Ergebnis 1 bis 2 von 2

Thema: X-Keyscore / Ragtime, etc.

  1. #1
    Erfahrener Benutzer Avatar von AreWe?
    Registriert seit
    20.07.2010
    Beiträge
    21.299
    Blog-Einträge
    204
    Mentioned
    249 Post(s)
    Follows
    0
    Following
    0
    Renommee: 536752

    X-Keyscore / Ragtime, etc.

    Ist der Snowden wirklich ein Whistleblower oder nur Ablenkung total, für etwas das eigentlich bekannt war und man davon ausgehen kann, dass sich nicht wirklich etwas ändern wird.

    Oder ist es ein weiterer Schachzug in Richtung NWO?

    Snowden kam im Juni "auf den Markt", der folgende Artikel ist von Ende Februar.

    CODENAME RAGTIME: Obama’s Surveillance Program Targets American Citizens

    More than a decade after the 9/11 terrorist attacks, a set of extraordinary and secretive surveillance programs conducted by the National Security Agency has been institutionalized, and they have grown.
    These special programs are conducted under the code name Ragtime, and are divided into several subcomponents, according to the new book Deep State: Inside the Government Secrecy Industry, by Marc Ambinder and D.B. Grady. (I purchased a copy this morning.)
    Obama’s surveillance program is much larger than Bush’s, so WHY are the Liberals keeping so quiet about it. Where’s Code Pink? Hmmm…..

    The authors, both journalists who cowrote a previous book about special operations in the military, have dug deep into the code names and operational nitty gritty of the NSA’s secretive and hugely controversial surveillance programs, and they’ve come up with impressive new details. Ragtime, which appears in official reports by the abbreviation RT, consists of four parts.
    Ragtime-A: involves US-based interception of all foreign-to-foreign counterterrorism-related data;
    Ragtime-B: deals with data from foreign governments that transits through the US;
    Ragtime-C: deals with counterproliferation actvities;
    Ragtime-P: P stands for Patriot Act. Ragtime-P is the remnant of the original President’s Surveillance Program, the name given to so-called “warrantless wiretapping” activities after 9/11, in which one end of a phone call or an e-mail terminated inside the United States. That collection has since been brought under law, but civil liberties groups, journalists, and legal scholars continue to seek more information about what it entailed, who was targeted, and what authorities exist today for domestic intelligence-gathering.
    Only about three dozen NSA officials have access to Ragtime’s intercept data on domestic counter-terrorism collection. That’s a tiny handful of the agency’s workforce, which has been pegged at about 30,000 people.
    As many as 50 companies have provided data to this domestic collection program, the authors report.
    If the NSA wants to collect information on a specific target, it needs one additional piece of evidence besides its own “link-analysis” protocols, a computerized analysis that assigns probability scores to each potential target. This is essentially a way to use a computer data-mining program to help determine whether someone is a national security threat. But the authors find that this isn’t sufficient if NSA wants to collect on said target. And while the authors found that the Foreign Intelligence Surveillance Court rarely rejects Ragtime-P requests, it often asks the NSA to provide more information before approving them.
    How the surveillance is approved tells us a lot about the breadth of the NSA’s intelligence gathering. The court and the Attorney General both certify a slate of approved targets under Ragtime-P, the authors find. That includes a certain amount of “bulk data”—such as phone call logs and records—that can be collected around those targets. An NSA official told the authors that Ragtime-P can process as many as 50 different data sets at one time.
    What happens next looks like a 21st-century data assembly line. At the NSA’s headquarters in Fort Meade, Maryland, a program called Xkeyscore processes all intercepted electronic signals before sending them to different “production lines” that deal with specific issues. Here, we find another array of code names.
    Pinwale is the main NSA database for recorded signals intercepts, the authors report. Within it, there are various keyword compartments, which the NSA calls “selectors.” Metadata (things like the “To” and “From” field on an e-mail) is stored in a database called Marina. It generally stays there for five years. In a database called Maui there is “finished reporting,” the transcripts and analysis of calls. (Metadata never goes here, the authors found.)
    As all this is happening, there are dozens of other NSA signals activity lines, called SIGADS, processing data. There’s Anchory, an all-source database for communications intelligence; Homebase, which lets NSA analysts coordinate their searches based on priorities set by the Director of National Intelligence; Airgap, which deals with missions that are a priority for the Department of Defense; Wrangler, an electronic intelligence line; Tinman, which handles air warning and surveillance; and more.
    Lest you get confused by this swirl of code names and acronyms, keep this image in mind of the NSA as a data-analysis factory. Based on my own reporting, the agency is collecting so much information every day that without a regimented, factory-like system, analysts would never have the chance to look at it all. Indeed, they don’t analyze much of it. Computers handle a chunk, but a lot of information remains stored for future analysis.
    So who is monitoring this vast production to ensure that the communications of innocent Americans aren’t spied on? Ambinder and Grady report that for the NSA’s terrorism-related programs, the agency’s general counsel’s office regularly reveals “target folders,” which contain the identities of those individuals who are under surveillance, “to make sure the program complied with the instruction to surveil those reasonably assumed to have connections to al-Qaeda.”
    That the NSA is policing itself may come as small comfort to many critics of the Obama administration’s intelligence programs. The size of the “compliance staff” that monitors this activity is only about four or five people, depending on what’s available in the budget at any moment, the authors report. They also say that we cannot know whether the program is pushing beyond the boundaries of the law.
    However, outside the closed circle of about three dozen NSA employees who are read in to Ragtime, there more than 1,000 people “outside the NSA are privy to the full details of the program.” If NSA is breaking the law, “how much longer can that secret last?” the authors ask.
    We have a preceding example to test this hypothesis, albeit in a limited fashion. In 2004, the senior leadership of the Justice Department and the FBI threatened to resign over what they saw as illegal collection activities at the NSA, collection activities that are still going on under Ragtime and under new surveillance law.
    Back then, James Comey, acting as Attorney General while John Ashcroft was in the hospital, refused to sign a set of certifications provided by the Justice Department to Internet, financial, and data companies, the authors report. Why? Comey believed that the justification for providing bulk data to the NSA wasn’t sufficient.
    The administration’s tortured logic “drove him bonkers. There was just no way to justify this,” the authors report, quoting people who have spoken to Comey, who has never publicly said why he objected. Interestingly, the authors find that the parts of the program he was objecting to didn’t implicate the Foreign Intelligence Surveillance Act.
    This comports with my own reporting in my book, The Watchers. The NSA was making “mirrors” of telecommunications databases, so that analysts could go through the data and mine it for clues. As it has been explained to me, the problem here dealt with how the government viewed its legal authorities to access data stored in computers, and whether analysts could dip back into it without specific authorizations. Importantly, this data consisted of that so-called “bulk data.” It wasn’t recorded phone calls or the text of e-mails. That information was governed by FISA–or should have been–because it was considered “content” under law, and that requires a warrant to obtain.
    The White House panicked when Comey and Ashcroft refused to sign off, Ambinder and Grady report, fearing that the companies on which NSA was depending for information would cut the agency off if they didn’t get a signed order from the Attorney General himself. It took six months for the administration to reshape the program so that it comported with “interpretation of the metatdata provisions” that were promulgated by the Justice Department’s Office of Legal Counsel.
    Had these officials resigned, it’s unthinkable that the secrets of NSA’s intelligence gathering activities would have stayed hidden. A year later, in 2005, they were revealed in part by the New York Times. Here, too, Ambinder and Grady have some new insights. It turns out that while the NSA’s director, General Michael Hayden, was publicly excoriating the newspaper for disclosing the classified activities, he was privately glad that they withheld what he considered key operational details.

    Quelle: http://www.nowtheendbegins.com/blog/?tag=xkeyscore
    Stellar Wind: http://en.wikipedia.org/wiki/Stellar...28code_name%29

    Ragtime: https://www.law.upenn.edu/live/files...r10-things.pdf

    X-Keyscore: http://de.wikipedia.org/wiki/XKeyscore

    Boundless Informant: http://en.wikipedia.org/wiki/Boundless_Informant

    Cloud Computing: http://de.wikipedia.org/wiki/Cloud-Computing

    Die Umstellung auf und das Arbeiten mit Cloud-Computing wurde uns natürlich mit unterschiedlichsten "Vorteilen" schmackhaft gemacht! Also wie immer, Vorteile anpreisen, Nachteile, wenn möglich, überhaupt nicht ansprechen.

    Karte des Datenvolumens des Tracking der US-Regierung: http://oglobo.globo.com/infograficos...rno-americano/

    Was zum Stöbern: http://www.barthworks.com/technical/nsaafter911.htm

    Ich habe jetzt nur mal ein paar Anhaltspunkte eingeworfen. Da gibt es noch eine Menge Gesprächsbedarf!

    Liebe Grüße

    P.S. Jemand ohne Job? Ist aber streng geheim!

    XKEYSCORE Systems Engineer Job

    Apply now »

    Date: Jul 19, 2013
    Location: Columbia, MD, US
    XKEYSCORE Systems Engineer (Job Number:328432)

    Description:



    The Integrated Systems Group of SAIC has a career opening for a Tier 2 XKEYSCORE Systems Engineer, for the Mission Programs Division (MPD), located in Columbia, Maryland.

    JOB SUMMARY:
    The Systems Engineer will provide support for the compartment systems that encompass the SKIDROWE systems. The successful candidate will be a self-starter, work well in a dynamic team environment, and be very organized and detailed oriented.

    PRIMARY RESPONSIBILITIES:
    •Design and develop large-scale systems, containing multiple subsystems and requiring integration with external systems and focus on all aspects of acquisition, requirements definition, system design, development, and training.
    •This candidate will need to have experience in basic SIGINT technology as well as integrating, installing, configuring, changing, and optimizing HW & SW solutions into an overall system architecture.
    •Support SIGINT systems by performing custom configurations of fielded mission systems.
    •Assist the dataflow team to verify the formats of input and output data and the flow of data from front end sources and to back end destinations.
    •Provide Tier 2 cross function support.
    •Troubleshoot network and system problems and a become knowledge expert in two other components.

    Portions of SAIC to be renamed Leidos, Inc., subject to stockholder approval and consummation of a separation transaction if approved by SAIC board of directors. SAIC is pursuing a plan to separate into two independently traded companies;one that provides technical, engineering and enterprise information technology services primarily to the U.S. government (new SAIC), and one that delivers technical solutions in national security, engineering and health (Leidos, Inc)

    Qualifications:
    BASIC QUALIFICATIONS:
    •High School diploma or equivalent with 3- 4+ years of related experience installing, configuring, integrating, and testing software which run on Red Hat Enterprise Linux (RHEL).
    •Software Integration experience with scripting languages (Java, C and Bourne shell).
    •Familiar with VMware ESXi 3.5, 4.1, and 5.0.
    •Currently possess an active TS/SCI with Polygraph security clearance.

    ADDITIONAL PREFERRED QUALIFICATIONS:
    •Bachelor's degree in a relevent technical disciplne.
    •Ability to be mobile, work, and travel independently.
    •Excellent interpersonal, verbal, and written communication skills with the ability to successfully interact with internal and external customers.

    SAIC Overview:

    SAIC is a FORTUNE 500® scientific, engineering, and technology applications company that uses its deep domain knowledge to solve problems of vital importance to the nation and the world, in national security, energy & environment, health and cybersecurity. The company's approximately 41,000 employees serve customers in the U.S. Department of Defense, the intelligence community, the U.S. Department of Homeland Security, other U.S. Government civil agencies and selected commercial markets. Headquartered in McLean, Va., SAIC had annual revenues of approximately $10.6 billion for its fiscal year ended January 31, 2012. For more information, visit www.saic.com. SAIC: From Science to Solutions®

    Job Posting: Jul 3, 2013, 8:17:27 AM
    Primary Location: United States-MD-COLUMBIA

    Clearance Level Must Currently Possess: Top Secret/SCI with Polygraph
    Clearance Level Must Be Able to Obtain: None
    Potential for Teleworking: No
    Travel: Yes, 10% of the time
    Shift: Yes, 10% of the time
    Schedule: Full-time

    Quelle: http://jobs.saic.com/job/Columbia-XK...ce=SimplyHired
    Bill Gates ist 100% Eugeniker!
    Leute! Denkt immer an: "Teile und herrsche", und fragt Euch wer der "Dritte" ist! Cui bono?
    1 + 1 = 2 (universell und ewig)
    Love, peace and freedom!

  2. #2
    Erfahrener Benutzer Avatar von AreWe?
    Registriert seit
    20.07.2010
    Beiträge
    21.299
    Blog-Einträge
    204
    Mentioned
    249 Post(s)
    Follows
    0
    Following
    0
    Renommee: 536752

    Cloud Computing wurde nur erfunden, um besser spionieren zu können

    Der PC trat unter anderem seinen Siegeszug an, weil er eine lokale Festplatte hatte. Vorher gab es Groß- und Midrange-Rchner, die mit "dummen" Terminals verbunden waren. Aber auch das meist nur lokal.

    Jetzt haben wir alles, was wir brauchen, aber der fremdgesteuerte Trend, geht in Richtung Auslagerung in fremde Rechenzentren.


    Freilich hätte niemand diesen Wunsch gehabt. Es hat sich so etwas wie ein Vertrauensverhältnis, fast schon familiärer Natur, entwickelt. Mit den großen Namen aus den USA.
    Ein irrsinniger Einsatz von Werbung folgte.

    Auf einmal war nicht mehr die Geschwindigkeit und der neueste Prozessor das wichtigste. Oder die dickste Festplatte.
    Davon haben die PC-Hersteller gelebt.

    Tablet-PCs kamen von Apple auf den Markt.

    Jetzt soll Cloud-Computing der Super-Trend sein.

    Der Trend, eigene, sensible Daten anderen anzuvertrauen.

    Wer kam eigentlich auf die Idee?

    Dazu auch noch zu behaupten, dass Cloud-Computing die Bereitststellung von IT-Dienstleistungen revolutioniert?

    Zumal nicht nur Privatkunden, sondern auch noch Geschäftskunden in die Clouds (Datenwolken) zu treiben?

    Die Idee ist schon etwas älter. Aber neu belebt wurde sie in den USA.

    Von den großen US-IT-Unternehmen.

    In Kooperation mit der NSA, versteht sich-wohl von selbst.

    Das Ziel ist nicht mehr nur das Aufsaugen von Daten, vielmehr das die User ihre Daten gleich bei den informellen Mitarbeitern des NSA lassen. Und dafür allen Ernstes auch noch Geld hinlegen. Denn: Viel Geld kostet das Unternehmen. Bei privaten Usern wird hingegen oft für ein oder zwei Jahre umsonst Speicherplatz angeboten.

    So soll der Umbruch gelingen.

    Mit den Daten lässt sich dann auf vielerlei Weise Geld oder Privilegien als US-Systemstütze verdienen.

    Die Logik lässt nur einen Schluss zu: Go local again!


    Liebe Grüße
    Bill Gates ist 100% Eugeniker!
    Leute! Denkt immer an: "Teile und herrsche", und fragt Euch wer der "Dritte" ist! Cui bono?
    1 + 1 = 2 (universell und ewig)
    Love, peace and freedom!

Aktive Benutzer

Aktive Benutzer

Aktive Benutzer in diesem Thema: 1 (Registrierte Benutzer: 0, Gäste: 1)

Berechtigungen

  • Neue Themen erstellen: Nein
  • Themen beantworten: Nein
  • Anhänge hochladen: Nein
  • Beiträge bearbeiten: Nein
  •