, whew...

Enhanced Cybersecurity Services

Protecting critical infrastructure against growing and evolving cyber threats requires a layered approach. The Department of Homeland Security (DHS) actively collaborates with public and private sector partners every day to respond to and coordinate mitigation efforts against attempted disruptions and adverse impacts to the nation’s critical cyber and communications networks and infrastructure.

As the federal government’s lead agency for coordinating the protection, prevention, mitigation, and recovery from cyber incidents, DHS works regularly with business owners and operators to strengthen their facilities and communities. To accomplish this, the DHS Enhanced Cybersecurity Services (ECS) program was expanded in February 2013 by Executive Order - Improving Critical Infrastructure Cybersecurity.

ECS is a voluntary information sharing program that assists critical infrastructure owners and operators as they improve the protection of their systems from unauthorized access, exploitation, or data exfiltration. DHS works with cybersecurity organizations from across the federal government to gain access to a broad range of sensitive and classified cyber threat information. DHS develops indicators based on this information and shares them with qualified Commercial Service Providers (CSPs), thus enabling them to better protect their customers who are critical infrastructure entities. ECS augments, but does not replace, an entities’ existing cybersecurity capabilities.

The ECS program does not involve government monitoring of private networks or communications. Under the ECS program, information relating to threats and malware activities detected by the CSPs is not directly shared between the critical infrastructure CSP customers and the government. However, when a CSP customer voluntarily agrees, the CSP may share limited and anonymized information with ECS. See the Privacy Impact Assessment below for more details.

Critical Infrastructure Entities

Most critical infrastructure entities already utilize cybersecurity providers to protect their networks. The ECS program offers an enhanced approach to protecting these entities by supplementing existing services and commercial capabilities with U.S. Government cyber threat information. This approach supports the delivery of enhanced capabilities to eligible participants from all sectors.

Participation in the program is voluntary and is designed to protect government intelligence, corporate information security, and the privacy of participants, while enhancing the security of critical infrastructure. Validated entities from all critical infrastructure sectors are eligible to participate in the ECS program and receive ECS services from qualified CSPs.

To learn more about becoming a validated critical infrastructure entity, please contact the ECS Program Management Office at ECS_Program@HQ.DHS.gov.

Commercial Service Providers

CSPs receive threat information from DHS and use it to offer specified services to their critical infrastructure customers in a secure environment in order to ensure the security of government furnished information.

CSPs deliver services to eligible customers through commercial relationships. The ECS program is not involved in establishing the commercial relationships between CSPs and validated critical infrastructure entities. As of February 2013, the following CSPs are approved to provide ECS services to critical infrastructure entities:

DHS is working with several additional providers who seek to offer enhanced cybersecurity services to entities. To learn about becoming a CSP, please contactECS_Program@HQ.DHS.gov.

Sector Specific Agencies

Sector Specific Agencies (SSAs) and DHS form a critical partnership within the ECS program. The role of the SSA is to leverage existing relationships with critical infrastructure entities to expand and improve ECS. The SSA is also responsible for helping to characterize risks and threats unique to critical infrastructure entities in their respective sectors. This characterization will enable the federal government to deliver the most effective indicators relevant to ECS protected entities based upon the unique threat environment of their sector. SSAs also serve as a vital conduit to DHS for data leading to requirements that will drive the development of ECS program capabilities.

Privacy and Civil Liberties

DHS embeds and enforces privacy protections and transparency in all its activities and uses the Fair Information Practice Principles (FIPPs) to assess and mitigate any impact on an individual’s privacy.   DHS has conducted and published a Privacy Impact Assessment for the ECS program. DHS also ensures that ECS and all of its cybersecurity activities are structured in a way that ensures individual rights are protected.

Contact Information

For more information, contact ECS_Program@HQ.DHS.gov.

//////

Once you poke around on FedBizOpps.gov a little bit it's easier to see how they blow so much money in DC.

Fun FEMA Pork tangent: Here are some FEMA satellite phone sole source contract. On the one hand, it's good someone has a satellite phone in emergencies, but someone is profiting off this sale...

https://www.fbo.gov/index?s=opportunity&mode=form&id=4a1af0e4e2942226816...

FEMA seeks to acquire on an other than full and open competition basis MSAT satellite terminals. These terminals are primarily utilized in Disaster Operations for mission critical communications within FEMA, as well as for communicating with strategic partners to support disasters. There is currently only one commercial satellite operator in North America offering two-way radio, push-to-talk (PTT) capability integrated with telephone. This feature makes it possible to communicate with another terminal in a specific talk group anywhere in CONUS. Authority is FAR 6.302-1 The anticipated period of performance is for one year. THIS NOTICE OF INTENT IS NOT A REQUEST FOR COMPETITIVE QUOTES. NO TELEPHONE INQUIRIES WILL BE ACCEPTED. A determination by the Government not to compete this acquisition based upon responses to this notice is solely within the discretion of the Government.

Contracting Office Address:

500 C Street SW

Patriots Plaza -- 5th Floor

Washington, District of Columbia 20472

United States

Primary Point of Contact.:

Christine Thomas

christine.thomas@associates.fema.dhs.gov

/////

Anyway here is the Reuters story central to this whole turn of narrative, a new system "Outside of the Military Industrial Complex" indeed.

REUTERS: Government to Share Cyber Security Information with Private Sector - By Joseph Menn | May 15, 2013

SOURCE http://www.insurancejournal.com/news/national/2013/05/15/292065.htm

The U.S. government will use classified information about software vulnerabilities for the first time to protect companies outside of the military industrial complex, top officials told Reuters this week.

Secretary of Homeland Security Janet Napolitano said that a system being developed to scan Internet traffic headed toward critical businesses would block attacks on software programs that the general population does not realize are possible.

“It is a way to share information about known vulnerabilities that may not be commonly available,” Napolitano said at the Reuters Cybersecurity Summit in Washington, D.C.

The information would come from “a variety of sources” including intelligence agencies, she said on Tuesday.

The National Security Agency and other intelligence agencies develop and acquire knowledge about software flaws in order to penetrate overseas networks. Until now, there has been no straightforward way for these agencies to share that classified data with U.S. companies outside the defense sector, even though those companies could become victims of cyber attacks.

The plan is to discreetly share the data through what the government calls Enhanced Cybersecurity Services. Under a February presidential order, those services will be offered by telecommunications and defense companies to utilities, banks and other critical infrastructure companies that choose to pay for them.

Napolitano’s Department of Homeland Security will take the information from the NSA and other sources, and relay it to service providers with security clearances. The service providers would then use these “attack signatures” – such as Internet routing data and content associated with known adversary groups – to screen out malicious traffic.

Napolitano’s comments were the first disclosure that the screening would also cover attacks on software using methods known to the government that have not been disclosed to the software manufacturers or buyers.

While U.S. intelligence agencies have at times warned software manufacturers, such as Microsoft Corp. and Google Inc., or Homeland Security officials of specific, declassified problems, the new system will be machine-to-machine and far more rapid.

It reflects the realization that many espionage attacks from overseas are aimed at the private sector and that future destructive attacks may arrive the same way. (Classified attack signatures have been used to protect defense manufacturers under a Pentagon program.)

House of Representatives Intelligence Committee Chairman Mike Rogers said he was glad about the plan to share more broadly information about vulnerabilities, while maintaining control of the process to avoid tipping off rival countries or criminals.

“This can’t happen if you post it on a website,” Rogers, a Republican and lead author of a cybersecurity information-sharing bill that has passed the House, told the Summit. “We have to find a forum in which we can share it, and 10 providers serve 80 percent of the market. We have classified relationships with a good number of them.”

Among those that have agreed to provide the classified security services are AT&T Inc. and Raytheon Co. Northrop Grumman Corp. said this week it had also joined the program.

The secret but widespread U.S. practice of buying up tools leveraging unknown or “zero-day” software flaws for spying or attacks was the subject of a Reuters Special Report last week, in which former White House cybersecurity advisors said more flaws should be disclosed for defensive reasons.

Michael Daniel, the White House cybersecurity policy coordinator, told the Summit the Enhanced Cybersecurity Services program was still evolving and the type of information shared would change as threats do.

“We want to use the full capabilities that we have to protect as much of the critical infrastructure as we can with that program,” he said.

(Reporting by Joseph Menn; Editing by Tiffany Wu and Leslie Gevirtz)

/////////

Here is the earlier Zero Day story: Booming 'zero-day' trade has Washington cyber experts worried | Reuters

(Reuters) - The proliferation of hacking tools known as zero-day exploits is raising concerns at the highest levels in Washington, even as U.S. agencies and defense contractors have become the biggest buyers of such products.

White House cybersecurity policy coordinator Michael Daniel said the trend was "very worrisome to us."

Asked if U.S. government buying in the offensive market was adding to the problem, Daniel said more study was needed. "There is a lot more work to be done in that space to look at the economic questions...so we can do a better job on the cost-benefit analysis," he said.

Some security experts say the government's purchasing power could help instead of hurt. They argue the U.S. government should bring the market into the open by announcing it will pay top dollar for zero-days and then disclosing all vulnerabilities to the companies concerned and their customers.

"Given that people are now buying vulnerabilities, the U.S. should simply announce that it is cornering the market, that they will pay 10 times anyone else," said Dan Geer, chief information security officer at In-Q-Tel, the U.S. intelligence community's venture capital firm. He said he was speaking outside of his official capacity.

IN-Q-TEL TROLLING. FACK... This story is going all over the place. In-Q-Tel is the CIA's venture capital wing, worth noting for those unfamiliar. They use government money to make private venture capitalists tons of profits - for example building up Keyhole into Google Earth, which, when installed on your computer phones home constantly.

See: https://www.cia.gov/library/publications/additional-publications/in-q-tel/

In-Q-Tel - Wikipedia. Among other things: "In-Q-Tel sold 5,636 shares of Google, worth over $2.2 million, on Nov 15, 2005.[6] The stocks were a result of Google’s acquisition of Keyhole, the CIA funded satellite mapping software now known asGoogle Earth."

Exclusive: Google, CIA Invest in 'Future' of Web Monitoring | Danger Room | Wired.com: "The investment arms of the CIA and Google are both backing a company that monitors the web in real time — and says it uses that information to predict the future."

In-Q-Tel: The CIA's Tax-Funded Player In Silicon Valley : All Tech Considered : NPR && 25 Cutting Edge Companies Funded By The Central Intelligence Agency - Business Insider

/////

Batchez of linx follow when diving into this newest gravy train. Here is a plain setup showing a bunch of classified stuff about to go out the door to shady contractors, I'm sure none of them sketchballs with foreign intelligence angles who will sell out and use the good stuff to attack for massive profit.

DIBS ON YOUR INTERNETS: This is probably the original DIB thing now foisted on America at large, or closer to it:

www.dc3.mil/dcise/DIB Enhanced Cybersecurity Services Procedures.pdf
DIB Enhanced Cybersecurity Services (DECS)

The Department of Defense (DoD) in coordination with the Department of Homeland Security (DHS) is actively engaged in multiple efforts to foster mutually beneficial partnerships with the Defense Industrial Base (DIB) to protect DoD information residing on or passing though DIB company systems. One such effort is the DIB Cyber Security/Information Assurance (CS/IA) Program, including its optional DIB Enhanced Cybersecurity Services (DECS) component.

Under the optional DECS component of the DIB CS/IA Program, the Government will furnish classified cyber threat and technical information either to a DIB company or to the DIB company’s Commercial Service Provider (CSP). This sensitive, Government-furnished information enables these DIB companies, or the CSPs on behalf of their DIB customers, to counter additional types of known malicious cyber activity, to further protect DoD program information.

///////

This is also nuts: www.uscg.mil/hq/cg5/cg544/docs/ECS_Fact_Sheet.pdf

And: Raytheon, Lockheed Get U.S. Secrets as Cybersecurity Go-Betweens

Cyber Security, Critical Infrastructure, and Obama’s Executive Order - Deloitte CIO - WSJ

Northrop, US DHS team up to support enhanced cybersecurity services :: Strategic Defence Intelligence

U.S. gives big, secret push to Internet surveillance | Politics and Law - CNET News

///////

Other Major Moves of Note right now: Of course the Bitcoin ecosystem got a major swipe at it from Department of Homeland Security's new uber-agency, Homeland Security Investigations. Warrant Reveals Homeland Security Seized Mt. Gox’s Dwolla Account for ‘Unlicensed Money Transmitting’ | Betabeat. I covered some key notes on the ever-spreading DHS-HSI organization in April 2012.

Associated Press situation is a big deal too. via @johnknefel: What's at Stake When the Department of Justice Seizes AP Phone Records | Politics News | Rolling Stone

Anyway I will leave it there for now. The Hack Cartel rides high today, but as with all these corrupt authoritarian bubbles they tumble sooner or later.

The Cyberwar fleet of fools will sink of its own accord, but how many innocent fishing boats will get capsized in the wake of their fooling about?

EXCLUSIVE MnDOT info cake: 2.97gb emails/docs on the Mileage Based User Fee (MBUF)- Minnesota's GPS vehicle taxing regime in the works

After a long wait, on Nov 28 2012, the Minnesota Department of Transportation (MnDOT) released ~2.97 gigabytes of data from inside the development of a GPS-based vehicle tracking system intended to introduce a vehicle tax - which would entail a great deal of data constantly collected by the government on the whereabouts and everyday patterns of the taxed vehicles. The source URL posted yesterday is ftp://ftp2.dot.state.mn.us/pub/outbound/chiefcounsel/Nate%20Hansen%20Email/ .

My friend Nathan Hansen made the request, pursuing a long-running story of the buildout of these taxation-tracking highway techs. (Disclosure: I did some design work for Hansen previously) The 2008 story I did: Now Searchable: The MnDOT NASCO NAFTA Superhighway Document Stash && Index of /June 2008 MN DOT Request/NASCO - Hansen Request && Index of /June 2008 MN DOT Request/June 2008 Request && Index of /DOT. A lot of these plans fell by the wayside - and a special Minnesota Intellidrive project and MBUF is the new plan. Related: Melissa Hill's new blog allows you to "Track the Police" using public data && Private company hoarding license-plate data on US drivers. In May 2011 I did this story: Contracts for IntelliDrive MnDOT Military-Industrial/U of M plan to GPS-track all cars. This data dump continues the story.

There are a few important angles: comprehensive vehicle tracking data would be great for law enforcement, lawyers and big corporations to investigate everything in one's life, including 'retroactive surveillance' of previous activities. However, the "fees" that would be imposed on rural Minnesotans who have to drive around a lot would be quite burdensome.

From a quick look at the PDFs we find internal discussion points about such impending scams as 'carbon credit' trading (a greenwashing Goldman Sachs sponsored futures bubble, as Matt Taibbi reported). Additionally Raytheon and SAIC have both been involved in this "Intellidrive" national-scale super-project. Also, just because the user data is processed behind Battelle's firewall in no way signifies any level of security of personal information.

The main block of data posted is in huge Acrobat Reader X sized PDF files (1.1 and 1.6GB) . We have mirrored around the files and checked with md5hash in case the govt pulls any later. Acrobat Reader X is kinda bogging on these giant files -- it loads all the emails in a slow email reader-like interface). Plenty of items like "concept of operations" or "MBUF CONOPS" is in there, a lot of stuff about consultants. We are just starting to peer at it, but Adobe is difficult to work with (a svelte 400MB app yay).

To get this batch of files yourself, if you have UNIX wget for mirroring:

$ wget -mb ftp://ftp2.dot.state.mn.us/pub/outbound/chiefcounsel/Nate%20Hansen%20Email/

I definitely recommend installing wget for things like this, where the files are listed in a directory for quick scraping.

//////////////

DATA EXTRACTION BONUS CHALLENGE: To open the attachments on these emails, for OSX you have to use a program such as the free MailRaider: Download MailRaider for Mac - Read Outlook .msg files on your Mac. This is what you gotta do - in Acrobat, hit the paperclip on the side:

acrobatreader.png

After first picking out the individual PDF attachments in Acrobat (the paperclip icon) you can get it to open in MailRaider. Hit the 'Open' button in that side panel. Hopefully this will launch MailRaider. In MailRaider, flip open the sidebar you can get it to work like so:

mailraider.png

Here is the first PDF I was able to extract - Intell~1.pdf (2MB) - it is a "business sensitive" presentation by military-industrial contractor Battelle to MnDOT. Let's have some choice excerpts including particularly how they use taxing people driving around rural-ish places like Wright County as a target for the mileage tax.

mndotcake000.png mndotcake001.png mndotcake002.png mndotcake003.png mndotcake004.png mndotcake005.png mndotcake006.png mndotcake007.png mndotcake008.png mndotcake009.png mndotcake010.png mndotcake011.png mndotcake012.png mndotcake013.png mndotcake014.png mndotcake015.png mndotcake016.png mndotcake017.png mndotcake018.png mndotcake019.png mndotcake020.png

What could possibly go wrong?!

mndotcake021.png

It is always sad to see fine open source techs like GnuPG used to encrypt tracking data. Damn you Technocratic Capitalism!

mndotcake022.png mndotcake023.png

This is pretty alarming. Sterns, Wright, etc are counties full of peopl that can't afford to pay more.

mndotcake025.png mndotcake026.png

LOOKS LEGIT:

mndotcake027.png mndotcake028.png

So this is just one extracted PDF from a single email. If Battelle was actually a front for malicious space aliens who want all the inhabitants of this planet tagged and tracked, I would not be surprised!

///////////////

MIRROR ADDRESSES: Here is the first mirror of it. These files are big enough to crash your browser - maybe rightclick & Save As link so the PDF plugin doesn't keel over... I don't think we'll need tons of mirrors for this, but it's good to have a couple around.

the big ones are at:

http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun... & also:

http://hongpong.com/files/mndotcake/Public%20QAM.pdf
http://hongpong.com/files/mndotcake/Public%20CommVault.pdf

dfc0fd1d4d6bdbcaf0498a50ee0f5fec Public CommVault.pdf 1.22 GB on disk (1,216,990,533 bytes)

cec386cc20000b7fe10297fc3ca0cdab Public QAM.pdf 1.7 GB on disk (1,698,431,132 bytes)

If you find gems tweet em with hashtag #mndotcake. If you find an open source way to work with files this big let us know. It will take some people to work on this. We invite people to occupythecomms.cc group infocake for looking at PDFs - this has group writing pads available (very easy, much like googledocs). Info on occupythecomms: https://occupythecomms.cc/pages/view/90009/activism-and-collaborative-media-methods

On the indymedia mirror the directoryIndex isn't cooperating yet (no folders list) but the files are here. The big ones are in bold, not too much in the others so far found.

You can generate a list of your wget mirror like this with:

$ find -name \*

http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outbound
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outbound/chiefcounsel/Nate%20Hansen%20Email/Public%20QAM.pdf
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outbound/chiefcounsel/Nate%20Hansen%20Email/Public%20CommVault.pdf

http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outbound/chiefcounsel/Nate%20Hansen%20Email/QAM%20Redactions/Fwd_%206_5_07%20Commissioner's%20Staff%20Meeting%20Minutes16.pdf
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outbound/chiefcounsel/Nate%20Hansen%20Email/QAM%20Redactions/Fwd_%206_5_07%20Commissioner's%20Staff%20Meeting%20Minutes27.pdf
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outbound/chiefcounsel/Nate%20Hansen%20Email/QAM%20Redactions/Fwd_%206_5_07%20Commissioner's%20Staff%20Meeting%20Minutes26.pdf
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outbound/chiefcounsel/Nate%20Hansen%20Email/QAM%20Redactions/Fwd_%206_5_07%20Commissioner's%20Staff%20Meeting%20Minutes3.pdf
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outbound/chiefcounsel/Nate%20Hansen%20Email/QAM%20Redactions/Fwd_%206_5_07%20Commissioner's%20Staff%20Meeting%20Minutes9.pdf
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outbound/chiefcounsel/Nate%20Hansen%20Email/QAM%20Redactions/Fwd_%206_5_07%20Commissioner's%20Staff%20Meeting%20Minutes13.pdf
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outbound/chiefcounsel/Nate%20Hansen%20Email/QAM%20Redactions/Fwd_%206_5_07%20Commissioner's%20Staff%20Meeting%20Minutes8.pdf
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outbound/chiefcounsel/Nate%20Hansen%20Email/QAM%20Redactions/Fwd_%206_5_07%20Commissioner's%20Staff%20Meeting%20Minutes29.pdf
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outbound/chiefcounsel/Nate%20Hansen%20Email/QAM%20Redactions/Fwd_%206_5_07%20Commissioner's%20Staff%20Meeting%20Minutes10.pdf
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outbound/chiefcounsel/Nate%20Hansen%20Email/QAM%20Redactions/Fwd_%206_5_07%20Commissioner's%20Staff%20Meeting%20Minutes5.pdf
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outbound/chiefcounsel/Nate%20Hansen%20Email/QAM%20Redactions/Fwd_%206_5_07%20Commissioner's%20Staff%20Meeting%20Minutes11.pdf
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outbound/chiefcounsel/Nate%20Hansen%20Email/QAM%20Redactions/Fwd_%206_5_07%20Commissioner's%20Staff%20Meeting%20Minutes12.pdf
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outbound/chiefcounsel/Nate%20Hansen%20Email/QAM%20Redactions/Fwd_%206_5_07%20Commissioner's%20Staff%20Meeting%20Minutes19.pdf
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outbound/chiefcounsel/Nate%20Hansen%20Email/QAM%20Redactions/r_phone%20for%2027th%20and%2028th....and%20a%20TIP!%20_).pdf
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outbound/chiefcounsel/Nate%20Hansen%20Email/QAM%20Redactions/Fwd_%206_5_07%20Commissioner's%20Staff%20Meeting%20Minutes17.pdf
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outbound/chiefcounsel/Nate%20Hansen%20Email/QAM%20Redactions/Fwd_%206_5_07%20Commissioner's%20Staff%20Meeting%20Minutes22.pdf
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outbound/chiefcounsel/Nate%20Hansen%20Email/QAM%20Redactions/Fwd_%206_5_07%20Commissioner's%20Staff%20Meeting%20Minutes6.pdf
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outbound/chiefcounsel/Nate%20Hansen%20Email/QAM%20Redactions/6_5_07%20Commissioner's%20Staff%20Meeting%20Minutes.pdf
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outbound/chiefcounsel/Nate%20Hansen%20Email/QAM%20Redactions/RE_%20Dieringer%20Pre-Award---IMPORTANT!!!!.pdf
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outbound/chiefcounsel/Nate%20Hansen%20Email/QAM%20Redactions/Fwd_%206_5_07%20Commissioner's%20Staff%20Meeting%20Minutes15.pdf
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outbound/chiefcounsel/Nate%20Hansen%20Email/QAM%20Redactions/RE_%20Dieringer%20Pre-Award---IMPORTANT!!!!3.pdf
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outbound/chiefcounsel/Nate%20Hansen%20Email/QAM%20Redactions/Ray's%20requests.pdf
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outbound/chiefcounsel/Nate%20Hansen%20Email/QAM%20Redactions/r_RE_%20Dieringer%20Pre-Award---IMPORTANT!!!!2.pdf
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outbound/chiefcounsel/Nate%20Hansen%20Email/QAM%20Redactions/Fwd_%206_5_07%20Commissioner's%20Staff%20Meeting%20Minutes30.pdf
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outbound/chiefcounsel/Nate%20Hansen%20Email/QAM%20Redactions/Fwd_%206_5_07%20Commissioner's%20Staff%20Meeting%20Minutes.pdf
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outbound/chiefcounsel/Nate%20Hansen%20Email/QAM%20Redactions/Fwd_%206_5_07%20Commissioner's%20Staff%20Meeting%20Minutes28.pdf
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outbound/chiefcounsel/Nate%20Hansen%20Email/QAM%20Redactions/r_Re_%20MNDOT_MBUF%20Discussion%20guide%20v2.DOC%20(Lucy's%20out%20of%20the%20office%20).pdf
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outbound/chiefcounsel/Nate%20Hansen%20Email/QAM%20Redactions/Fwd_%206_5_07%20Commissioner's%20Staff%20Meeting%20Minutes18.pdf
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outbound/chiefcounsel/Nate%20Hansen%20Email/QAM%20Redactions/Attachments/r_6%205%2007%20Commissioner's%20Staff%20Meeting%20Minutes.pdf
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outbound/chiefcounsel/Nate%20Hansen%20Email/QAM%20Redactions/Fwd_%206_5_07%20Commissioner's%20Staff%20Meeting%20Minutes2.pdf
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outbound/chiefcounsel/Nate%20Hansen%20Email/QAM%20Redactions/Fwd_%206_5_07%20Commissioner's%20Staff%20Meeting%20Minutes20.pdf
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outbound/chiefcounsel/Nate%20Hansen%20Email/QAM%20Redactions/r_This%20should%20do%20it!.pdf
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outbound/chiefcounsel/Nate%20Hansen%20Email/QAM%20Redactions/Fwd_%206_5_07%20Commissioner's%20Staff%20Meeting%20Minutes%20-%20No%20major%20issues%20FYI.pdf
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outbound/chiefcounsel/Nate%20Hansen%20Email/QAM%20Redactions/Fwd_%206_5_07%20Commissioner's%20Staff%20Meeting%20Minutes25.pdf
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outbound/chiefcounsel/Nate%20Hansen%20Email/QAM%20Redactions/Fwd_%206_5_07%20Commissioner's%20Staff%20Meeting%20Minutes7.pdf
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outbound/chiefcounsel/Nate%20Hansen%20Email/QAM%20Redactions/r_This%20should%20do%20it!2.pdf
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outbound/chiefcounsel/Nate%20Hansen%20Email/QAM%20Redactions/r_RE_%20Help_!_.pdf
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outbound/chiefcounsel/Nate%20Hansen%20Email/QAM%20Redactions/Fwd_%206_5_07%20Commissioner's%20Staff%20Meeting%20Minutes14.pdf
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outbound/chiefcounsel/Nate%20Hansen%20Email/QAM%20Redactions/r_headin'%20home%20with%20MBUF%20as%20my%20bedmate....pdf
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outbound/chiefcounsel/Nate%20Hansen%20Email/QAM%20Redactions/Fwd_%206_5_07%20Commissioner's%20Staff%20Meeting%20Minutes24.pdf
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outbound/chiefcounsel/Nate%20Hansen%20Email/QAM%20Redactions/r_Selection%20Committee%20%20(Just%20In%20Case)%20.pdf
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...).pdf
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outbound/chiefcounsel/Nate%20Hansen%20Email/QAM%20Redactions/Fwd_%206_5_07%20Commissioner's%20Staff%20Meeting%20Minutes21.pdf
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outbound/chiefcounsel/Nate%20Hansen%20Email/QAM%20Redactions/Fwd_%206_5_07%20Commissioner's%20Staff%20Meeting%20Minutes4.pdf
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outbound/chiefcounsel/Nate%20Hansen%20Email/QAM%20Redactions/Fwd_%206_5_07%20Commissioner's%20Staff%20Meeting%20Minutes23.pdf
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outbound/chiefcounsel/Nate%20Hansen%20Email/QAM%20Redactions/6_5_07%20Commissioner's%20Staff%20Meeting%20Minutes2.pdf
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outbound/chiefcounsel/Nate%20Hansen%20Email/QAM%20Redactions/Fwd_%206_5_07%20Commissioner's%20Staff%20Meeting%20Minutes31.pdf
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outbound/chiefcounsel/Nate%20Hansen%20Email/CommVault%20Redactions/RECEIVED!!%20%20_)%20%20%20%20MBUF%20Presentation%20Draft_11_16_2009_415pm.pdf
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outbound/chiefcounsel/Nate%20Hansen%20Email/CommVault%20Redactions/RE_%20Temp%20classification%20is%20here!_02_09_2011_128pm.pdf
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outbound/chiefcounsel/Nate%20Hansen%20Email/CommVault%20Redactions/RE_%20Temp%20classification%20is%20here!_02_09_2011_136pm.pdf
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outbound/chiefcounsel/Nate%20Hansen%20Email/CommVault%20Redactions/RE_%20Temp%20classification%20is%20here!_02_09_2011_133pm.pdf
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outbound/chiefcounsel/Nate%20Hansen%20Email/CommVault%20Redactions/RE_%20Temp%20classification%20is%20here!_02_08_2011_1141am.pdf
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outbound/chiefcounsel/Nate%20Hansen%20Email/CommVault%20Redactions/RE_%20CONSULTANT%20CONTRACTs_last%20night!_12_02_2009_1127am.pdf
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outbound/chiefcounsel/Nate%20Hansen%20Email/CommVault%20Redactions/RE_%20Temp%20classification%20is%20here!_02_08_2011_1130am.pdf
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outbound/chiefcounsel/Nate%20Hansen%20Email/CommVault%20Redactions/RE_%20CONSULTANT%20CONTRACTs_last%20night!_12_02_2009_1132am.pdf
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outbound/chiefcounsel/Nate%20Hansen%20Email/CommVault%20Redactions/RE_%20News%20from%20Mileage%20Based%20User%20Fee%20Alliance%20(MBUFA)_04_11_2011_309pm.pdf
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...

/////////////////

Here is the MD5 hashes for all these files. (for fingerprinting/verification of file uniqueness, accept no substitutes). There are a bunch of apparently empty emails in "redactions" directories - or going to try another PDF reader to see if something is hiding.

a1541603442a1f0a6c2c7487c947e35b Hansen, Nathan 4_20_2011.xlsx

dfc0fd1d4d6bdbcaf0498a50ee0f5fec Public CommVault.pdf 1.22 GB on disk (1,216,990,533 bytes)

cec386cc20000b7fe10297fc3ca0cdab Public QAM.pdf 1.7 GB on disk (1,698,431,132 bytes)

$ cd QAM\ Redactions/

$ md5sum *

2bd53b4d4cfdf5735c6acb3d78dcac68 6_5_07 Commissioner's Staff Meeting Minutes.pdf

ac02fb8d2d000af38df63e9d6804a5bd 6_5_07 Commissioner's Staff Meeting Minutes2.pdf

bb562e176106b9436968ec57312fd74c Fwd_ 6_5_07 Commissioner's Staff Meeting Minutes - No major issues FYI.pdf

cbbb2e9d9d81892a865d6539216d768c Fwd_ 6_5_07 Commissioner's Staff Meeting Minutes.pdf

5294e1ef211a8a2de42749ab525b53ff Fwd_ 6_5_07 Commissioner's Staff Meeting Minutes10.pdf

dba29ffb9fc67b3a389dbfc7e67ea8f7 Fwd_ 6_5_07 Commissioner's Staff Meeting Minutes11.pdf

e77272f7a0b33506dbf7e284f553bc58 Fwd_ 6_5_07 Commissioner's Staff Meeting Minutes12.pdf

8b0f53991f8b62fc2d1c92407839a4cc Fwd_ 6_5_07 Commissioner's Staff Meeting Minutes13.pdf

a6b449f524250717b8fcdbac45abe537 Fwd_ 6_5_07 Commissioner's Staff Meeting Minutes14.pdf

c0b806598d33db35b25a167558e61dca Fwd_ 6_5_07 Commissioner's Staff Meeting Minutes15.pdf

3243ea3f27b71c5da5d8aa146033fd45 Fwd_ 6_5_07 Commissioner's Staff Meeting Minutes16.pdf

091a17b9fd52dcb52f8ee9f2e1087426 Fwd_ 6_5_07 Commissioner's Staff Meeting Minutes17.pdf

61f4122e7d61e84099bcd39479c389a0 Fwd_ 6_5_07 Commissioner's Staff Meeting Minutes18.pdf

f8537cda72dc63a7dd3e6fd5bdf96f80 Fwd_ 6_5_07 Commissioner's Staff Meeting Minutes19.pdf

1dc010c5ff89962ae132c242d99cdd4e Fwd_ 6_5_07 Commissioner's Staff Meeting Minutes2.pdf

d005b7b9edf6acf4046e57f0f157b098 Fwd_ 6_5_07 Commissioner's Staff Meeting Minutes20.pdf

0b9c231b2a572b29bc0b26e533b49416 Fwd_ 6_5_07 Commissioner's Staff Meeting Minutes21.pdf

9234a884059b1667134a3a60438da49d Fwd_ 6_5_07 Commissioner's Staff Meeting Minutes22.pdf

16095da57ce2c90ab73ea3acb470231a Fwd_ 6_5_07 Commissioner's Staff Meeting Minutes23.pdf

e834fc715abed962a5926db379b7d47b Fwd_ 6_5_07 Commissioner's Staff Meeting Minutes24.pdf

44bc416f5ed69a62dbc3284bddf45be4 Fwd_ 6_5_07 Commissioner's Staff Meeting Minutes25.pdf

93db674814645af1a9b2e3b86e0cedbb Fwd_ 6_5_07 Commissioner's Staff Meeting Minutes26.pdf

7dfb0294d4e9916117d48f87399396b4 Fwd_ 6_5_07 Commissioner's Staff Meeting Minutes27.pdf

0d1e549ec6911fb272c273cc9cdb85d2 Fwd_ 6_5_07 Commissioner's Staff Meeting Minutes28.pdf

af0b4c77b40a92f007f6de0937689666 Fwd_ 6_5_07 Commissioner's Staff Meeting Minutes29.pdf

14ad0e9eaf2a1ec784a7f64a4677d1fd Fwd_ 6_5_07 Commissioner's Staff Meeting Minutes3.pdf

eb3c3a2ab081cd011cb8dc3cc4220c17 Fwd_ 6_5_07 Commissioner's Staff Meeting Minutes30.pdf

babb6166d521b7bd5e3da38e549101b9 Fwd_ 6_5_07 Commissioner's Staff Meeting Minutes31.pdf

faa33837481a7ea9ce5389301005d276 Fwd_ 6_5_07 Commissioner's Staff Meeting Minutes4.pdf

ec283884cf4eb57c1902f554c6daf88a Fwd_ 6_5_07 Commissioner's Staff Meeting Minutes5.pdf

fd3955363a06c5e4f073b9a0eb685dce Fwd_ 6_5_07 Commissioner's Staff Meeting Minutes6.pdf

9bb8bb439de8ebd31245d9e5c8039ba1 Fwd_ 6_5_07 Commissioner's Staff Meeting Minutes7.pdf

7e8d8bf30cb1979c98d26b68f74b4354 Fwd_ 6_5_07 Commissioner's Staff Meeting Minutes8.pdf

5e691539c7ab6721cd39e1739a63c977 Fwd_ 6_5_07 Commissioner's Staff Meeting Minutes9.pdf

eaf5422b97c8ada9bc1a2e2eebfef0bf Fwd_ MNDOT_DOCS-#573688-v3-MBUF_EXEC_SUMM.DOC.pdf

17f5832daf02053ece137906874516a2 Fwd_ Re_ CANCELED TONIGHT.pdf

4324e83ef735d5e77d99dfd22044224f Fwd_ Re_ Contract 90815 with The Dieringer Research Group; Mileage Based User Fee et al.pdf

3b7488cce7ecd2166663f08279cfc3dd Fwd_ Russian exchange program.pdf

fdd5552a9a0a29ea87998d4836e80e96 RE_ Dieringer Pre-Award---IMPORTANT!!!!.pdf

d0658a06b65516fca4053fc9b36ecb8c RE_ Dieringer Pre-Award---IMPORTANT!!!!3.pdf

0dbcad4857d9b6403a2e853cd78c6972 RE_ Dieringer Pre-Award.pdf

a1d456e7e7b594fe400f3848aa11e98c RE_ Dieringer Pre-Award3.pdf

6fd5adfd694451487ccdf26373eeab55 Ray's requests.pdf

39468301435c56e3ec93fc588c92819a Re_ Fwd_ Fox 9 follow up.pdf

58e487d24be75a7d253941dde63b08fc Re_ Fwd_ UPA.pdf

f01b3471912eedfdba901c0c593de83a Re_ Fwd_ UPA2.pdf

d3b3a8c4347947539ca68b1e9c1d6e51 Re_ MBUF_ Invoice Questions.pdf

b063347fb895a472d4dbfd830646ddad r_Final payment on MBUF.pdf

d215cb89c3fd54140daf25b9ef8284ce r_MBUF Session at Research Conference.pdf

5b355449e4377a26817cd4c6811596bf r_MBUF_EXEC_SUMM.DOC.pdf

62531bda63cf387a9af54c603c485f05 r_MNDOT_DOCS-#573688-v3-MBUF_EXEC_SUMM.DOC.pdf

9d58ff05a42d717ab21fb16b025ae57a r_One-pager on MBUF.pdf

00498befc398512b83fd12a504885117 r_RE_ Couple quick thoughts for the morning....pdf

f7f56814799552a8c7623a05651abf6a r_RE_ Dieringer Pre-Award---IMPORTANT!!!!2.pdf

21f3cd6184330313fd4c968a7f028cbd r_RE_ Dieringer Pre-Award2.pdf

44b00634488d6c0a4047f001d0458fe0 r_RE_ EGADS___.pdf

ab4a3171454d293faf05282fd2d83eec r_RE_ Help_!_.pdf

0fd3fb1e29875e32749ea7c14c04c3f4 r_RE_ RE_ MBUF 3 Informational Materials.doc.pdf

326fc5ab634d7bfedb4c1bb5f301f2c0 r_RE_ Revised Proposal.pdf

4653657972f849fd9a1c7054079d000c r_RE_ Weighting issue_ new thought_.pdf

c61c3d6a1ef1be417f9d00c7be8b77cb r_RE_ dang, did it again.....pdf

91179ab7d3629f5762bd8e18ab4afca5 r_RE_ tomorrow_ or... in the meantime....pdf

08d3bea45066ef0c5d509828947797d8 r_RFI Responses.pdf

e507c028247157bf0860a7ed793f429a r_RFI Responses2.pdf

9cb9fe08acb375b3ddfbedfb27c640fe r_RFI Responses3.pdf

3d9ee0668e57b78f837885a77e7afe80 r_Re_ WANT INPUT FROM RW_KM- Re_ Notes from the second pretest.pdf

477daab48437d06bbc3d48763f849c09 r_Re_ Any MBUF updates_.pdf

5db8f9421c5edf2810be6964febc0d4c r_Re_ Budget review.pdf

4606fdd159fd22f59b610edfddd6e8ca r_Re_ Checking in.....pdf

51f6f0c7e5b327a6378b96dc2d0ba936 r_Re_ Contract 90815 with The Dieringer Research Group; Mileage Based User Fee et al.pdf

4ab4226505ba43336ca2ddfb864de016 r_Re_ Contract 90815 with The Dieringer Research Group; Mileage Based User Fee et al2.pdf

c980c15aa1358178a1766ce97f04f090 r_Re_ Contract 90815 with The Dieringer Research Group; Mileage Based User Fee et al3.pdf

37258df0b414af50f8c64d51e0bcf500 r_Re_ Contract 93707.pdf

63c77560c995c1f95af81637e25a0cbf r_Re_ Div. Directors.pdf

fb76beed27f4086fc713c6d6bc59159c r_Re_ Final payment on MBUF.pdf

0c045b993642661cfc57e47d2998f539 r_Re_ Focus Groups_ MBUF.pdf

13369f6c2c7d1f15947be9f5451ecf3e r_Re_ MBUF FAQ.pdf

c0f66f0d95a6bb505dfe5a152f4a6d04 r_Re_ MBUF FAQ2.pdf

6768b6bb46892736ca405151827dc3e1 r_Re_ MBUF FAQ3.pdf

5548eb744fdefe5edc438d777aee0e7b r_Re_ MBUF Posting.pdf

f452cc41fb449ac5a532fe69e36f9aae r_Re_ MBUF TRB Paper.pdf

fdc671465cca77c1ac28c624c66eec60 r_Re_ MBUF TRB Paper2.pdf

15fdbfc26e9c1d7d1d75bebf19bd3d4b r_Re_ MBUF TRB Paper3.pdf

f9064a7d54b55dbdfee12201f5a6d6fb r_Re_ MBUF TRB Paper4.pdf

1ea6c324c4810a187fbb466f090e9dc8 r_Re_ MBUF TRB Paper5.pdf

ee2bf6d95d1dde47efad543d7fcd72f7 r_Re_ MNDOT_MBUF Discussion guide v2.DOC (Lucy's out of the office ).pdf

908d43977c57905893b1876c3743680b r_Re_ MNDOT_MBUF Discussion guide v2.DOC.pdf

c953af1a4399e1c7186b760163d22cf4 r_Re_ PAYD Market Research.pdf

2c3ff87a050058633837b932e27ffdf3 r_Re_ Presentation of MBUF Public Perceptions Study.pdf

ab603f4bed9c05693a38a2fbbbfab8dd r_Re_ RFP Questions - 3.pdf

971fa164a5f7b261c89828bf7abc9396 r_Re_ What time do you think you will go to lunch__.pdf

1322615f623d2ad114f056d96ac22800 r_Re_ What time do you think you will go to lunch__2.pdf

2e4cac2496e0ae647c75c03336ea1365 r_Re_ What time do you think you will go to lunch__3.pdf

d1cc38d07c46de1d9603c9d0e34c9e46 r_Re_ checking on your status.pdf

b0ee689930c73f8f899ef89dc65996b0 r_Re_ project status.pdf

d98803d63a7121d7475fa402037bde55 r_Re_ project status2.pdf

75339d3c33fa450cde6aeb9f61d4cf46 r_Revised Proposal.pdf

2b719b5df5c7e94cb4c254a923a77029 r_Selection Committee (Just In Case) .pdf

9b858373c2c295719101426381877004 r_This should do it!.pdf

3e0a41234df919fc5748fb0f3733f5a0 r_This should do it!2.pdf

3c0202bf34f06fca292a363ded23d808 r_Travel Authorization Signatures.pdf

4ff5b016ecab1a8194ba82d1f3166166 r_What time do you think you will go to lunch__4.pdf

f9b137390f0e4be87d0eacc412e55cbf r_headin' home with MBUF as my bedmate....pdf

74da3639cfd3c5cad57a802cfb571df6 r_last Friday....pdf

8a720e445fbd86bae91c273b7ee94bec r_meeting today.pdf

01517f469063f9f88b231abbf3c60fe0 r_phone for 27th and 28th....and a TIP! _).pdf

1893859cb7ef79f3e8edeaa57e6d40bc r_to hear the second pretest interviews_.pdf

ec21dda39b263e35e15ffa1a7106e3d7 r_up and taking nourishment _).pdf

$ cd ../CommVault\ Redactions/

$ md5sum *

4526805e569ac612e8b47e0baa0f18c5 Bernie Lieder Update_04_12_2011_316pm.pdf

965a35632c7ee3c5b4a77953c819b6e7 Email address_04_19_2011_152pm.pdf

ea00a30ddde74758dfb632444ee17554 FW_ MBUF Online Community_02_14_2011_122pm.pdf

c30785e48c44ab468535c835ea8808ca FW_ MBUF Symposium & PAYD Insurance_03_23_2010_1002am.pdf

ae3f69040f670c509ed143bf937abeb6 FW_ MBUF_12_10_2010_1006am.pdf

1f217b45f730ab22fa987aec48ec1797 FW_ MnDOT Snapshot - Reaching Older Generations_02_23_2011_1143am.pdf

6c04c8b976f6c6615aaf1f3e553eef4a FW_ Mn_DOT MBUF RFP_08_10_2010_1032pm.pdf

be0486bbafba485cf73e797cf57cce1d FW_ TRB_01_06_2011_1148am.pdf

5dd29c7fdc005ea0d1872b7b50db4f9c FW_ Temp classification Ready for your review_11_17_2010_330pm.pdf

da1c6529e24b3aeb622e465810d2493d FW_ Terminology for legislation_12_02_2010_832am.pdf

60526ffba0b83ed3ca2de4b1d0ee4d93 FW_ US-2 Alternative Risk Analysis_12_02_2009_126pm.pdf

356efd4378b9f723631510c6da3ab9ec FW_ my schedule_06_02_2010_339pm.pdf

8134913b6cb4291df781450444fad923 Fw_ MBUF project name_03_18_2011_405pm.pdf

4806c46d5527908e4f5d6d69ecc3fb9e Fw_ MnDOT Snapshot - Reaching Older Generations_02_23_2011_358pm.pdf

03a2a1ca03c16fb5b1cbec671111a729 Fw_ TRB_01_06_2011_937am.pdf

14db70ba2b1af71c30c850b9a6470dd5 Hansen, Nathan 4_20_2011.xlsx

abb315692a9475591a3f3ebebb2ca0df I-394_05_20_2010_848am.pdf

484c3fad46b8460e8cc8e024d44b2eda Letter to Administration and IPAD_02_21_2011_221PM.pdf

30f936b3baf79c8a3f4adf0c37b9cd17 MBUF Exec Summ in one pager template.docx_02_24_2010_139pm.pdf

54447e231cc5e7d1d12d52cfcb2cb51e MBUF Online Community_02_11_2011_1223pm.pdf

8144d33f994c47817ec2ea44e06ec98a MBUF Project_02_08_2011_143pm.pdf

b27c2fdf06cd476d21c4e66b772d3fb1 MBUF_10_22_2010_839am.pdf

be348e1362ac6ccece5756bcf754d3f1 MBUF_11_30_2009_1013am.pdf

c4b6a0285baa57dfd06cc49e19228773 Mbuf name_02_23_2011_1141am.pdf

274c29d8c6e94608478aa42efaad281e MnDOT & Communispace weekly call agenda_02_25_2011_919am1.pdf

71d3478d4d6332dc22e6c575ef2e0512 MnDOT & Communispace weekly call agenda_02_25_2011_919am2.pdf

39d76453ecd31324635d95e3891e9d13 MnDOT Snapshot - Reaching Older Generations_02_22_2011_943am.pdf

671fe8c19a2f81667a52fe78075655b1 MnDOT Snapshot - Reaching Older Generations_02_22_2011_944am.pdf

b135755acaa77b327ddd2f8339179b0c RECEIVED!! _) MBUF Presentation Draft_11_16_2009_415pm.pdf

886befdaa2332b043dc63e9800f8f6f6 RE_ CONSULTANT CONTRACT EXPIRATION ALERT_12_01_2009_1035am.pdf

d63301b6ab7408fd335ecd01c22bfba9 RE_ CONSULTANT CONTRACT EXPIRATION ALERT_12_01_2009_1059am.pdf

c3c35a0da620de7e9fabf3e281b33cd1 RE_ CONSULTANT CONTRACTs_last night!_12_02_2009_1127am.pdf

66c4c8e5721a887186ef32c29e24ff93 RE_ CONSULTANT CONTRACTs_last night!_12_02_2009_1132am.pdf

78d6d6ef56ecfc67fcaf61e5a332127a RE_ I-394_05_20_2010_902am.pdf

05df7eaf8b317c80f13820f1e1cee14b RE_ IntelliDrive MBUF Project_12_16_2009_333pm.pdf

2b7f16e797a7a0c6ad62c7ed1333b8f5 RE_ IntelliDrive MBUF Project_12_16_2009_810am.pdf

9a0cec08313abcf1c9ca70c658f80e14 RE_ Letter to Administration and IPAD_02_22_2011_927AM.pdf

e30e6e048ba92ef1a599a2600bd6498f RE_ MBUF Exec Summ in one pager template.docx_02_24_2010_154pm.pdf

70c7b32debe5a55e2f8f2d67bebb76b8 RE_ MBUF Focus Group_01_17_2011_511pm.pdf

50e47e4450bab89d5500f5eb35a036a4 RE_ MBUF Online Community_02_11_2011_1225pm.pdf

92fcfc9630992a333dc3b46bd48732c4 RE_ MBUF Online Community_02_11_2011_1231pm.pdf

f027c45acab6e57b1d36e24d0ee93772 RE_ MBUF Online Community_02_15_2011_1100am.pdf

a1b6ce5cde68ea77a9c23c95ea8dcb9a RE_ MBUF Online Community_02_15_2011_1129am.pdf

deb5838863a641688c6e7c85ece7b5db RE_ MBUF Policy Kick-Off Meeting_12_01_2010_1236pm.pdf

7899b2e46e7bbc1d7d3dab6b67204ef8 RE_ MBUF Policy Study Draft Online Survey Approach_02_03_2011_1206pm.pdf

04a3bd71953c8a3116c6d5302d71b583 RE_ MBUF news release going out today_04_18_2011_419pm.pdf

0f97d747bd627273951ae52d9f47af52 RE_ MBUF news release going out today_04_18_2011_506pm.pdf

5d7c9d7b938d012327ad74e8adc1c6ef RE_ MBUF news release going out today_04_18_2011_603pm.pdf

1108a01bc5647242129db848b1968ad0 RE_ MBUF project name_03_18_2011_424pm.pdf

9d04bdc4f3d47bd9aa6a42cc86e8111c RE_ MBUF project name_03_18_2011_425pm.pdf

e1b29a363a67381a2bf62b520b81c54b RE_ MBUFF meeting today; cancelling_04_15_2011_215pm.pdf

2b62cff8e2356af2367a533757fecd3c RE_ MBUFF meeting today; cancelling_04_18_2011_830am.pdf

8c6f28f8bfad5e6269be821d90a38ef3 RE_ MBUF_11_30_2009_1149am.pdf

e44110f22e541bd4e66165e507305409 RE_ MBUF_12_10_2010_1103am.pdf

999925ec95ed3a13e110e798bf1555c1 RE_ MBUF_12_10_2010_1111am.pdf

27a82743582cefc14bb61353f8551a06 RE_ MBUF_12_10_2010_950am.pdf

27956fe15cf55ca0c7f0287b03148ea6 RE_ MBUF_12_10_2010_953am.pdf

81af256a23a3809ff8bb8d622b70d4a0 RE_ MBUF_12_10_2010_954am.pdf

3e13a81758d56493a83f5c7428ed370b RE_ MBUF_12_10_2010_955am.pdf

19d4fb79563af9ee4d8fdd44b9ee2508 RE_ MBUF_12_10_2010_957am.pdf

f9f6f496419b156db9f74f4f7683f83b RE_ MNDOT & Communispace weekly call - 2_15_02_17_2011_236pm.pdf

5b8361f64e68eab5c8a8342fbcfda50d RE_ Mbuf name_02_23_2011_1144am.pdf

006f09322d12e50fb6f0f819bea23fbe RE_ Media contact-mileage based user fee_04_19_2011_319pm.pdf

f1ee5606964818951a6c908260505a4a RE_ MnDOT & Communispace weekly call agenda - NOTES_02_28_2011_957am1.pdf

cb9614632da4c99f2b63cab39767a502 RE_ MnDOT & Communispace weekly call agenda - NOTES_02_28_2011_957am2.pdf

dc0c94c5bda4f38f9b50e5bbee1adeb1 RE_ MnDOT Snapshot - Reaching Older Generations_02_22_2011_504pm.pdf

4700a7736adc778ff83d49f14c6ab184 RE_ MnDOT Snapshot - Reaching Older Generations_02_23_2011_1153am.pdf

7ab57aca29541ad59aa8cb4aa735396d RE_ MnDOT Snapshot - Reaching Older Generations_02_23_2011_12483.pdf

e8021d8f7e3afdd8629541fd1a9b0cc3 RE_ MnDOT Snapshot - Reaching Older Generations_02_23_2011_1248pm.pdf

fa54ec8e94bf5fb5cdbe3fa6e1c4db9f RE_ MnDOT Snapshot - Reaching Older Generations_02_23_2011_1248pm2.pdf

3218af37335c0e06c3f3b9a011b19e39 RE_ MnDOT Snapshot - Reaching Older Generations_02_23_2011_328pm.pdf

eb696b4ffeee4e306e2eb7e484bba2d6 RE_ MnDOT Snapshot - Reaching Older Generations_02_23_2011_331pm.pdf

2dd4f45c1331c9db6bc6ad13cad669e7 RE_ MnDOT Snapshot - Reaching Older Generations_02_23_2011_331pm2.pdf

6dcab9c1d50ee4793d1c2f50ac5c1aac RE_ Mn_DOT MBUF RFP_08_11_2010_1031am.pdf

8d4ac4b9986a2dee1ebdf640cc241aa4 RE_ News from Mileage Based User Fee Alliance (MBUFA)_04_11_2011_309pm.pdf

e210a430bee280107a58c426d63a4bdd RE_ Next steps_Action Planning_12_03_2009_124pm.pdf

dd51eb0f42aea93f113ff5753b23f7f5 RE_ TRB Presentation_01_28_2011_125pm.pdf

4dc9010d0d7df27e8d5dd8689beebd0b RE_ TRB Presentation_01_28_2011_133pm.pdf

f910d3770ae1253cb5a096f9fc89be26 RE_ TRB_01_05_2011_543pm.pdf

3559e8bf7034bd767690c270c54aa1d8 RE_ TRB_01_06_2011_1111am.pdf

be8de9d4e1d3f82ab1a7567cbbbd0db2 RE_ TRB_01_06_2011_1116am.pdf

276086ae4495d14e7cbb077238747743 RE_ TRB_01_06_2011_1136am.pdf

de5827e592a282eea1853abaf717bc0d RE_ TRB_01_07_2011_840am.pdf

1e20ee8d269538d3c51f1e4a394813a9 RE_ TRB_01_07_2011_848am.pdf

29bbb01ead3b247be765ae31ccc4af0b RE_ TRB_01_24_2011_450pm.pdf

b44878a8ba14e90d657e411ad8d6f3f8 RE_ TRB_01_26_2011_620am.pdf

0c08f27a10d2e6df4d0562d7a6f1c0ff RE_ TRB_01_26_2011_801am.pdf

76495b1ee7bf01d8cd82d00f844a3df4 RE_ Temp class_02_17_2011_412pm.pdf

2f0318acfd3b1dcb960d5ea3a58a3264 RE_ Temp classification Ready for your review_11_17_2010_636pm.pdf

920a5c9704de481feb63d517712c1bbc RE_ Temp classification Ready for your review_11_18_2010_1105am.pdf

91d9a6e0ecaccd8038d737fb9e018548 RE_ Temp classification is here!_02_08_2011_1130am.pdf

f00a78733245cdb151b70161e8b0c6c6 RE_ Temp classification is here!_02_08_2011_1141am.pdf

88084dd4767ce27fb1c98cab13fe86c8 RE_ Temp classification is here!_02_09_2011_128pm.pdf

325966f645ec703d7da2d357249d6678 RE_ Temp classification is here!_02_09_2011_133pm.pdf

5c900f9cadf4e5037c0cd14da33e283c RE_ Temp classification is here!_02_09_2011_136pm.pdf

eb559b717547c18aa1ce5de7f4a334fb RE_ This AM_06_11_2010_934am.pdf

1d52160c492897b3bca16ee9df7ffa8b RE_ VM yesterday_12_05_2009_1131am.pdf

6be20bbfc07fe87eaecab816bc64e9dc RE_ another version of the policy study overview_01_07_2011_835am.pdf

3eebed34ca6fdfd6224366da55a0364e RE_ another version of the policy study overview_01_07_2011_932am.pdf

221e425208d0c9dea2da17e21cedaf78 Re_ 2010 MBUF Symposium Call March 12, 3 p.m. Central time_02_27_2010_1006am.pdf

4a7ad39b42e8063a51090e4dfc4c9ac3 Re_ Jon H.2_01_05_2011_759am.pdf

bf84169642681c0393244cbdb2661a3e Re_ Jon H._01_05_2011_838am.pdfbf84169642681c0393244cbdb2661a3e Re_ Jon H._01_05_2011_838am.pdf

ec3787db74d4c1110113c0b45f0a355e Re_ Letter to Administration and IPAD_02_22_2011_155PM.pdf

7cb7973b2280ba2688b13512ebcb7625 Re_ MBUF Policy Meeting_03_02_2011_215pm.pdf

739ed2f8cadb31733edb0fdfd97f04e7 Re_ MBUF_03_31_2011_714pm.pdf

5cabfd708b4c7a48068bcb609c853d79 Re_ MBUF_03_31_2011_824pm.pdf

4ee94529b2e9ec85f9f64693e0dff2cf Re_ MBUF_12_09_2010_911pm.pdf

2ea238fe33918e7b7eebc5ac7ec96c1e Re_ MBUF_12_10_2010_1047am.pdf

5baa528dfaecef9cd4ed408f2d94a650 Re_ MBUF_12_13_2010_746am.pdf

f7adb768801ba9af6150f1cbc9053a97 Re_ MnDOT Snapshot - Reaching Older Generations_02_23_2011_155pm.pdf

8bc02ad9e7444b670486bc1fc4f1fb2c Re_ MnDOT Snapshot - Reaching Older Generations_02_23_2011_323pm.pdf

36fdd9e21207b2267c0d13fbb8baad70 Re_ TRB_01_25_2011_148pm.pdf

7c3a94657f2afb64691f52ede7db19cb Shortened Presentation draft_11_18_2009_104pm.pdf

e82b4a99ead5133167d892c292950a64 Temp classification citations and final Attachment _11_18_2010_146pm.pdf

e3a1eb76c041f03400532d26a93c01b7 Temp classification_11_09_2010_420pm.pdf

f35b892dcd07cae5ef763765ec8e8989 VM yesterday_12_05_2009_718am.pdf

ad284dd91760b55caa43d94947bcb309 my notes from focus group_07_15_2010_1042pm.pdf

5ec009dc1d2b30fd7180043d71e431d2 my schedule_06_01_2010_306pm.pdf

df2c566cec38e930b2fc0b89c5467048 note changes per my vm on your cell...._07_22_2010_1142am.pdf

adcbf8b475c7158e8800c223e06b1783 r_VPPP Grant Apps_02_03_2011_905am.pdf

2bc792828e021379bd6508c0a8e5e808 your 3905 and 3924_ classifying data_12_21_2010_403pm.pdf

$ cd ../QAM\ Redactions/Attachments/

$ md5sum *

3fd8f0f9226e7b23383fb4e9820800ef r_0584_001.pdf

5fe5e205e8c9673a577d2acb389fbbd7 r_09xxx Dieringer 2009 FHR Cost Detail.pdf

8b56f9fb39fa8b7a6d58e2b2da23776c r_09xxx Dieringer 2009 FHR Cost Detail_for revi.pdf

e22812037eada83aecf6311eb08a7b4a r_1.30.07 Commissioners Staff Meeting Minutes.pdf

f713229f7f300f227589bd89aaad2002 r_2.06.07 Commissioners Staff Meeting Minutes.pdf

f3375414fc619ee175b5dc224a5e07a1 r_2.13.07 Commissioners Staff Meeting Minutes.pdf

22f6f34e84981638ffa263c1f5a434fd r_6 5 07 Commissioner's Staff Meeting Minutes.pdf

52a28aea5fffa90a906a41dd04d6ea5c r_Addresses_2009.pdf

8c31824d4de7622ffcffaf8d4a44fcd4 r_Fwd_ Re_ CANCELED TONIGHT.pdf

d52b1e9786833b3d758a0e642afd0507 r_Grants-dot-gov-20070522131848652_1.pdf

cf02b8b051229580d130fadce52e7a67 r_MNDOT_DOCS-#573688-v3-MBUF_EXEC_SUMM.DOC.pdf

0298e9beac45b9d02e9c3c5f3e4fae96 r_Re_ Contract 90815 with The Dieringer Research Group; Mileage Based User Fee et al.pdf

///////////////////

More on this as stuff develops. Happy tracker hunting!

Syndicate content