[cryptome] 31c3 @ CCC, Jacob Appelbaum - more snowden releases

  • From: Aftermath <aftermath.thegreat@xxxxxxxxx>
  • To: "cryptome@xxxxxxxxxxxxx" <cryptome@xxxxxxxxxxxxx>
  • Date: Thu, 1 Jan 2015 15:22:03 -0800

http://pastebin.com/mfCEr9XD




========================================================================
 ______   __    _______  ______              _______  _______  _______
/ ___  \ /  \  (  ____ \/ ___  \            (  ____ \(  ____ \(  ____ \
\/   \  \\/) ) | (    \/\/   \  \           | (    \/| (    \/| (    \/
   ___) /  | | | |         ___) /   _____   | |      | |      | |
  (___ (   | | | |        (___ (   (_____)  | |      | |      | |
      ) \  | | | |            ) \           | |      | |      | |
/\___/  /__) (_| (____/\/\___/  /           | (____/\| (____/\| (____/\
\______/ \____/(_______/\______/            (_______/(_______/(_______/
========================================================================
#BULLRUN #LONGHAUL #BLUESNORT #GALLANTWAVE #VALIANTSURF #APEX #SPIN9 #TAO
#PRISM #TURBINE #TURMOIL #POISENNUT #MALIBU #FOURSCORE #XKeyscore #TUNDRA

Live Streaming:
http://streaming.media.ccc.de/relive/

31c3: Reconstructing Narratives - Jacob Appelbaum
https://www.youtube.com/watch?v=XgdWC-4ERbA

More security revelations still coming from the NSA Edward Snowden
Documents!
Recently at 31c3 @ CCC, Jacob Appelbaum did another presentation and
released more DOX on Der Speigel!
Topics range from encryption standard exploiting, mass
surveillance/targeting, govt kill lists, govt assassinations, etc.

Here are more NSA Edward Snowden Dox recently released at 31c3 by Der
Spiegel:
http://www.spiegel.de/media/media-35530.pdf
http://www.spiegel.de/media/media-35531.pdf
http://www.spiegel.de/media/media-35532.pdf
http://www.spiegel.de/media/media-35533.pdf
http://www.spiegel.de/media/media-35534.pdf
http://www.spiegel.de/media/media-35535.pdf
http://www.spiegel.de/media/media-35536.pdf
http://www.spiegel.de/media/media-35537.pdf
http://www.spiegel.de/media/media-35509.pdf
http://www.spiegel.de/media/media-35510.pdf
http://www.spiegel.de/media/media-35511.pdf
http://www.spiegel.de/media/media-35512.pdf
http://www.spiegel.de/media/media-35513.pdf
http://www.spiegel.de/media/media-35514.pdf
http://www.spiegel.de/media/media-35515.pdf
http://www.spiegel.de/media/media-35516.pdf
http://www.spiegel.de/media/media-35517.pdf
http://www.spiegel.de/media/media-35518.pdf
http://www.spiegel.de/media/media-35519.pdf
http://www.spiegel.de/media/media-35520.pdf
http://www.spiegel.de/media/media-35521.pdf
http://www.spiegel.de/media/media-35522.pdf
http://www.spiegel.de/media/media-35523.pdf
http://www.spiegel.de/media/media-35524.pdf
http://www.spiegel.de/media/media-35525.pdf
http://www.spiegel.de/media/media-35526.pdf
http://www.spiegel.de/media/media-35527.pdf
http://www.spiegel.de/media/media-35528.pdf
http://www.spiegel.de/media/media-35529.pdf
http://www.spiegel.de/media/media-35538.pdf
http://www.spiegel.de/media/media-35539.pdf
http://www.spiegel.de/media/media-35540.pdf
http://www.spiegel.de/media/media-35541.pdf
http://www.spiegel.de/media/media-35542.pdf
http://www.spiegel.de/media/media-35543.pdf
http://www.spiegel.de/media/media-35544.pdf
http://www.spiegel.de/media/media-35545.pdf
http://www.spiegel.de/media/media-35546.pdf
http://www.spiegel.de/media/media-35547.pdf
http://www.spiegel.de/media/media-35548.pdf
http://www.spiegel.de/media/media-35549.pdf
http://www.spiegel.de/media/media-35550.pdf
http://www.spiegel.de/media/media-35551.pdf
http://www.spiegel.de/media/media-35552.pdf


Use this command to download all .pdf's at once:
wget --wait=5s http://www.spiegel.de/media/media-355{09..52}.pdf

^Example:
http://imgur.com/VORg4Zt


\!/ Important Quotes \!/

"According to an NSA document dating from late 2009, the agency was
processing 1,000 requests an hour to decrypt VPN connections. This number
was expected to increase to 100,000 per hour by the end of 2011. The aim
was for the system to be able to completely process "at least 20 percent"
of these requests, meaning the data traffic would have to be decrypted and
reinjected. In other words, by the end of 2011, the NSA's plans called for
simultaneously surveilling 20,000 supposedly secure VPN communications per
hour."


"Things become "catastrophic" for the NSA at level five - when, for
example, a subject uses a
combination of Tor, another anonymization service, the instant messaging
system CSpace and a
system for Internet telephony (voice over IP) called ZRTP. This type of
combination results in a
"near-total loss/lack of insight to target communications, presence," the
NSA document states."



[+] Sources [+]
http://www.spiegel.de/international/germany/inside-the-nsa-s-war-on-internet-security-a-1010361.html

Other related posts: