flash Intro Movie Down with murder inc Index News by country GOOGLE US DEFENSE
 

DOWN WITH MURDER INC.

The following images were provided by Mr. Lester with AIM/NCOM at the Oklahoma Confederation of Clubs meeting held on 05 January, 03 at the Rogues Clubhouse in Tulsa. The four pages below pertain to the Fourth Amendment of the Constitution; Unreasonable Search and Seizure. - original source

February 20th 2005 - Hunter S Thompson found dead...suicide - involved how?

Hunter S. Thompson's body was found in a chair in the kitchen in front of his typewriter with the word "counselor" typed in the centre of the page, according to sheriff's reports.

The word was typed on stationery from the Fourth Amendment Foundation, which was started to defend victims of unwarranted search and seizure, according to reports released Tuesday. Source

Speculation & Rumour abounds:


4th amendment
Were they spooking Hunter?

the strange death of HS thompson

AT&T and spying

The New York Times - TUESDAY, APRIL 18, 2006

A former employee of AT&T has come forward with documents suggesting that there may be a lot more spying going on in America than President George W. Bush has admitted. The AT&T documents suggest that telephone companies may be helping the U.S. government engage in wholesale interception of telephone calls, e-mail messages and Web surfing. If AT&T is violating its customers' privacy rights, it should come clean, and stop immediately.

According to Mark Klein, a longtime AT&T technician who is now retired, AT&T maintained a room at its San Francisco Internet and telephone hub where its customers' data could be mined by keywords, e-mail addresses and other attributes. Klein says the National Security Agency was given access to the room and the data. He says other technicians have reported to him that similar rooms exist at other AT&T sites.

Klein's assertions are the heart of a lawsuit filed by the Electronic Frontier Foundation, which charges AT&T with helping the NSA conduct an extensive and illegal domestic spying program. The government can legally intercept private communications only under limited circumstances, with proper judicial oversight. AT&T has refused to describe its cooperation with the NSA.

The lawsuit seeks damages on behalf of a large number of AT&T customers, which could provide the company with a strong incentive to re-evaluate its policies. But even without the suit, AT&T has a reason to worry if it is participating in illegal domestic spying. No company should want to get a reputation for allowing the government to listen in on its customers' phone calls, read their e-mail and monitor their Web activity without the requisite legal showing. - www.iht.com/

April 20, 2006

Can you hear me now? Big Brother is listening

Posted by Richard Stiennon @ 1:50 pm

In today’s threatcast Barrett Lyon and I resort to an air-gap technique to interview an engineer at ATT about the massive funneling of data and voice traffic into the NSA’s analysis centers.  At first we looked into doing the interview directly with this guy, who we call Deep Packet, and masking his voice with digital effects. When we realized just what sort of processing power the NSA has available to them we decided that was not good enough to protect our source. Any digital effects could be reversed.  So I got Barrett on the phone and he relayed my questions to Deep Packet via IRC and read his responses back to me.

 

And those responses were chilling. Deep Packet gives a sense of an insider who at first did not believe the press reports but quickly learned that not only were they true but it went deeper. 

 
By now you have heard of the Electronic Frontier Foundation’s class action suit against ATT.  (Support the EFF! I did. )   From the 37 page filing:

This case challenges the legality of Defendants’ participation in a secret and illegal government program to intercept and analyze vast quantities of Americans’ telephone and Internet communications, surveillance done without the authorization of a court and in violation of federal electronic surveillance and telecommunications statues, as well as the First and Fourth Amendments to the United States Constitution.

According to Deep Packet ATT maintains numerous facilities that host very expensive Juniper routers for this project. As far as he knows there is no direct contract with the NSA. In other words ATT is paying for all of this. He feels that the reward is favorable treatment when ATT is bidding on less clandestine government contracts.  

According to Deep Packet these Juniper routers have specially designed cards in them to shunt ALL OF THE TRAFFIC from ATT peering points to NSA analysis centers around the country.  Peering traffic means not just traffic that begins and ends on ATT’s network but any traffic from networks that ATT has peering arrangements with. A quick look here indicates that is just about… everything.  

Now, the EFF claims that ATT handles 300 million voice calls and 4,000 terabytes PER DAY of traffic.  I tried to get a feel for whether ATT had enough storage space to actually archive all of that info. Deep Packet says there is A LOT of storage associated with this project. I still doubt it is enough. But maybe enough to grab every conversation that involves airplanes, flight school, anthrax, and Allah. 

Narus Corp mentioned in above podcast as Data storage facility for ATT NSA spying

Narus is the leader in providing the real-time traffic insight essential to profitably manage, secure and deliver Services over IP.

Today, large IP-based networks are transforming the traditional circuit-switch world of telecommunications into a dynamic, ever-changing world of IP-based services such as VoIP, IPTV and others.

In order to secure, monitor, bill and provide excellent quality of service for these IP-based offerings, carriers and service providers must simultaneously capture, normalize and correlate IP traffic across all layers of the network.

Only Narus is capable of providing companies with the total network view with deep packet inspection and correlation across every link and element on the network.

Narus is partnered with top resellers and integrators around the world to ensure that our customers get end-to-end solutions. Highlighted partners include IBM, NEC, Datacraft, T-Systems, Giza and VeriSign.

With its patented technology and processes, Narus helps customers like AT&T, Brasil Telecom, Korea Telecom, KDDI, Telecom Egypt, Saudi Telecom, France Telecom and T-Mobile in areas of network security, traffic classification and monitoring.

Narus is headquartered in Mountain View, CA (USA) with offices throughout North America, EMEA (France, Germany, U.K.), Asia (Japan, Korea, China), and Brazil. Core product development is done in Mountain View with additional development facilities in Bangalore, India. - narus.com

AT&T Whistle-Blower's Evidence

commondreams.org

Former AT&T technician Mark Klein is the key witness in the Electronic Frontier Foundation's class-action lawsuit against the company, which alleges that AT&T illegally cooperated in an illegal National Security Agency domestic-surveillance program.

In this recently surfaced statement, Klein details his discovery of an alleged surveillance operation in an AT&T office in San Francisco, and offers his interpretation of company documents that he believes support his case.

For its part, AT&T is asking a federal judge to keep those documents out of court, and to order the EFF to return them to the company. Here Wired News presents Klein's statement in its entirety, along with select pages from the AT&T documents.

AT&T's Implementation of NSA Spying on American Citizens

31 December 2005 -

I wrote the following document in 2004 when it became clear to me that AT&T, at the behest of the National Security Agency, had illegally installed secret computer gear designed to spy on internet traffic. At the time I thought this was an outgrowth of the notorious Total Information Awareness program which was attacked by defenders of civil liberties. But now it's been revealed by The New York Times that the spying program is vastly bigger and was directly authorized by President Bush, as he himself has now admitted, in flagrant violation of specific statutes and constitutional protections for civil liberties. I am presenting this information to facilitate the dismantling of this dangerous Orwellian project.

AT&T Deploys Government Spy Gear on WorldNet Network

-- 16 January, 2004

In 2003 AT&T built "secret rooms" hidden deep in the bowels of its central offices in various cities, housing computer gear for a government spy operation which taps into the company's popular WorldNet service and the entire internet. These installations enable the government to look at every individual message on the internet and analyze exactly what people are doing. Documents showing the hardwire installation in San Francisco suggest that there are similar locations being installed in numerous other cities.

The physical arrangement, the timing of its construction, the government-imposed secrecy surrounding it, and other factors all strongly suggest that its origins are rooted in the Defense Department's Total Information Awareness (TIA) program which brought forth vigorous protests from defenders of constitutionally protected civil liberties last year:

"As the director of the effort, Vice Adm. John M. Poindexter, has described the system in Pentagon documents and in speeches, it will provide intelligence analysts and law enforcement officials with instant access to information from internet mail and calling records to credit card and banking transactions and travel documents, without a search warrant." The New York Times, 9 November 2002

To mollify critics, the Defense Advanced Research Projects Agency (Darpa) spokesmen have repeatedly asserted that they are only conducting "research" using "artificial synthetic data" or information from "normal DOD intelligence channels" and hence there are "no U.S. citizen privacy implications" (Department of Defense, Office of the Inspector General report on TIA, December 12, 2003). They also changed the name of the program to "Terrorism Information Awareness" to make it more politically palatable. But feeling the heat, Congress made a big show of allegedly cutting off funding for TIA in late 2003, and the political fallout resulted in Adm. Poindexter's abrupt resignation last August. However, the fine print reveals that Congress eliminated funding only for "the majority of the TIA components," allowing several "components" to continue (DOD, ibid). The essential hardware elements of a TIA-type spy program are being surreptitiously slipped into "real world" telecommunications offices.

In San Francisco the "secret room" is Room 641A at 611 Folsom Street, the site of a large SBC phone building, three floors of which are occupied by AT&T. High-speed fiber-optic circuits come in on the 8th floor and run down to the 7th floor where they connect to routers for AT&T's WorldNet service, part of the latter's vital "Common Backbone." In order to snoop on these circuits, a special cabinet was installed and cabled to the "secret room" on the 6th floor to monitor the information going through the circuits. (The location code of the cabinet is 070177.04, which denotes the 7th floor, aisle 177 and bay 04.) The "secret room" itself is roughly 24-by-48 feet, containing perhaps a dozen cabinets including such equipment as Sun servers and two Juniper routers, plus an industrial-size air conditioner.

The normal work force of unionized technicians in the office are forbidden to enter the "secret room," which has a special combination lock on the main door. The telltale sign of an illicit government spy operation is the fact that only people with security clearance from the National Security Agency can enter this room. In practice this has meant that only one management-level technician works in there. Ironically, the one who set up the room was laid off in late 2003 in one of the company's endless "downsizings," but he was quickly replaced by another.

Plans for the "secret room" were fully drawn up by December 2002, curiously only four months after Darpa started awarding contracts for TIA. One 60-page document, identified as coming from "AT&T Labs Connectivity & Net Services" and authored by the labs' consultant Mathew F. Casamassima, is titled Study Group 3, LGX/Splitter Wiring, San Francisco and dated 12/10/02. (See sample PDF 1-4.) This document addresses the special problem of trying to spy on fiber-optic circuits. Unlike copper wire circuits which emit electromagnetic fields that can be tapped into without disturbing the circuits, fiber-optic circuits do not "leak" their light signals. In order to monitor such communications, one has to physically cut into the fiber somehow and divert a portion of the light signal to see the information.

This problem is solved with "splitters" which literally split off a percentage of the light signal so it can be examined. This is the purpose of the special cabinet referred to above: Circuits are connected into it, the light signal is split into two signals, one of which is diverted to the "secret room." The cabinet is totally unnecessary for the circuit to perform -- in fact it introduces problems since the signal level is reduced by the splitter -- its only purpose is to enable a third party to examine the data flowing between sender and recipient on the internet.

The above-referenced document includes a diagram (PDF 3) showing the splitting of the light signal, a portion of which is diverted to "SG3 Secure Room," i.e., the so-called "Study Group" spy room. Another page headlined "Cabinet Naming" (PDF 2) lists not only the "splitter" cabinet but also the equipment installed in the "SG3" room, including various Sun devices, and Juniper M40e and M160 "backbone" routers. PDF file 4 shows one of many tables detailing the connections between the "splitter" cabinet on the 7th floor (location 070177.04) and a cabinet in the "secret room" on the 6th floor (location 060903.01). Since the San Francisco "secret room" is numbered 3, the implication is that there are at least several more in other cities (Seattle, San Jose, Los Angeles and San Diego are some of the rumored locations), which likely are spread across the United States.

One of the devices in the "Cabinet Naming" list is particularly revealing as to the purpose of the "secret room": a Narus STA 6400. Narus is a 7-year-old company which, because of its particular niche, appeals not only to businessmen (it is backed by AT&T, JP Morgan and Intel, among others) but also to police, military and intelligence officials. Last November 13-14, for instance, Narus was the "Lead Sponsor" for a technical conference held in McLean, Virginia, titled "Intelligence Support Systems for Lawful Interception and Internet Surveillance." Police officials, FBI and DEA agents, and major telecommunications companies eager to cash in on the "war on terror" had gathered in the hometown of the CIA to discuss their special problems. Among the attendees were AT&T, BellSouth, MCI, Sprint and Verizon. Narus founder, Dr. Ori Cohen, gave a keynote speech. So what does the Narus STA 6400 do?

"The (Narus) STA Platform consists of stand-alone traffic analyzers that collect network and customer usage information in real time directly from the message.... These analyzers sit on the message pipe into the ISP (internet service provider) cloud rather than tap into each router or ISP device" (Telecommunications magazine, April 2000). A Narus press release (1 Dec., 1999) also boasts that its Semantic Traffic Analysis (STA) technology "captures comprehensive customer usage data ... and transforms it into actionable information.... (It) is the only technology that provides complete visibility for all internet applications."

To implement this scheme, WorldNet's high-speed data circuits already in service had to be rerouted to go through the special "splitter" cabinet. This was addressed in another document of 44 pages from AT&T Labs, titled "SIMS, Splitter Cut-In and Test Procedure," dated 01/13/03 (PDF 5-6). "SIMS" is an unexplained reference to the secret room. Part of this reads as follows:

"A WMS (work) Ticket will be issued by the AT&T Bridgeton Network Operation Center (NOC) to charge time for performing the work described in this procedure document.... "This procedure covers the steps required to insert optical splitters into select live Common Backbone (CBB) OC3, OC12 and OC48 optical circuits."

The NOC referred to is in Bridgeton, Missouri, and controls WorldNet operations. (As a sign that government spying goes hand-in-hand with union-busting, the entire (Communication Workers of America) Local 6377 which had jurisdiction over the Bridgeton NOC was wiped out in early 2002 when AT&T fired the union work force and later rehired them as nonunion "management" employees.) The cut-in work was performed in 2003, and since then new circuits are connected through the "splitter" cabinet.

Another "Cut-In and Test Procedure" document dated January 24, 2003, provides diagrams of how AT&T Core Network circuits were to be run through the "splitter" cabinet (PDF 7). One page lists the circuit IDs of key Peering Links which were "cut-in" in February 2003 (PDF 8), including ConXion, Verio, XO, Genuity, Qwest, PAIX, Allegiance, AboveNet, Global Crossing, C&W, UUNET, Level 3, Sprint, Telia, PSINet and Mae West. By the way, Mae West is one of two key internet nodal points in the United States (the other, Mae East, is in Vienna, Virginia). It's not just WorldNet customers who are being spied on -- it's the entire internet.

The next logical question is, what central command is collecting the data sent by the various "secret rooms"? One can only make educated guesses, but perhaps the answer was inadvertently given in the DOD Inspector General's report (cited above):

"For testing TIA capabilities, Darpa and the U.S. Army Intelligence and Security Command (INSCOM) created an operational research and development environment that uses real-time feedback. The main node of TIA is located at INSCOM (in Fort Belvoir, Virginia)…."

Among the agencies participating or planning to participate in the INSCOM "testing" are the "National Security Agency, the Defense Intelligence Agency, the Central Intelligence Agency, the DOD Counterintelligence Field Activity, the U.S. Strategic Command, the Special Operations Command, the Joint Forces Command and the Joint Warfare Analysis Center." There are also "discussions" going on to bring in "non-DOD federal agencies" such as the FBI.

This is the infrastructure for an Orwellian police state.

It must be shut down!

 

Captain Wardrobes

Down with Murder inc.