Monthly Archives November 2014

NSA Device – CTX4000

(TS//SI//REL TO USA,FVEY) The CTX4000 is a portable continuous wave (CW) radar unit. It can be used to illuminate a target system to recover different off net information. Primary uses include VAGRANT and DROPMIRE collection.   (TS//SI//REL TO USA,FVEY) The CTX4000 provides the means to collect signals that otherwise would not be collectable, or would be extremely difficult to collect and process. It provides the following features: Frequency Range: 1 – 2 GHz. Bandwidth: Up to 45 MHz Output Power: User adjustable up to 2 W using the internal amplifier; external amplifiers make it possible to go up to 1
Read More

Categories: Information Technology, IT Security, and Preston Hood.

Happy Thanksgiving and a Tribute to (What Would Have Been) Amanda Todd’s 18th Birthday

Happy Thanksgiving to everyone in the United States! I hope that everyone is having a wonderful and blessed day! Many people might only think of today as Thanksgiving in the US, but today also happens to be the day that would have been Amanda Todd’s 18th birthday. Amanda Todd is the teen who tragically took her own life due to many different issues. If you have not heard about Amanda’s story I would encourage you to read my article Cyberbullying – In Memory Of Amanda Todd. Today Carol Todd (Amanda’s mother) and many other volunteers have joined together to help
Read More

Categories: Preston Hood.

NSA Device – CROSSBEAM

(TS//SI//REL) CROSSBEAM is a GSM module that mates a modified commercial cellular product with a WAGONBED controller board. (TS//SI//REL) CROSSBEAM is a reusable CHIMNEYPOOL-compliant GSM communications module capable of collecting and compressing voice data. CROSSBEAM can receive GSM voice, record voice data, and transmit the received information via connected modules or 4 different GSM data modes (GPRS, Circuit Switched Data, Data Over Voice, and DTMF) back to a secure facility. The CROSSBEAM module consists of a standard ANT architecture embedded computer, a specialized phone component, a customized software controller suite and an optional DSP (ROCKYKNOB) of using Data Over Voice
Read More

Categories: Information Technology, IT Security, and Preston Hood.

NSA Device – COTTONMOUTH-III

(TS//SI//REL) COTTONMOUTH-III (CM-III) is a Universal Serial Bus (USB) hardware implant, which will provide a wireless bridge into a target network as well as the ability to load exploit software onto target PCs. (TS//SI//REL) CM-III will provide air-gap bridging, software persistence capability, “in-field” re-programmability, and covert communications with a host software implant over the USB. The RF link will enable command and data infiltration and exfiltration. CM-III will also communicate with Data Network Technologies (DNT) software (STRAITBIZARRE) through a covert channel implemented on the USB, using this communication channel to pass commands and data between hardware and software implants. CM-III
Read More

Categories: Information Technology, IT Security, and Preston Hood.

NSA Device – COTTONMOUTH-II

(TS//SI//REL) COTTONMOUTH-II (CM-II) is a Universal Serial Bus (USB) hardware Host Tap, which will provide a covert link over USB link into a target network. CM-II is intended to be operate with a long haul relay subsystem, which is co-located within the target equipment. Further integration is needed to turn this capability into a deployable system. (TS//SI//REL) CM-II will provide software persistence capability, “in-field” re-programmability, and covert communications with a host software implant over the USB. CM-II will also communicate with Data Network Technologies (DNT) software (STRAITBIZARRE) through a covert channel implemented on the USB, using this communication channel to
Read More

Categories: Information Technology, IT Security, and Preston Hood.

The Joint Worldwide Intelligence Communications System (JWICS)

The Joint Worldwide Intelligence Communications System (JWICS) is a Top Secret/SCI network. Just like the Secret Internet Protocol Router Network (SIPRNet) and the Nonsecure Internet Protocol Router Network (NIPRNet), JWICS is basically the same thing with the exception of what it is used for. The JWICS is primarily used for file sharing to transmit information that is classified up to and including the “Top Secret” level of the United States government classification system. Information that is classified at this level would cause “exceptionally grave damage” to national security if disclosed to the public. There are about 1.4 million Americans who
Read More

Categories: Information Technology, IT Security, and Preston Hood.

Silk Road 2.0 Taken Down By United States Authorities

On 11/4/14 U.S authorities including the United States Federal Bureau of Investigation (FBI) and the United States Department of Homeland Security (DHS) along with European law enforcement agencies announced that they have taken down Silk Road 2.0 [silkroad6ownowfk.onion], which is the successor website to the original Silk Road. Blake Benthall was the owner of Silk Road 2.0; he was arrested on 11/5/14 in San Francisco and the charges that were brought up against him carry a maximum sentence of life in prison. While I do not totally disagree with what law officials did here I do disagree with the actions
Read More

Categories: Information Technology, IT Security, Legal, and Preston Hood.

The Nonsecure Internet Protocol Router Network (NIPRNet)

The Nonsecure Internet Protocol Router Network (NIPRNet) is basically the same thing as the Secret Internet Protocol Router Network (SIPRNet), with the exception of what the two are used for. NIPRNet was created in the 1980s for the purpose of transmitting sensitive but unclassified information among “internal” users; it also allowed the “internal” users to access the regular Internet. NIPRNet is made up of Internet Protocol routers which are owned by the United States Department of Defense (DoD). Today NIPRNet is the largest private network in the world and is still growing.   The NIPRNet Verses the SIPRNet As I
Read More

Categories: Information Technology, IT Security, and Preston Hood.

The Secret Internet Protocol Router Network (SIPRNet)

The Secret Internet Protocol Router Network (SIPRNet) is basically a secure network that is used by the United States Department of Defense (DoD) and the United States Department of State (DoS) to distribute classified information and communicate amongst each other. SIPRNet is nearly identical to any other standard TCP/IP network; it originated from the same predecessor as the internet, the Advanced Research Projects Agency Network (ARPANET). Of course there are major enhancements in the security design of the network such as the implementation of strong crypto throughout the whole network but for the most part SIPRNet and the Internet are
Read More

Categories: Information Technology, IT Security, and Preston Hood.