I see the battle over the claims that the CIA/NSA heads cooperated with Obama to spy on Trump is now raging like a forest fire. The mainstream media and DNC are pretending that spying was impossible yet we get one ‘insider story’ after another as they continue spying on Trump, I show examples of this. I suggested in the past that Trump should avoid the White House but now it seems there is a tap on his home in Manhattan. With modern spy stuff, it is easy to do this, one doesn’t have to go in and plant devices everywhere.
I grew up in the ‘spy world’. I used to play at spying because it was lots of fun. I also played international power politics starting at age 17 years old. So I have a fairly good idea, how the game is played. NSA ANT catalog –
The NSA ANT catalog is a 50-page classified document listing technology available to the United States National Security Agency (NSA) Tailored Access Operations (TAO) by the Advanced Network Technology (ANT) Division to aid in cyber surveillance. Most devices are described as already operational and available to US nationals and members of the Five Eyes alliance. According to Der Spiegel, which released the catalog to the public on December 30, 2013, “The list reads like a mail-order catalog, one from which other NSA employees can order technologies from the ANT division for tapping their targets’ data.” The document was created in 2008.[10]
No one knows who leaked this, Snowden was blamed but claims he didn’t do it. So the leaker is still at large.
BULLDOZER: Technology that creates a hidden wireless bridge allowing NSA personnel to remotely control a system wirelessly.[15][19]
CANDYGRAM: A $40,000 tripwire device that emulates a GSM cellphone tower.COTTONMOUTH-I
COTTONMOUTH: (see image at right) A family of modified USB and Ethernet connectors that can be used to install Trojan horse software and work as wireless bridges, providing covert remote access to the target machine.[20] COTTONMOUTH-I is a USB plug that uses TRINITY as digital core and HOWLERMONKEY as RF transceiver. Cost in 2008 was slightly above $1M for 50 units.
COTTONMOUTH-II is deployed in a USB socket (rather than plug), and costs only $200K per 50 units, but requires further integration in the target machine to turn into a deployed system.
COTTONMOUTH-III is a stacked Ethernet and USB plug costing approximately $1.25M for 50 units.
CROSSBEAM is “a GSM communications module capable of collecting and compressing voice data” [21]
CTX4000: Continuous wave radar device that can “”illuminate” a target system for recovery of “off net” information.[22]
CYCLONE-HX9 – GSM Base Station Router
DEITYBOUNCE: Technology that installs a backdoor software implant on Dell PowerEdge servers via the motherboard BIOS and RAID controller(s).[23][24]
DROPOUTJEEP: “A software implant for the Apple iPhone that utilizes modular mission applications to provide specific SIGINT functionality. This functionality includes the ability to remotely push/pull files from the device. SMS retrieval, contact list retrieval, voicemail, geolocation, hot mic, camera capture, cell tower location, etc. Command, control and data exfiltration can occur over SMS messaging or a GPRS data connection. All communications with the implant will be covert and encrypted.”[8]
EBSR is a “tri-band active GSM base station with internal 802.11/GPS/handset capability” [25]
ENTOURAGE
FEEDTROUGH: Software that can penetrate Juniper Networks firewalls allowing other NSA-deployed software to be installed on mainframe computers.[1][9][26]
FIREWALK
FIREWALK: (see image at right) A device that looks identical to a standard RJ45 socket that allows data to be injected, or monitored and transmitted via radio technology.[27] using the
HOWLERMONKEY RF transceiver. It can for instance create a VPN to the target computer. Cost in 2008: $537K for 50 units.
FOXACID: Technology that can install spyware using a “quantum insert” capable of infecting spyware at a packet level. (Not numbered because FOXACID may or may not be part of the NSA ANT catalog; sources differ.)
GENESIS
GINSU: Technology that uses a PCI bus device in a computer, and can reinstall itself upon system boot-up.[28]
GOPHERSET: GSM software that uses a phone’s SIM card’s API (SIM Toolkit or STK) to control the phone through remotely sent commands.[29]
GOURMETTROUGH: User-configurable persistence implant for certain Juniper Networks firewalls.[22]
HALLUXWATER: Back door exploit for Huawei Eudemon firewalls.[22]
HEADWATER: Persistent backdoor technology that can install spyware using a “quantum insert” capable of infecting spyware at a packet level on Huawei routers.[22]HOWLERMONKEY
HOWLERMONKEY: (see image at right) A RF transceiver that makes it possible (in conjunction with digital processors and various implanting methods) to extract data from systems or allow them to be controlled remotely.
IRATEMONK: Technology that can infiltrate the firmware of hard drives manufactured by Maxtor, Samsung, Seagate, and Western Digital.[30]
IRONCHEF: Technology that can “infect” networks by installing itself in a computer I/O BIOS.[15] IRONCHEF includes also “Straitbizarre” and “Unitedrake” which have been linked to the spy software REGIN.[31]
JUNIORMINT
JETPLOW: Firmware that can be implant to create a permanent backdoor in a Cisco PIX series and ASA firewalls.[22]
LOUDAUTO: $30 audio-based RF retro-reflector listening device.[22]TRINITY
MAESTRO-II: a multi-chip module approximately the size of a dime that serves as the hardware core of several other products. The module contains a 66 MHz ARM7 processor, 4 MB of flash, 8 MB of RAM, and a FPGA with 500,000 gates. Unit cost: $3–4K (in 2008). It replaces the previous generation modules which were based on the HC12 microcontroller.
MONKEYCALENDAR: Software that transmits a mobile phone’s location by hidden text message.
NEBULA
NIGHTSTAND: Portable system that wirelessly installs Microsoft Windows exploits from a distance of up to eight miles.[22]
NIGHTWATCH: Portable computer used to reconstruct and display video data from VAGRANT signals; used in conjunction with a radar source like the CTX4000 to illuminate the target in order to receive data from it.
PICASSO: Software that can collect mobile phone location date, call metadata, access the phone’s microphone to eavesdrop on nearby conversations.[29]
PHOTOANGLO: A joint NSA/GCHQ project to develop a radar system to replace CTX4000.[22]
RAGEMASTER: (see image above, right) A concealed $30 device that taps the video signal from a target’s computer’s VGA signal output so the NSA can see what is on a targeted desktop monitor. It is powered by a remote radar and responds by modulating the VGA red signal (which is also sent out most DVI ports) into the RF signal it re-radiates; this method of transmission is codenamed VAGRANT. RAGEMASTER is usually installed/concealed in the ferrite choke of the target cable. The original documents are dated 2008-07-24. Several receiver/demodulating devices are available, e.g. NIGHTWATCH.[6]
SCHOOLMONTANA: Software that makes DNT implants persistent on JUNOS-based (FreeBSD-variant) J-series routers/firewalls.[22]
SIERRAMONTANA: Software that makes DNT implants persistent on JUNOS-based M-series routers/firewalls.[22]
STUCCOMONTANA: Software that makes DNT implants persistent on JUNOS-based T-series routers/firewalls.[22]
SOMBERKNAVE: Software that can be implanted on a Windows XP system allowing it to be remotely controlled from NSA headquarters.
SOUFFLETROUGH: BIOS injection software that can compromise Juniper Networks SSG300 and SSG500 series firewalls.[22]SPARROW II
SPARROW II: (see image at right) A small computer intended to be used for WLAN collection, including from UAVs. Hardware: IBM Power PC 405GPR processor, 64 MB SDRAM, 16 MB of built-inflash, 4 mini PCI slots, CompactFlash slot, and 802.11 B/G hardware. Running Linux 2.4 and the BLINDDATE software suite. Unit price (2008): $6K.
SURLYSPAWN: Keystroke monitor technology that can be used on remote computers that are not internet connected.
SWAP: Technology that can reflash the BIOS of multiprocessor systems that run FreeBSD, Linux, Solaris, or Windows.
TAWDRYYARD
TOTECHASER
TOTEGHOSTLY: Software that can be implanted on a Windows mobile phone allowing full remote control.
TRINITY: (see image at right) A more recent and more powerful multi-chip module using a 180 MHz ARM9 processor, 4 MB of flash, 96 MB of SDRAM, and a FPGA with 1 million gates. Smaller than a penny. Estimated cost (2008) $625K for 100 units.
WATERWITCH: A portable “finishing tool” that allows the operator to find the precise location of a nearby mobile phone.
WISTFULTOLL
I highlighted various items here which could be used today to spy on the President of the USA. Trump entered the White House after meeting with Obama who was strangely friendly back then. Being very naive, Trump thought Obama was going to cooperate with him not knowing that Obama actually had rigged the White House so he could spy on Trump which is why he bought a building very close by, pretending to plan to live there and then installed people from the Spook community there.
That is his spy headquarters. I haven’t seen anyone discussing this yet, it is a great place to start to see who is monitoring Trump.
Trump Tower was a harder nut to crack but we can see from the secret list above, they have the equipment to do this and I am betting one of Trump’s tenants is using an apartment for spying on Trump and they had to squirrel in spy equipment secretly there which isn’t hard to do, there are no real guards stopping people from wandering all over the building.
Trump’s Florida home has to be spied on from further away which is why Trump ran off there this weekend. He is angry with his staff for not doing a better job of protecting him but then, he hired people who are naive, not pros who know how things really work.
For example, I was literally spied on by the government under Nixon and Bush Sr. I used various tricks to force them out into the open, embarrassing them. It was with some great satisfaction, proving they were spying on me. It made little news because all my life, the media has lied about stuff like this and I never expected them to cease lying and today, they lie all the time.
For many of them are in this open conspiracy to have top secret meetings mainly overseas, only in remote locations, where they plot their rule of the planet and top politicians meet with media owners to figure out various tricks and schemes to keep power.
Across Europe as well as in the US, outsiders are threatening to take over via popular elections and the Bilderberg gang is doing everything in their considerable power to prevent this. Street rage is growing as conservatives across Europe and North America wake up and realize they are being literally invaded by foreigners who are allowed in by the Bilderberg gang and the eye of this rage is increasingly focused on the media which is in collusion with the ruling elites.
The above is a fine example of staff in the White House spying on Trump. Someone illegally did this and CNN ran it immediately. Trump is surrounded by humans spying on him as well as the NSA/CIA spooks tapping into everything in sight.
I have a suggestion to Trump but then I outwitted him years ago so I don’t think he will listen to me: have your staff go to the CIA and NSA buildings and have them chat with the lower staff there. Talk to them about their superiors who were put in place by Obama and Bush Jr. who is Obama’s best buddy now.
Find out who is able to see into the murk there, such as people at the systems level or secretaries…they know all the inside dope. Find people who are inside, lower levels and then build up a new system from the outside in.
Trump is a ‘hostile takeover’. I have actually seen, first hand, what happens with the lower staff hates the takeover. Like throwing files out the windows of sky scrapers in Manhattan. The Obama people are hostile towards our nation. They hate America and think it should be changed. The means of this change are illegal aliens and Muslim terrorists both of which Obama let in over and over again.
Trump’s efforts to stop this is being thwarted by Democratic judges and traitors in Congress. This is their power base, non-citizens and hostile people who want the US destroyed. Isn’t that utter insanity? Yes, it is, but history is littered by crazy despotic people who drive countries off the cliff. Has happened many, many times.
From Russian news: in France, Hollande who is a Bilderberg member, says his ULTIMATE DUTY is to prevent Le Pen from ever entering office. He will pull every trick in the book including arresting her over spurious charges, to prevent her from gaining access to the secret systems.
Note the propaganda from the New York Times front page today: this wave of vandalism is coming from Muslim terrorist types, not Trump at all. In this week’s case, it was a man sent to fight Muslims who came back a Muslim terrorist. The NYT doesn’t mention that the other ‘incidents’ were all caused by frost heaves.
The front page editorials are all attacks on Trump, of course. On top of this, they claim we don’t need a strong military to patrol our borders, either! And what, pray tell, is ‘making the world more dangerous’? Why, talk about WWIII and pushing Russia to paranoia that NATO will attack Russia! Great idea, NYT.
The NYT censors me now. They censor anyone who disputes with them or discusses their secret affairs and connections. The NYT only mentions the Bilderberg gang when they ‘debunk’ real information, that is, lie about it all.
These are the wiretap stories at this newspaper that tells mainly lies. Up until a year ago, I used to use Google News to locate stories. No more. It is mostly junk news today like this specimen:
The desperate Democrats who lost considerable political power in the last election despite letting so many illegal aliens vote, are definitely pushing for a coup. They are hoping Trump will isolate himself defensively and then they will do the shark attacks, that is rip him up bit by bit and lying about everything in sight won’t stop them at all.
We do have the internet today and Obama handed this over to the communist Chinese dictators and other despots overseas which means we may not have this freedom to discuss reality for much longer.
It is not clear whether the intercepted communications had anything to do with Mr. Trump’s campaign, or Mr. Trump himself. It is also unclear whether the inquiry has anything to do with an investigation into the hacking of the Democratic National Committee’s computers and other attempts to disrupt the elections in November. The American government has concluded that the Russian government was responsible for a broad computer hacking campaign, including the operation against the D.N.C.
Basically, they are assuming Russia is doing what the NSA/CIA are doing to Trump and his associates. Russia doesn’t have such sophisticated spy equipment right now but may in the future for they are quite capable of this. Ditto, the Chinese.
The F.B.I. is leading the investigations, aided by the National Security Agency, the C.I.A. and the Treasury Department’s financial crimes unit. The investigators have accelerated their efforts in recent weeks but have found no conclusive evidence of wrongdoing, the officials said. One official said intelligence reports based on some of the wiretapped communications had been provided to the Obama White House…”
We are witnessing a real transfer of power here. The Bilderberg gang lost control of the White House. They still control a great deal of Congress, but not the White House, a key element in their secret rule. They are freaking out because eventually, Trump will gain access to all their damn secrets. As I keep pointing out, they can’t bear being held responsible for what is going on.
HAHAHA….Badly maintained cemetery plus spring frost heaves equals anti-semitism!
OT
New Executive ban on refugees:
http://www.breitbart.com/big-government/2017/03/06/trump-new-refugees-executive-pushes-back-judges/#disqus_thread
This is endorphin levels of truth , devastating !
Of course one of the oldest tricks in the book is to deliberately discuss certain things and reveal some (bogus or real) details for the spies to pick up.
And then watch to see where those details appear outside the secure environment.
Here’s hoping for a brigade of Snowdens to emerge from the catacombs of DC… that business of lower-level employees not liking the boss works both ways. And there may just be some of ’em who have not been happy with the way things have gone for the last 8, 16, 24 years.
@Ziff #3
Listened to Steyn, quite factual. I should listen to the message, not its bearer, but I can’t like Steyn. Not sure what it is about him that turns me off.