http://pastebin.com/mfCEr9XD ======================================================================== ______ __ _______ ______ _______ _______ _______ / ___ \ / \ ( ____ \/ ___ \ ( ____ \( ____ \( ____ \ \/ \ \\/) ) | ( \/\/ \ \ | ( \/| ( \/| ( \/ ___) / | | | | ___) / _____ | | | | | | (___ ( | | | | (___ ( (_____) | | | | | | ) \ | | | | ) \ | | | | | | /\___/ /__) (_| (____/\/\___/ / | (____/\| (____/\| (____/\ \______/ \____/(_______/\______/ (_______/(_______/(_______/ ======================================================================== #BULLRUN #LONGHAUL #BLUESNORT #GALLANTWAVE #VALIANTSURF #APEX #SPIN9 #TAO #PRISM #TURBINE #TURMOIL #POISENNUT #MALIBU #FOURSCORE #XKeyscore #TUNDRA Live Streaming: http://streaming.media.ccc.de/relive/ 31c3: Reconstructing Narratives - Jacob Appelbaum https://www.youtube.com/watch?v=XgdWC-4ERbA More security revelations still coming from the NSA Edward Snowden Documents! Recently at 31c3 @ CCC, Jacob Appelbaum did another presentation and released more DOX on Der Speigel! Topics range from encryption standard exploiting, mass surveillance/targeting, govt kill lists, govt assassinations, etc. Here are more NSA Edward Snowden Dox recently released at 31c3 by Der Spiegel: http://www.spiegel.de/media/media-35530.pdf http://www.spiegel.de/media/media-35531.pdf http://www.spiegel.de/media/media-35532.pdf http://www.spiegel.de/media/media-35533.pdf http://www.spiegel.de/media/media-35534.pdf http://www.spiegel.de/media/media-35535.pdf http://www.spiegel.de/media/media-35536.pdf http://www.spiegel.de/media/media-35537.pdf http://www.spiegel.de/media/media-35509.pdf http://www.spiegel.de/media/media-35510.pdf http://www.spiegel.de/media/media-35511.pdf http://www.spiegel.de/media/media-35512.pdf http://www.spiegel.de/media/media-35513.pdf http://www.spiegel.de/media/media-35514.pdf http://www.spiegel.de/media/media-35515.pdf http://www.spiegel.de/media/media-35516.pdf http://www.spiegel.de/media/media-35517.pdf http://www.spiegel.de/media/media-35518.pdf http://www.spiegel.de/media/media-35519.pdf http://www.spiegel.de/media/media-35520.pdf http://www.spiegel.de/media/media-35521.pdf http://www.spiegel.de/media/media-35522.pdf http://www.spiegel.de/media/media-35523.pdf http://www.spiegel.de/media/media-35524.pdf http://www.spiegel.de/media/media-35525.pdf http://www.spiegel.de/media/media-35526.pdf http://www.spiegel.de/media/media-35527.pdf http://www.spiegel.de/media/media-35528.pdf http://www.spiegel.de/media/media-35529.pdf http://www.spiegel.de/media/media-35538.pdf http://www.spiegel.de/media/media-35539.pdf http://www.spiegel.de/media/media-35540.pdf http://www.spiegel.de/media/media-35541.pdf http://www.spiegel.de/media/media-35542.pdf http://www.spiegel.de/media/media-35543.pdf http://www.spiegel.de/media/media-35544.pdf http://www.spiegel.de/media/media-35545.pdf http://www.spiegel.de/media/media-35546.pdf http://www.spiegel.de/media/media-35547.pdf http://www.spiegel.de/media/media-35548.pdf http://www.spiegel.de/media/media-35549.pdf http://www.spiegel.de/media/media-35550.pdf http://www.spiegel.de/media/media-35551.pdf http://www.spiegel.de/media/media-35552.pdf Use this command to download all .pdf's at once: wget --wait=5s http://www.spiegel.de/media/media-355{09..52}.pdf ^Example: http://imgur.com/VORg4Zt \!/ Important Quotes \!/ "According to an NSA document dating from late 2009, the agency was processing 1,000 requests an hour to decrypt VPN connections. This number was expected to increase to 100,000 per hour by the end of 2011. The aim was for the system to be able to completely process "at least 20 percent" of these requests, meaning the data traffic would have to be decrypted and reinjected. In other words, by the end of 2011, the NSA's plans called for simultaneously surveilling 20,000 supposedly secure VPN communications per hour." "Things become "catastrophic" for the NSA at level five - when, for example, a subject uses a combination of Tor, another anonymization service, the instant messaging system CSpace and a system for Internet telephony (voice over IP) called ZRTP. This type of combination results in a "near-total loss/lack of insight to target communications, presence," the NSA document states." [+] Sources [+] http://www.spiegel.de/international/germany/inside-the-nsa-s-war-on-internet-security-a-1010361.html