Very instructive documents, lot of content we already knew they may have made it, exposed to the public. Consider they may have made it; to sum up that could be false informations. But there is more important. One other thing is disturbing my mind. From all these leaked PDF presentations, there is none sexy. I mean if you want to be an intel guy, you have to deal with ugliness presentations. Do you know if the geek guys are funny at least ? I would be sleepy and bored if I had to get to these internal "top secret" things. On Fri, Jan 2, 2015 at 12:22 AM, Aftermath <aftermath.thegreat@xxxxxxxxx> wrote: > http://pastebin.com/mfCEr9XD > > > > > ======================================================================== > ______ __ _______ ______ _______ _______ _______ > / ___ \ / \ ( ____ \/ ___ \ ( ____ \( ____ \( ____ \ > \/ \ \\/) ) | ( \/\/ \ \ | ( \/| ( \/| ( \/ > ___) / | | | | ___) / _____ | | | | | | > (___ ( | | | | (___ ( (_____) | | | | | | > ) \ | | | | ) \ | | | | | | > /\___/ /__) (_| (____/\/\___/ / | (____/\| (____/\| (____/\ > \______/ \____/(_______/\______/ (_______/(_______/(_______/ > ======================================================================== > #BULLRUN #LONGHAUL #BLUESNORT #GALLANTWAVE #VALIANTSURF #APEX #SPIN9 #TAO > #PRISM #TURBINE #TURMOIL #POISENNUT #MALIBU #FOURSCORE #XKeyscore #TUNDRA > > Live Streaming: > http://streaming.media.ccc.de/relive/ > > 31c3: Reconstructing Narratives - Jacob Appelbaum > https://www.youtube.com/watch?v=XgdWC-4ERbA > > More security revelations still coming from the NSA Edward Snowden > Documents! > Recently at 31c3 @ CCC, Jacob Appelbaum did another presentation and > released more DOX on Der Speigel! > Topics range from encryption standard exploiting, mass > surveillance/targeting, govt kill lists, govt assassinations, etc. > > Here are more NSA Edward Snowden Dox recently released at 31c3 by Der > Spiegel: > http://www.spiegel.de/media/media-35530.pdf > http://www.spiegel.de/media/media-35531.pdf > http://www.spiegel.de/media/media-35532.pdf > http://www.spiegel.de/media/media-35533.pdf > http://www.spiegel.de/media/media-35534.pdf > http://www.spiegel.de/media/media-35535.pdf > http://www.spiegel.de/media/media-35536.pdf > http://www.spiegel.de/media/media-35537.pdf > http://www.spiegel.de/media/media-35509.pdf > http://www.spiegel.de/media/media-35510.pdf > http://www.spiegel.de/media/media-35511.pdf > http://www.spiegel.de/media/media-35512.pdf > http://www.spiegel.de/media/media-35513.pdf > http://www.spiegel.de/media/media-35514.pdf > http://www.spiegel.de/media/media-35515.pdf > http://www.spiegel.de/media/media-35516.pdf > http://www.spiegel.de/media/media-35517.pdf > http://www.spiegel.de/media/media-35518.pdf > http://www.spiegel.de/media/media-35519.pdf > http://www.spiegel.de/media/media-35520.pdf > http://www.spiegel.de/media/media-35521.pdf > http://www.spiegel.de/media/media-35522.pdf > http://www.spiegel.de/media/media-35523.pdf > http://www.spiegel.de/media/media-35524.pdf > http://www.spiegel.de/media/media-35525.pdf > http://www.spiegel.de/media/media-35526.pdf > http://www.spiegel.de/media/media-35527.pdf > http://www.spiegel.de/media/media-35528.pdf > http://www.spiegel.de/media/media-35529.pdf > http://www.spiegel.de/media/media-35538.pdf > http://www.spiegel.de/media/media-35539.pdf > http://www.spiegel.de/media/media-35540.pdf > http://www.spiegel.de/media/media-35541.pdf > http://www.spiegel.de/media/media-35542.pdf > http://www.spiegel.de/media/media-35543.pdf > http://www.spiegel.de/media/media-35544.pdf > http://www.spiegel.de/media/media-35545.pdf > http://www.spiegel.de/media/media-35546.pdf > http://www.spiegel.de/media/media-35547.pdf > http://www.spiegel.de/media/media-35548.pdf > http://www.spiegel.de/media/media-35549.pdf > http://www.spiegel.de/media/media-35550.pdf > http://www.spiegel.de/media/media-35551.pdf > http://www.spiegel.de/media/media-35552.pdf > > > Use this command to download all .pdf's at once: > wget --wait=5s http://www.spiegel.de/media/media-355{09..52}.pdf > > ^Example: > http://imgur.com/VORg4Zt > > > \!/ Important Quotes \!/ > > "According to an NSA document dating from late 2009, the agency was > processing 1,000 requests an hour to decrypt VPN connections. This number > was expected to increase to 100,000 per hour by the end of 2011. The aim > was for the system to be able to completely process "at least 20 percent" > of these requests, meaning the data traffic would have to be decrypted and > reinjected. In other words, by the end of 2011, the NSA's plans called for > simultaneously surveilling 20,000 supposedly secure VPN communications per > hour." > > > "Things become "catastrophic" for the NSA at level five - when, for > example, a subject uses a > combination of Tor, another anonymization service, the instant messaging > system CSpace and a > system for Internet telephony (voice over IP) called ZRTP. This type of > combination results in a > "near-total loss/lack of insight to target communications, presence," the > NSA document states." > > > > [+] Sources [+] > > http://www.spiegel.de/international/germany/inside-the-nsa-s-war-on-internet-security-a-1010361.html >