Tag: National Security

  • NSA Releases Documents on ET contact

    NSA releases ultra-secret file regarding effort to decode decades-old alien signals.

    Scientists determined that mysterious signals received in 1957 were transmitted to Earth from an advanced alien civilization. Decades have passed while security analysts and dedicated cryptographers struggled to decipher the enigmatic messages from a completely unknown, distant alien culture.

    Now, in 2011, the National Security Agencyone of the United States’ most secret intelligence gathering organizationshas released under protest (forced by order of a U.S. Federal Court judge) stunning information about intelligent life in the universe.

    But as usual, the non-curious, inept, doltish mainstream media completely ignores it.

    NSA analysts marvel at strange messages

    Twenty-nine lengthy transmissions were received and verified as being “of extraterrestrial origin.” According to some in the intelligence community, this hot potato was given the highest priority and assigned to “goggle-eyed geeks” tasked to find out exactly what the enigmatic transmissions said.

    Speculation among some of the NSA spooks about what the mysterious messages said allegedly ran the gambit from sarcastic guesses they were just some garbled alien radio commercials (an inside joke that drew nervous laughter from some of the analysts) to those that were convinced the messagescoded in some unknown mathematical progressionconveyed the basics of unlimited energy, star travel, or even time travel.

    Allegedly, those that subscribe to the latter theories have absolutely nothing to support their belief.

    NSA forms crack teams

    According to researchers who have analyzed the document [available for your inspection as a downloadable PDF at the end of this article] an NSA specialist named Dr. Howard Campaigne was given the responsibility of choosing a cryptology team to work on cracking the alien messages.

    The task was compartmentalized and many who worked at the NSA had no idea that such a projector even the messages the team focused uponexisted.

    The entire project was strictly enforced by secrecy and conducted under the auspices of the Official Secrets Act and all participants took National Security oaths.

    Only those deemed crucial to the success of the undertaking were allowed access to the secret under the provisions of a well-defined need-to-know heirarchy.

    ET documents  by  NSA.
    NSA documents on ET

    http://beforeitsnews.com/story/1424/136/Major_US_Intelligence_Agency_Reveals_ET_Contact.html

    http://www.nsa.gov/public_info/_files/ufo/key_to_et_messages.pdf

     

  • New Terror Group-More Lethal Than Al-Qaeda.

    This group is more dangerous.

    It does not spill blood nor does it have a specified demand and it appears to be leaderless.

    It seems to be the outcome of the frustration felt by the  behavior of Politicians and as such its targets are wide-ranging.

    What is at stake is National secrets and National Security.

    Imagine what could happen if they hack power grids, Traffic Controls,Finance markets,Military Soft ware.

    This has to be the  most dangerous group around  and as such needs urgent and concerted action by the Governments the world over.

    It also means that the politicians must mend their ways to prevent a system collapse.

    If they don’t, this group shall gain public sympathy as well.

    A collection of 10,365 e-mails from the Iranian government were leaked by digital activist group Anonymous Operations on June 2. According to members of Anonymous, the files were taken after the hacker accessed the Iranian Passport and Visa Office email center…

    “I don’t know why the Islamic regime keeps providing money to their cyber army while they can’t secure their most important mail server,” Anonymous stated…

    The growing phenomena of “hactivism,” whereby groups and individuals use hacking and cyberattacks as a form of dissent, is steadily growing. Anonymous Operations is among the main groups falling under the category of hactivists, and has garnered international attention through their operations, with targets ranging from Iran to Sony.

    Following the White House release of an international cyberspace strategy, issues of cybersecurity and hacking are gaining heavy attention. The report even states in part that cyberattacks can be regarded as acts of war.

    It states that countries “have an inherent right to self-defense that may be triggered by certain aggressive acts in cyberspace … When warranted, the United States will respond to hostile acts in cyberspace as we would to any other threat to our country.”..

    A new NATO report on cybersecurity, “Information and National Security,” refers to Anonymous directly, stating “The longer these attacks persist the more likely countermeasures will be developed, implemented, the groups will be infiltrated and perpetrators persecuted.”

    The report states NATO’s concern that “Observers note that Anonymous is becoming more and more sophisticated and could potentially hack into sensitive government, military, and corporate files.”..

    “As traditional means of protest … have slowly turned into nothing but an empty, ritualized gesture of discontent over the course of the last century, people have been anxiously searching for new ways to pressure politicians and give voice to public demands … Anonymous has, for now, found this new way of voicing civil protest in the form of the DDoS,” states the letter.

    They add, “You can easily arrest individuals, but you cannot arrest an ideology. We are united by a common objective and we can and WILL cross any borders to achieve that.”.

    http://www.theepochtimes.com/n2/world/anonymous-leaks-10000-e-mails-from-iranian-government-57143.html

    Related:

    NATO leaders have been warned that WikiLeaks-loving ‘hacktivist’ collective Anonymous could pose a threat to member states’ security, following recent attacks on the US Chamber of Commerce and defence contractor HBGary – and promise to ‘persecute’ its members.

    In a toughly-worded draft report to the NATO Parliamentary Assembly, General Rapporteur Lord Jopling claims that the loose-knit, leaderless group is „becoming more and more sophisticated“, and „could potentially hack into sensitive government, military, and corporate files“.

    The group demonstrated its capabilities in February, says the report, when it hacked into US-based defence contractor HBGary. Documents stolen in the attack lifted the lid on the US military’s plans to use social network surveillance software, code-named ‘Metal Gear’ by the online hive-mind, which could control an army of fake profiles, collecting data from disparate sites and piecing together an individual’s identity by analysing linguistic traits and other details.

    Describing the rise of the group from its beginnings on internet picture message board 4chan, via campaigns against the Church of Scientology and, more recently, in support of whistle-blowing website Wikileaks, the report continues: „Today, the ad hoc international group of hackers and activists is said to have thousands of operatives and has no set rules or membership.“

    The report goes on to lay out a stark warning to the group’s nameless participants:

    „It remains to be seen how much time Anonymous has for pursuing such paths. The longer these attacks persist the more likely countermeasures will be developed, implemented, the groups will be infiltrated and perpetrators persecuted.“.

    http://serpentsembrace.wordpress.com/2011/06/03/nato-report-threatens-to-persecute-anonymous-hacktivist-grouped-named-as-threat-by-military-alliance-2/

     

     

     

     

  • Can’t track Blackberry, Gmail: DoT

     

    ‘Enemy of The State’ is a favorite movie of mine. I was watching it(second time) yesterday.

    I wanted to write on the subject of privacy,National Protection and National Security.

    Now , as I sit down to write down on this,I find this funny gem,where an emerging giant of an industrial power unable to track G mail,Blackberry story has been going around for quite some time now.(read my blog on ‘no technology for 3G under Technology)

    Instead i am producing here below links on tracking electronic mail.

    I have deferred my decision on National Security for the time being,

    India‘s Department of Telecommunications (DoT) has given up on Blackberry – saying it cannot track about 15 communication services including Gmail and other email services. Nothing new was decided at a high-level meeting where India’s top security officials were present. The DoT understands the only option would be to build technologies for intelligence agencies for monitoring and interception purposes. It was pointed out by the DoT that in most countries, intelligence agencies build their own monitoring and interception capabilities, where feedback is provided by telcos. But, the Home Ministry has asked the service providers to ensure their services can be tracked on a real-time basis.
    DoT sources said: “The DoT has come to a conclusion that to track blackberry services and intercepting encrypted communication, security agencies must build capabilities of decrypting the intercepted communication. The ball is now in the Home Ministry’s court as it has to decide whether to ban such communications now.” The services listed by the DoT were video chats, internet telephony calls and push emails on high-end handsets.

    Related:

    E-mail tracking is a method for monitoring the e-mail delivery to intended recipient. Most tracking technologies utilize some form of digitally time-stamped record to reveal the exact time and date that your e-mail was received or opened, as well the IP address of the recipient.

    E-mail tracking is useful when the sender wants to know if the intended recipient actually received the e-mail, or if they clicked the links. However, due to the nature of the technology, e-mail tracking cannot be considered an absolutely accurate indicator that a message was opened or read by the recipient.

    Most e-mail marketing software provides tracking features, some

    times in aggregate (e.g. click-through rate), and sometimes on an individual basis.

    Read-receipts

    Some e-mail applications, such as Microsoft Office Outlook, employ a read-receipt tracking mechanism. The sender selects the receipt request option prior to sending the message, and then upon sending, each recipient has the option of notifying the sender that the message was received and/or read by the recipient.

    However, requesting a receipt does not guarantee that you will get one, for several reasons. Very few e-mail applications or services support read receipts, and users can generally disable the functionality if they so wish. Those that do support it aren’t necessarily compatible with or capable of recognizing requests from a different e-mail service or application. Generally read receipts are only useful within an organization where all employees/members are using the same email service and application.

    Depending on the recipient’s mail client and settings, they may be forced to click a notification button before they can move on with their work. Even though it is an opt-in process, a recipient may consider it inconvenient, discourteous, or invasive.

    Read receipts are sent back to your Inbox as e-mail messages. Additional technical information, such as who it is from, the e-mail software they use, and the IP addresses of the sender and their e-mail server is available inside the Internet headers of the read receipt.

    The technical term for these is MDN – Message Disposition Notifications, and they are requested by inserting one or more of the following lines into the email headers: X-Confirm-Reading-To: Disposition-Notification-To: or Return-Receipt-To:

    Return-receipts

    Main article: Return receipt#E-mail

    Another kind of receipt can be requested, which is called a DSN (delivery status notification), which is a request to the recipients email server to send you a notification about the delivery of an email you’ve just sent. The notification takes the form of an email, and will tell you if your delivery succeeded, failed, got delayed, or will warn you if any email server involved was unable to give you a receipt. DSN’s are requested at the time of sending by the sending application or server software (not anyplace inside the email or headers itself), and you can request to “Never” get any, or to “Always” get one, or (which most software does by default) only to get DSN if delivery fails (i.e.: not for success, delay, or relay DSNs). These failure DSNs are normally referred to as a “Bounce”. Additionally, you can specify in your DSN request whether you want your receipt to contain a full copy of your original email, or just a summary of what happened. In the SMTP protocol, DSNs are requested at the end of the RCPT TO: command (e.g.: RCPT TO:<> NOTIFY=SUCCESS,DELAY) and the MAIL FROM: command (e.g.: MAIL FROM:<> RET=HDRS)

    E-mail marketing and tracking

    Some e-mail marketing tools include tracking as a feature. Such e-mail tracking is usually accomplished using standard web tracking devices known as cookies and web beacons. When you send a tracked e-mail message, if it’s a graphical HTML message (not a plain text message) the e-mail marketing system may embed a tiny, invisible tracking image (a single-pixel gif, sometimes called a web beacon) within the content of the message. When the recipient opens the message, the tracking image is referenced. When they click a link or open an attachment, another tracking code is activated. In each case a separate tracking event is recorded by the system. These response events accumulate over time in a database, enabled the e-mail marketing software to report metrics such as open-rate and click-through rates. E-mail marketing users can view reports on both aggregate response statistics and individual response over time.

    http://www.telecomnewsindia.com/2011/03/cant-track-blackberry-gmail-dot.html

    Our StreamSend Email Marketing software includes programs that provide email tracking, email reporting and email monitoring.  Now, with our email reporting program, you can see the results of your online marketing campaigns in real-time. Plus, with email tracking, you can monitor email delivery to intended recipients, to make sure that all your email marketing campaign materials have been delivered according to your specifications. Utilizing the latest in email tracking technology, our software features a digital time-stamp to reveal exactly when your email was received and opened. In addition, you can track and flag invalid email addresses automatically.

    You can strategically review all your email marketing campaigns with the help of our email reporting program. So simple, it allows you to track click-through performance in terms of the total number of clicks and click-throughs for all the links within your email. You can even select up to five campaigns to compare, and then monitor their progress over time. Plus, our domain tracking features allow you to view the statistics on the top 100 domains on your mailing list.

    Email monitoring

    With our email monitoring services, you can customize your email marketing campaign to increase its potential for success. Track your click-to-conversion results, analyze your return on investment, and get easy integration with Google Analytics. By reviewing the email tracking and reporting data available through Google Analytics, you can prepare better, more targeted email advertisements, strengthen marketing initiatives and increase your conversion click-through ratio.

    For more information on our email marketing software that includes email tracking, reporting and monitoring, contact us at 877-439-4078, ext. 1.For free Download Clock Link below:

    http://www.streamsend.com/email-tracking-reporting.htm

  • Improving national Security and Defense Budget.

    While it is true that corporations-military nexus has to be shunned, it is not correct to presume that increase in Defense spending diminishes Security level.
    What is of relevance is the use of appropriate use of methods in tackling security issues, with out the nexus grabbing a pie in every deal to sign in fancy and irrelevant technology .
    The concept of updating technology is fine, but corruption at the individual level is to be stopped.
    Also the so called lobbyists and party funding is the root of this problem;unfortunately this is one of the natural ugly faces of Democracy where money is needed for power and not character.
    This problem is endemic in all Democracies.
    Media can play a vital role in exposing the same periodically.

    Story:

    Washington – Speaking last week at a Christian Science Monitor breakfast with journalists, Admiral Michael Mullen, chairman of the Joint Chiefs of Staff, remarked that he hoped to avoid “massive cuts” in defense, which “would be dangerous now, given the national security requirements that we have.” Yet cutting the baseline defense budget, which is now even higher than it was at the height of the Reagan buildup, may ironically be one of the best tools we have to meet our national security needs.

    http://news.yahoo.com/s//csm/330810

     

    Related;

    Larison finds little reason to believe that Obama will ever trim the military budget. He also argues that we shouldn’t confuse military spending and defense spending:

    http://andrewsullivan.theatlantic.com/the_daily_dish/2010/10/obamas-big-big-spending-on-defense-the-military.html

    AfrikaansAlbanianArabicBelarusianBulgarianCatalanChineseCroatianCzechDanishDetect languageDutchEnglishEstonianFilipinoFinnishFrenchGalicianGermanGreekHaitian Creole ALPHAHebrewHindiHungarianIcelandicIndonesianIrishItalianJapaneseKoreanLatvianLithuanianMacedonianMalayMalteseNorwegianPersianPolishPortugueseRomanianRussianSerbianSlovakSlovenianSpanishSwahiliSwedishThaiTurkishUkrainianVietnameseWelshYiddishAfrikaansAlbanianArabicBelarusianBulgarianCatalanChineseCroatianCzechDanishDutchEnglishEstonianFilipinoFinnishFrenchGalicianGermanGreekHaitian Creole ALPHAHebrewHindiHungarianIcelandicIndonesianIrishItalianJapaneseKoreanLatvianLithuanianMacedonianMalayMalteseNorwegianPersianPolishPortugueseRomanianRussianSerbianSlovakSlovenianSpanishSwahiliSwedishThaiTurkishUkrainianVietnameseWelshYiddish 

    Detect language » Hungarian
    AfrikaansAlbanianArabicBelarusianBulgarianCatalanChineseCroatianCzechDanishDetect languageDutchEnglishEstonianFilipinoFinnishFrenchGalicianGermanGreekHaitian Creole ALPHAHebrewHindiHungarianIcelandicIndonesianIrishItalianJapaneseKoreanLatvianLithuanianMacedonianMalayMalteseNorwegianPersianPolishPortugueseRomanianRussianSerbianSlovakSlovenianSpanishSwahiliSwedishThaiTurkishUkrainianVietnameseWelshYiddishAfrikaansAlbanianArabicBelarusianBulgarianCatalanChineseCroatianCzechDanishDutchEnglishEstonianFilipinoFinnishFrenchGalicianGermanGreekHaitian Creole ALPHAHebrewHindiHungarianIcelandicIndonesianIrishItalianJapaneseKoreanLatvianLithuanianMacedonianMalayMalteseNorwegianPersianPolishPortugueseRomanianRussianSerbianSlovakSlovenianSpanishSwahiliSwedishThaiTurkishUkrainianVietnameseWelshYiddish

    Detect language » Hungarian
  • National Security-Press Vs Establishment

    Establishment often resorts to National Security Tag when they feel they are threatened.Remember Nixon?Having said that mature decision has to be taken by the media to decide what is Natonal Security and what is not.It is not to be abdicated to anybody else.However, publisher’s political leanings have a say as well.It is a tricky situation.Unless credible repoting is done, news papers will be something people read-when they miss late night TV and one which puts in words between advertisenments