Total Information Awareness

EXCLUSIVE: Such Critical Infrastructures: FBI feeds Anonymous IRC channels to CIA, Pentagon intel, NSA, NORTHCOM in 2012 Intel memo

An FBI "IIR" intelligence report, dated April 12 2012 entitled "Identification of Internet Relay Chat (IRC) Channels Used by Anonymous Members, as of 12 April 2012" surfaces a dicey realm between US military & intelligence and electronic activists. The full report is at scribd.com/doc/246922867/FBI-FOIA-IRC-Chat-Channels-used-by-Anonymous // (Mobile) /// UPDATE: Upvote this post on Reddit & Thanks to YAN for amplifying!

FBI FOIA IRC Chat Channels used by Anonymous by Smiley Hill

A tiny peek into a huge deal: the potential fracas between assorted would-be American military cyberwar commandoes and international (and domestic!) computer activists. This lower-level report (Unclassified//For Official Use Only) (U//FOUO) perhaps is more interesting for its "metadata" rather than thoroughly censored content. Below I also included some other domestic military operations documents below to draw a wider context than just this "cyberwar" stuff, as Ferguson has prompted Gov. Nixon in Missouri to activate the state militia, it's good to read up on what federal legal doctrine for "civil disturbances" is.

fbi-iir1.png
fbi-iir2.png
fbi-iir3.png

Such recipients: In order, it says it is from "DIRECTOR FBI" to:

All FBI field offices

INFO AFOSI DET 331 Andrews AFB Maryland, Headquarters Air Force Office of Special Investigations (also cited in this case http://www.dod.mil/pubs/foi/homeland_defense/intelligence/EFF_vs_DOD_Bates_997_1096.pdf )

CDR USSTRATCOM Offutt AFB Nebraska, Strategic Command commander

CDR USTRANSCOM Scott AFB Illinois, United States Transportation Command commander

CDR1STIO Ft Belvoir Virginia, First Information Operations Command commander - https://www.1stiocmd.army.mil/ (wat? "CDR1STIO" pops in a bunch of other FOIA'd IIRs as well if you googlize it)

CIA WASHINGTON DC - always down for a good time

DEPT OF HOMELAND SECURITY WASHINGTON DC - yes, this hot info wasn't stovepiped away from rivals

DEPT OF JUSTICE WASHINGTON DC - fetching banhammer

DEPT OF STATE WASHINGTON DC

DIA WASHINGTON DC - Defense Intelligence Agency which is huge and low profile - http://www.dia.mil/

DIRNAVCRIMINVSERV - Probably HEADQUARTERS. NAVAL CRIMINAL INVESTIGATIVE SERVICE.

DNI WASHINGTON DC - Director of National Intelligence. (Clapper at the time)

HQ AFOSI Andrews AFB Maryland - Air Force Office of Special Investigations. Tip, if you have some message for them, use their unencrypted contact form to let them know about fraud or etc. What could possibly go wrong? > http://www.osi.af.mil/main/contactus.asp

HQ NORAD USNORTHCOM INTEL PETERSON AFB - US Northern Command located near Colorado Springs was created as Dept of Homeland Security's military counterpart for "Homeland Defense", an elastic concept extending Pentagon involvement with "critical infrastructure," namely the machinery of major corporations. They also revised "GARDEN PLOT" into CONPLAN 3502 Civil Disturbance Operations," relevant in a Ferguson type context under federal mobilization. (see 2010 story) They were also written into Superman's plot.

JOINT STAFF Washington DC - J2 - Director for Intelligence (J2) on the Joint Chiefs of Staff (now this guy)

JWAC DAHLGREN Virginia - Joint Warfare Analysis Center a "premier science and engineering institution" under Strategic Command (USSTRATCOM), which also hosts Cyber Command. see http://www.stratcom.mil/functional_components/

NGA HQ Bethesda Maryland. The National Geospatial Intelligence Agency, like DIA, is up to a lot of things off the radar. They have domestic satellite spying (GEO INT) responsibilities at National Special Security Events which require a special domestic military intel privacy waiver. http://www.stratcom.mil/functional_components/ . Big spenders.

NSA FT GEORGE G MEADE Maryland - National Security Agency at the oddly spelled out Ft Meade. I wonder how many land in this inbox - and how many times "George G" is stored in their databases.

US SECRET SERVICE WASHINGTON DC

USCYBERCOM FT GEORGE G MEADE Maryland - Cyber Command in ur router, sniffin ur packets

WHITE HOUSE SITUATION ROOM WASHINGTON DC.

BT . … I am fairly sure this is a closing list tag like </UL>

////

Serial IIR 4 213 4003 12, "WARNING (U): This is an information report, not finally evaluated intelligence. It is being shared for informational purposes but has not been fully evaluated, integrated with other information, interpreted or analyzed. Receiving agencies are requested not to take action based on this raw reporting without prior coordination with the FBI. Unless a conviction in a criminal proceeding occurs, a presumption of innocence exists for any person being reported on in this IIR." Declassification date appears 20370607, as this hot stuff needs to lay low for a couple more decades.

What is an IIR? It is pretty low level stuff for the FBI. For a bit of info see FBI Intelligence Information Report Handbook | Electronic Frontier Foundation. That document interestingly, at the very end includes a statutory info pipeline from Grand Jury operations to various feds. Patriot Act Section 203(a)(1)( C )(i)(V) certainly makes for an industrious star chamber circuit, but they don't want grand jury info going out in IIRs without asking the HQ attorney.

This document was obtained by Smiley Hill via FOIA. Please follow https://twitter.com/smilyus for more smileable FOIAs on a regular basis.

////

The use of the military - and these contractors in the game now - to police corporate systems labeled as Critical Infrastructure is significant. After all, Missouri Gov Nixon just activated the state militia because of Ferguson.

ferguson-crop2.png ferguson-crop1.png

In the recent FBI writeup freeking out about Ferguson protesters, I took the "critical infrastructure" references to allude to authorizing military activity around corporate electronic assets that might get poked at by angry activists.

“The announcement of the grand jury’s decision … will likely be exploited by some individuals to justify threats and attacks against law enforcement and critical infrastructure,” the FBI says in an intelligence bulletin issued in recent days. “This also poses a threat to those civilians engaged in lawful or otherwise constitutionally protected activities.”

fergusoncrop.png

////

Background on Executive Order 13636:

See NSA's cybersecurity program to protect critical infrastructure revealed - Military & Aerospace Electronics

Feb 2013: Executive Order -- Improving Critical Infrastructure Cybersecurity | The White House

CRS analysis on Executive Order: http://fas.org/sgp/crs/misc/R42984.pdf

Feb 2013: Pentagon will require security standards for critical infrastructure networks - Nextgov.com

This is actually a word? Cyberinfrastructure - Wikipedia, the free encyclopedia

Nov 2012: Cyber Order Puts DHS In Charge Of Oversight, Sets Deadlines « Breaking Defense - Defense industry news, analysis and commentary

USA TODAY: Feb 2013: Cybersecurity executive order fosters information sharing for greater good

As for the legal ramifications of domestic military operations and targeting electronic activists with tools like STRATCOM / CYBERCOM retain for battling Al Qaeda servers or whatever, most people say "But, Posse Comitatus!" In reality a vast area of domestic military operations has been expanded and operated by JAGs. See : www.loc.gov/rr/frd/Military_Law/pdf/operational-law-handbook_2012.pdf

This Domestic Operational Law Cyber Realm has a Handbook, People!

DomesticOperationalLaw2011.png

The domestic version of this JAG manual is extremely recommended reading for everyone. See Domestic Operational Law Handbook for Judge Advocates 2011 | Public Intelligence.

Also the newer 248 page Domestic Operational Law Handbook for Judge Advocates 2013 | Public Intelligence is available. You will definitely know moar about WTF is up with weird meshes of civilian/military authority in the US by skimming over this.

PI highlighted a bunch of good 2011 stuff, since we are talking Ferguson anyway, it's worth noting again:

G. The Department of Defense Civil Disturbance Plans

Formerly, DoD’s Civil Disturbance Operations (CDO) plan was known as “GARDEN PLOT.” Since the creation of the Department of Homeland Security and USNORTHCOM however, DoD has delegated to geographic combatant commanders responsibility for developing CDO Contingency Plans (CONPLANs). These geographic commanders’ CONPLANs provide guidance and direction for planning, coordinating, and executing military operations during domestic civil disturbances.

1. Civil Disturbance Operations Mission

Broadly stated, the CDO mission assists civil authorities in restoring law and order in the United States and its territories.58 This mission statement, while not duplicating the language in the Insurrection Act allowing for the use of federal forces to “suppress” insurrection, provides wide latitude to the President to use federal forces to assist civil law enforcement in “restoring” law and order.

The restoration of law and order must be distinguished from the preservation of law and order. CDO mission statements do not allow the joint civil disturbance task force commander to undertake preservation missions. It is generally agreed that missions to restore law and order include dispersing unauthorized assemblages, patrolling disturbed areas, maintaining essential transportation and communications systems, setting up roadblocks, and cordoning off areas. Care should be taken before a military commander accepts missions that are routine maintenance of civil order.

2. Combatant Commanders’ CONPLANs

The CONPLANs provide the basis for all preparation, deployment, employment, and redeployment of Department of Defense component forces, including National Guard forces called to active federal service, for use in domestic civil disturbance operations, in support of civil authorities as directed by the President. The concept of a civil disturbance operation is multi-phased: Phase 0, Shape; Phase I, Anticipate; Phase II, Respond (deployment can occur in either Phase I or Phase II); Phase III, Operate; Phase IV, Stabilize; and Phase V, Transition (redeployment). Prior to deployment, military forces maintain five preparedness postures, called Civil Disturbance Conditions (CIDCONS) in order to alert and react to potential civil disturbance operations. Changes in the CIDCON level are directed by the JDOMS.

3. The Standing Rules for the Use of Force for U.S. Forces

Civil disturbance operations are conducted in accordance with Appendix L of the Standing Rules of Engagement/Standing Rules for the Use of Force for U.S. Forces (SRUF). Guidance on how and when forces can use force in a CDO mission are detailed in that annex. Although the CJCSI is classified, Annex L is not and can be shared with our mission partners.

a. Custody and Detention

All apprehensions should be made by the civil police force unless they are not available or require assistance. Military forces have the authority to detain rioters, looters, or other civilians committing criminal offenses. Civilians taken into custody should be transferred to civilian law enforcement authorities as soon as possible.

All members of the force must remember that state and federal criminal law and procedure govern apprehension. Apprehension is justified only on the basis of probable cause to believe that an offense has been committed and that the person to be apprehended committed the offense. Soldiers should not question detainees beyond basic pedigree such as name and address. If formal questioning of an offender is necessary, civilian police should conduct the interview. If civilian police are not available, CID agents or military police may conduct interviews only if the interview is essential to the civil disturbance mission. Actions taken by Soldiers that do not conform to criminal law constitutional standards could jeopardize future prosecution and subject Soldiers and their Commanders to criminal and/or civil liability.

b. Search and Seizure

CDO CONPLANs anticipate that military forces will generally not be involved in searches unless there is “an immediate danger of violence, destruction of evidence, or escape of violent persons unless the search is conducted without delay.” In all other cases, local authorities should conduct searches. When required to perform searches, federal armed forces may conduct warrantless searches under the same constitutional parameters imposed upon law enforcement officials. Joint Civil Disturbance Task Force forces conducting a warrantless search will fully document the reasons for the search as soon as is reasonably convenient.69 Generally these searches are limited to the following incidents.

(1) Stop and Frisk

If there is a reasonable suspicion based upon articulable facts that a person has committed, is committing, or is about to commit a crime, that person may be temporarily stopped and questioned about his activities. The stop must be limited in duration to that which is reasonably necessary to investigate the suspicion. If there is a reasonable suspicion based on articulable facts that a person is armed or is carrying instruments of violence and that the individual presents an immediate risk of harm, members of the armed force may conduct a “frisk” (an external “patdown” of the clothing) for weapons. Any weapons found during a frisk may be removed from the individual and seized.

(2) Search Incident to Lawful Apprehension

A person lawfully detained may be searched for weapons or destructible evidence. A search for weapons or destructible evidence may also be conducted in the area where the detained person could reach with a sudden movement to obtain a weapon or destroy evidence.

(3) Exigent circumstances

Military forces assisting law enforcement may make a search without a warrant when they have reason to believe (probable cause) that weapons, objects related to criminal activity, or persons believed to have committed an offense, are in the place to be searched; and they have reason to believe that the delay necessary to obtain a search warrant would result in removal of the weapons or destruction of the objects related to criminal activity. For example, Joint Civil Disturbance Task Force forces may stop and search an automobile without a warrant when there is reason to believe that the automobile contains weapons or instruments of violence and/or contains an individual reasonably believed to have committed violence.

(4) Emergency

Military forces in a civil disturbance operation may make an immediate entry into a building when there is reason to believe that entry is necessary to prevent injury to persons, serious damage to property, loss of evidence, to protect public safety, or to render aid to someone who is in danger.

(5) Hot pursuit

Military forces pursuing a person who they have reason to believe has just committed a serious crime, may enter a vehicle or building believed to be entered by the suspect and search the building or vehicle for the person or any weapons that might be used to further his escape.

(6) Plain View

During the course of otherwise lawful activity, military forces may seize any unlawful weapons or objects related to criminal activity which they observe in plain view. When conducting warrantless searches that require a probable cause determination, military forces can obtain advice from a judge advocate; however, the probable cause determination must be made personally by the individual desiring to conduct the search.

If a search warrant is required, local civil authorities should obtain judicially issued search warrants. If local civilian authorities are not available, judge advocates need to be prepared to provide advice on probable cause to military authorities before they approach a local judge or magistrate for a search warrant.

When feasible, all searches conducted by military personnel will be conducted by two personnel with the actual search performed by someone of the same sex.76 A hand receipt or some similar document should be prepared when items of personal property are seized from an individual.

c. Confinement Facilities

The Joint Civil Disturbance Task Force should not operate a detention facility. Any person apprehended should be turned over to the police for detention. Military correctional facilities cannot be used to detain civilians. If available civilian detention facilities cannot accommodate the number of detained persons who are awaiting arraignment, the Joint Civil Disturbance Task Force commander must seek the approval of the SCRAG and Combatant Commander to set up a temporary detention facility.

Should the Task Force be required to operate a detention facility, the detention facility standards and operations should conform, to the maximum extent possible, to current DoD confinement facility operations and will be under the professional supervision and control of Military Police personnel. The establishment and operation of military detention facilities is a temporary expedient and is authorized only until such time as the custody of detained persons can be transferred to civil authorities.

d. Riot Control Agents

Normally, for CDO the deployment and use of riot control agents is allowed as a matter of U.S. policy. However, initial approval authority for its deployment and use may be retained at a level higher than the Joint Civil Disturbance Task Force Commander and may require a specific request.

This is not the same as a state-level activation, but it is the doctrine that is crafted at the federal level these days so I think it's pretty relevant to Ferguson.

timthumb.png

The federal government hasn't taken kindly to people that expose these types of relationships. Barrett Brown's sentencing just got delayed again - but at least the Barrett Brown Review of Arts and Letters and Jail is awesome. For more info FreeBarrettBrown.org.

Local cell phone spying KingFish stonewall: Minnesota law enforcement at BCA & Hennepin County refuse to disclose SIGINT cell phone snooping capabilities from NSA contractor Harris

kingfish.jpg

It's been dawning on Americans this year that their everyday electronic devices are used by law enforcement for investigations. However the lawmen and the county attorneys are withholding the policy information about the Harris Corporation Kingfish system which is a device that can alter the electronic behavior in a cell phone, also known as a CDMA Interrogator or cell phone interceptor.

The MN Bureau of Criminal Apprehension (BCA) has declined to share any policy information about Kingfish. I have also heard that Hennepin County Sheriffs Office and their legal counsel are putting up rather high barriers to disclosing anything at all about Kingfish. The whole case is weirdly parallel to the 1978 Rockford Files episode House on Willis Avenue, which ended with this unprecedented title card:

rockford-files-willis-ave.pngWe still have "no legal right" to know about who in Minnesota is building dossiers and how. The main question: what is Hennepin County and the BCA hiding in their versions of the House on Willis Avenue?

At the Hennepin County level in the 2010 they earlier promised to come up with sensible and clear policies about if and when law enforcement uses these devices to interfere with cell phones. Now they are claiming that stuff is non-public data - which of course precludes informed public debate at the Legislature in 2014 about electronic law enforcement interference in technical devices.

Several people including Rich Neumeister are looking into this nasty Signals Intelligence (SIGINT) mess. Follow @RichNeumeister - he is helpful answering about the details on this via Twitter.

In a shocking surprise Harris Corporation is a major contractor with the National Security Agency and KingFish is part of the domestic-grade apparatus for local but still unchecked NSA-style electronic snooping. The NSA didn't seem like a big deal when KingFish was approved, but now everyone has finally started noticing the tremendous power of unchecked electronic data collection. It's a much Hotter Potato than in 2012!

See: Sept 2009: Harris Corporation and National Security Agency Announce Certification of First Tactical Radio with Type-1 Suite B Information Security

July 2012: Harris Corporation Receives National Security Agency Certification for Soldier Radio Waveform in Falcon III AN/PRC-117G Multiband Manpack Radio

April 2007: National Security Agency Certifies Harris Corporation's SecNet 54 Top-Secret Capable Secure Wireless LAN Product

September 2004: Harris Corporation Receives NSA Certification for Programmable Cryptographic Module

Wikispaces notes: PIRT - Harris Corporation etc. More Harris links at end.

rockford3.pngAnother angle here: Hundreds of thousands of dollars have gone into KingFish in Minnesota and they are not willing to share the expense information. Ars Technica reports the boxes cost $25K so where the hell is the rest of the money? Meet the machines that steal your phone’s data | Ars Technica:

The Kingfish is a surveillance transceiver that allows authorities to track and mine information from mobile phones over a targeted area. The device does not appear to enable interception of communications; instead, it can covertly gather unique identity codes and show connections between phones and numbers being dialed. It is smaller than the Stingray, black and gray in color, and can be controlled wirelessly by a conventional notebook PC using Bluetooth. You can even conceal it in a discreet-looking briefcase, according to marketing brochures.

First used: Trademark records show that a registration for the Kingfish was filed in August 2001. Its “first use anywhere” is listed in records as December 2003.

Cost: $25,349.

Agencies: Government agencies have spent about $13 million on Kingfish technology since 2006, sometimes as part of what is described in procurement documents as a “vehicular package” deal that includes a Stingray. The US Marshals Service; Secret Service; Bureau of Alcohol, Tobacco, Firearms, and Explosives; Army; Air Force; state cops in Florida; county cops in Maricopa, Arizona; and Special Operations Command have all purchased a Kingfish in recent years.

[…]The code of silence shrouding the above tools, however, is highly contentious. Their use by law enforcement agencies is in a legal gray zone, particularly because interference with communications signals is supposed to be prohibited under the federal Communications Act. In May, an Arizona court ruled that the FBI's use of a Stingray was lawful in a case involving conspiracy, wire fraud, and identity theft. But according to the American Civil Liberties Union (ACLU), when seeking authorization for the use of the Stingray tool, the feds have sometimes unlawfully withheld information from judges about the full scope of its capabilities. This means that judges across the country are potentially authorizing the use of the technology without even knowing what it actually does. [But in MN who needs judges?? LOL]

That's not all. There is another significant issue raised by the Harris spy devices: security. According to Christopher Soghoian, chief technologist at the ACLU, similar covert surveillance technology is being manufactured by a host of companies in other countries like China and Russia. He believes the US government’s “state secrecy” on the subject is putting Americans at risk.

"Our government is sitting on a security flaw that impacts every phone in the country," Soghoian says. "If we don't talk about Stingray-style tools and the flaws that they exploit, we can't defend ourselves against foreign governments and criminals using this equipment, too."

rockford-files.png

Soghoian makes an excellent point - the vulnerabilities exploited by KingFish are in some ways a major public safety threat, and the security establishment is accruing power by hiding the flaws as usual instead of forcing society to deal with the overall crappiness of today's telecom technology.

"Security by obscurity" is the dominant principle of political accountability here, and of course it is doomed to fail. Responsible disclosure of the flaws exploited by KingFish and their granular legal circumstances are what we need, not moar domestic SIGINT fog and mystification.

All of these cell phone attack avenues should be known because similar tech to KingFish would be more widely available soon. The disruption under the federal Communications Act is also relevant.

Some time back I pointed out the problems with MN statutes about these kind of cell interceptor technology at a Senate committee and former Sen. Mee Moua suggested that if I wanted to go fishing for KingFish I might need to find some alternate way. At least these days more people care about this stuff!! [It should be recalled Moua - a Hmong war refugee - was hounded by law enforcement at the tail end of her service. See MPR clip below]

/////

Earlier: March 3 2010: Sheriff Stanek landing Fed cash for KingFish military cellphone tracker in Hennepin County; National Guard intelligence analysts fuse to metro police departments; Lobby for warrantless wiretaps in St. Paul | Twin Cities Indymedia -- March 15 2010: Surprise bill for interstate fusion center data sharing pops up Tuesday; Specs found for Harris StingRay & KingFish cellphone tracking devices | Twin Cities Indymedia

via Rich Neumeister: Open Secrets: An indefensible and odious practice with (Foia-Data Practice) data requests (Oct 15th)

////

Office of the Commissioner

445 Minnesota Street - Suite 1000 - Saint Paul, Minnesota 55101

Phone: 651.201.7160 - Fax: 651.297.5728 - TTY: 651.282.6555

Website: dps.mn.gov

October 3, 2013

Rich Neumeister VIA Electronic Mail

Re: Cell Phone Tracking Data Request

Dear Mr. Neumeister:

Thank you for your data request. You ask "to inspect and review all government data about the cell phone location tool known as the (Kingfish) including, but not limited to, such items as protocols, procedures, legal thresholds, Attorney opinions, evaluations, correspondence, and results of use."

The BCA does possess cellular exploitation equipment; however, we cannot provide details about the equipment because it would compromise ongoing and future criminal investigations including AMBER Alerts, kidnapping cases, fugitive searches and homicides.

In addition, any disclosure regarding the manufacturer, model, capabilities, functionality or other specifics about the equipment could be used by criminals and fugitives to defeat the technology and render the system useless.

As a result, any data regarding this equipment is confidential or protected non-public under Statutes 13.82 Subd. 25 and 13.37 Subd. l (a).

Portions of the data are also trade secret data not subject to dissemination. The contracting company has taken efforts to protect the data from disclosure. As you are aware, a corporation supplying trade secret data to a government entity may claim portions are trade secret. The contractor in this case has appropriately made such a claim as it relates to portions of the data, pursuant to Minn. Statute 13.37 Subd. 1(b).

Again, thank you for your data request. Should you care to discuss it further please contact me.

Sincerely,

E. Joseph Newton

General Counsel

/////

Lol "any disclosure regarding the manufacturer, model, capabilities, functionality or other specifics about the equipment could be used by criminals and fugitives to defeat the technology" - so they are counting on ignorance to succeed in controlling society. A perfectly sound way to invest public Debt-Dollars, counting on perpetual confusion over some metal box's legal & technical specifications. Perhaps this kind of clever spending theory contributed to the federal government shut down - it's not like millions haven't vanished on deficient & wasteful Homeland Security gear :-/

Well then let us take a look at MN Statutes 13.82 Subdivision 25. 13.82, 2013 Minnesota Statutes

"Subd. 25.Deliberative processes. Data that reflect deliberative processes or investigative techniques of law enforcement agencies are confidential data on individuals or protected nonpublic data; provided that information, reports, or memoranda that have been adopted as the final opinion or justification for a decision of a law enforcement agency are public data."

Justification for a decision of a law enforcement agency are public data and that would really seem to include the legal memos about the process for when to fire up Kingfish to poke at cell phones.

here is the 13.37 Subdivision 1 a: 13.37, 2013 Minnesota Statutes

Subdivision 1.Definitions. As used in this section, the following terms have the meanings given them.

(a) "Security information" means government data the disclosure of which the responsible authority determines would be likely to substantially jeopardize the security of information, possessions, individuals or property against theft, tampering, improper use, attempted escape, illegal disclosure, trespass, or physical injury. "Security information" includes crime prevention block maps and lists of volunteers who participate in community crime prevention programs and their home and mailing addresses, telephone numbers, e-mail or other digital addresses, Internet communication services accounts information or similar accounts information, and global positioning system locations.

/////

It seems like this is worded to mean that the "information" would be subjected to "theft, tampering, improper use, attempted escape, illegal disclosure, trespass, or physical injury". "Defeat the technology" is not on that list, and indeed the question of who the technology has been used on remains decidedly open.

Here is Rich's list of questions which is a good starting point: What's behind the secrecy wall of Hennepin Co Sheriff and BCA?

Some of the few questions I am trying to get answered are as follows: In what situations are the cellular exploitation devices used?

Are the BCA/Hennepin Co Sheriff invading people's privacy and liberty at a low legal threshold or no threshold rather than get a search warrant?

Who oversees and approves the use of the equipment? Where is the accountability?

How many innocent people have been within sights of the Kingfish or similar device, the data collected and those subjects of the surveillance who may not even know about it,? How many arrests have happened with the use of this device?

Kip Carver, an official in the Hennepin County Sheriff's office stated to the county's commissioners three years ago that the cellular exploitation device may be used hundreds of times a year.

How frequently are the cellular exploitation devices used and the number of subjects?

Depending if the cops are using a low threshold or none at all in using this device are they doing so to avoid an appearance before a judge where a search warrant (top standard to protect our privacy & liberty) needs to be issued and where questions can be asked?

What is the role of the prosecutors in situations when this equipment is used?

In my data request I asked for the legal thresholds that the agencies must go by in order to use the Kingfish? What is so secret about that?

At this time, the attitude that both agencies have taken with my data requests give the Minnesota Legislature and most important the public no idea how this tool has been used, is being used, how an individual or individuals get chosen to be pursued, and who is accountable.

As some people may currently know I have been working to possibly update our state laws so that the rule of law applies to whats happening now in 2013 not in 1988-1989 when 626A had its last major update.

Even though the Department of Public Safety and the Hennepin County Sheriff do not want to tell me or the public their protocols, policies, procedures of accountability, legal thresholds, and other appropriate public data I will still push on and I hope others will. I am not interested to live in a state where law enforcement rules and not the people.

/////

Story from Feb 9 2010 Star Tribune. You Can LOL about how Kip Carver claims that the device would only track cell phone numbers obtained through a search warrant: via Sheriff Stanek landing Fed cash for KingFish military cellphone tracker in Hennepin County; National Guard intelligence analysts fuse to metro police departments; Lobby for warrantless wiretaps in St. Paul | Twin Cities Indymedia | Movement Media for Minneapolis-St. Paul

The Minnesota Bureau of Criminal Apprehension in St. Paul has a KingFish device and makes it available to local agencies, said Jill Oliveira, a BCA spokeswoman. Only a few people know how to use it because the training is expensive, she said.

Stanek couldn't be reached for comment Tuesday. Kip Carver, a Sheriff's Office inspector who heads the investigations bureau, told commissioners that the device would track only cell phone numbers obtained through a search warrant, and couldn't be used without a court order.

The KingFish can't eavesdrop on phone conversations, Carver said. Instead, it locates cell phones that might be in the possession of an abduction victim, he said, or a robber making a getaway.

"I truly believe [we] would be very busy using that," Carver said. Asked how many times a year the device might be used, he said it could be in the hundreds.

Commissioner Jan Callison agreed to table the request to get more information, but added she was not as troubled by the device as some of her colleagues. "It seems to me that there are certainly ways to make sure this technology is deployed legally. ... It's really the sort of law enforcement that we want," she said.

/////

rockford-files2.pngHere is something handy, a contract surely similar to the ones being currently hoarded by BCA and Hennepin County Sheriffs Office, a 2012 Harris Government Communications Systems Division June 25 2012 from the city of Tempe Arizona: Harris Corporation Wireless Surveillance Products Standard Terms and Conditions of Sale | Public Intelligence - 11 pages.

Harris Corporation’s “StingRay” Used by FBI for Warrantless Mobile Phone Tracking

Harris Corporation AmberJack, StingRay, StingRay II, KingFish Wireless Surveillance Products Price List. Thanks to PublicIntelligence.net as always for stacking the key infos nicely!

/////

December 2008: Harris Corporation Receives National Security Agency Certification for Type 1 Ethernet Module for SecNet 54

June 2013: Harris Corporation Receives NSA Type 1 Certification for Cryptographic Component of Anti-Scintillation/Anti-Jam Modem

July 2011: Harris Corporation's Small Secure Data Link Receives National Security Agency Certification - aka drone radios

January 2008: Harris Corporation Receives National Security Agency Certification for Falcon III Multiband Manpack Radio

Photo source: Ars Technica: Meet the machines that steal your phone’s data | Ars Technica

/////

Sen Mee Moua hounded by law enforcement: Mee Moua leaves state Senate, legacy | Minnesota Public Radio News - Laura Yuen June 29 2010

Yet Moua made waves with some law-enforcement officials this year when she proposed legislation that would ban police departments from sharing secret files on gang members and activities. Moua said she had concerns about racial profiling, especially of young African-Americans who she says could be entered into the database simply for being photographed with a known gang member. The proposal came after a series of scandals involving the now-defunct Metro Gang Strike Force.

"So she saw abuse in law enforcement, and I think that's why she wrote the bills she did," Limmer said. "Was it an overreach? Hmm. Some people might say so, but you could understand where she was coming from."

Some law-enforcement officials, though, painted Moua as a gang sympathizer. And Ramsey County Sheriff Bob Fletcher said at the time that Moua was overreacting to isolated problems with the strike force.

"I think that overreaction has caused her to introduce reckless legislation that will jeopardize the safety of citizens, officers and case prosecutions," Fletcher said.

Moua said she was taken aback by the reaction from law enforcement.

"They wanted to make this about cops vs. dangerous criminals," she said. "But the actuality is it's about cops vs. people in the community who haven't done anything [wrong] and who were being profiled in these databases."

Chaska Police Chief Scott Knight said Moua has been known to question police practices -- which may have irked some law enforcement officials.

"While sometimes some of my peers had some frustrations, I thought she was very healthy for the global approach to law enforcement, and the balance with community and citizens' rights and fairness," Knight said.

/////

To paraphrase Rockford Files Jim says: "You can stomp someone into the ground using computer technology as a club"… Evil CEO guy: "To my knowledge none of this is illegal." Jim: "It should be!" The House on Willis Avenue is easily the most applicable episode to this scenario, with its combination of unregulated electronic spying and shady local government operations:

See also: Rockford files data surveillance didactic ending — Critical Commons

/////

Finally I would add there are several candidates for Pirate Party in Minneapolis in November - if you want to send the signal that these issues matter, consider voting for them. The two parties are almost certainly not going to help you and the other minor parties are all over the map.

Bezos "saves" Washington Post as Feinstein et al plan to obliterate indy journalism w new shield law; Plus: Linkdump on ancient site, HAARP, UFOs & lulz!

The root of the latest story: Sen. Feinstein During 'Shield' Law Debate: 'Real' Journalists Draw Salaries | Techdirt - Aug 8 2013

EFF: Why Sen. Feinstein Is Wrong About Who’s a “Real Reporter” | Electronic Frontier Foundation - Aug 9 2013

Great summary of the issue: Media Lens - All Journalism Is 'Advocacy Journalism'. Covers how being happy about Bezos is its own form of chummy advocacy journalism. Also Matt Taibbi: Hey, MSM: All Journalism is Advocacy Journalism | Matt Taibbi | Rolling Stone June 27 2013.

The Fear of moar Greenwalds and Snowdens runs deep with the Establishment this year. i.e. Hey, Washington Post: Print that forbidden NSA interview! - Salon.com

Feinstein is catching the heat on this, the GOP is right there too but for the moment its mostly snarky Republicans pouncing on the story. She already has been clear she hates journalists with her handling of Wikileaks etc - tons of summer 2012 stories on this. But the new round is just as bad. Check it:

The American Spectator : Sen. Feinstein Threatens Press Freedom - new

Feinstein wants to limit who can be a journalist « Watchdog.org - These guys kinda do rightwing hatchet jobs but they have points here. Aug 12 2013. There is a

Dianne Feinstein targets press freedom - Salon.com Jul 2 2012. Glenn Greenwald! (also)

Feinstein: Assange is not a journalist - Los Angeles Times July 9 2012

Sen. Feinstein Pushes Restrictive "Journalist" Definition Under Shield Law - Reason 24/7 : Reason.com - Aug 13 2013

Federal Media Shield Law Should Extend to Unpaid Bloggers and Citizen Journalists | Larry Atkins - Aug 13 2013. Schumer says Wikileaks gets targeted like it should:

SEN SCHUMER: "The world has changed. We're very careful in this bill to distinguish journalists from those who shouldn't be protected, WikiLeaks and all those, and we've ensured that. But there are people who write and do real journalism, in different ways than we're used to. They should not be excluded from this bill."

Senator Feinstein Is Misguided In Her Attempt To Narrowly Define A Journalist :: Fox&Hounds - Aug 16 2013

Dianne Feinstein backs Media Shield Law to protect only ‘real reporters’ - The Global Dispatch - Aug 11 2013

» Feinstein: You’re Not a Real Journalist Unless You Draw a Salary Alex Jones' Infowars: There's a war on for your mind! - Aug 9 2013 - BAN INFOWARS they don't count as journalists!

For fack's sake - these days usually I do journalism for free -- in part because believe it or not the big organizations in the Twin Cities HARDLY EVER POST THE DAMN PDF FILES & PRIMARY SOURCES OF THE STUFF THEY REPORT ON. DANG IT!!

So many of the best journalists I know are anything but salaried - the radical publishers like Wikileaks and Cryptome.org, the livestreamers out there getting teargassed etc. In other words people connected to the real narratives of our time - and publishing about it. And so our responsible political figures are getting ready to nuke the whole concept of journalism because the full-timers with salary - the what, quarter of them that still exist compared to 20 years ago - are the only "real journalists." Bug off - journalism is publishing. It's research and God forbid sometimes it's also advocacy.

/////

Honestly this is my favorite headline all week and really highlights the interesting verb "govern" : Kerry Says Internet "Makes it Much Harder to Govern" and "Organize" People - | Intellihub.com via:

John Kerry: 'This Little Thing Called the Internet ... Makes It Much Harder to Govern' | CNS News

"Well, folks," he said, "ever since the end of the Cold War, forces have been unleashed that were tamped down for centuries by dictators, and that was complicated further by this little thing called the internet and the ability of people everywhere to communicate instantaneously and to have more information coming at them in one day than most people can process in months or a year.

"It makes it much harder to govern, makes it much harder to organize people, much harder to find the common interest," said Kerry, "and that is complicated by a rise of sectarianism and religious extremism that is prepared to employ violent means to impose on other people a way of thinking and a way of living that is completely contrary to everything the United States of America has ever stood for. So we need to keep in mind what our goals are and how complicated this world is that we’re operating in."

- See more at: http://www.cnsnews.com/news/article/john-kerry-little-thing-called-inter...

/////

For the Unofficial or OutLaw Journalists - those outside the Bezos Funded Bubble/Shield Law of Feinstein: I want to add Security in a Box - this is some stuff that can include necessary security for journalists as governments increasingly turn to surveillance to whack the civil service into compliance with the whims of political hacks... About Security in-a-box | Security In A Box and Quick Guide to Alternatives

Also neat: Hacktivists Want to Free the Net by Building a New One From Scratch | Motherboard

WTF: Sigurdur Thordarson: Icelandic WikiLeaks volunteer turned FBI informant. - Slate Magazine (aug 9)

These damn Lenco Bearcats are all over the counrty and always put on display in Minneapolis now: www.lencoarmor.com

/////

FEDERAL GOVERNMENT PERPETUAL EMERGENCY! One level of bureaucratic arcana I find interesting is the long running "perpetual national emergency" of the federal government that seemingly has been going since the "deeply weird" credit reorganization and specifically March 9th 1933. Just bumped into the 1973 Congressional report about finally terminating that national emergency, which of course never happens and nowadays Pres. Obama re-issues the emergency once a year with vague references to wars and things. 1973 doc here - rarely does the third paragraph of anything from Congress speak frankly about martial law! https://www.dropbox.com/s/jp0gow6krzhdvtb/Senate-Report-93-549.pdf

/////

FED GOV CONPLAN 3501 DSCA: Here is the latest from July 2013 public version of US Defense Support of Civil Authorities. Just posted by PublicIntelligence.net: Joint Publication 3-28 Defense Support of Civil Authorities July 2013 | Public Intelligence. You definitely need to know about this to understand CONPLAN 3502 Civil Disturbance Operations which is the off-the-shelf modern martial law-style concept of operations plan for domestic crackdowns. Follow PI on Fedbook.

/////

Just creepy: Defense Science Board Report: Unconventional Operational Concepts and the Homeland | Public Intelligence. Go away you people.

/////

I don't really buy the idea that the Obama administration blew up that Texas fertilizer plant but there is some odd new Executive Order involving fertilizers that I'm sure will work out in Monsanto' interest anyway... Obama Signs Executive Order Signifying Previous Texas Plant Fertilizer Explosion Might Have Been Orchestrated - | Intellihub.com. The real EO is here: http://www.whitehouse.gov/the-press-office/2013/08/01/executive-order-improving-chemical-facility-safety-and-security

/////

Solar tariff mess in Spain: Spaniards rebel against solar panel levy | Reuters. Check this insanity out:

Spaniards who have generated power independently for their own homes under a system known as "autoconsumo" are among the hardest hit by policies which they say punish, rather than encourage, energy efficiency.

Industry Minister Jose Manuel Soria accepts the measures are painful but says they are needed to plug the energy deficit.

"I support 'autoconsumo' ... but the power system has infrastructure, grids that the rest of us Spaniards who are in the system have to pay for. And we pay for it through our electricity bill," said Soria.

That is a pretty classic example of "why civilization is doomed, or at least feels that way" amirite??

/////

Misc items today:

best misc headline: NRL Scientists Produce Densest Artificial Ionospheric Plasma Clouds Using HAARP - U.S. Naval Research Laboratory - http://www.nrl.navy.mil/media/news-releases/2013/nrl-scientists-produce-... NRL Scientists Produce Densest Artificial Ionospheric Plasma Clouds Using HAARP - yes weather is experimented upon as a surface for tactics in the HAARP array. Any questions you skeptics? :D

Coinbase now lets you send, buy or sell Bitcoin via SMS - The Next Web

CIA crushes UFO conspiracy theorists’ hopes and dreams with Area 51 documents | The Raw Story - Aug 16

Christie gives conditional OK to broader medicinal marijuana use - NBC Politics - Aug 16

World's oldest temple built to worship the dog star - space - 16 August 2013 - New Scientist - that headline not hedged enough of course - Aug 16. Awesome!

This solar flare thing was a joke!! Dammit Fetzer come on man: Edward Snowden: Solar-Flare ‘Killshot’ Cataclysm Imminent | Veterans Today

On the other hand this General James Mattis took a swipe at Israeli settlement as apartheid: Top American General Cites Israel as Unsustainable and Apartheid | Veterans Today

Israeli security contractor Magal lurking all over the place into who knows what: http://www.fromthetrenchesworldreport.com/israeli-firm-magal-helping-to-provide-security-at-us-prisons/49331#more-49331

Cool LA gallery opening: Fear and Loathing in Los Angeles | Totally Gonzo - The Hunter S. Thompson and Gonzo Journalism Community

Lol this guy: Orson Scott Card Worries About Obama Turning "Urban Gangs" Into His Personal Police Force

Guillermo del Toro's sketches reveal his At the Mountains of Madness LOVECRAFT!

This internet ISP guy Nicholas Merrill another one who has had long nights after being forcibly turned by the NSA into a honeypot I think : http://www.democracynow.org/2013/8/13/former_internet_provider_gagged_by_national

This is phenomenal and interactive: http://www.mindmeister.com/308518551/the-national-security-agency-operates-more-than-500-separate-signals-intelligence-platforms-employs-roughly-30-000-civilians-and-military-budget-10-billion - full story: What the NSA’s Massive Org Chart (Probably) Looks Like - Defense One

THE KLAN WOW: http://www.slate.com/blogs/behold/2013/08/13/anthony_s_karen_a_photojournalist_s_unrestricted_access_to_the_ku_klux_klan.html - see also links between KKK and Freemasonry - in these pics you see traces of similar thinking. The Scottish Rite and KKK - with all the ritualism both also reminds me a little of the Muslim Brotherhood as well - a complex subject not really well written about by anyone I've yet seen?

Hm: Socialists And Libertarians Have More In Common Than They'd Like To Think

The Bearcat thing in NH: Police State Too Much? Send in a Marine! - YouTube

Chinese Hacking Team Caught Taking Over Decoy Water Plant | MIT Technology Review !!

Good guy Einstein: Einstein's Circle of Compassion | Brainwash Update - YouTube - Congrats to Abby Martin for a totally decent show.

Backstories & Backbones; Security of US Emergency Alert System (EAS) is crap & spoof zombie apocalypses not very difficult apparently; #OpNSA NSA PRISM tunnel servers may be getting noticed; Joe Naccio & NSA revisited

Oh For Facks Sake. All this big government/police state techno-crap is so often easily hacked in some way, which means the Awesome Emergency Powers of Teh Govmints are easily subverted by the Baba Booey fans of the world, or zombie apocalypses as the case may be. Indeed quite possibly all this NSA crap is starting to get hacked (and not just by activists but cynical commercial weasels) and since it's all backdoored to everything and everyone's mom, everyone gets screwed. Well played. Truth tellers keep publishing before it's too late :/

Much of this is old news but why not batch some of it in one place?

On the newer lulz front at least some people are claiming to poke around including determining which servers run in-between points for PRISM mass surveillance for the NSA. And I don't know anything about these IOActive guys who posted on the EAS hack but they seem worth keeping an eye on….

Before the EAS info, here is a good place to look at alternative, well polished and much open source apps : https://prism-break.org/ - bookmark this and use it when setting up any new computer :)

Emergency Alert System Fail: Also covered in ars technica. See this video's crazy audio message for hacked Montana Emergency Alert System clip from this February: http://gawker.com/5983516/montana-tv-stations-emergency-alert-system-hac...

So more or less a main contractor mailed out the damn master login keys to their products controlling the national Emergency Alert System, exactly the opposite of what you're supposed to do.

Clearly in the event of some adverse network screwing with things, it will probably be a mess. Let's say a Jimmy Carter tries to cut off SAIC and Blackwater, triggering an epic new Iran Contra type Ollie North conspiracy scene -- all these dumb horrible systems like the EAS DASDEC will behave horribly.

/////

http://www.ioactive.com/news-events/ioactive_uncovers_vulnerabilities_in...

Press contact:
Craig Brophy
Global PR Manager, IOActive, Inc.
E: PR@ioactive.com
T: +1 206 462 2291

Press Release

IOActive Uncovers Vulnerabilities in United States Emergency Alerting System

Digital Alerting Systems DASDEC application servers found to be vulnerable to remote attack

Seattle, WA July 8, 2013IOActive, Inc., a leading provider of application security, compliance and smart grid security services, today announced that is has discovered vulnerabilities in the Emergency Alerting System (EAS) which is widely used by TV and radio stations across the United States.

IOActive's principal research scientist, Mike Davis, uncovered the vulnerabilities in the digital alerting systems - DASDEC - application servers. The DASDEC receives and authenticates EAS messages. Once a station receives and authenticates the message, the DASDEC interrupts the broadcast and overlays the message onto the broadcast with the alert tone containing some information about the event. The affected devices are the DASDEC-I and DASDEC-II appliances.

“Earlier this year we were shown an example of an intrusion on the EAS when the Montana Television Network's regular programming was interrupted by news of a zombie apocalypse. Although there was no zombie apocalypse, it did highlight just how vulnerable the system is,” said Mike Davis, principal research scientist for IOActive. “These DASDEC application servers are currently shipped with their root privileged SSH key as part of the firmware update package. This key allows an attacker to remotely log on in over the Internet and can manipulate any system function. For example, they could disrupt a station's ability to transmit and could disseminate false emergency information. For any of these issues to be resolved, we believe that re-engineering needs to be done on the digital alerting system side and firmware updates to be pushed to all appliances.”

The EAS is designed to enable to the President of the United States to speak to US citizens within 10-minutes of a disaster occurring. In the past these alerts were passed from station to station using the Associate Press (AP) or United Press International (UPI) “wire services” which connected to television and radio stations around the US. Whenever the station received an authenticated Emergency Action Notification (EAN), the station would disrupt its current broadcast to deliver the message to the public. On Wednesday 26 June, the Cyber Emergency Response Team (CERT) published an advisory providing details of the vulnerability.

IOActive has also issued its own IOActive Labs Advisory outlining the affected products, the impact and the solution.

About IOActive
Established in 1998, IOActive is an industry leader that offers comprehensive computer security services with specialisations in smart grid technologies, software assurance, and compliance. Boasting a well-rounded and diverse clientele, IOActive works with a majority of Global 500 companies including power and utility, hardware, retail, financial, media, aerospace, healthcare, high-tech, and software development organizations. As a home for highly skilled and experienced professionals, IOActive attracts talented consultants who contribute to the growing body of security knowledge by speaking at such elite conferences as Black Hat, Ruxcon, Defcon, BlueHat, CanSec, and WhatTheHack. For more information, visit www.ioactive.com.

////////////

http://ics-cert.us-cert.gov/advisories/ICSA-13-184-02

Advisory (ICSA-13-184-02)

Monroe Electronics DASDEC Compromised Root SSH Key

Original release date: July 03, 2013

OVERVIEW

This advisory provides mitigation details for a vulnerability that impacts the Monroe Electronics DASDEC.

Mike Davis, a researcher with IOActive, reported a compromised root SSH key vulnerability to CERT Coordination Center (CERT/CC). This vulnerability is in Monroe Electronics DASDEC‑I and DASDEC-II appliances. ICS-CERT coordinated with CERT/CC and Monroe Electronics to resolve the vulnerability. Monroe Electronics has produced an update that mitigates this vulnerability.

This vulnerability could be exploited remotely.

AFFECTED PRODUCTS

The following Monroe Electronics products are affected:

  • DASDEC-I
  • DASDEC-II

IMPACT

An attacker who exploits this vulnerability could gain root access to the device and affect the availability, integrity, and confidentiality of the system.

Impact to individual organizations depends on many factors that are unique to each organization. ICS‑CERT recommends that organizations evaluate the impact of this vulnerability based on their operational environment, architecture, and product implementation.

BACKGROUND

Monroe Electronics is a US-based company that maintains offices and research facilities in Lyndonville, New York. Monroe Electronics develops and distributes worldwide electrostatic measuring instruments including electrostatic voltmeters, electrostatic field meters, coulomb meters, and resistivity meters.

The affected products, DASDEC-I and DASDEC-II are emergency alert system (EAS) encoder/decoder (endec) devices that are used to broadcast EAS messages over digital and analog channels. According to Monroe Electronics, DASDEC-I and DASDEC-II are deployed across broadcast radio and television in the communication sector. Monroe Electronics estimates that these products are used primarily in the United States.

VULNERABILITY CHARACTERIZATION

VULNERABILITY OVERVIEW

COMPROMISED ROOT SSH KEYhttp://cwe.mitre.org/data/definitions/321.html, Web site last accessed July 03, 2013." href="http://ics-cert.us-cert.gov/advisories/ICSA-13-184-02#footnotea_ixegenr" name="footnoterefa_ixegenr">a

DASDEC-I and DASDEC-II had publicly available firmware images for these devices that included a private SSH key that authorizes remote logins to the devices. For software versions prior to 2.0-2, where the default SSH keys have not already been changed, an attacker can then log into a device with root privileges.

CVE-2013-0137http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2013-0137, Web site last accessed July 03, 2013." href="http://ics-cert.us-cert.gov/advisories/ICSA-13-184-02#footnoteb_ya73jua" name="footnoterefb_ya73jua">b has been assigned to this vulnerability. A CVSS v2 base score of 10.0 has been assigned; the CVSS vector string is (AV:N/AC:L/Au:N/C:C/I:C/A:C).http://nvd.nist.gov/cvss.cfm?version=2&vector=AV:N/AC:L/Au:N/C:C/I:C/A:C, Web site last accessed July 03, 2013." href="http://ics-cert.us-cert.gov/advisories/ICSA-13-184-02#footnotec_6n5eegx" name="footnoterefc_6n5eegx">c

VULNERABILITY DETAILS

EXPLOITABILITY

This vulnerability could be exploited remotely.

EXISTENCE OF EXPLOIT

No known public exploits specifically target this vulnerability.

DIFFICULTY

An attacker with a moderate skill level could exploit this vulnerability.

MITIGATION

Monroe Electronics has produced a software update, Version 2.0-2 that resolves this vulnerability. DASDEC users can obtain the DASDEC v2.0-2 software update and release notes by contacting support@digitalalertsystems.com.

ICS‑CERT encourages asset owners to take additional defensive measures to protect against this and other cybersecurity risks.

  • Minimize network exposure for all control system devices. Critical devices should not directly face the Internet.
  • Locate control system networks and remote devices behind firewalls, and isolate them from the business network.
  • When remote access is required, use secure methods, such as Virtual Private Networks (VPNs), recognizing that VPN is only as secure as the connected devices.

ICS-CERT also provides a section for control systems security recommended practices on the ICS-CERT Web page. Several recommended practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.http://ics-cert.us-cert.gov/content/recommended-practices, Web site last accessed July 03, 2013." href="http://ics-cert.us-cert.gov/advisories/ICSA-13-184-02#footnoted_t8orqgw" name="footnoterefd_t8orqgw">d ICS‑CERT reminds organizations to perform proper impact analysis and risk assessment prior to taking defensive measures.

Additional mitigation guidance and recommended practices are publicly available in the ICS‑CERT Technical Information Paper, ICS-TIP-12-146-01B—Targeted Cyber Intrusion Detection and Mitigation Strategies,http://ics-cert.us-cert.gov/tips/ICS-TIP-12-146-01B, Web site last accessed July 03, 2013." href="http://ics-cert.us-cert.gov/advisories/ICSA-13-184-02#footnotee_wn76bab" name="footnoterefe_wn76bab">e that is available for download from the ICS-CERT Web page (http://ics-cert.us-cert.gov/).

Organizations observing any suspected malicious activity should follow their established internal procedures and report their findings to ICS‑CERT for tracking and correlation against other incidents.

///////////

http://www.kb.cert.org/vuls/id/662676

Vulnerability Note VU#662676

Digital Alert Systems DASDEC and Monroe Electronics R189 One-Net firmware exposes private root SSH key

Original Release date: 26 Jun 2013 | Last revised: 02 Jul 2013

Overview

Digital Alert Systems DASDEC and Monroe Electronics One-Net E189 Emergency Alert System (EAS) devices exposed a shared private root SSH key in publicly available firmware images. An attacker with SSH access to a device could use the key to log in with root privileges.

Description

The Digital Alert Systems DASDEC-I and DASDEC-II and Monroe Electronics R189 One-Net/R189SE One-NetSE are Linux-based EAS encoder/decoder (ENDEC) devices that are used to broadcast EAS messages over digital and analog channels. IOActive has reported several security issues affecting these devices. The most severe of these issues is the public disclosure of the default private root SSH key. The less severe issues could also contribute to an attacker's ability to compromise a vulnerable device.

Compromised root SSH key (CVE-2013-0137)
Publicly available firmware images for these devices included a private root SSH key that was authorized to log in to the devices (CWE-798, CWE-321). The fingerprint for the compromised SSH key is 0c:89:49:f7:62:d2:98:f0:27:75:ad:e9:72:2c:68:c3. Although this key is not hard-coded, it may be impractical for less technical users to manually disable or change they key prior to firmware version 2.0-2.

Predictable session ID
IOActive reports that the administrative web server uses a predictable, monotonically increasing session ID. This finding is based on running the web server in a test environment. Testing on a variety of firmware versions on devices both at the factory and in the field, Monroe Electronics could not reproduce this finding.

Log information disclosure
Logs available via the web server provide a variety of information about the configuration, operation, and status of the device (CWE-532). Some of the log information is public and may be required by regulation.

Predictable password generation
The dasdec_mkuser script generates passwords in a deterministic way (CWE-341), however these passwords are not for administrative access, and the script is not used for general user account configuration.

Default password
Like many similar devices, the DASDEC and One-Net ENDECs use default administrative credentials. Some sites fail to change the default administrative password and allow unrestricted internet access.

Impact

An attacker with the private key and SSH access can log in to a device with root privileges.

Predictable session IDs could allow an attacker to take control of an existing administrative web session.

Predictable and unchanged default passwords can allow an attacker to log in to a device with root privileges. Devices exposed to the internet are at particularly high risk, for example, see Secure EAS Codecs Prevent Zombie Attacks and US-CERT Alert TA13-175A.

Logs may disclose configuration information that can benefit an attacker.

Solution

Apply an update

On April 24, 2013, Monroe Electronics and Digital Alert Systems released firmware version 2.0-2 that disables the compromised SSH key, provides a simplified user option to install new unique keys, and enforces a new password policy. Monroe Electronics has taken considerable effort to provide update information to DASDEC and One-NetSE users.

DASDEC users can obtain updated firmware and release notes by contacting <support@digitalalertsystems.com>. R189 One-Net users can contact <eas@monroe-electronics.com>.

Disable compromised SSH key

The compromised root SSH key should be disabled immediately, especially if the SSH service is exposed to untrusted networks such as the internet. If SSH connectivity is required, generate, install, and test new SSH keys before disabling the compromised key. The fingerprint for the compromised SSH key is 0c:89:49:f7:62:d2:98:f0:27:75:ad:e9:72:2c:68:c3.

Manually inspect SSH keys

To identify a compromised key, examine the authorized_keys file at /root/.ssh/authorized_keys2.dasdec and use the ssh-keygen command to show SSH key fingerprints. The following example shows the fingerprint for the compromised key:

$ ssh-keygen -l -f authorized_keys2.dasdec
1024 0c:89:49:f7:62:d2:98:f0:27:75:ad:e9:72:2c:68:c3 wood@endec1 (DSA)

Note that ssh-keygen only shows the fingerprint for the first key/line in the file. If authorized_keys2.dasdec contains multiple keys (multiple lines, one key per line), it will be necessary to extract each key (line) to a separate file and run the ssh-keygen command on each key/file. These shell scripts can be used to list and test multiple SSH keys in an authorized_keys file:

To generate new SSH keys, use ssh-kegen.

Restrict access

If for some reason you are not able to remove and replace the compromised SSH key, restrict access to the SSH service to highly trusted hosts and networks only. As a general good security practice, restrict access to all services to trusted hosts and networks.

Change default passwords

Change any default passwords, and do not deploy production systems without changing default passwords. Search engines like Shodan can index systems exposed to the internet and default passwords are usually documented and well-known. It is often trivial for an attacker to identify and access systems on the internet using default passwords.

/////

#OpNSA: Some infos has been coming out about possible probing into the NSA PRISM system. Here are copies of some pastebins about all this. Start here: https://twitter.com/Op_NSA . It is indeed branded Anonymous and they said that two anons got searched over the weekend. What's cooking? Will the now-more-infamous NSA Q Group catch these cats?

#OpNSA claiming to have doxed some NSA officials and posting their phone numbers on interwebs. Something big may be taking off here -- if it turns out to be a honeypot there still better be lulz!

statement here:

Twitter: http://www.twitter.com/op_nsa

IRC: https://webchat.anonops.com/?channels…

Transcript below:

Greetings Citizens of the World, we are Anonymous. It is understood that the recent exposé of the national security agency has angered you. Anger caused by the realization that your own elected representatives promised to vote for your best interests but changed their minds when the price was right, in favor of increased surveillance on your normal everyday life. You hate them for voting your freedom and privacy away, and you have every right to. There are those that say you have nothing to fear if you have nothing to hide, but these are the same people who won’t tell you any of their own personal information upon your request. Complacent cowards like these have made it easier for this enormous surveillance operation to come to fruition. Eventually enough legislation will pass in favor of the evolving police state that will make every citizen a potential terrorist by default, and the NSA is at the core of it all. But you wonder to yourself, what can be done about all of this injustice and corruption? The answer is simple. Raise your voice so loud that no one can ignore it. Create such an overwhelming public outcry that the government and the media will be forced to acknowledge the issue. We need to show those directly responsible for all of this that there will be consequences for betraying us, and it will be the last time they do. In accordance with this we will be initiating stage two of operation national security agency and releasing the personal information of one politician each week that slandered Edward Snowden as a criminal and was involved with supporting the NSA and PRISM. We will make visible to everyone the depth of their violations against our freedom, privacy and well-being. We will expose the precise amount of money it took for them to turn their backs on us and we will show them how it feels to have their privacy abused and their personal information mined, collected and analyzed. But we won’t stop there. Since this affects not just Americans but everyone around the world, it is only right that we give this information as much exposure as possible. Spam the emails of your local representatives voicing your opposition to these surveillance measures along with president obama. Spread flyers regarding the NSA’s data mining and organize protests to inform the public. We will all need to work together in spreading this information as far and wide as we can so that the world is fully aware of what has been orchestrated at their expense. We are all in this together and have an obligation to awaken the masses to see how their rights are being stripped away one by one leaving themselves, their friends, their family and their children vulnerable to government manipulation and control. This will spark an awakening that cannot be stopped.

We are Anonymous.
We are Legion.
We do not forgive.
We do not forget.
Expect us.

This one is interesting, I don't know why anyone would trust any VPN in particular tho :/

/////

http://pastebin.com/BzN9aUkq By: luminary on Jun 29th, 2013 | OpNSA VPN services.

Want to defeat PRISM?

Do you like the idea of free internet usage?

Well here is a list of Virtual Private Network providers recommended by Anonymous.

These services claim explicitly in their Terms of Service that they don't keep connection

logs on their customers, though it's always best to do some SERIOUS digging into a company's

history before you commit your freedom.

If you don't plan on doing anything illegal and you're merely trying to avoid snoopers

or circumvent censorship, free VPNs will likely suffice, but if you're going for a more

shady flavor of activism, don't leave home without these.

All of these accept Bitcoin, so that's a very helpful attribute. Bitcoin is a highly secure

payment method used if you don't want people to know who you are when you buy things over the internet.

BTGuard VPN

Private Internet Access VPN

Air VPN

PRQ VPN

Mullvad VPN

///////

http://pastebin.com/TpGTHDSy By: luminary on Jul 7th, 2013 | syntax: None | size: 2.45 KB | hits: 2,365 | expires: Never

PRETENTIOUS MINIATURE PRESS RELEASE:

Greetings, National "Security" Agency -- and our followers whom we love so much:

This may look like a small release, but it's actually huge. See, we hacked the NSA yet again because we just love doing that. These are DNS tunnels that are sending encrypted data to and from the PRISM databases. We have the IP's of those servers. If you crash these servers with DDoS, you literally render PRISM "broken". We are also planning to release some of that data (which we have access to) if we can decrypt it. So anyway. Hit these -- you hit PRISM. And die in the Matrix, you die in real life, etc etc.

SLIGHTLY TECHNICAL INFORMATION THAT MEANS NOTHING TO A LOT OF PEOPLE:

ns3-194.akamaiedge.net 56923 IN A 23.61.199.194

lar7.akamaiedge.net 64613 IN A 222.122.64.131

la11.akamaiedge.net 90000 IN A 213.254.238.131

lac1.akamaiedge.net 90000 IN A 193.108.88.1

la6.akamaiedge.net 70352 IN A 96.7.50.192

ns6-194.akamaiedge.net 90000 IN A 95.100.168.194

ns7-194.akamaiedge.net 90000 IN A 96.7.49.194

lar2.akamaiedge.net 84886 IN A 2.16.40.192

la1.akamaiedge.net 53942 IN A 184.26.161.192

lar6.akamaiedge.net 54809 IN A 195.59.44.137

la7.akamaiedge.net 39448 IN A 96.17.144.197

ns5-194.akamaiedge.net 35282 IN A 184.85.248.194

la3.akamaiedge.net 39672 IN A 96.7.251.131

Acquired by:

Restless

R00tsh3ll - @r00tsh3ll1 (twitter)

Intro Written and Info PASTED by:

Luminary - @aluminary (twitter)

PS:

There's TONS more information to release. We're going through some folders to see what we can and can't release before July 11th, 2013 (DDoS day). There's more to come. For those that have been asking for "proof of a hack", we're releasing some more as we go, but remember: this is the NSA. We have to be very careful about what goes public before we're done actually UTILIZING that information. For those that are understanding of this, you are the people that will receive the best information first! ^___^

//////

http://pastebin.com/X3siNZRC By: luminary on Jul 8th, 2013 | syntax: None | size: 3.64 KB | hits: 120 | expires: Never

Tor Tutorial

By: @aluminary

Greetings, faithful supporters of Anonymous and haters of PRISM. We are Anonymous, and for a moment, we're going to take time off from destroying things we don't like and teach you how to secure yourself and hide your identity while online. Naturally, this will be a benefit to you in the long run. Most people have no doubt heard of “TOR”, or “The Onion Router”. In basic terms, Tor is a routing network that sends all of your internet traffic through many different nodes all scattered about around the world. So imagine you've got a message you want to pass to a friend who's standing 100 meters from you. Whereas your standard internet traffic would be like walking over to your friend and handing him that note, Tor puts many different people between you two. So rather, in this situation, you'd hand the note to one of those people, they'd pass it to a random person, who'd pass that on, again and again until it gets to your friend. This allows the actual source of the traffic to be hidden after it comes through the exit node. Fortunately, Tor is very easy to acquire.

It can be downloaded from here: https://www.torproject.org/

For windows users, that download comes with the Tor browser bundle, which, when used, routes all of your traffic through a series of nodes as mentioned previously. Likely Linux users will know how to properly configure a client or program to use Tor, so we won't waste their time.

Once downloaded, that package will come with Vidalia Control Panel, an .exe file which acts as a sort of mothership. Once opened, a socks5 proxy server will begin running on local host. Your computer is the only computer on the network that will be able to use it unless others are also running Tor. The Tor browser will begin running on its own, so all you'll really need to do once in that browser is simply start searching away like a pro. If you want to verify your privacy because of paranoia, you can visit cmyip.com while using the Tor browser and be assured that your real IP is in fact hidden.

Tor itself is generally considered trust worthy. The thing is, even if nodes are run by undesirable parties, not only would said parties have to own that node, but they'd have to own the entire random path to... well... backtrace you. A downside of this entire thing, though, is that Tor is a high latency network. Because your traffic is being routed all around, it's also a bit slower. You will certainly notice slower internet speeds in applications using Tor (regular browsers not on the proxy won't be any slower). Then again, such a trivial matter is certainly worth the amount of protection Tor will offer you. Tor is a widely used and completely free project available at the aforementioned link.

Remember though, nobody is completely invincible. And human error can play into your traffic, or worse, your identity, being revealed. If, however, you take precautions to make sure Tor is operating and so forth, you will be fine. One more downside of Tor – that is one of the reasons a lot of us use VPN services – is that it's blocked in a lot of places. Because it's so easy and so anonymous, many websites, services, IRCs and networks will block Tor Exit Nodes to eliminate or crack down on abuse. In these cases, you'll probably need special permission to use the Tor server, as is the case with the AnonOps IRC network, which is one widely used meeting place for Anons.

Stay Anonymous. Stay safe.

Keep it up and defeat PRISM. Together, we are strong.

Together, we are Legion.

Twitter: https://twitter.com/op_nsa

IRC: webchat.anonops.com

channel: #opnsa.

^^You cannot use Tor with webchat. J/s

/////////////

Something ought to be said here ^ about the importance of other tracking links in browsers, time attacks, recent tor vulnerabilities that have come up etc. More caution and other layers are pretty surely necessary. Stuff like Ghostery to block various web tracker bugs for example.

A recent tor security example, you would need to keep javascript shut off to be safer from this, as but one example http://tedjonesweb.blogspot.com/2013/06/torbroker-security-vulnerability...

Another recent discussion http://seclists.org/fulldisclosure/2013/Jul/31

"I run 5 tor nodes. I can tell that 5 nodes on the network are save for me. Trust tor. I will not run dsniff or tcpdump. Its save. I will never abuse the logins you gave me for free. Afk now, that one guy is surfing on xhamster, nice video choice" -- "Alex"

Lol well put I suppose. Concise anyway.

Good tor network data source http://torstatus.blutmagie.de/

Router name agentAdrianLamo is doing well lol http://torstatus.blutmagie.de/router_detail.php?FP=ba7385668e2386246f2fb...

Tor vuln paper http://www.syverson.org/tor-vulnerabilities-iccs.pdf

http://www.blackhatlibrary.net/Tor

also for listserv activity https://lists.torproject.org/pipermail/tor-censorship-events/

Tor activity very much logged by NSA as shown recently http://nakedsecurity.sophos.com/2013/06/24/using-tor-and-other-means-to-...

Anyway it's just a normal hesitation in pointing out that Tor or given VPNs are not magically perfect for sure. There are merits to both technologies but magic boxes they are not! Of course one should assume the FBI is listening closely to IPs like webchat.anonops.com etc. 141.101.120.67 & 141.101.120.66

//////

For more on the Op_NSA situation check out

https://twitter.com/Op_NSA

https://twitter.com/aluminary

https://twitter.com/dickfacerax

///////

Email encryption in general:

For basics of encrypting email see Riseup.net: https://help.riseup.net/en/encrypting-email-with-thunderbird

Cryptome.org has had interesting stuff about PGP keys lately as well! http://cryptome.org/2013/07/mining-pgp-keyservers.htm & many posts on PGP keys registered to assorted federal departments! 2013-0744.htm 2013-0746.htm 2013-0741.htm etc

///////

More backstories and Backbones:

Here is a possible explanation of the Company A / B / C listings in the NSA Inspector General report. MCI, AT&T & Sprint:

Date: Wed, 03 Jul 2013 16:05:20 -0400
From: "James M. Atkinson" <jmatk[at]tscm.com>
Organization: Granite Island Group
To: TSCM-L Mailingin List <tscm-l2006[at]googlegroups.com>
Subject: Presidents Surveillance Program of 14 September 2001

On September 14, 2001 the NSA initiated a program on eavesdropping of all or the telephone and internet traffic of all U.S. Citizens, and concealed this quite unlawful program under many layers of secrecy, not because it as in the interests of national security, but rather to hide the violation of the Fourth Amendment.

These are the "initial three backbones" that the NSA tapped into (with the consent of the companies, each of whom gave the NSA full, unrestricted access):

The attached PDF file is a list of all of the funds spent by the program... do the math, and closely observe the date ranges (they perfectly match up, to the day with all of the dates in the Snowden document leaks).

MCI COMMUNICATIONS SERVICES INCORPORATED/MCI TELECOMMUNICATIONS CORPORATION
AMERICAN TELEPHONE & TELG COMPANY/AT&T
SPRINT COMMUNICATIONS COMPANY

In the IG report these aforementioned companies at listed at Company A, B, and C.

There are four additional companies (and others) to include Verizon, Nextel, Microsoft, Yahoo, Google, and so on.

See also procurement code: DAAB0701DH802 for Booze Allen Hamilton (Snowdens employer)

The project and procurement code as: DXXXXX01XXXXX

The program office as listed at:

2011 CRYSTAL DRIVE STE 911 (One Crystal Park Bldg "Crystal City 2" see also: http://cryptome.org/rummy-op2.htm)
ARLINGTON , VA , 22202-3732
USA

19.1 Billion Dollar Series of Contract initiated on the same day that the president authorized the Presidents Surveillance System for the NSA, and ending on the day it as shutdown.

Using a DUNS# of 790238638

The persons name under whom this was all listed is:

GRAFTON THOMAS BIGLOW
1312 Rhode Island Ave NW
Washington, DC 20005
(202) 483-8707

At the same address is:
Hope L Biglow

Grafton Bigelow is also listed at various addresses in:
414 Second
Cape May, NJ and West Cape May, NJ
(609) 884-4346

Plus several addresses in:
Hyattsville, MD
West Palm Beach, FL

But, the name Grafton Biglow also turns up:

FEDERAL PROCUREMENT DATA CENTER
7th & D Street SW, Room 5652
Washington, DC 20407
Director: Mr. Graffton Biglow
Fax: (202) 401-1546
Internet e-mail: grafton.biglow[at]gsa.gov

Curious coincidence.

Hopefully he had his own phone checked for bugs.

Maybe they can use the "Nuremberg defense"or claim "Befehl ist Befehl"

Very, very carefully look at the attached document, and take very deep and very slow breathes as you read it.

The bottom line is the Rainmaker system captured and indexed 1.17 racks per day of communications, bridging all major service providers, all fiber optic choke points, and eavesdropping mostly on U.S. Citizens (unlawfully) in what is called a "General Warrant" which is explicitly prohibited under U.S. Law.

The President of the United State is just a fucking moron, and utter and complete moron.

--- FUCK THE PIGS ---

-jma

--
James M. Atkinson. President and Sr. Engineer
"Leonardo da Vinci of Bug Sweeps and Spy Hunting"
http://www.linkedin.com/profile/view?id=15178662

Granite Island Group          http://www.tscm.com/
(978) 546-3803                jmatk[at]tscm.com
(978) 381-9111


Presidents-Spy-Program-Sept14-2001.pdf (342pp, 679KB)

/////////

The NSA Naccio Qwest case!

So there have been interesting developments. This bit about the contract hookups reminds me of Qwest's former CEO Joseph Naccio.

Here is what Naccio filed while fighting charges -- unlike virtually every white collar weasel ever, he ultimately got convicted of insider trading, no doubt with only the finest SIGINT available. Redacted PDF :: http://www.wired.com/images_blogs/threatlevel/files/512.pdf

http://www.denverpost.com/breakingnews/ci_22918125/former-qwest-ceo-joe-nacchio-moved-halfway-house - April 2013 he is getting out of jail soon with enormous fines as well. Many posts at Denver Post.

Nacchio, who turns 64 in June, was convicted in 2007 on 19 counts of illegal insider trading connected to his sale of $52 million in Qwest stock. A federal jury in Denver found that he sold the shares based on nonpublic information about the company's deteriorating financial condition.

Lucrative secret contracts indeedly doodley.

http://usatoday30.usatoday.com/news/washington/2006-05-10-nsa_x.htm 5-11-2006

The NSA, which needed Qwest's participation to completely cover the country, pushed back hard. ...

... the agency suggested that Qwest's foot-dragging might affect its ability to get future classified work with the government.

//////

Oct 15 2007: WSJ story: http://webcache.googleusercontent.com/search?q=cache:http://online.wsj.com/article/SB119240248793758652.html

Nacchio Alleges Reprisal

Qwest Ex-CEO Says Firm Denied Pacts After Spurning NSA

By

DIONNE SEARCEY

and

EVAN PEREZ

Contentions from former telecommunications executive Joseph Nacchio that the government retaliated against his company because he didn't comply with National Security Agency requests could add to the renewed debate over the NSA's secret surveillance of telephone records.

Once-classified documents that were unveiled in the insider-trading case of Mr. Nacchio, the former chief of Qwest Communications International Inc., Q +1.60% suggest the U.S. government didn't offer lucrative contracts to the company after Mr. Nacchio refused to cooperate with what the documents call "improper government requests" in February 2001. The documents, submitted as part of Mr. Nacchio's defense in the insider-trading case, don't elaborate on the government requests. Mr. Nacchio has said in the past he didn't comply when asked by the NSA for access to the private phone records of Qwest customers.

Mr. Nacchio in April was convicted in federal court in Denver of insider trading for selling $52 million of stock in the spring of 2001 as Qwest's outlook was deteriorating. He was sentenced to six years in prison but remains free pending his appeal. His attorneys suggested in pretrial filings that Mr. Nacchio believed the company was about to win secret government contracts that would keep it in the black, despite warnings from his executive team that the company was in financial trouble. The judge at his trial didn't allow much of the classified defense, and Mr. Nacchio's appeal disputes that decision. The latest revelations were in pretrial briefs filed months ago that were unsealed last week.

A spokesman for the Director of National Intelligence office, which oversees the NSA and other intelligence agencies, declined to comment on the allegations in the court filings.

The revelations emerge as the White House is in negotiations with Congress on long-term changes to the 1978 Foreign Intelligence Surveillance Act. Democrats, and some Republicans, in Congress are at odds with the Bush administration's demand that lawmakers preserve the secrecy of the NSA program by granting telecommunications companies immunity from lawsuits for any aid they gave to the government surveillance without a court order.

The administration has balked at giving Congress documents detailing the legal justifications for the NSA program, and says that the secrecy is necessary to protect national security.

Speaking on Fox News channel yesterday, House Majority Leader Steny Hoyer (D., Md.) restated his position that Democrats were willing to pass such immunity, if the administration turned over documents about the NSA program.

Write to Dionne Searcey at dionne.searcey@wsj.com and Evan Perez at evan.perez@wsj.com

///////////

The Daily Caller is trying to get this narrative bounced again: http://dailycaller.com/2013/06/13/jailed-qwest-ceo-claimed-that-nsa-retaliated-because-he-wouldnt-participate-in-spy-program/

CBS news in 2009: http://www.cbsnews.com/2100-250_162-1616326.html

Naccio's argument was not allowed in open court. Of course that Denver judge also had the NSA all over his phone too I would hazard to guess.

But who cares what the NSA does to judge's phones anyway? (see NSA whistleblower Russ Tice specifying NSA space asset surveillance vs Justice Alito for example)

Don't forget Israel re NSA contractors: read up on James Bamford on Israeli contractors & the NSA: http://www.wired.com/threatlevel/2012/04/shady-companies-nsa/ . A few salient snippets on the pervasive role of the spinoff companies of Israel's NSA equivalent, Unit 8200:

Like Narus, Verint was founded by in Israel by Israelis, including Jacob “Kobi” Alexander, a former Israeli intelligence officer. Some 800 employees work for Verint, including 350 who are based in Israel, primarily working in research and development and operations, according to the Jerusalem Post. Among its products is STAR-GATE, which according to the company’s sales literature, lets “service providers … access communications on virtually any type of network, retain communication data for as long as required, and query and deliver content and data …” and was “[d]esigned to manage vast numbers of targets, concurrent sessions, call data records, and communications.”

In a rare and candid admission to Forbes, Retired Brig. Gen. Hanan Gefen, a former commander of the highly secret Unit 8200, Israel’s NSA, noted his former organization’s influence on Comverse, which owns Verint, as well as other Israeli companies that dominate the U.S. eavesdropping and surveillance market. “Take NICE, Comverse and Check Point for example, three of the largest high-tech companies, which were all directly influenced by 8200 technology,” said Gefen. “Check Point was founded by Unit alumni. Comverse’s main product, the Logger, is based on the Unit’s technology.”

According to a former chief of Unit 8200, both the veterans of the group and much of the high-tech intelligence equipment they developed are now employed in high-tech firms around the world. “Cautious estimates indicate that in the past few years,” he told a reporter for the Israeli newspaper Ha’artez in 2000, “Unit 8200 veterans have set up some 30 to 40 high-tech companies, including 5 to 10 that were floated on Wall Street.” Referred to only as “Brigadier General B,” he added, “This correlation between serving in the intelligence Unit 8200 and starting successful high-tech companies is not coincidental: Many of the technologies in use around the world and developed in Israel were originally military technologies and were developed and improved by Unit veterans.”

Equally troubling is the issue of corruption. Kobi Alexander, the founder and former chairman of Verint, is now a fugitive, wanted by the FBI on nearly three dozen charges of fraud, theft, lying, bribery, money laundering and other crimes. And two of his top associates at Comverse, Chief Financial Officer David Kreinberg and former General Counsel William F. Sorin, were also indicted in the scheme and later pleaded guilty, with both serving time in prison and paying millions of dollars in fines and penalties.

Anyway that's enough stuff for now. Figure better to get a hard reference of it for those interested!

Interview on the Rundown Live re NSA, covert ops, Minnesota drug war policy, CONPLAN 3502 US martial law framework & moar

On Monday June 24: Caught up on matters re deep politics & weirdness with the guys on TheRunDownLive - got to cover some good topics including domestic military operations under USNORTHCOM CONPLAN 3502 aka "Civil Disturbance Operations", the DRE drug scandal in Minneapolis, arcana of the covert ops legitimization framework such as Executive Order 12333 thanks to Al Martin. (links below). Once I got the chat stablized it was all good. Nice thumbnail pic too! Give em a subscription for more updates from Out There. A recent episode with Stew Webb describing getting attacked by Lucifer or Baphomet is worth seeing - of course Stew has cigarette in hand! The Rundown Live #45 Dan Feidt of Hongpong.com // See also Baran Hines WTFRLY: The Rundown Live #42 Baran Hines of wtfrly.com.

Also additionally in meta-news, I finally updated the sidebar on hongpong.com and added a bunch of friends and really excellent news projects on there. So look left once more.

The Rundown Live #45 Dan Feidt of Hongpong.com

http://bigpzone.com/live LIVE M-F 8C/9E

Dan - http://hongpong.com

http://publicintelligence.net/the-mil...

http://www.scribd.com/collections/272...

http://www.theatlanticwire.com/global...

http://www.hongpong.com/archives/2010...

http://almartinraw.com - Al Martin the Conspirators Secrets of an Iran Contra Insider

Executive Order 12333 http://www.archives.gov/federal-regis...legalizes privatized covert operations via shell companies



http://fb.com/therundownlive



http://www.facebook.com/wearechangemi...

http://www.twitter.com/bigpzone

http://www.facebook.com/bigpzone



Subscribe to "The Awakening" List here:

http://bit.ly/TheAwakeningOnFB

(2,000+ Truth LIKE Pages)

BREAKING: NSA whistleblower Russ Tice says Obama spied on by NSA; Colin Powell's telecoms tracked by NSA satellite tech

///// UPDATE Friday 2pm Central: Tice got squelched by shady NBC lawyers at the last second according to BoilingFrogsPost.com:

Today MSNBC aired an interview with Mr. Tice disclosing “some” of his revelations, thanks to the vigilant activists who tirelessly shared and disseminated Mr. Tice’s revelations and interview audio. Interestingly, at the last minute, MSNBC told Mr. Tice that they would NOT include his revelations on NSA’s targeting of Obama, elected officials, attorneys, judges and activists. Basically, they censored his entire testimony on these stunning allegations!
In a correspondence with Boiling Frogs Post immediately following his censored interview with MSNBC Mr. Tice stated: “When they were placing the ear-phone in my ear with less than ten minutes left till my air time, the producer in New York said that their lawyers were discussing the material, and at this time, they did not want me to mention anything about the NSA wiretaps against all the people and organizations that I mentioned. That is how it went down. I did say on the air that I know it is much worse and would like to talk about that some time.”
- See more at: http://www.boilingfrogspost.com/2013/06/21/msnbc-censors-nsa-whistleblow...

The heat is on and the squirrels are getting squirrelly!!! /////

shit-just-got-real.jpg

Been waiting to hear more material from Russ Tice, one of the earlier NSA whistleblowers. Fortunately one of our ol' underdogs BoilingFrogsPost.com & Sibel Edmonds got Tice to lay out a lot of new stuff. Tice was a major source for NSA revelations including the 2005 NY Times warrantless wiretapping story.

Named NSA targets by Tice include current Supreme Court Justice Alito, Sen. Dianne Feinstein, Hillary Clinton, Rep. Henry Waxman, then-Sen. Evan Bayh, Sen. John McCain, Sen. Jay Rockefeller, then-US Rep. Kucinich. And of course President Obama.

Here is a quick clip: via very big on FiredogLake: BREAKING: NSA Whistleblower Russ Tice Alleges NSA Wiretapped Then-Sen. Candidate Barack Obama | MyFDL

In this bombshell episode of the Boiling Frogs Post Podcast Show NSA whistleblower Russ Tice joins us to go on record for the first time with new revelations and the names of official culprits involved in the NSA’s illegal practices. Mr. Tice explains in detail how the National Security Agency targets, sucks-in, stores and analyzes illegally obtained content from the masses in the United States. He contradicts officials and the mainstream media on the status of the NSA’s Utah facility, which is already operating and “On-Line.” He reveals the NSA as a Deep State that targets and wiretaps US political candidates for its own purposes. We discuss the latest controversies involving the NSA, PRISM, Edward Snowden, and the spins and lies that are being floated by the US mainstream and pseudo-alternative media. Do NOT miss this revelatory interview.

Listen to the preview Here - See more at: http://www.boilingfrogspost.com/2013/06/19/podcast-show-112-nsa-whistleb...

DOWNLOAD HERE > http://www.boilingfrogspost.com/podpress_trac/web/20927/0/BF.0112.Tice_2... - you may want to skip to about 50 minutes to catch the name dropping space spying going on.

bfp_podcast_version.gif"Here's the big one ... this was in summer of 2004, one of the papers that I held in my hand was to wiretap a bunch of numbers associated with a 40-something-year-old wannabe senator for Illinois," he said. "You wouldn't happen to know where that guy lives right now would you? It's a big white house in Washington, D.C. That's who they went after, and that's the president of the United States now."

There was a lot of specific references to space-based platforms - that is National Security Agency satellite technology - which was Tice's specialty to which he has now apparently turned The Blowtorch with excellent timing.

The story is getting out now. Bush-era whistleblower: Obama was NSA wiretap victim in 2004 | The Daily Caller. Huffpo did a quick post: Russ Tice, Bush-Era Whistleblower, Claims NSA Ordered Wiretap Of Barack Obama In 2004. Duly flagged on Cryptogon: Russ Tice on Boiling Frogs Podcast

Iran's press service flagged it: PressTV - NSA spied on Obama: Whistleblower

At the Guardian: Procedures used by NSA to target non-US persons: Exhibit A – full document | World news | guardian.co.uk && Revealed: the top secret rules that allow NSA to use US data without a warrant | World news | guardian.co.uk

Vast discretion vested in NSA analysts -- Glenn Greenwald http://www.guardian.co.uk/commentisfree/2013/jun/19/fisa-court-oversight-process-secrecy

The vast amount of discretion vested in NSA analysts is also demonstrated by the training and briefings given to them by the agency. In one such briefing from an official with the NSA’s general counsel’s office – a top secret transcript of which was obtained by the Guardian, dated 2008 and then updated for 2013 – NSA analysts are told how much the new Fisa law diluted the prior standards and how much discretion they now have in deciding whose communications to intercept:

“The court gets to look at procedures for saying that there is a reasonable belief for saying that a target is outside of the United States. Once again – a major change from the targeting under Fisa. Under Fisa you had to have probable cause to believe that the target was a foreign power or agent of a foreign power. Here all you need is a reasonable belief that the target is outside of the United States …

“Now, all kinds of information can be used to this end. There’s a list in the targeting procedures: phone directories, finished foreign intelligence, NSA technical analysis of selectors, lead information. Now, you don’t have to check a box in every one of those categories. But you have to look at everything you’ve got and make a judgment. Looking at everything, do you have a reasonable belief that your target is outside the United States? So, cast your search wide. But don’t feel as though you have to have something in every category. In the end, what matters is, ‘Does all that add up to a reasonable belief that your target is outside the United States?’”

So vast is this discretion that NSA analysts even have the authority to surveil communications between their targets and their lawyers, and that information can be not just stored but also disseminated. NSA procedures do not ban such interception, but rather set forth procedures to be followed in the event that the NSA analyst believes they should be “disseminated”.

The decisions about who has their emails and telephone calls intercepted by the NSA is made by the NSA itself, not by the Fisa court, except where the NSA itself concludes the person is a US citizen and/or the communication is exclusively domestic. But even in such cases, the NSA often ends up intercepting those communications of Americans without individualized warrants, and all of this is left to the discretion of the NSA analysts with no real judicial oversight.

Also: FBI Admits That Obeying The Constitution Just Takes Too Much Time | Techdirt

And: Skype Provided Backdoor Access to the NSA Before Microsoft Takeover [NYT]

Plus: Straight Outta Government: GSA Mulls Deal With Rap Genius - Nextgov.com (wat?)

And: Obama’s crackdown views leaks as aiding enemies of U.S. | McClatchy

Wowww… busy days people. It's amazing to see a suppressed narrative like the NSA domestic spying apparatus suddenly catch such traction in so many quarters!

The other heinous thing - well one other thing - is the secret TPP treaty. I'm glad reelected Rep. Alan Grayson is going to kick at it. First Congressman Allowed to Read Secret Treaty Says “This ... Hands The Sovereignty of Our Country Over to Corporate Interests” | Zero Hedge

The TPP is nicknamed “NAFTA on steroids.” Now that I’ve read it, I can see why. I can’t tell you what’s in the agreement, because the U.S. Trade Representative calls it classified. But I can tell you two things about it.

1) There is no national security purpose in keeping this text secret.

2) This agreement hands the sovereignty of our country over to corporate interests.

3) What they can’t afford to tell the American public is that [the rest of this sentence is classified].

……..

It is ironic in a way that the government thinks it's alright to have a record of every single call that an American makes, but not alright for an American citizen to know what sovereign powers the government is negotiating away.

***

Having seen what I’ve seen, I would characterize this as a gross abrogation of American sovereignty. And I would further characterize it as a punch in the face to the middle class of America. I think that’s fair to say from what I’ve seen so far. But I’m not allowed to tell you why!

Also: Warren on Trans-Pacific Partnership: If people knew what was going on, they would stop it | The Raw Story

Alright leaving this here for now. Get tuned in and look around - the truth is out there! SAIC, Booz Allen Hamilton, the grip of your sorts on all our lives is in for its createst challenge yet. The infosec praetorians are overdue for a fall in their space-age egos!

MPD Tracking OccupyMN Facebook BBQs: Minneapolis "secret" Strategic Information Center / Emergency Operations and Training Facility 25 37th Ave NE in Fridley

Dateline: Pseudo-Secret Minneapolis (aka Fridley): What WCCO called the "secret" "City of Eyes" Strategic Information Center has been located on the Google! Your Federal Stimulus Money & FY2010 Homeland Security Appropriations At Work - A Facility for Spying on Facebook Occupy Barbecues

strategic-center-mpls.png

It's nice when data releases tie together a larger system, and we've sure got that here. It's not really "secret" but it's quite shiny & new, not well-known at all, and it is certainly has been used as a site for spying on Occupy activists without criminal predicates by the Minneapolis Police Department. [emails a bit farther down]

///// UPDATE Nov 14 2014: See #Pointergate Pieces: Hodges merged out politically powerful police pensions; KSTP Quadruples Down; Minneapolis gang intel plugs away ///// UPDATE Jan 10 2013: See How to check cops checking your driver's license, Rassmusson lawsuit settlement docs /////

The Minneapolis Police Department files about Occupy Minnesota released by a data request on Monday afternoon are turning up interesting wastes of taxpayer money -- and even the so-called "secret" Strategic Information Center & Emergency Operations and Training Facility at 25 37th Ave Northeast in Fridley, north of the city line by the river & railroad tracks.

Also known as the EOTF/SIC, let's wrangle up everything we can find. Start with architects, via Wold Architects/Engineers: City of Minneapolis EOTF | Wold Architects and Engineers

Wold Architects and Engineers designed a site and facility for the City of Minneapolis Fire Department Training Campus to include a Fire Department’s Training Division; training classrooms multi-used as an Emergency Operations Center for the City’s Emergency Preparedness; a Strategic Information Sensor Monitoring Center for the Minneapolis Police Department; and vehicle storage garages for the Fire Department’s regional asset equipment.

The design exceeds the City of Minneapolis requirement for design to meet LEED Silver.

strategic-4.png

strategic-5.pngThis state-of-the-art federally funded facility allows police to determine... the location of barbecues on Facebook, including even the number of "YES" and "MAYBE" invitees.

This facility also encompasses "Shotspotter" directional microphones all over the city - I wonder if those are ever activated besides the gunshot decibel threshold "trigger" - they are in fact pretty high-fidelity microphones, it has been disclosed (May 28 2012 NYT article) but the manufacturer denies the mics are triggered by conversations.

I for one, am glad that we spent both municipal and borrowed federal tax dollars on training the Minneapolis police to believe a Facebook "YES" invite is real. The simulacrum of today's clicks has become the strategic information of tomorrow!

The old EOC center, used in the 2007 35W bridge collapse, can be seen here via MPR and clearly lacks expensive-enough videoconferencing gear.

Here is the press release from Nov 4 2010: Minneapolis opens Emergency Operations Training Facility - City of Minneapolis

Minneapolis opens Emergency Operations Training Facility

The City of Minneapolis has opened its new Emergency Operations Training Facility, which will help emergency responders and other City staff better prepare for and respond to emergencies. The multi-purpose building helps meet the training and response needs of the Minneapolis Fire Department, the Minneapolis Police Department, and the City's Emergency Management Division, along with other regional partners.

The Emergency Operations Training Facility is a multi-purpose building that includes training classrooms for Minneapolis firefighters and metro emergency managers, a strategic information center for the Minneapolis police, the main training site for the State of Minnesota Structural Collapse Team, and an emergency operations center that will be used during significant emergencies or disasters.

The new facility is built on a 12-acre site in Fridley that the City purchased in 1990, and since that time, the site has been built out as a training facility for Minneapolis Firefighters. Over the years, a fire training tower and propane burn building have been constructed, and special equipment has been purchased to help train emergency responders for incidents involving hazardous materials and collapsed structures. The construction of the new Emergency Operations Training Facility on the site is a major step toward completing this training and response site.

The Emergency Operations Training Facility is built to a LEED Silver Quality Standard for sustainability, and it includes facilities for a wide range of emergency responders from Minneapolis and the region:

Emergency Operations Center

One of the lessons learned from the City's response to the Interstate 35W Bridge collapse in 2007 was that the City's Emergency Operations Center, located in the basement of City Hall, was too small to serve as a center for large-scale emergencies. The new facility fixes that, with 2,800 more square feet of floor space. It will also be used as a back-up Emergency Operations Center for the State, Hennepin County and the City of St. Paul.

Strategic Information Center

The Strategic Information Center is a new space where the Minneapolis Police Department will analyze data to determine long-range trends that pose potential risks to the city. It can provide emergency managers with important information during a major event, incident or disaster.

State of Minnesota Structural Collapse Team

This team serves the entire state with specialized equipment and trained personnel for urban search and rescue and structural collapse incidents. This facility will include apparatus bays for storage of emergency response vehicles and specialty equipment for the Coast Guard, State, City and Metro West region of Homeland Security. In addition, this facility will house training and classroom space, staff offices, support spaces and common spaces.

Coast Guard monitoring.

The U.S. Coast Guard will also use the facility as a monitoring location for cameras placed along the Mississippi River from St. Louis to the metro area.

Published Nov. 4, 2010

Moar casual Google Mapping:

google-streetview-mpls.png

Apparently they dropped a cool $50K on the fence in early 2012. here is the bid page "To furnish all labor, materials, equipment and incidentals necessary to accomplish the complete construction of Emergency Operations Training Facility Perimeter Fence Project, located at 25 37th Ave NE, Fridley, MN." SRC: Minneapolis, City of - Projects. [A little more on the fence industrial complex below]

google-streetview-mpls2.png

Of course, once Erin Brockovich samples those weird adjacent holding pond things, I'm sure the infamous Fridley Cancer Cluster case will be solved. Perhaps Sgt. Garcia can go out and take some samples!

google-map-mpls1.png google-map-mpls2.png

I believe at least two of structures are firefighter training buildings - later pics below seem to bear this out.

eoc-marketing-swag1.pngHere is some marketing swag about the video conferencing gear. AVI-SPL Integrates Government Emergency Operation Centers. See the PDF and video too.

eoc-marketing-swag2.pngLet's check out the $330,704 in electronically-created yet borrowed-at-interest-from-private-Fed-cartel recently invested in this barbecue monitoring center. Official less-than-informative stimulus info page: Minneapolis Recovery - City of Minneapolis Minneapolis Police Strategic Information Center.

[Naturally it is funded by the electronically created debt-digits from the Department of Justice Bureau of Justice Assistance (BJA), the same endless police pork hub that brought us all those "you might be a terrorist if you pay in cash" type intel flyers for everything from hotels to hobby stores - many of those flyers were financed by Grant Number 2007-MU-BX-K002, which I included ironically on my own site's banner art. Google it for lulz!] Here's that official page:

The City of Minneapolis is not a primary recipient on this project. No Federal Report XML is submitted for this project.

Dollars Awarded

$330,704

Project Status

Fully completed

Project Description

To establish integrated crime analysis in cooperation with the St. Paul Police Department. Staff will be located in a joint Strategic Information Center (SIC).

Funding Program

MN Department of Public Safety: Byrne Justice Assistance Grant

Responsibility for Implementation

Police Department

Funding Agency

US Department of Justice [BJA/Recovery Act]

Dollars Leveraged

Data not yet available.

Dollars Leveraged Description

Data not yet available.

Dollars Requested

$330,704

Projected Jobs Created

2

Award Type

Grant

Sub-recipient Names

Minneapolis, City of

Vendor Names

No vendors have been contracted to date.

Recovery Funds Spent to Date

$330,704

Perhaps this is even the 'secret' location Tippy spycams are constructed: a while ago prankster MPD Spokester & PIO Jesse Garcia shared pics of a camera construction room & with all the other video rigs this seems a likely spot.

Anyway finally here is the email chain which prompted this line of research. There are surely other gems, we are just barely getting started. Circa page 109 of Part 1:

strategic-center-targets-barbecue.png

The public servant on some of these emails is one Minneapolis Police Department officer Steven Otteson, who has a decidedly low Internet profile.

Poking for traces of intrepid Strategic Facebooker Otteson turns up very little - even though the email is dated June 2012, he has no listed salary on this MPD salary list: My Docstoc. Crossposted the index here: 2011 Minneapolis Police Dept Gross Salary index for Web.

A news story indicated the supervisor of the Strategic Information Center is MPD Lt. Jeff Rugel at 612-673-3428. Page 112:

rugel-bbq.png

"Why are we not getting this stuff from the SIC?" Here is stuff about why they should not have to "spend time looking it up" and it should be run through the SIC... This could kind of be the crux of the whole issue here on Page 114:

sic-track-occupy

Alright, that covers some of the new data on this SIC thing vis-a-vis obsessing on Occupy events, so let's turn to the news coverage of this facility.

Carefully shaped news coverage: Mid-2012 saw a series of mainstream media items intended to shape public perceptions this center is designed to neutralize the threats from the surveilled populace. WCCO went so far as to call it a "secret location". That is some quality Fourth Estate right there.

Coverage for this "City of Eyes" facility on WCCO March 19 2012 (video) City Of Eyes: Your Camera May Help Mpls Police Fight Crime « CBS:

MINNEAPOLIS (WCCO) – Minneapolis police are the first in the country to merge two technologies to help officers fight crime.

The Minneapolis Police Department has combined shot spotter technology and a system of cameras to help catch criminals in the act.

Authorities allowed WCCO-TV’s Reg Chapman into a secret location in Minneapolis, where a strategic information center is housed.

Minneapolis Police Deputy Chief Rob Allen said the room is where police gather intelligence.

“This is the room where we try and fuse the technology we have to monitor video cameras, to monitor the sounds of possible gunshots, and it’s where we have our officers who are trained in intelligence gathering,” he said.

The system in the room is like CBS’ Thursday night show “Person of Interest,” in which cameras are used to help save people from becoming victims of crime.

“If you can anticipate where crimes might happen, you got a far better chance of preventing them from occurring,” Allen said.

According to Allen, when a gunshot goes off, a camera turns toward the source of the sound. Strategic Information Center Commander Lt. Jeff Rugel said the technology helped solve a case where a man was shot, killed and pushed out of a moving car. The sound of the gunfire activated the cameras, which gave police their first clue.

[......]City Of Eyes

The number of cameras connected to the intelligence system is growing and helping police catch more criminals. But not all the cameras are owed by the city.

“The city owns roughly 250 cameras,” Allen said. “We can access right now … an infinite number of cameras.”

According to Allen, any camera that has an IP address, is connected to the Internet, and that police have permission to use can give information to authorities.

So whenever you are in a public space, know that you’re likely on camera. Police are using portable cameras more now than ever. They can put them where they are needed and have one up and running within an hour of the order.

Invasion Of Privacy?

But what about your right to privacy? Police say they are careful not to infringe on anyone’s rights.

“Every time we installed a camera system, we went to the neighborhood and said, ‘You know, this is what we’ve thought about doing? Do you want it or not,’” Allen said.

He says police can’t look into a place where someone has the expectation of privacy. [magic filters eh?] But police still have a wide reach, which gives criminals a greater chance of getting caught on camera.

Crime patterns are currently moving and Minneapolis police hope to add more portable cameras. Police believe if criminals know they are being watched they are more likely not to commit crimes.

Star Tribune writes about this center using Facebook to watch what the state defines as "gang members" (mysteriously, shady rich Caucasian financial operatives never seem to meet this race/age/wealth-biased deviance category schema).

Of course, this week's data release shows this has bloated out to canvassing political movements without even the semblance of illegal activity... there is no "barbecue predicate" but there are of course hourly wages to be paid by Minneapolis taxpayers for monitoring the barbecue Facebook Event. Perhaps even overtime!

Gangs sometimes fire first shots online | StarTribune by Matt McKinney July 14 2012:

Facebook has become a virtual street corner where members trade threats, mourn the dead.

"It's probably no different than any other kids, right?" said Minneapolis police Lt. Jeff Rugel. "They're sharing stuff that they used to do face-to-face or over the phone. But there's criminal stuff." [.....]

Rugel runs the police department's Strategic Information Center, where officers use technology to track crime. One of the jobs in his office amounts to monitoring Facebook full-time. They understand the teen slang and filter through thousands of innocuous and inane comments to look for the few that could solve a crime or stop one before it happens. They try to draw connections out of the Facebook networks to help document the shifting alliances on the street.

Police were aware of Facebook threats between rival gangs weeks before the shooting that killed Nizzel, but the threats weren't specific. When Rugel and his staff sees something that looks like trouble -- a known gang member says he's going to hurt someone -- they pass the information along to officers on the street.

It's a poorly kept secret that the police watch Facebook, said Rugel.

"You see comments every once in a while. 'Don't put that on Facebook. You know who's looking at it,' " he said.

Despite some users' occasional concern, many of the Facebook users monitored by police flaunt their illegal behavior online, showing themselves smoking marijuana, posing with stolen merchandise, the security tags still attached, and making gang signs. [.....]

There was also some bidding information online about the estimated $50,000 fence around the facility. Emergency Operations Training Facility Perimeter Fence Project (eBidDoc #1810882) contact: David Schlueter phone: 612-673-2834 e-mail: david.schlueter@ci.minneapolis.mn.us bid date: 01/25/2012 10:00:00 AM

Try http://io.questcdn.com/questio/projects/planholder/planholder_list.html?jobPK=1810882&userPK=&modifiable=FALSE&isQCPI=TRUE

strategic-center-fence-bidding.png

//////

garcia-yatedo.pngSome other stuff: for what it's worth, this lists PIO Jesse Garcia as being based at the Strategic Information Center.Minneapolis Police Department Employees - Professional Experience,Email,Phone numbers..Everything!: Digging deeper to: Jesse Garcia III - Strategic Information Center, Minneapolis Police Department:

It was scraped off his LinkedIn - no surprise there. But no one put it together... Jesse Garcia III | LinkedIn. I think it would be great if state law were changed so that Garcia could be cross-examined by taxpayers about the flow of drug money through the Federal Reserve Bank of Minneapolis and its member banks, let's say once a month on live community access TV. Looks like he ought to be tapped into that gigaflow of data on bankster crime intel!

Strategic Information Center

Minneapolis Police Department

September 2010 – Present (2 years 5 months)

I am a supervisor in our new intel center that focuses on:

-gang intel

-crime intel

-real time officer assist

-safety camera analysis

-Emergency Operations Center readiness

jesse.garcia@ci.minneapolis.mn.us

Public Information Officer / Media Relations

Minneapolis Police Department

October 2007 – September 2010 (3 years)

More media: Vehicle data, email access among Minneapolis legislative issues | MinnPost - Karen Boros, Nov 2, 2012. Automated License Plate Reader (ALPR) including of course the "secret" camera on nearby Plymouth Ave. N. bridge is controlled from this "Strategic Information unit" according to the article - I would assume this is the same spot it's based, unless it is somehow split:

Currently, the Minneapolis Police Department uses cameras to record the license plates, time and location of vehicles. That data is now public information that can be obtained by anyone requesting the information.

“Our concern is that if it stays public data that people can use it for inappropriate purposes,” said Deputy Chief Robert Allen. The system now doesn’t allow police to inquire how it might be used. “We’re not allowed to make a judgment,” he said.

Access to the data is controlled by about a dozen people working in the department’s Strategic Information unit.

Alright this is taking more than long enough. This thing says it is 22,178 sq ft and it is on parcel 34-30-24-43-0009.

Minneapolis, City of - Projects: An estimated $1.5 million were bid on this beast for just a small chunk of the building, closed Feb 2012.

directions to site: 25 37th Ave NE Fridley, MN 55421

bids close: 02/23/2012, 10:00:00 AM

bids received by: City of Minneapolis Purchasing Department CONSTRUCTION OF THE EOTF APPARAUS BAY ADDITION 330 Second Avenue South Suite 552 Minneapolis, MN 55401

estimated value: $1,500,000.00

project completion date: 08/15/2011

pre-bid meeting information: A Pre-Bid Meeting and site tour will be held on February 15th, at 11:00 AM, Local Time in Room 128 at the Emergency Operations Training Facility located at 25 37th Ave NE, Fridley MN. All interested bidders should attend this meeting.

addenda: 1

project description: Scope of Work Includes: Complete construction of the Apparatus Bay Addition at the City of Minneapolis Emergency Operations Training Facility. This work shall include all labor, equipment, materials, installation, handling, delivery at site, necessary insurance and permits, erection and other required items for general, civil, landscaping, demolition, structural, architectural, mechanical and electrical construction and stability as shown on the plans and specifications.

additional description: This Contract contemplates the complete construction of the Emergency Operations Training Facility Apparatus Bay Addition for the Minneapolis Fire Department located at 25 37th Avenue NE., in Fridley, all in accordance with the Contract Documents. This Project has been designed to comply with the requirements of the State of Minnesota Sustainability Building Guidelines B3 (MSBG B3) Version 2.1 and also the U.S. Green Building Council’s Leadership in Energy and Design ( USGBC LEED®) Rating System. It is the intent of this Contract that the Project shall become MSBG B3 Version 2.1 Certified and LEED® SILVER level of quality building under the LEED®-NC Rating System. Work to be performed consists of the furnishing of all materials, machinery, equipment, labor, supplies, tools, transportation, and other incidentals necessary or convenient to complete the work as shown in the Contract Documents on file in the Minneapolis Finance Department, Property Services Division and with the Purchasing Agent of the City of Minneapolis.

owner: City of Minneapolis

350 South 5th Street, Room 223

Minneapolis , MN 55415

ph: 612-673-3774

contact: Chris Backes e-mail: chris.backes@ci.minneapolis.mn.us

Soliciting Agent: Soliciting agent

Minneapolis, City of

330 2nd Ave. S. Suite 552

Minneapolis, MN 55415

ph: 612-673-2834

fax: 612-673-3565

contact: David Schlueter e-mail: david.schlueter@ci.minneapolis.mn.us

It was used to host a session of the 10,000 Lakes Chapter of the International Code Council. [pdf]

The site's address is place on things like preparedness for your pet: Emergency Preparedness - City of Minneapolis && stuff about exercises (again on the sidebar) City Preparation - City of Minneapolis - the 'meh' front page: Emergency Preparedness - City of Minneapolis. Really need to improve page titles at the city. Perhaps after the election?

Awards - City of Minneapolis:

Minneapolis wins its second Tekne Award

Minneapolis Emergency Operations Training Facility

November 2011: The Minnesota High Tech Association recognized the City of Minneapolis and its Emergency Operations Training Facility with an award at the 2011 Tekne Awards, held Nov. 3 at the Minneapolis Convention Center. The Tekne Awards recognize Minnesota companies and individuals who have shown superior technology innovation and leadership.

The City of Minneapolis took home the award in the “Technology Excellence in a Nonprofit Organization” category that recognized the City’s Emergency Operations Training Facility/Strategic Information Center (EOTF/SIC) for bringing technology and information together to make Minneapolis a safer place. At the facility, technology, digital data, streaming video and highly interactive interfaces come together in one highly efficient communication center for the city.

The Minneapolis Fire Department, Police Department, and Emergency Management division opened the EOTF/SIC in August 2010 as a place where they and other emergency responders could coordinate more closely than had ever been possible before. The facility recently demonstrated its effectiveness during the response to the May 22 tornado that struck north Minneapolis.The multi-purpose building also provides training space for emergency responders.

Here it was, the first one: Minneapolis Emergency Operations Training Facility wins Tekne award - City of Minneapolis: The City of Minneapolis took home the award in the “Technology Excellence in a Nonprofit Organization” category that recognized the City’s Emergency Operations Training Facility/Strategic Information Center (EOTF/SIC) for bringing technology and information together to make Minneapolis a safer place. At the facility, technology, digital data, streaming video and highly interactive interfaces come together in one highly efficient communication center for the city.... and earlier: Oct 18, 2011: Minneapolis Emergency Operations Training Facility a finalist for Tekne award - City of Minneapolis

Mpls. Unveils New Emergency Operations Center | Crime | Downtown News - Nov 4 2010, KSTP Gail Brown: Congressman Keith Ellison secured $750,000 for the project in a 2010 appropriations bill, and he will be attending a ribbon cutting ceremony at 2:30 p.m. along with Minneapolis Mayor R.T. Rybak, City Council President Barb Johnson and other city leaders.

Ellison Secures $750,000 for Minneapolis Emergency Operations Center - Ellison.House.gov Oct 15 2009:

Washington, D.C. – Congressman Keith Ellison (D-Minneapolis) secured a $750,000 appropriation for the City of Minneapolis to build a new Emergency Operations Center in a bill approved by the House today. The funds were included in H.R. 2892, the Homeland Security Appropriations Bill for FY 2010.

Roughly the same stuff in this Council Prez Barb Johnson doc.

It's on Pinterest - see Government & Military for tons of funny stuff including everything from the avispl swag people above. And also: AV Products We Love / Minneapolis Emergency Operations Training Facility

There is a blog post about training there on the Mpls Dept of Civil Rights by Anthony Johnson - Civil Rights Urban Scholars with a helpful slideshow. Tony’s Voice: Our Day As Fire Fighters! | Minneapolis Department of Civil Rights.

strategic-center-3.png strategic-center-2.png strategic-center-1.png

I think you can see this fire training structure (or maybe a similar one) on Google Maps though I have not swung by to check out the Facility myself. Another one:

Minneapolis Emergency Services Employ projectiondesign - AVNetwork.com (undated? A couple pix included)

Fredrikstad, Norway--The City of Minneapolis has deployed 12 projectiondesign F32 DLP projectors as the main display source in the Analyst Room and F22 series projectors in the Incident Command Room of its Emergency Operations Training Facility (EOTF).

Located just outside Minneapolis, the EOTF boasts an extensive surveillance, audiovisual and network infrastructure specified and installed by systems integrator AVI-SPL.

“In a facility like this, even the slightest compromise in performance can result in tragic consequences,” said Fred Primoli, regional VP Sales for AVI-SPL. Primoli and his colleagues worked with the city for nearly two years on the concept, planning and final implementation of the EOTF, with the primary challenge being an interesting one: the creation of a state-of-the-art communications facility that may get activated no more than once in a decade.

“We needed systems that were capable of totally robust operation 24 hours per day, seven days per week – but which also were capable of performing at their best after extended periods of inactivity.

“From the outset we were delighted with the performance of the F32 projectors. The Analyst Room has three rear-projection screens, each measuring 160 inches wide by 120 inches tall, with four projectors driving each screen so that four separate windows can be shown on each one.

“The projectors have been superbly colour-matched to ensure consistency across each screen, while their excellent resolution, contrast and brightness mean they are equally at home showing video or data sources – which is important in an installation such as this where the staff need to a view a combination of both.”

Deputy Chief Robert Allen, a veteran of the Minneapolis Police Department, said: “The new display system allows us to look at a video feed and understand a situation almost instantly. Through video, we can get information to our officers much faster – especially when time is critical. We can zoom in with our cameras and really examine a situation and relay it back to our officers, allowing them to be prepared even before they get there. With this new technology, we can see something happen faster than a police offer 50 feet away.”

F22 series projectors from projectiondesign can also be found in the EOTF’s Incident Command Room that’s used for emergency training and an actual declared emergency.

“There is a large number of emergency monitoring projects in the U.S., and we are delighted that our technology has been used to display high-resolution security-camera images in so many of them," said Anders Løkke, marketing director, projectiondesign. "The Minneapolis EOTF already demonstrated its effectiveness during the tornado that swept through the area last May and, although we would prefer it if our systems never had to be used in similar situations again, the reality is that the city is better-protected now that its providers of emergency services have such easy, immediate and accurate access to security-camera imaging from so many locations.”

“The EOTF was conceived as a place where the various Departments responsible for emergency response and management in Minneapolis could co-ordinate their efforts more closely than had previous been possible,” said Primroli.

Same stuff as May 11, 2012: Minneapolis Emergency Services Goes with Projectiondesign - Fire Apparatus

On May 20 2011 CItyPages reported on Rocco Forte, former Minneapolis fire chief, departing, and Forte talked about being pleased to help finish the complex: "After the 35W bridge collapse, the Republican National Convention, and the tornado that went through South Minneapolis, it is clear that we have one of the finest emergency management teams in the country. It was also a long time goal of mine to complete the Emergency Operations Training Facility that includes an Emergency Operations Center, Strategic Information Center as well as a training facility which seats up to 250 people per day."

Reed Construction Data estimates its cost at $3,988,400 (a more accurate cost estimate is available from RSMeans Online), they say.

There are a couple autogenerated links at Facility Management Minneapolis Product From Industrial Manufacturers, Distributers, Suppliers And OEMs.

There is some PR speak about AVI-SPL getting an award. Press Release/ InfoComm, Sound & Video Contractor Honor AVI-SPL with Two PRO AV Spotlight Awards - Audio/Video Equip./Surveillance - AVI-SPL, Inc. | PRZOOM

On March 11, 2009, the overall cost of the project was pegged by House Research as $27,403,000. SRC: www.house.leg.state.mn.us/hrd/bs/86/hf0554.pdf

This bill would grant $8,000,000 in bond proceeds to the City of Minneapolis to design, construct, furnish, and equip an emergency operations center housed in the City’s current training center and to make other improvements to the training center.

According to the 2008 budget request, the overall cost of the project is $27,403,000 with the City and Hennepin County funding the non-state funded portions of the project. The Joint Emergency Operations Center (EOC) for Hennepin County and the City of Minneapolis will be located at the Minneapolis Fire Training Campus on city owned land. The City contends the current facility is inadequate and limits the effectiveness of the command structure. The City further contends that the Minneapolis Fire Training Campus is an ideal location for the EOC as it would provide a secure operations center with enough room to respond to a major incident affecting the county. Finally, the City believes this request would provide much needed training classrooms at the Minneapolis Training Facility which is the main site for training the State Structural Collapse Team.

HF 554 Status in the House for the 86th Legislature (2009 - 2010) - this is the bill number - I suspect it probably got rolled into the omnibus bill but I will leave that to a Deep Wonk to suss out. // H.F. No. 554, as introduced - 86th Legislative Session (2009-2010).

With a pretty severe shortage of funds for both state and municipal operations, is an open-ended SIC mandate to track protest activity on Facebook really the most prudent use of funds? And doesn't this operational configuration create a chilling effect on political expression in Minneapolis? The research continues....

Mordor Mayor Rybak makes moves to hide Minneapolis panopticon: Total Minneapolis Awareness Automatic License Plate Reader records form 'retroactive surveillance' empire

rybak-licenseplate-mordor-panopticon.jpg

"It is poor civic hygiene to install technologies that could someday facilitate a police state." ~ Cryptographer/security guy Bruce Schneier (src)

We all know the old motif - Feds staking out parking lots, reporting the license plates back to Hoover. Nowadays things are a little different - computers can trivially hoover up all the unique features like license plates and faces from video signals, 24/7. These are technical capabilities that Hitler and Stalin only dreamed of. The former National Security Agency employee William Binney described the system locking into place as a "turnkey totalitarian state" is arriving one system at a time. One of those turnkeys just turned up in Minneapolis.

The word is out now that more than 2 million license plate records have been obtained through a data request, since the surveillance material consists of mostly public record fields. Minneapolis developer Tony Webster (@webster) wrote up the info on what happened here - and quite correctly calls for the government to quit holding this kind of data for a number of serious reasons. See TonyWebster.com: Minneapolis Police release 2.1 million license plate records.

Rybak wants quick action on license plate data | StarTribune.com:

A day after the city released a database containing more than two million license plate scans, Mayor R.T. Rybak wants expedited state action to make the data non-public.

The Legislature is already expected to take action this session to reclassify license plate tracking data, which is derived from cameras mounted on local police squad cars across the state. But after complying with a request for Minneapolis' entire public database -- featuring dates, times and locations of all plates scanned in a 90 day period -- Rybak wants more immediate action.

He said the request was "already in the works" before Tuesday's data release, but "it does concern me." His request to temporarily reclassify the data would, if approved by the Commissioner of Administration, prevent the city from releasing the tracking data to members of the public.

See also latest on MPR: Lawmakers mull bill to regulate automatic license plate readers Minnesota Today. I think MPR is inaccurate as MPD said they'd shortened this to 90 days from the original year, as Strib indicated. (otherwise they would have violated MN Data Practices Act by failing to release earlier public records upon request)

Minneapolis' DFL Mayor RT Rybak (@mayorRTrybak) has sprung into action to demand the records generated by Minneapolis Police Department's Automated License Plate Reader (ALPR) system become classified as "private data", which means only the government, cops, various lawyers under different circumstances, etc, could trivially get ahold of incredibly detailed data & patterns about your vehicle's movements without a warrant.

Rybak's thoughtful plan is to make sure that no one else can get that data, only that bloated galaxy of whom John Young @ Cryptome.org calls the 'authoritatives' lording the new panopticon over us.

This is our window - our snapshot of the beta test - into the hellish future of total 'retroactive surveillance' awaiting us, when all our actions are constantly recorded to be 'played backwards' whenever some bureaucratic enforcer wants to increment his career through hassling us, demanding civil fines for infractions etc.

As recent posts on this site have documented, the Minnesota Department of Transportation (which just got a new chief) is spending state taxpayer money funnelled to military-industrial contractors in order to build a local version of a GPS tracking system called Intellidrive, which would transmit every damn move, including velocity, of every tagged car.

Additionally, exposure of abusive & immoral practices in the Drug Recognition Evaluator training program (& main BCA file) resulted not in a candid cleanup by law enforcement, but stonewalling. When individual law enforcement officers invariably abuse these massive data mining deployments, as some do, is there really adequate oversight let alone punishment for turning these 'necessary' technologies into avenues of abuse?

Plus of course, what are the implications of the chilling effects of these ALPR systems? What is the price paid by society when the chilling effect of avoiding ALPRs by staying put kicks in? How many people refuse to fly because of the intrusive & abusive security measures? And what happens when municipal cameras collect data even more granular and intrusive than the federal TSA?

For more on this stuff I recommend following @webster, and @RichNeumeister, a citizen activist on nearly all data & privacy matters at the Mn State Capitol. It seems like Webster triggered the Rybak blocking him on Twitter. Classy - especially since Webster posted in this recent context he's a lifelong DFL supporter.

To quote a bit from Rich Neumeister's blog which is VERY helpful for Minnesota issues: Two meetings: prescription records and license plate scans

Now to the Criminal Justice and Juvenile Information Policy Group meeting which was to make a decision about the collection and retention of millions of records of where you and I travel if we happen to be owners of cars collected secretly by the cops.

Per Eric Roper's Star Tribune Blog post  the Policy Group made up of Commissioners, judges, and others decided to make the license scan data private, but deleted the retention of 180 days for the data if there were no hits for law enforcement investigation.

Now I have to scratch my head on this one. By deleting the retention of 180 days, is the Policy Group saying with all intents and purposes, DO NOT KEEP OR COLLECT LICENSE SCANS ON INNOCENT AND LAW ABIDING PEOPLE, or are they saying the COPS CAN COLLECT ALL THE LICENSE SCAN DATA THEY WANT ON INNOCENT AND LAW ABIDING PEOPLE AND KEEP IT AS LONG AS THEY WANT.

I am perplexed.

& also earlier: Email to Minnesota Criminal Justice Policy Group on License Plate Cameras. For what it's worth Webster tweeted this afternoon (Tues Dec 13th) that the division of the state govt that implements/sets the rules, IPAD, has NOT yet received anything new from Minneapolis about ALPR data.

The reality is that politicians are not that responsible about these data issues. Instead you get ignored, blocked on Twitter etc. I am writing another post about yet another newly relevant old case - the Norm Coleman credit card database leak which I covered at Politics In Minnesota circa January 2009, eerily similar to the new charges against alternative journalist Barrett Brown. (Posting links to data like the Coleman leak is a form of journalism & research that feds are trying to redefine [unconstitutionally] as a felony! NOT GOOD). But that is definitely a whole 'nother story....

/////

MORE ON RETROACTIVE SURVEILLANCE LIKE MINNEAPOLIS POLICE DEPARTMENT ALPR SYSTEM: (not to be confused with the practice of retroactively legalizing the earlier illegal surveillance performed by telecoms during the Bush administration). 'Retroactive surveillance' is basically a timestamped panopticon.

Retroactive surveillance is a class of technology which can easily destroy certain dimensions of 'free will' and therefore should be considered extremely carefully as a keystone type of social control system. It's my personal opinion it will take at least a century for this type of tech to be possible to be used ethically (if ever), as the ethical structures do not currently exist – a major reason we are all descending into a kind of neo-feudal technocratic authoritarianism worldwide.

cryptogon.com » NYPD and Microsoft Team Up to Peddle Retroactive Surveillance System [WSJ] - same type of camera data inputs

NYPD, Microsoft Hope to Make a Mint off New Surveillance System - National - The Atlantic Wire

Coming soon: Ubiquitous surveillance from Big Brother's wayback machine (the archive.org wayback machine snapshots many websites over time, invaluable!)

NetworkWorld, 2011: Coming soon: Ubiquitous surveillance from Big Brother's wayback machine

cryptogon.com » New Video Surveillance System Tags, Tracks and Follows

a commenter puts it well at cryptogon.com » Coming Soon: Retroactive Surveillance on Anyone: "A present anxiety of future trouble from the unforgotten past; black to the future."

A change in tune: law enforcement now aggressively promoting retroactive surveillance capabilities of license plate readers | Privacy SOS

Is there any science (social science) of retroactive surveillance?

House Passes Surveillance Bill without Retroactive Immunity | TPMMuckraker

Drug war provides cover for retroactive surveillance without probable cause | Privacy SOS

.. That's all for now - this post is licensed Creative Commons remix/reuse with attribution to Dan Feidt/Hongpong.com non-commercially, including the "sheeple style" remix image I slapped together.

EXCLUSIVE MnDOT info cake: 2.97gb emails/docs on the Mileage Based User Fee (MBUF)- Minnesota's GPS vehicle taxing regime in the works

After a long wait, on Nov 28 2012, the Minnesota Department of Transportation (MnDOT) released ~2.97 gigabytes of data from inside the development of a GPS-based vehicle tracking system intended to introduce a vehicle tax - which would entail a great deal of data constantly collected by the government on the whereabouts and everyday patterns of the taxed vehicles. The source URL posted yesterday is ftp://ftp2.dot.state.mn.us/pub/outbound/chiefcounsel/Nate%20Hansen%20Email/ .

My friend Nathan Hansen made the request, pursuing a long-running story of the buildout of these taxation-tracking highway techs. (Disclosure: I did some design work for Hansen previously) The 2008 story I did: Now Searchable: The MnDOT NASCO NAFTA Superhighway Document Stash && Index of /June 2008 MN DOT Request/NASCO - Hansen Request && Index of /June 2008 MN DOT Request/June 2008 Request && Index of /DOT. A lot of these plans fell by the wayside - and a special Minnesota Intellidrive project and MBUF is the new plan. Related: Melissa Hill's new blog allows you to "Track the Police" using public data && Private company hoarding license-plate data on US drivers. In May 2011 I did this story: Contracts for IntelliDrive MnDOT Military-Industrial/U of M plan to GPS-track all cars. This data dump continues the story.

There are a few important angles: comprehensive vehicle tracking data would be great for law enforcement, lawyers and big corporations to investigate everything in one's life, including 'retroactive surveillance' of previous activities. However, the "fees" that would be imposed on rural Minnesotans who have to drive around a lot would be quite burdensome.

From a quick look at the PDFs we find internal discussion points about such impending scams as 'carbon credit' trading (a greenwashing Goldman Sachs sponsored futures bubble, as Matt Taibbi reported). Additionally Raytheon and SAIC have both been involved in this "Intellidrive" national-scale super-project. Also, just because the user data is processed behind Battelle's firewall in no way signifies any level of security of personal information.

The main block of data posted is in huge Acrobat Reader X sized PDF files (1.1 and 1.6GB) . We have mirrored around the files and checked with md5hash in case the govt pulls any later. Acrobat Reader X is kinda bogging on these giant files -- it loads all the emails in a slow email reader-like interface). Plenty of items like "concept of operations" or "MBUF CONOPS" is in there, a lot of stuff about consultants. We are just starting to peer at it, but Adobe is difficult to work with (a svelte 400MB app yay).

To get this batch of files yourself, if you have UNIX wget for mirroring:

$ wget -mb ftp://ftp2.dot.state.mn.us/pub/outbound/chiefcounsel/Nate%20Hansen%20Email/

I definitely recommend installing wget for things like this, where the files are listed in a directory for quick scraping.

//////////////

DATA EXTRACTION BONUS CHALLENGE: To open the attachments on these emails, for OSX you have to use a program such as the free MailRaider: Download MailRaider for Mac - Read Outlook .msg files on your Mac. This is what you gotta do - in Acrobat, hit the paperclip on the side:

acrobatreader.png

After first picking out the individual PDF attachments in Acrobat (the paperclip icon) you can get it to open in MailRaider. Hit the 'Open' button in that side panel. Hopefully this will launch MailRaider. In MailRaider, flip open the sidebar you can get it to work like so:

mailraider.png

Here is the first PDF I was able to extract - Intell~1.pdf (2MB) - it is a "business sensitive" presentation by military-industrial contractor Battelle to MnDOT. Let's have some choice excerpts including particularly how they use taxing people driving around rural-ish places like Wright County as a target for the mileage tax.

mndotcake000.png mndotcake001.png mndotcake002.png mndotcake003.png mndotcake004.png mndotcake005.png mndotcake006.png mndotcake007.png mndotcake008.png mndotcake009.png mndotcake010.png mndotcake011.png mndotcake012.png mndotcake013.png mndotcake014.png mndotcake015.png mndotcake016.png mndotcake017.png mndotcake018.png mndotcake019.png mndotcake020.png

What could possibly go wrong?!

mndotcake021.png

It is always sad to see fine open source techs like GnuPG used to encrypt tracking data. Damn you Technocratic Capitalism!

mndotcake022.png mndotcake023.png

This is pretty alarming. Sterns, Wright, etc are counties full of peopl that can't afford to pay more.

mndotcake025.png mndotcake026.png

LOOKS LEGIT:

mndotcake027.png mndotcake028.png

So this is just one extracted PDF from a single email. If Battelle was actually a front for malicious space aliens who want all the inhabitants of this planet tagged and tracked, I would not be surprised!

///////////////

MIRROR ADDRESSES: Here is the first mirror of it. These files are big enough to crash your browser - maybe rightclick & Save As link so the PDF plugin doesn't keel over... I don't think we'll need tons of mirrors for this, but it's good to have a couple around.

the big ones are at:

http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun... & also:

http://hongpong.com/files/mndotcake/Public%20QAM.pdf
http://hongpong.com/files/mndotcake/Public%20CommVault.pdf

dfc0fd1d4d6bdbcaf0498a50ee0f5fec Public CommVault.pdf 1.22 GB on disk (1,216,990,533 bytes)

cec386cc20000b7fe10297fc3ca0cdab Public QAM.pdf 1.7 GB on disk (1,698,431,132 bytes)

If you find gems tweet em with hashtag #mndotcake. If you find an open source way to work with files this big let us know. It will take some people to work on this. We invite people to occupythecomms.cc group infocake for looking at PDFs - this has group writing pads available (very easy, much like googledocs). Info on occupythecomms: https://occupythecomms.cc/pages/view/90009/activism-and-collaborative-media-methods

On the indymedia mirror the directoryIndex isn't cooperating yet (no folders list) but the files are here. The big ones are in bold, not too much in the others so far found.

You can generate a list of your wget mirror like this with:

$ find -name \*

http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outbound
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outbound/chiefcounsel/Nate%20Hansen%20Email/Public%20QAM.pdf
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outbound/chiefcounsel/Nate%20Hansen%20Email/Public%20CommVault.pdf

http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outbound/chiefcounsel/Nate%20Hansen%20Email/QAM%20Redactions/Fwd_%206_5_07%20Commissioner's%20Staff%20Meeting%20Minutes16.pdf
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outbound/chiefcounsel/Nate%20Hansen%20Email/QAM%20Redactions/Fwd_%206_5_07%20Commissioner's%20Staff%20Meeting%20Minutes27.pdf
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outbound/chiefcounsel/Nate%20Hansen%20Email/QAM%20Redactions/Fwd_%206_5_07%20Commissioner's%20Staff%20Meeting%20Minutes26.pdf
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outbound/chiefcounsel/Nate%20Hansen%20Email/QAM%20Redactions/Fwd_%206_5_07%20Commissioner's%20Staff%20Meeting%20Minutes3.pdf
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outbound/chiefcounsel/Nate%20Hansen%20Email/QAM%20Redactions/Fwd_%206_5_07%20Commissioner's%20Staff%20Meeting%20Minutes9.pdf
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outbound/chiefcounsel/Nate%20Hansen%20Email/QAM%20Redactions/Fwd_%206_5_07%20Commissioner's%20Staff%20Meeting%20Minutes13.pdf
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outbound/chiefcounsel/Nate%20Hansen%20Email/QAM%20Redactions/Fwd_%206_5_07%20Commissioner's%20Staff%20Meeting%20Minutes8.pdf
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outbound/chiefcounsel/Nate%20Hansen%20Email/QAM%20Redactions/Fwd_%206_5_07%20Commissioner's%20Staff%20Meeting%20Minutes29.pdf
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outbound/chiefcounsel/Nate%20Hansen%20Email/QAM%20Redactions/Fwd_%206_5_07%20Commissioner's%20Staff%20Meeting%20Minutes10.pdf
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outbound/chiefcounsel/Nate%20Hansen%20Email/QAM%20Redactions/Fwd_%206_5_07%20Commissioner's%20Staff%20Meeting%20Minutes5.pdf
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outbound/chiefcounsel/Nate%20Hansen%20Email/QAM%20Redactions/Fwd_%206_5_07%20Commissioner's%20Staff%20Meeting%20Minutes11.pdf
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outbound/chiefcounsel/Nate%20Hansen%20Email/QAM%20Redactions/Fwd_%206_5_07%20Commissioner's%20Staff%20Meeting%20Minutes12.pdf
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outbound/chiefcounsel/Nate%20Hansen%20Email/QAM%20Redactions/Fwd_%206_5_07%20Commissioner's%20Staff%20Meeting%20Minutes19.pdf
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outbound/chiefcounsel/Nate%20Hansen%20Email/QAM%20Redactions/r_phone%20for%2027th%20and%2028th....and%20a%20TIP!%20_).pdf
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outbound/chiefcounsel/Nate%20Hansen%20Email/QAM%20Redactions/Fwd_%206_5_07%20Commissioner's%20Staff%20Meeting%20Minutes17.pdf
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outbound/chiefcounsel/Nate%20Hansen%20Email/QAM%20Redactions/Fwd_%206_5_07%20Commissioner's%20Staff%20Meeting%20Minutes22.pdf
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outbound/chiefcounsel/Nate%20Hansen%20Email/QAM%20Redactions/Fwd_%206_5_07%20Commissioner's%20Staff%20Meeting%20Minutes6.pdf
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outbound/chiefcounsel/Nate%20Hansen%20Email/QAM%20Redactions/6_5_07%20Commissioner's%20Staff%20Meeting%20Minutes.pdf
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outbound/chiefcounsel/Nate%20Hansen%20Email/QAM%20Redactions/RE_%20Dieringer%20Pre-Award---IMPORTANT!!!!.pdf
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outbound/chiefcounsel/Nate%20Hansen%20Email/QAM%20Redactions/Fwd_%206_5_07%20Commissioner's%20Staff%20Meeting%20Minutes15.pdf
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outbound/chiefcounsel/Nate%20Hansen%20Email/QAM%20Redactions/RE_%20Dieringer%20Pre-Award---IMPORTANT!!!!3.pdf
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outbound/chiefcounsel/Nate%20Hansen%20Email/QAM%20Redactions/Ray's%20requests.pdf
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outbound/chiefcounsel/Nate%20Hansen%20Email/QAM%20Redactions/r_RE_%20Dieringer%20Pre-Award---IMPORTANT!!!!2.pdf
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outbound/chiefcounsel/Nate%20Hansen%20Email/QAM%20Redactions/Fwd_%206_5_07%20Commissioner's%20Staff%20Meeting%20Minutes30.pdf
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outbound/chiefcounsel/Nate%20Hansen%20Email/QAM%20Redactions/Fwd_%206_5_07%20Commissioner's%20Staff%20Meeting%20Minutes.pdf
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outbound/chiefcounsel/Nate%20Hansen%20Email/QAM%20Redactions/Fwd_%206_5_07%20Commissioner's%20Staff%20Meeting%20Minutes28.pdf
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outbound/chiefcounsel/Nate%20Hansen%20Email/QAM%20Redactions/r_Re_%20MNDOT_MBUF%20Discussion%20guide%20v2.DOC%20(Lucy's%20out%20of%20the%20office%20).pdf
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outbound/chiefcounsel/Nate%20Hansen%20Email/QAM%20Redactions/Fwd_%206_5_07%20Commissioner's%20Staff%20Meeting%20Minutes18.pdf
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outbound/chiefcounsel/Nate%20Hansen%20Email/QAM%20Redactions/Attachments/r_6%205%2007%20Commissioner's%20Staff%20Meeting%20Minutes.pdf
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outbound/chiefcounsel/Nate%20Hansen%20Email/QAM%20Redactions/Fwd_%206_5_07%20Commissioner's%20Staff%20Meeting%20Minutes2.pdf
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outbound/chiefcounsel/Nate%20Hansen%20Email/QAM%20Redactions/Fwd_%206_5_07%20Commissioner's%20Staff%20Meeting%20Minutes20.pdf
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outbound/chiefcounsel/Nate%20Hansen%20Email/QAM%20Redactions/r_This%20should%20do%20it!.pdf
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outbound/chiefcounsel/Nate%20Hansen%20Email/QAM%20Redactions/Fwd_%206_5_07%20Commissioner's%20Staff%20Meeting%20Minutes%20-%20No%20major%20issues%20FYI.pdf
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outbound/chiefcounsel/Nate%20Hansen%20Email/QAM%20Redactions/Fwd_%206_5_07%20Commissioner's%20Staff%20Meeting%20Minutes25.pdf
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outbound/chiefcounsel/Nate%20Hansen%20Email/QAM%20Redactions/Fwd_%206_5_07%20Commissioner's%20Staff%20Meeting%20Minutes7.pdf
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outbound/chiefcounsel/Nate%20Hansen%20Email/QAM%20Redactions/r_This%20should%20do%20it!2.pdf
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outbound/chiefcounsel/Nate%20Hansen%20Email/QAM%20Redactions/r_RE_%20Help_!_.pdf
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outbound/chiefcounsel/Nate%20Hansen%20Email/QAM%20Redactions/Fwd_%206_5_07%20Commissioner's%20Staff%20Meeting%20Minutes14.pdf
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outbound/chiefcounsel/Nate%20Hansen%20Email/QAM%20Redactions/r_headin'%20home%20with%20MBUF%20as%20my%20bedmate....pdf
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outbound/chiefcounsel/Nate%20Hansen%20Email/QAM%20Redactions/Fwd_%206_5_07%20Commissioner's%20Staff%20Meeting%20Minutes24.pdf
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outbound/chiefcounsel/Nate%20Hansen%20Email/QAM%20Redactions/r_Selection%20Committee%20%20(Just%20In%20Case)%20.pdf
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...).pdf
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outbound/chiefcounsel/Nate%20Hansen%20Email/QAM%20Redactions/Fwd_%206_5_07%20Commissioner's%20Staff%20Meeting%20Minutes21.pdf
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outbound/chiefcounsel/Nate%20Hansen%20Email/QAM%20Redactions/Fwd_%206_5_07%20Commissioner's%20Staff%20Meeting%20Minutes4.pdf
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outbound/chiefcounsel/Nate%20Hansen%20Email/QAM%20Redactions/Fwd_%206_5_07%20Commissioner's%20Staff%20Meeting%20Minutes23.pdf
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outbound/chiefcounsel/Nate%20Hansen%20Email/QAM%20Redactions/6_5_07%20Commissioner's%20Staff%20Meeting%20Minutes2.pdf
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outbound/chiefcounsel/Nate%20Hansen%20Email/QAM%20Redactions/Fwd_%206_5_07%20Commissioner's%20Staff%20Meeting%20Minutes31.pdf
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outbound/chiefcounsel/Nate%20Hansen%20Email/CommVault%20Redactions/RECEIVED!!%20%20_)%20%20%20%20MBUF%20Presentation%20Draft_11_16_2009_415pm.pdf
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outbound/chiefcounsel/Nate%20Hansen%20Email/CommVault%20Redactions/RE_%20Temp%20classification%20is%20here!_02_09_2011_128pm.pdf
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outbound/chiefcounsel/Nate%20Hansen%20Email/CommVault%20Redactions/RE_%20Temp%20classification%20is%20here!_02_09_2011_136pm.pdf
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outbound/chiefcounsel/Nate%20Hansen%20Email/CommVault%20Redactions/RE_%20Temp%20classification%20is%20here!_02_09_2011_133pm.pdf
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outbound/chiefcounsel/Nate%20Hansen%20Email/CommVault%20Redactions/RE_%20Temp%20classification%20is%20here!_02_08_2011_1141am.pdf
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outbound/chiefcounsel/Nate%20Hansen%20Email/CommVault%20Redactions/RE_%20CONSULTANT%20CONTRACTs_last%20night!_12_02_2009_1127am.pdf
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outbound/chiefcounsel/Nate%20Hansen%20Email/CommVault%20Redactions/RE_%20Temp%20classification%20is%20here!_02_08_2011_1130am.pdf
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outbound/chiefcounsel/Nate%20Hansen%20Email/CommVault%20Redactions/RE_%20CONSULTANT%20CONTRACTs_last%20night!_12_02_2009_1132am.pdf
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outbound/chiefcounsel/Nate%20Hansen%20Email/CommVault%20Redactions/RE_%20News%20from%20Mileage%20Based%20User%20Fee%20Alliance%20(MBUFA)_04_11_2011_309pm.pdf
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...
http://tc.indymedia.org/files/mndotcake/ftp2.dot.state.mn.us/pub/outboun...

/////////////////

Here is the MD5 hashes for all these files. (for fingerprinting/verification of file uniqueness, accept no substitutes). There are a bunch of apparently empty emails in "redactions" directories - or going to try another PDF reader to see if something is hiding.

a1541603442a1f0a6c2c7487c947e35b Hansen, Nathan 4_20_2011.xlsx

dfc0fd1d4d6bdbcaf0498a50ee0f5fec Public CommVault.pdf 1.22 GB on disk (1,216,990,533 bytes)

cec386cc20000b7fe10297fc3ca0cdab Public QAM.pdf 1.7 GB on disk (1,698,431,132 bytes)

$ cd QAM\ Redactions/

$ md5sum *

2bd53b4d4cfdf5735c6acb3d78dcac68 6_5_07 Commissioner's Staff Meeting Minutes.pdf

ac02fb8d2d000af38df63e9d6804a5bd 6_5_07 Commissioner's Staff Meeting Minutes2.pdf

bb562e176106b9436968ec57312fd74c Fwd_ 6_5_07 Commissioner's Staff Meeting Minutes - No major issues FYI.pdf

cbbb2e9d9d81892a865d6539216d768c Fwd_ 6_5_07 Commissioner's Staff Meeting Minutes.pdf

5294e1ef211a8a2de42749ab525b53ff Fwd_ 6_5_07 Commissioner's Staff Meeting Minutes10.pdf

dba29ffb9fc67b3a389dbfc7e67ea8f7 Fwd_ 6_5_07 Commissioner's Staff Meeting Minutes11.pdf

e77272f7a0b33506dbf7e284f553bc58 Fwd_ 6_5_07 Commissioner's Staff Meeting Minutes12.pdf

8b0f53991f8b62fc2d1c92407839a4cc Fwd_ 6_5_07 Commissioner's Staff Meeting Minutes13.pdf

a6b449f524250717b8fcdbac45abe537 Fwd_ 6_5_07 Commissioner's Staff Meeting Minutes14.pdf

c0b806598d33db35b25a167558e61dca Fwd_ 6_5_07 Commissioner's Staff Meeting Minutes15.pdf

3243ea3f27b71c5da5d8aa146033fd45 Fwd_ 6_5_07 Commissioner's Staff Meeting Minutes16.pdf

091a17b9fd52dcb52f8ee9f2e1087426 Fwd_ 6_5_07 Commissioner's Staff Meeting Minutes17.pdf

61f4122e7d61e84099bcd39479c389a0 Fwd_ 6_5_07 Commissioner's Staff Meeting Minutes18.pdf

f8537cda72dc63a7dd3e6fd5bdf96f80 Fwd_ 6_5_07 Commissioner's Staff Meeting Minutes19.pdf

1dc010c5ff89962ae132c242d99cdd4e Fwd_ 6_5_07 Commissioner's Staff Meeting Minutes2.pdf

d005b7b9edf6acf4046e57f0f157b098 Fwd_ 6_5_07 Commissioner's Staff Meeting Minutes20.pdf

0b9c231b2a572b29bc0b26e533b49416 Fwd_ 6_5_07 Commissioner's Staff Meeting Minutes21.pdf

9234a884059b1667134a3a60438da49d Fwd_ 6_5_07 Commissioner's Staff Meeting Minutes22.pdf

16095da57ce2c90ab73ea3acb470231a Fwd_ 6_5_07 Commissioner's Staff Meeting Minutes23.pdf

e834fc715abed962a5926db379b7d47b Fwd_ 6_5_07 Commissioner's Staff Meeting Minutes24.pdf

44bc416f5ed69a62dbc3284bddf45be4 Fwd_ 6_5_07 Commissioner's Staff Meeting Minutes25.pdf

93db674814645af1a9b2e3b86e0cedbb Fwd_ 6_5_07 Commissioner's Staff Meeting Minutes26.pdf

7dfb0294d4e9916117d48f87399396b4 Fwd_ 6_5_07 Commissioner's Staff Meeting Minutes27.pdf

0d1e549ec6911fb272c273cc9cdb85d2 Fwd_ 6_5_07 Commissioner's Staff Meeting Minutes28.pdf

af0b4c77b40a92f007f6de0937689666 Fwd_ 6_5_07 Commissioner's Staff Meeting Minutes29.pdf

14ad0e9eaf2a1ec784a7f64a4677d1fd Fwd_ 6_5_07 Commissioner's Staff Meeting Minutes3.pdf

eb3c3a2ab081cd011cb8dc3cc4220c17 Fwd_ 6_5_07 Commissioner's Staff Meeting Minutes30.pdf

babb6166d521b7bd5e3da38e549101b9 Fwd_ 6_5_07 Commissioner's Staff Meeting Minutes31.pdf

faa33837481a7ea9ce5389301005d276 Fwd_ 6_5_07 Commissioner's Staff Meeting Minutes4.pdf

ec283884cf4eb57c1902f554c6daf88a Fwd_ 6_5_07 Commissioner's Staff Meeting Minutes5.pdf

fd3955363a06c5e4f073b9a0eb685dce Fwd_ 6_5_07 Commissioner's Staff Meeting Minutes6.pdf

9bb8bb439de8ebd31245d9e5c8039ba1 Fwd_ 6_5_07 Commissioner's Staff Meeting Minutes7.pdf

7e8d8bf30cb1979c98d26b68f74b4354 Fwd_ 6_5_07 Commissioner's Staff Meeting Minutes8.pdf

5e691539c7ab6721cd39e1739a63c977 Fwd_ 6_5_07 Commissioner's Staff Meeting Minutes9.pdf

eaf5422b97c8ada9bc1a2e2eebfef0bf Fwd_ MNDOT_DOCS-#573688-v3-MBUF_EXEC_SUMM.DOC.pdf

17f5832daf02053ece137906874516a2 Fwd_ Re_ CANCELED TONIGHT.pdf

4324e83ef735d5e77d99dfd22044224f Fwd_ Re_ Contract 90815 with The Dieringer Research Group; Mileage Based User Fee et al.pdf

3b7488cce7ecd2166663f08279cfc3dd Fwd_ Russian exchange program.pdf

fdd5552a9a0a29ea87998d4836e80e96 RE_ Dieringer Pre-Award---IMPORTANT!!!!.pdf

d0658a06b65516fca4053fc9b36ecb8c RE_ Dieringer Pre-Award---IMPORTANT!!!!3.pdf

0dbcad4857d9b6403a2e853cd78c6972 RE_ Dieringer Pre-Award.pdf

a1d456e7e7b594fe400f3848aa11e98c RE_ Dieringer Pre-Award3.pdf

6fd5adfd694451487ccdf26373eeab55 Ray's requests.pdf

39468301435c56e3ec93fc588c92819a Re_ Fwd_ Fox 9 follow up.pdf

58e487d24be75a7d253941dde63b08fc Re_ Fwd_ UPA.pdf

f01b3471912eedfdba901c0c593de83a Re_ Fwd_ UPA2.pdf

d3b3a8c4347947539ca68b1e9c1d6e51 Re_ MBUF_ Invoice Questions.pdf

b063347fb895a472d4dbfd830646ddad r_Final payment on MBUF.pdf

d215cb89c3fd54140daf25b9ef8284ce r_MBUF Session at Research Conference.pdf

5b355449e4377a26817cd4c6811596bf r_MBUF_EXEC_SUMM.DOC.pdf

62531bda63cf387a9af54c603c485f05 r_MNDOT_DOCS-#573688-v3-MBUF_EXEC_SUMM.DOC.pdf

9d58ff05a42d717ab21fb16b025ae57a r_One-pager on MBUF.pdf

00498befc398512b83fd12a504885117 r_RE_ Couple quick thoughts for the morning....pdf

f7f56814799552a8c7623a05651abf6a r_RE_ Dieringer Pre-Award---IMPORTANT!!!!2.pdf

21f3cd6184330313fd4c968a7f028cbd r_RE_ Dieringer Pre-Award2.pdf

44b00634488d6c0a4047f001d0458fe0 r_RE_ EGADS___.pdf

ab4a3171454d293faf05282fd2d83eec r_RE_ Help_!_.pdf

0fd3fb1e29875e32749ea7c14c04c3f4 r_RE_ RE_ MBUF 3 Informational Materials.doc.pdf

326fc5ab634d7bfedb4c1bb5f301f2c0 r_RE_ Revised Proposal.pdf

4653657972f849fd9a1c7054079d000c r_RE_ Weighting issue_ new thought_.pdf

c61c3d6a1ef1be417f9d00c7be8b77cb r_RE_ dang, did it again.....pdf

91179ab7d3629f5762bd8e18ab4afca5 r_RE_ tomorrow_ or... in the meantime....pdf

08d3bea45066ef0c5d509828947797d8 r_RFI Responses.pdf

e507c028247157bf0860a7ed793f429a r_RFI Responses2.pdf

9cb9fe08acb375b3ddfbedfb27c640fe r_RFI Responses3.pdf

3d9ee0668e57b78f837885a77e7afe80 r_Re_ WANT INPUT FROM RW_KM- Re_ Notes from the second pretest.pdf

477daab48437d06bbc3d48763f849c09 r_Re_ Any MBUF updates_.pdf

5db8f9421c5edf2810be6964febc0d4c r_Re_ Budget review.pdf

4606fdd159fd22f59b610edfddd6e8ca r_Re_ Checking in.....pdf

51f6f0c7e5b327a6378b96dc2d0ba936 r_Re_ Contract 90815 with The Dieringer Research Group; Mileage Based User Fee et al.pdf

4ab4226505ba43336ca2ddfb864de016 r_Re_ Contract 90815 with The Dieringer Research Group; Mileage Based User Fee et al2.pdf

c980c15aa1358178a1766ce97f04f090 r_Re_ Contract 90815 with The Dieringer Research Group; Mileage Based User Fee et al3.pdf

37258df0b414af50f8c64d51e0bcf500 r_Re_ Contract 93707.pdf

63c77560c995c1f95af81637e25a0cbf r_Re_ Div. Directors.pdf

fb76beed27f4086fc713c6d6bc59159c r_Re_ Final payment on MBUF.pdf

0c045b993642661cfc57e47d2998f539 r_Re_ Focus Groups_ MBUF.pdf

13369f6c2c7d1f15947be9f5451ecf3e r_Re_ MBUF FAQ.pdf

c0f66f0d95a6bb505dfe5a152f4a6d04 r_Re_ MBUF FAQ2.pdf

6768b6bb46892736ca405151827dc3e1 r_Re_ MBUF FAQ3.pdf

5548eb744fdefe5edc438d777aee0e7b r_Re_ MBUF Posting.pdf

f452cc41fb449ac5a532fe69e36f9aae r_Re_ MBUF TRB Paper.pdf

fdc671465cca77c1ac28c624c66eec60 r_Re_ MBUF TRB Paper2.pdf

15fdbfc26e9c1d7d1d75bebf19bd3d4b r_Re_ MBUF TRB Paper3.pdf

f9064a7d54b55dbdfee12201f5a6d6fb r_Re_ MBUF TRB Paper4.pdf

1ea6c324c4810a187fbb466f090e9dc8 r_Re_ MBUF TRB Paper5.pdf

ee2bf6d95d1dde47efad543d7fcd72f7 r_Re_ MNDOT_MBUF Discussion guide v2.DOC (Lucy's out of the office ).pdf

908d43977c57905893b1876c3743680b r_Re_ MNDOT_MBUF Discussion guide v2.DOC.pdf

c953af1a4399e1c7186b760163d22cf4 r_Re_ PAYD Market Research.pdf

2c3ff87a050058633837b932e27ffdf3 r_Re_ Presentation of MBUF Public Perceptions Study.pdf

ab603f4bed9c05693a38a2fbbbfab8dd r_Re_ RFP Questions - 3.pdf

971fa164a5f7b261c89828bf7abc9396 r_Re_ What time do you think you will go to lunch__.pdf

1322615f623d2ad114f056d96ac22800 r_Re_ What time do you think you will go to lunch__2.pdf

2e4cac2496e0ae647c75c03336ea1365 r_Re_ What time do you think you will go to lunch__3.pdf

d1cc38d07c46de1d9603c9d0e34c9e46 r_Re_ checking on your status.pdf

b0ee689930c73f8f899ef89dc65996b0 r_Re_ project status.pdf

d98803d63a7121d7475fa402037bde55 r_Re_ project status2.pdf

75339d3c33fa450cde6aeb9f61d4cf46 r_Revised Proposal.pdf

2b719b5df5c7e94cb4c254a923a77029 r_Selection Committee (Just In Case) .pdf

9b858373c2c295719101426381877004 r_This should do it!.pdf

3e0a41234df919fc5748fb0f3733f5a0 r_This should do it!2.pdf

3c0202bf34f06fca292a363ded23d808 r_Travel Authorization Signatures.pdf

4ff5b016ecab1a8194ba82d1f3166166 r_What time do you think you will go to lunch__4.pdf

f9b137390f0e4be87d0eacc412e55cbf r_headin' home with MBUF as my bedmate....pdf

74da3639cfd3c5cad57a802cfb571df6 r_last Friday....pdf

8a720e445fbd86bae91c273b7ee94bec r_meeting today.pdf

01517f469063f9f88b231abbf3c60fe0 r_phone for 27th and 28th....and a TIP! _).pdf

1893859cb7ef79f3e8edeaa57e6d40bc r_to hear the second pretest interviews_.pdf

ec21dda39b263e35e15ffa1a7106e3d7 r_up and taking nourishment _).pdf

$ cd ../CommVault\ Redactions/

$ md5sum *

4526805e569ac612e8b47e0baa0f18c5 Bernie Lieder Update_04_12_2011_316pm.pdf

965a35632c7ee3c5b4a77953c819b6e7 Email address_04_19_2011_152pm.pdf

ea00a30ddde74758dfb632444ee17554 FW_ MBUF Online Community_02_14_2011_122pm.pdf

c30785e48c44ab468535c835ea8808ca FW_ MBUF Symposium & PAYD Insurance_03_23_2010_1002am.pdf

ae3f69040f670c509ed143bf937abeb6 FW_ MBUF_12_10_2010_1006am.pdf

1f217b45f730ab22fa987aec48ec1797 FW_ MnDOT Snapshot - Reaching Older Generations_02_23_2011_1143am.pdf

6c04c8b976f6c6615aaf1f3e553eef4a FW_ Mn_DOT MBUF RFP_08_10_2010_1032pm.pdf

be0486bbafba485cf73e797cf57cce1d FW_ TRB_01_06_2011_1148am.pdf

5dd29c7fdc005ea0d1872b7b50db4f9c FW_ Temp classification Ready for your review_11_17_2010_330pm.pdf

da1c6529e24b3aeb622e465810d2493d FW_ Terminology for legislation_12_02_2010_832am.pdf

60526ffba0b83ed3ca2de4b1d0ee4d93 FW_ US-2 Alternative Risk Analysis_12_02_2009_126pm.pdf

356efd4378b9f723631510c6da3ab9ec FW_ my schedule_06_02_2010_339pm.pdf

8134913b6cb4291df781450444fad923 Fw_ MBUF project name_03_18_2011_405pm.pdf

4806c46d5527908e4f5d6d69ecc3fb9e Fw_ MnDOT Snapshot - Reaching Older Generations_02_23_2011_358pm.pdf

03a2a1ca03c16fb5b1cbec671111a729 Fw_ TRB_01_06_2011_937am.pdf

14db70ba2b1af71c30c850b9a6470dd5 Hansen, Nathan 4_20_2011.xlsx

abb315692a9475591a3f3ebebb2ca0df I-394_05_20_2010_848am.pdf

484c3fad46b8460e8cc8e024d44b2eda Letter to Administration and IPAD_02_21_2011_221PM.pdf

30f936b3baf79c8a3f4adf0c37b9cd17 MBUF Exec Summ in one pager template.docx_02_24_2010_139pm.pdf

54447e231cc5e7d1d12d52cfcb2cb51e MBUF Online Community_02_11_2011_1223pm.pdf

8144d33f994c47817ec2ea44e06ec98a MBUF Project_02_08_2011_143pm.pdf

b27c2fdf06cd476d21c4e66b772d3fb1 MBUF_10_22_2010_839am.pdf

be348e1362ac6ccece5756bcf754d3f1 MBUF_11_30_2009_1013am.pdf

c4b6a0285baa57dfd06cc49e19228773 Mbuf name_02_23_2011_1141am.pdf

274c29d8c6e94608478aa42efaad281e MnDOT & Communispace weekly call agenda_02_25_2011_919am1.pdf

71d3478d4d6332dc22e6c575ef2e0512 MnDOT & Communispace weekly call agenda_02_25_2011_919am2.pdf

39d76453ecd31324635d95e3891e9d13 MnDOT Snapshot - Reaching Older Generations_02_22_2011_943am.pdf

671fe8c19a2f81667a52fe78075655b1 MnDOT Snapshot - Reaching Older Generations_02_22_2011_944am.pdf

b135755acaa77b327ddd2f8339179b0c RECEIVED!! _) MBUF Presentation Draft_11_16_2009_415pm.pdf

886befdaa2332b043dc63e9800f8f6f6 RE_ CONSULTANT CONTRACT EXPIRATION ALERT_12_01_2009_1035am.pdf

d63301b6ab7408fd335ecd01c22bfba9 RE_ CONSULTANT CONTRACT EXPIRATION ALERT_12_01_2009_1059am.pdf

c3c35a0da620de7e9fabf3e281b33cd1 RE_ CONSULTANT CONTRACTs_last night!_12_02_2009_1127am.pdf

66c4c8e5721a887186ef32c29e24ff93 RE_ CONSULTANT CONTRACTs_last night!_12_02_2009_1132am.pdf

78d6d6ef56ecfc67fcaf61e5a332127a RE_ I-394_05_20_2010_902am.pdf

05df7eaf8b317c80f13820f1e1cee14b RE_ IntelliDrive MBUF Project_12_16_2009_333pm.pdf

2b7f16e797a7a0c6ad62c7ed1333b8f5 RE_ IntelliDrive MBUF Project_12_16_2009_810am.pdf

9a0cec08313abcf1c9ca70c658f80e14 RE_ Letter to Administration and IPAD_02_22_2011_927AM.pdf

e30e6e048ba92ef1a599a2600bd6498f RE_ MBUF Exec Summ in one pager template.docx_02_24_2010_154pm.pdf

70c7b32debe5a55e2f8f2d67bebb76b8 RE_ MBUF Focus Group_01_17_2011_511pm.pdf

50e47e4450bab89d5500f5eb35a036a4 RE_ MBUF Online Community_02_11_2011_1225pm.pdf

92fcfc9630992a333dc3b46bd48732c4 RE_ MBUF Online Community_02_11_2011_1231pm.pdf

f027c45acab6e57b1d36e24d0ee93772 RE_ MBUF Online Community_02_15_2011_1100am.pdf

a1b6ce5cde68ea77a9c23c95ea8dcb9a RE_ MBUF Online Community_02_15_2011_1129am.pdf

deb5838863a641688c6e7c85ece7b5db RE_ MBUF Policy Kick-Off Meeting_12_01_2010_1236pm.pdf

7899b2e46e7bbc1d7d3dab6b67204ef8 RE_ MBUF Policy Study Draft Online Survey Approach_02_03_2011_1206pm.pdf

04a3bd71953c8a3116c6d5302d71b583 RE_ MBUF news release going out today_04_18_2011_419pm.pdf

0f97d747bd627273951ae52d9f47af52 RE_ MBUF news release going out today_04_18_2011_506pm.pdf

5d7c9d7b938d012327ad74e8adc1c6ef RE_ MBUF news release going out today_04_18_2011_603pm.pdf

1108a01bc5647242129db848b1968ad0 RE_ MBUF project name_03_18_2011_424pm.pdf

9d04bdc4f3d47bd9aa6a42cc86e8111c RE_ MBUF project name_03_18_2011_425pm.pdf

e1b29a363a67381a2bf62b520b81c54b RE_ MBUFF meeting today; cancelling_04_15_2011_215pm.pdf

2b62cff8e2356af2367a533757fecd3c RE_ MBUFF meeting today; cancelling_04_18_2011_830am.pdf

8c6f28f8bfad5e6269be821d90a38ef3 RE_ MBUF_11_30_2009_1149am.pdf

e44110f22e541bd4e66165e507305409 RE_ MBUF_12_10_2010_1103am.pdf

999925ec95ed3a13e110e798bf1555c1 RE_ MBUF_12_10_2010_1111am.pdf

27a82743582cefc14bb61353f8551a06 RE_ MBUF_12_10_2010_950am.pdf

27956fe15cf55ca0c7f0287b03148ea6 RE_ MBUF_12_10_2010_953am.pdf

81af256a23a3809ff8bb8d622b70d4a0 RE_ MBUF_12_10_2010_954am.pdf

3e13a81758d56493a83f5c7428ed370b RE_ MBUF_12_10_2010_955am.pdf

19d4fb79563af9ee4d8fdd44b9ee2508 RE_ MBUF_12_10_2010_957am.pdf

f9f6f496419b156db9f74f4f7683f83b RE_ MNDOT & Communispace weekly call - 2_15_02_17_2011_236pm.pdf

5b8361f64e68eab5c8a8342fbcfda50d RE_ Mbuf name_02_23_2011_1144am.pdf

006f09322d12e50fb6f0f819bea23fbe RE_ Media contact-mileage based user fee_04_19_2011_319pm.pdf

f1ee5606964818951a6c908260505a4a RE_ MnDOT & Communispace weekly call agenda - NOTES_02_28_2011_957am1.pdf

cb9614632da4c99f2b63cab39767a502 RE_ MnDOT & Communispace weekly call agenda - NOTES_02_28_2011_957am2.pdf

dc0c94c5bda4f38f9b50e5bbee1adeb1 RE_ MnDOT Snapshot - Reaching Older Generations_02_22_2011_504pm.pdf

4700a7736adc778ff83d49f14c6ab184 RE_ MnDOT Snapshot - Reaching Older Generations_02_23_2011_1153am.pdf

7ab57aca29541ad59aa8cb4aa735396d RE_ MnDOT Snapshot - Reaching Older Generations_02_23_2011_12483.pdf

e8021d8f7e3afdd8629541fd1a9b0cc3 RE_ MnDOT Snapshot - Reaching Older Generations_02_23_2011_1248pm.pdf

fa54ec8e94bf5fb5cdbe3fa6e1c4db9f RE_ MnDOT Snapshot - Reaching Older Generations_02_23_2011_1248pm2.pdf

3218af37335c0e06c3f3b9a011b19e39 RE_ MnDOT Snapshot - Reaching Older Generations_02_23_2011_328pm.pdf

eb696b4ffeee4e306e2eb7e484bba2d6 RE_ MnDOT Snapshot - Reaching Older Generations_02_23_2011_331pm.pdf

2dd4f45c1331c9db6bc6ad13cad669e7 RE_ MnDOT Snapshot - Reaching Older Generations_02_23_2011_331pm2.pdf

6dcab9c1d50ee4793d1c2f50ac5c1aac RE_ Mn_DOT MBUF RFP_08_11_2010_1031am.pdf

8d4ac4b9986a2dee1ebdf640cc241aa4 RE_ News from Mileage Based User Fee Alliance (MBUFA)_04_11_2011_309pm.pdf

e210a430bee280107a58c426d63a4bdd RE_ Next steps_Action Planning_12_03_2009_124pm.pdf

dd51eb0f42aea93f113ff5753b23f7f5 RE_ TRB Presentation_01_28_2011_125pm.pdf

4dc9010d0d7df27e8d5dd8689beebd0b RE_ TRB Presentation_01_28_2011_133pm.pdf

f910d3770ae1253cb5a096f9fc89be26 RE_ TRB_01_05_2011_543pm.pdf

3559e8bf7034bd767690c270c54aa1d8 RE_ TRB_01_06_2011_1111am.pdf

be8de9d4e1d3f82ab1a7567cbbbd0db2 RE_ TRB_01_06_2011_1116am.pdf

276086ae4495d14e7cbb077238747743 RE_ TRB_01_06_2011_1136am.pdf

de5827e592a282eea1853abaf717bc0d RE_ TRB_01_07_2011_840am.pdf

1e20ee8d269538d3c51f1e4a394813a9 RE_ TRB_01_07_2011_848am.pdf

29bbb01ead3b247be765ae31ccc4af0b RE_ TRB_01_24_2011_450pm.pdf

b44878a8ba14e90d657e411ad8d6f3f8 RE_ TRB_01_26_2011_620am.pdf

0c08f27a10d2e6df4d0562d7a6f1c0ff RE_ TRB_01_26_2011_801am.pdf

76495b1ee7bf01d8cd82d00f844a3df4 RE_ Temp class_02_17_2011_412pm.pdf

2f0318acfd3b1dcb960d5ea3a58a3264 RE_ Temp classification Ready for your review_11_17_2010_636pm.pdf

920a5c9704de481feb63d517712c1bbc RE_ Temp classification Ready for your review_11_18_2010_1105am.pdf

91d9a6e0ecaccd8038d737fb9e018548 RE_ Temp classification is here!_02_08_2011_1130am.pdf

f00a78733245cdb151b70161e8b0c6c6 RE_ Temp classification is here!_02_08_2011_1141am.pdf

88084dd4767ce27fb1c98cab13fe86c8 RE_ Temp classification is here!_02_09_2011_128pm.pdf

325966f645ec703d7da2d357249d6678 RE_ Temp classification is here!_02_09_2011_133pm.pdf

5c900f9cadf4e5037c0cd14da33e283c RE_ Temp classification is here!_02_09_2011_136pm.pdf

eb559b717547c18aa1ce5de7f4a334fb RE_ This AM_06_11_2010_934am.pdf

1d52160c492897b3bca16ee9df7ffa8b RE_ VM yesterday_12_05_2009_1131am.pdf

6be20bbfc07fe87eaecab816bc64e9dc RE_ another version of the policy study overview_01_07_2011_835am.pdf

3eebed34ca6fdfd6224366da55a0364e RE_ another version of the policy study overview_01_07_2011_932am.pdf

221e425208d0c9dea2da17e21cedaf78 Re_ 2010 MBUF Symposium Call March 12, 3 p.m. Central time_02_27_2010_1006am.pdf

4a7ad39b42e8063a51090e4dfc4c9ac3 Re_ Jon H.2_01_05_2011_759am.pdf

bf84169642681c0393244cbdb2661a3e Re_ Jon H._01_05_2011_838am.pdfbf84169642681c0393244cbdb2661a3e Re_ Jon H._01_05_2011_838am.pdf

ec3787db74d4c1110113c0b45f0a355e Re_ Letter to Administration and IPAD_02_22_2011_155PM.pdf

7cb7973b2280ba2688b13512ebcb7625 Re_ MBUF Policy Meeting_03_02_2011_215pm.pdf

739ed2f8cadb31733edb0fdfd97f04e7 Re_ MBUF_03_31_2011_714pm.pdf

5cabfd708b4c7a48068bcb609c853d79 Re_ MBUF_03_31_2011_824pm.pdf

4ee94529b2e9ec85f9f64693e0dff2cf Re_ MBUF_12_09_2010_911pm.pdf

2ea238fe33918e7b7eebc5ac7ec96c1e Re_ MBUF_12_10_2010_1047am.pdf

5baa528dfaecef9cd4ed408f2d94a650 Re_ MBUF_12_13_2010_746am.pdf

f7adb768801ba9af6150f1cbc9053a97 Re_ MnDOT Snapshot - Reaching Older Generations_02_23_2011_155pm.pdf

8bc02ad9e7444b670486bc1fc4f1fb2c Re_ MnDOT Snapshot - Reaching Older Generations_02_23_2011_323pm.pdf

36fdd9e21207b2267c0d13fbb8baad70 Re_ TRB_01_25_2011_148pm.pdf

7c3a94657f2afb64691f52ede7db19cb Shortened Presentation draft_11_18_2009_104pm.pdf

e82b4a99ead5133167d892c292950a64 Temp classification citations and final Attachment _11_18_2010_146pm.pdf

e3a1eb76c041f03400532d26a93c01b7 Temp classification_11_09_2010_420pm.pdf

f35b892dcd07cae5ef763765ec8e8989 VM yesterday_12_05_2009_718am.pdf

ad284dd91760b55caa43d94947bcb309 my notes from focus group_07_15_2010_1042pm.pdf

5ec009dc1d2b30fd7180043d71e431d2 my schedule_06_01_2010_306pm.pdf

df2c566cec38e930b2fc0b89c5467048 note changes per my vm on your cell...._07_22_2010_1142am.pdf

adcbf8b475c7158e8800c223e06b1783 r_VPPP Grant Apps_02_03_2011_905am.pdf

2bc792828e021379bd6508c0a8e5e808 your 3905 and 3924_ classifying data_12_21_2010_403pm.pdf

$ cd ../QAM\ Redactions/Attachments/

$ md5sum *

3fd8f0f9226e7b23383fb4e9820800ef r_0584_001.pdf

5fe5e205e8c9673a577d2acb389fbbd7 r_09xxx Dieringer 2009 FHR Cost Detail.pdf

8b56f9fb39fa8b7a6d58e2b2da23776c r_09xxx Dieringer 2009 FHR Cost Detail_for revi.pdf

e22812037eada83aecf6311eb08a7b4a r_1.30.07 Commissioners Staff Meeting Minutes.pdf

f713229f7f300f227589bd89aaad2002 r_2.06.07 Commissioners Staff Meeting Minutes.pdf

f3375414fc619ee175b5dc224a5e07a1 r_2.13.07 Commissioners Staff Meeting Minutes.pdf

22f6f34e84981638ffa263c1f5a434fd r_6 5 07 Commissioner's Staff Meeting Minutes.pdf

52a28aea5fffa90a906a41dd04d6ea5c r_Addresses_2009.pdf

8c31824d4de7622ffcffaf8d4a44fcd4 r_Fwd_ Re_ CANCELED TONIGHT.pdf

d52b1e9786833b3d758a0e642afd0507 r_Grants-dot-gov-20070522131848652_1.pdf

cf02b8b051229580d130fadce52e7a67 r_MNDOT_DOCS-#573688-v3-MBUF_EXEC_SUMM.DOC.pdf

0298e9beac45b9d02e9c3c5f3e4fae96 r_Re_ Contract 90815 with The Dieringer Research Group; Mileage Based User Fee et al.pdf

///////////////////

More on this as stuff develops. Happy tracker hunting!

ECHELON GCSB military surveillance vs New Zealand & Kim Dotcom; IRC logs on Anonymous false flag attacks viewed anew; Barrett Brown setup via #OpCartel

"<omg> i'm one of those horned rimmed guys sitting behind a desk in DC dreaming of ways to manipulate Anonymous for UK's and USA's purpose :)" Backtrace Security - Pastebin.com http://pastebin.com/KtLfurP1 -posted BY: A GUEST ON MAR 16TH, 2012 | SYNTAX: NONE | SIZE: 9.62 KB | HITS: 833 |

/// UPDATE OCT 23 1AM: YET ANOTHER SHADY OP with links to OpCartel material turns up! YE GODS! Even more #OpCartel related shadiness: Anonymous hive instantly rejects @FawkesSecurity feds/contractors/fools posting violent threat, false flag or buffoonery ///

Dragging a big post together here because it's a loose thing, happening in real time, with some old logs illustrating new predicaments from New Zealand to Texas. All of this post material is out in the open, not SpySquirrel material, but drifting by quick. Everything here seems pretty tenuous but might be useful to have for review. If nothing else there is kind of an old school global hacker madness tone tying this all together, hard to tell what is truthful & hype :-/ Mostly just raises a bunch of questions for further inquiry.

Wired is covering the Kim Dotcom case - one of the world's (literally) biggest cloud hosting provider CEOs taken down by the New Zealand government and FBI; the case is collapsing in court and it's been admitted that their NSA spy sigint equivalent GCSB was illegally spying on him - even the Prime Minister had to apologize. Suggested to search Topsy.com for "GCSB Surveillance" "GCSB Scandal" etc.

Checking into backstories kind of related to realtime events From New Zealand & found some new info from Decentralise Occupy (endarken) on Twitter. There was an #O20 anti-austerity protest this weekend and a complex surveillance scandal unfolding. I don't really agree with endarken's conclusions about a bunch of things, however there is a lot worth looking at. First the New Zealand Dotcom/Surveillance scandal - let's mainline some New Zealand surveillance state inside-Cricket fail - or here is a news clip running down the illegal NZ GovOps:

The problem with riding out a political controversy is that it makes it very hard to draw a line underneath it.

High profile resignations eventually allowed the Government to draw a line under the ACC mess.

Compare that to the problems Mr Dotcom is causing, which are numerous and largely unresolved. John Banks' involvement is still creating fallout, with the Prime Minister again having to back his coalition partner. This is despite revelations in a letter from Banks' lawyer that the Act leader - who repeatedly stated he had nothing to hide - was concerned about what journalists and Opposition MPs might do with his statements to the police - see: Key still backs Banks, despite letter.

Of course the actual statements are still to be revealed - another political grenade waiting to go off, even as related issues keep John Key occupied. David Shearer's claim that there was a video of the PM discussing Kim Dotcom in February clearly wasn't a knockout blow and as Patrick Gower reports, Shearer's Labour colleagues weren't exactly enthusiastic in support - see: Has Shearer's GCSB claim backfired?.

In the (un)parliamentary melee that erupted as John Key sought to correct a previous statement to the House there were no real blows landed, just some brawling that was difficult to referee - see: Jane Clifton's Smith on a hot tin roof with points-ordering. As Corin Dann points out, however, that is probably enough for the opposition at the moment: 'The fact is that the Government is now having to fight a number of fires on different fronts. It's starting to look a little rattled' - see: No 'gotcha' moment for Key.

The nature of the GCSB may also be preventing Key from dealing with the politics of the issue says Patrick Smellie: 'If lawyers are unwilling to be open about the truth, spy agencies are both obliged and pathologically inclined to withhold information. He simply can't defend himself. In the process, however, his position is eroded' - see: Trust easily lost in age of new media. However, heads may be beginning to roll at the spy agency, albeit slowly, as it appears Hugh Wolfensohn - a key player in signing off on the illegal spying of Dotcom is on 'gardening leave' - see Patrick Gower's Senior spy faces sack over Dotcom debacle.

There will undoubtedly be some gardening leave on offer soon at the Ministry of Social Development. The seriousness and scale of the problem has been underlined by the head of the Government's IT programmes being ordered to do an urgent stocktake of all public computer systems in use by government departments: - see Claire Trevett's Scramble to safeguard IT systems.

Despite denials that the Minister, her office and her department had nothing to do with the outing of Ira Bailey, suspicion remains. Not least because the Minister has a track record: 'Ms Bennett has done a similar thing in the past, releasing the weekly benefit details of a solo mother who challenged a National Party policy. Green Party co-leader Metiria Turei wants a forensic investigation of the computers in Ms Bennett's office' - see: Bennett accused of breaching privacy again. There is clear evidence that Bailey's identity was known in the Beehive. Holly Ford, a member of Ms Bennett's staff, checked out Bailey's LinkedIn profile just before it was leaked to the Herald's Claire Trevett - see: Chris Keall's LinkedIn trail leads to Bennett's office - Ng.

The independent journalist at the centre of it all wasn't impressed with his source being forced into public view, but Keith Ng will be happy with the public response to his work - over $5,500 in donations so far to support his work - see: Blogger raises donations for breaking Winz story.

KimDotcom tweets a news clip on this thing unfolding & more here. Roughly speaking @endarken says... well if i can paraphrase, between the industrial surveillance on Dotcom, the new State Dept cables and others, chunks of the overall surveillance grid are getting exposed in operations from New Zealand to the US. In New Zealand right now the Dotcom surveillance issue is really cooking!


newzealand-dotcom.pngNZ-dotcom2.png

Other things from down under & thereabouts surfacing, including the industrial-strength US-backed spying campaign against MegaUpload proprietor Kim Dotcom, a combination of stuff including Australian diplomatic cables -- cables also showing PM Gillard being noticed as friendly new Leader material for Australia with a thumbs-up from US intelligence.

False Flagging Mossad website attack: Let's get to this purported IRC log @endarken highlights from many months back, which purports to show two hacker-handlers bragging about creating Anonymous false flag operations. The first idea is that "omg" tries to have "rooster" get "zeekill" to jam the Mossad's public website enough to cause a news story -- then they joke about their previous #op false flags and jeopardizing Texas journalist Barrett Brown's life by starting the #opCartel fight between Anonymous & the Zetas Mexican drug trafficking cartel. (google that one)

This could be another spoof writing (packs rather a lot of info, srsly) but it's getting a lot of renewed interest now, if the hit counter's any indication: http://pastebin.com/KtLfurP1

<rooster> Tell me what you told him.

<omg> <omg> just get zeekill to use his BR roots to hit mossad's IP for 20 hours and i'll make sure you and zeekill are free to stroll along with no more interference from "external" parties

<omg> <omg> or if you want just 8 hours

<omg> <omg> enough to have reporters verify Mossad's tango down

<omg> i'll make sure Interpol doesn't get a red notice on him

<rooster> why.

<omg> his little panda security stunt and with #antisec hacking the site is what will get his ass hauled by SUPO to Spain

<omg> this is what i call leverage

<omg> <omg> do you know it wasn't Sabu's idea to tell Anarchaos to deliver the emails?

<rooster> yes, i know abou that.

<omg> that was my work, along with other stupid Anonymous false operations such as

<omg> #opcartel, #opglobalbackout

<rooster> Yes, that's fine. i know

<rooster> about all of that.

<rooster> i want to know

<rooster> why.

<rooster> not only, why did you do it.

<rooster> why are you now

<rooster> telling people.

<omg> <omg> i'm one of those horned rimmed guys sitting behind a desk in DC dreaming of ways to manipulate Anonymous for UK's and USA's purpose :)

<rooster> if this is true.

<rooster> give me contact information.

<omg> Anonymous never had leadership that's why it was so easy in the last 6 months

<omg> tell your handlier in NYC

<omg> he'll know

<omg> FBI plays by the books

<rooster> alright. i'll be in touch then.

<omg> however guys like me in counter intelligence don't

<rooster> you'd be surprised.

<omg> oh i know

<omg> don't worry :) i have friends in JTTF

<omg> i assume your magneto's handlier?

<omg> if so call up Philip Selton in DC he's a good friend of my

<omg> tell him 'B' is up to his old tricks

<rooster> i'll look into that. that's what i needed in the first place.

<rooster> Thanks.

<rooster> im working on something of my own, it's a bit in your department, but i need to talk to someone official about it.

<omg> trying to mitigate the Strafor email damage unfortunally

<omg> did you see the assesment?

<rooster> no i did not.

<omg> ask CT in NYC

<omg> they have it

<omg> Senate Intelligence Committee will have a briefing on it next week

<rooster> oh, i don't go to that. i have someone who gives me things i request.

<omg> prob above your clearance level

<omg> anyways you know about their little group's HTP right?

<rooster> not really. but i'm interested.

<rooster> what can you tell me?

<omg> apparently in an attempt to SE, one of their guy's zeekill ran a SYN+ACK ddos against mossad.gov.il

<rooster> oh, the mossad ddos.

<rooster> done with brazil roots, right?

<omg> yep

<omg> from what i gather it's prob CDN servers

<omg> with the bandwidth that was pumped to the site

<omg> the site is on a tier 1 backbone provider with about 1gbs of total speed

<omg> their little gang has some serious bandwidth

<rooster> i guess so. would have to be a good amount to take out something on t1

<omg> haha much faster from what i guess Mossad has

<omg> think it's on a OC-24

<rooster> well, most public sites are on small servers isolated from anything important

<omg> onto a STM-64 uplink

<omg> dunno but what that anonyroot idiot hit CIA's site was pretty high too. The uplink pipe for DC's link was a OC-24

<omg> guys in DS&T had to rotate the public ip three times

<rooster> these guys are persistent fuckers, aren't they?

<omg> well it depends

<omg> most are idiots

<omg> their Anonymous-OS already has a sudoder backdoor

<omg> i think the offical dl count is close to 34K now

<rooster> that was well known

<rooster> and obvious

<omg> about their HTP group from what's read from previous intel reports. It was a splinter group that formed after the HB Gary hack

<omg> they previously use the irc skidr.us

<omg> and apparently the group rotates irc servers monthly

<rooster> i'll be right back.

<omg> figured i should give it a try and try to use their crazy members to try and mitigate the next wikileaks release

<omg> one of them did a quick demo yestoday and was able to bring down Mossad's site

<omg> *yesterday*

<omg> btw you know Israel already caught that 0xOmar kid right?

<omg> it's embarrassing to see Israel able to catch a hacker weeks after an intrusion, while we don't have CERN teams cyber readiness level to react quickly enough to large scale attacks

<rooster> back, sorry i have two other people relaying information to me.

<rooster> reading, sec.

<rooster> hes the israeli, right?

<rooster> no

<rooster> the saudi?

<omg> they caught him in SA

<rooster> yea, the saudi.

<omg> tracked him through credit card purchases

<rooster> yes, i remember when he pastebinned some ccs

<omg> it takes about 2 weeks min to just get a search warrent your whitecollar depts + SS with the DOJ for a simple id theft

<rooster> Yes, i know.

<rooster> fraud isn't just a slap on the wrist.

<omg> yes

<omg> and it's a constant battle

<omg> with DOJ versus state level id theft charges

<omg> though it's good to know cybercrime is monitering hardchats

<rooster> yeah, there are eyes on a lot of different places right now

<omg> that's good, though i'm prob the only guy in my agency trying to figure how to not mess things up with current investigations :)

<rooster> if you can disclose, who are you with?

<omg> sorry i cannot

<rooster> understandable

<rooster> just, personal curiosity.

<omg> just contact SSA Selton

<omg> he'll understand

<rooster> right.

<omg> but i'm not with you guy's at the Bureau

<omg> in fact because of the sealed DOJ docket's, I didn't even know about Xavier Monsegur being a CI

<rooster> Should have, it was actually leaked a while back.

<rooster> also i'm with the bureau, i have to state that if you return this back to anyone.

<omg> i had track down one of your contractors Backtrace to confirm it two months ago in Jan

<rooster> i have a position similar to you.

<rooster> just so that's clear.

<rooster> i don't want break any laws while doing my job.

<omg> i just don't want to mess up any existing investigations

<omg> i thought everything is need to know. Regardless everyone has TS clearance, but certain things such as knowing who is an CI is a need to know

<omg> at the Bureau

<rooster> again, i'm not with the bureau, i do what you do.

<rooster> and it is all need to know

<rooster> but if you look closely

<rooster> you can find out a lot on your own

<omg> <rooster> also i'm with the bureau, i have to state that if you return this back to anyone.

<rooster> hah. wow.

<rooster> that is a typo.

<rooster> meant to say not. i apologize.

<omg> i'm with DS

<omg> of the DOS

<rooster> ah.

<rooster> ive interacted with the bureau

<omg> i'm the guy responsible for mitigating damage caused by Jeremy Hammond sending the Strafor emails to Wikileaks

<rooster> hammon, sounds familiar.

<rooster> um

<rooster> what does he run

<rooster> he runs something, i think.

<omg> Anarchaos aka crediblethreat aka Hack This Site founder

<omg> btw did you ever use the nick moop?

<rooster> there are a few people

<rooster> that use that nick

<omg> my suggestion work with Jennifer Emick with Backtrace

<rooster> i've not worked with backtrace directly, but i've chatted to hubris before.

<omg> i've been helping Hubris aka david with some "special projects" such as injecting fake Anonymous operations such as #opcartel

<rooster> i understand about injecting fake ops, like a honeypot

<rooster> but opcartel

<rooster> was too far

<rooster> lives could have been at risk

<omg> not really, only Barret Brown's

<omg> the goal of #opcartel was to get CISEN into iranserv

<omg> and understand the leadership structure resulted in the recent Interpol South American arrests

<omg> and anonworld

<rooster> ah, so you're planting fake ops, to infiltrate.

<rooster> smart.

<omg> #opglobalbackout was a response by that anonyroot's idiot ddos of CIA.gov

<omg> so the NSA could argue for stronger monitering + domestic intelligence

<omg> inject stories such as: http://pastebin.com/pVmAZqWY

<rooster> so is that new internet monitoring bill related at all to OpDarknet?

<omg> opdarknet?

<rooster> also

<rooster> i dont tink

<omg> no it's because of the constant threat of China

<rooster> there is any validity

<rooster> in that pastebin

<omg> + guys like pr0f_srs's dump of the SCADA system

<rooster> i understand SCADA system dumps.

<rooster> how does china play into that?

<omg> and a simple ddos to CIA.gov is enough to invoke the "terrorism" arguement

<rooster> anything is enough to invoke the terrorism card

<rooster> it's so vague, it can be thrown around until it sticks.

<omg> when you have critical US infracture such as a Water Pump Facility, or your Intelligence Agency being under attack?

<rooster> why do you think the reason for monitoring the occupy movement, and various protesters was under a counter-terrorism effort?

<omg> how do you think Counter-Intelligence feels?

<rooster> i think they would feel like they need to step it up.

<rooster> and that's where you come in, correct?

<omg> yep

<omg> been doing the injections and manipulation of Anonymous' agenda at the sidelines to push for stronger FBI + NSA prescence

<omg> not everyone in DSS agrees with me

<omg> but when the head of the FBI + NSA is making these arguements to the National Security Council

<omg> ^-- Director

<omg> i've said i've did a good job in the last 5 months :)

<rooster> opcartel, an globalblackout were well recognized, i guess that means you're right

<omg> i'm not involved with Intelligence gathering of Occupy

<omg> it's the boys that are with DHS

<omg> then again they over-react to everything

<rooster> nor am i, but i've a few contacts of mine are.

<omg> shit like Anonymous hackers fucking up train lines?

<omg> yea... DHS your idiots

End of log. This log could be fake or partially fake but it draws a classic picture.

[Side note - the planted story they mention - http://pastebin.com/pVmAZqWY - is a rather silly "message for Anonymous from Mossad" which I remember thinking of as really silly...(BY: A GUEST ON FEB 12TH, 2012 | SYNTAX: NONE | SIZE: 12.71 KB | HITS: 12,109 | EXPIRES: NEVER) ]

Speculating but DSS could be Defense Security Service - http://www.dss.mil/ - which has a purview of defending the Defense Industrial Base generally & that could involve efforts to catch hackers eh? It is a military agency with responsibility for aspects of guarding private contractor installations, so they would seem to have an Interface or 2 to domestic political monitoring. DSS definitely scans websites a lot & shows up in logs but has virtually no public or alt-researcher profile at all. What kinds of programs have they been up to in this exciting era? etc. [Also could be State Diplomatic Security Service but I doubt it - or the odd DOJ Domestic Security Section but that dissolved in 2009 into (this is not a TV show probably): Criminal Division: the Human Rights and Special Prosecutions Section.

Any place run from Quantico AND bonus Fort Meade DISCO Summary from their site:

About Us

The Defense Security Service (DSS) is an agency of the Department of Defense(DoD) located in Quantico, Virginia with field offices throughout the United States. The Under Secretary of Defense for Intelligence provides authority, direction and control over DSS. DSS provides the military services, Defense Agencies, 24 federal agencies and approximately 13,300 cleared contractor facilities with security support services.

DSS contributes to national security by serving as an interface between the government and cleared industry. DSS administers and implements the defense portion of the National Industrial Security Program pursuant to Executive Order 12829. Approximately 356 Industrial Security Representatives provide oversight and assistance to cleared contractor facilities and assist management and Facility Security Officers in ensuring the protection of U.S. and foreign classified information. DSS also facilitates classified shipments between the United States and foreign countries and implements foreign ownership, control and influence countermeasures.

The Center for Development of Security Excellence (CDSE) is located in Linthicum, Md., and provides security education and training to DoD security professionals through formal classroom and distributed learning methodologies (i.e., computer-based, web-based and tele-training).

The Defense IndustrialSecurity Clearance Office (DISCO), located in Fort Meade, Md., processes requests for industrial personnel security investigations and provides eligibility or clearance determinations for cleared industry personnel under the NISP.

OMG's comment on DHS - Homeland Security, collecting info on Occupy could have been related to the Critical Infrastructure stuff similar to DSS activities (as well as Federal Protective Service which has been the main FOIA released docs so far).

The Pastebin he references as a lol fake OMG - it's this crazy absurd Mossad threat missive that got tons of views at the time: http://pastebin.com/pVmAZqWY

//// Below the fold - more logs - coverage on the DOJ's system of illegal operations and signaling to cartels, and other loosely related elements ////

Syndicate content