911:Secret services

From Wiki
Jump to navigationJump to search

Site menu:


To sort out: [5] [6]


  • Quote from Ignatius, Spying and Sedition-From A Work in Progress
    • Prior to his journey across the English Channel, on his first begging journey to Bruges and Antwerp, Loyola encountered a Spaniard of high repute and learning. “He met at Bruges the Spanish humanist Juan Luis Vives, who had recently returned from his post in England.” (The Society of Jesus in Ireland, Scotland and England 1541-1588 by Thomas M. McCoog. Page 12, published by Brill, 1996.) Vives was a professor at the Louvain who had come to England at the invitation of Henry, acted as tutor to Princess Mary (later “Bloody Mary”), but was forced to leave England because he had declared himself against the divorce of Catherine of Aragon. (Encyclopedia Britannica,11th Edition, Handy Edition, 1911, Vol. 28, Pages 152-153.) This Spanish Papist was a connection for Ignatius to the Spaniards in England. He was an excellent Catholic role model for Ignatius, having produced a most bigoted and fanatic, religious murderess in his education of Mary. His up to date knowledge of England, together with letters of introduction from him would have provided open doors for Loyola throughout all strata of Catholic and Spanish society in England. Ignatius also would have been easily able to serve as a courier, bringing messages in and then gathering information for his Lord, the Pope. The beginning of Jesuit espionage and counterintelligence began with the founder of the Order, a calculating militarist who well understood the importance of reconnaissance, logistics and planning.... The early training of Loyola would later bear fruit in the spiritual surveillance, physical espionage, and a “human resource” inventory system that was developed within the Society. “The detective system which prevails to so iniquitous an extent amongst the Jesuits must prevent friendship by destroying mutual confidence"... Full dictatorial surveillance based on the Jesuit model was openly implemented in Western Europe under the Gestapo, and this was improved and expanded upon to control and permeate the intelligence agencies of all nations. It has birthed as well a fraternity of men who have demonstrated the ability to amass the wealth of the nations in heaps and piles across the globe for use to achieve the designs for world domination.

  • Quote from: Dave Hunt
    • "Moreover, the pope has thousands of secret agents worldwide. They include Jesuits, the Knights of Columbus, Knights of Malta, Opus Dei, and others. The Vatican's Intelligence Service and its field resources are second to none.." (A Woman Rides the Beast, Dave Hunt, p. 87) [7]

  • Secret Service & the Occult
    • "It is not really surprising that historically occultism and espionage have often been strange bedfellows. The black art of espionage is about obtaining secret information and witches, psychics and astrologers have always claimed to be able to predict the future and know about things hidden from ordinary people. Gathering intelligence is carried out under a cloak of secrecy and occultists are adept at keeping their activities concealed from sight. Like secret agents they also use codes, symbols and cryptograms to hide information from outsiders. Occultists and intelligence officers are similar in many ways, as both inhabit a shadowy underworld of secrets, deception and disinformation. It is therefore not unusual that often these two professions have shared the same members."


International surveillance companies are based in the more technologically sophisticated countries, and they sell their technology on to every country of the world. This industry is, in practice, unregulated. Intelligence agencies, military forces and police authorities are able to silently, and on mass, and secretly intercept calls and take over computers without the help or knowledge of the telecommunication providers. Users’ physical location can be tracked if they are carrying a mobile phone, even if it is only on stand by.

When citizens overthrew the dictatorships in Egypt and Libya this year, they uncovered listening rooms where devices from Gamma corporation of the UK, Amesys of France, VASTech of South Africa and ZTE Corp of China monitored their every move online and on the phone.

But the WikiLeaks Spy Files are more than just about ’good Western countries’ exporting to ’bad developing world countries’. Western companies are also selling a vast range of mass surveillance equipment to Western intelligence agencies. In traditional spy stories, intelligence agencies like MI5 bug the phone of one or two people of interest. In the last ten years systems for indiscriminate, mass surveillance have become the norm. Intelligence companies such as VASTech secretly sell equipment to permanently record the phone calls of entire nations. Others record the location of every mobile phone in a city, down to 50 meters. Systems to infect every Facebook user, or smart-phone owner of an entire population group are on the intelligence market.

Surveillance companies like SS8 in the U.S., Hacking Team in Italy and Vupen in France manufacture viruses (Trojans) that hijack individual computers and phones (including iPhones, Blackberries and Androids), take over the device, record its every use, movement, and even the sights and sounds of the room it is in. Other companies like Phoenexia in the Czech Republic collaborate with the military to create speech analysis tools. They identify individuals by gender, age and stress levels and track them based on ‘voiceprints’. Blue Coat in the U.S. and Ipoque in Germany sell tools to governments in countries like China and Iran to prevent dissidents from organizing online.

Trovicor, previously a subsidiary of Nokia Siemens Networks, supplied the Bahraini government with interception technologies that tracked human rights activist Abdul Ghani Al Khanjar. He was shown details of personal mobile phone conversations from before he was interrogated and beaten in the winter of 2010-2011. [8]

  • Todo: secret/military network infrastructures, financial payment infrastructures, encrypted lines.

Personal records

  • State number ("social 'security' number")
  • Social profile
    • Address
    • Family composition (present and past genealogy)
    • Health record
    • Occupational record
    • Educational record
    • Legal record (police/court/fines/crime/jail)
    • Political afiliations
    • Financal record
      • Bank accounts
      • Income
      • Taxation (private and corporate)
      • Spending record (house loan, debt, consumer spending, investments, ...)
      • Pension funds
      • Social welfare record
    • Travel record (visa's / state-entry, boarding logs: bus/metro/train/ferry/airline)
    • Internet tracks (email, web sites & searches, ...)
    • Personal character record (emotional/intellectual classification, pastime passions, luxury goods / entertainment spending, sexuality, etc.)
  • Biometrics:
    • Facial scans
    • Fingerprints
    • Eye scan
    • Voice signature
    • DNA signature

Special networks



DNA surveys from space

Laser Spying

  • NASA succeeded in using space telescope to decipher voices in a room. Telescope analysed the vibrations of the clothing being worn by the room occupants. This was in 2005.
    • More recently, Nasa technology has been suggested as a method of extending it: in 2005, New Scientist reported that the US security services were using a space technology previously used to detect faint radio signals from space to eavesdrop on a room where the curtains had been pulled (which defeats the laser). The system used a "horn antenna" to blast a beam of microwave energy at between 30GHz and 100GHz through a building wall: "If people are speaking inside the room, any flimsy surface, such as clothing, will be vibrating. This modulates the radio beam reflected from the surface," it reported. That could be amplified using the Nasa technology and analysed as before. [11]


Unmanned combat air vehicle

Phone tracing

  • Todo:
    • Mobile phone tracing/triangulation/wiretapping (passive/activated-by-defined-signatures and active/on-demand), identification.
    • Mobile phone infrastructure (connection logs, voice/web data)
    • VOIP provider data hooks/requests for secret services (Skype, Google Voice, etc.)
    • Geotagging
    • Are all telephone calls recorded and accessible to the US government?: A former FBI counterterrorism agent claims on CNN that this is the case



Social networking

Security/privacies issues

  • Information gleaned from social networks has cost people jobs, led to suspensions and expulsions, damaged prospects for employment and university admission, helped crooks defraud victims and generated criminal charges. Universities scour social networking sites for evidence of residence keg parties, in violation of campus policies. Admissions officers use them to evaluate university-bound students. Police tap into them to investigate underage drinking and sexual activity. Companies check out Facebook to help with direct marketing campaigns. And increasingly, employers are using them to screen prospective employees....“Anything on the site, Facebook can see and data mine,”
  • For companies that engage in Datamining “Not only is it a wide range of personal information that’s cross-referenced and verified by the individuals themselves, but people themselves are volunteering this information.”
  • Risks associated with the use of social networks
    • Data, once published, may remain there forever;
    • Traffic data may be shared with third parties, including advertisers and law enforcement agencies;
    • Third parties may misuse the data they obtain;
    • Photos posted to social networking sites may be connected to facial recognition software and become universal biometric identifiers
    • The availability of personal data in user profiles could lead to increased identity theft.





  • FinFisher
    • Google security engineer Morgan Marquis-Boire and Berkeley student Bill Marczak were investigating spyware found in email attachments to several Bahraini activists. In their analysis they identified the spyware infecting not only PCs but a broad range of smartphones, including iOS, Android, RIM, Symbian, and Windows Phone 7 handsets. The spying software has the capability to monitor and report back on calls and GPS positions from mobile phones, as well as recording Skype sessions on a PC, logging keystrokes, and controlling any cameras and microphones that are installed. [14]
    • Egyptian dissidents who ransacked the office's of Egypt's secret police following the overthrow of Egyptian President Hosni Mubarak reported they discovered a contract with Gamma International for €287,000 for a license to run the FinFisher software. [15]


  • Flame (malware)
    • Flame related articles
      • Flame, also known as Flamer, sKyWIper, and Skywiper, is modular computer malware discovered in 2012 that attacks computers running the Microsoft Windows operating system. The program is being used for targeted cyber espionage in Middle Eastern countries. Its discovery was announced on 28 May 2012 by MAHER Center of Iranian National Computer Emergency Response Team (CERT), Kaspersky Lab and CrySyS Lab of the Budapest University of Technology and Economics. The last of these stated in its report that it "is certainly the most sophisticated malware we encountered during our practice; arguably, it is the most complex malware ever found." Flame can spread to other systems over a local network (LAN) or via USB stick. It can record audio, screenshots, keyboard activity and network traffic.[6] The program also records Skype conversations and can turn infected computers into Bluetooth beacons which attempt to download contact information from nearby Bluetooth-enabled devices. This data, along with locally stored documents, is sent on to one of several command and control servers that are scattered around the world. The program then awaits further instructions from these servers. (wikipedia)

Operating Systems

  • Backdoors
    • Some of the information strikes me as outdated, as I am aware of at least one large nation/economy which has removed Microsoft from its government computer systems and in now Linux-based, using proprietary software. This switchover began in 2004/5. In other words, that country's government was aware of the "backdoor" in Microsoft which allowed the US to spy on them -- and they weren't having it anymore. [16]
    • [www.wnd.com/2013/06/now-fbi-wants-back-door-to-all-software/ Now fbi wants back door to all software/]

Windows 8

  • Windows 8 Will Have a “Kill Switch”
    • The very anticipated operating system Windows 8 will have a feature that was never found on PC’s before: A kill switch that can remotely delete software and edit code without the user’s permission. Although Microsoft claims the switch would only be used for software that is downloaded from its app store, no official policies clearly define the actual purpose of the kill switch. In other words, nothing is truly considered “illegal” and that includes issues regarding spying, censorship and free speech. [17]
  • LEAKED: German Government Warns Key Entities Not To Use Windows 8 – Links The NSA
    • According to leaked internal documents from the German Federal Office for Information Security (BSI) that Die Zeit obtained, IT experts figured out that Windows 8, the touch-screen enabled, super-duper, but sales-challenged Microsoft operating system is outright dangerous for data security. It allows Microsoft to control the computer remotely through a built-in backdoor. Keys to that backdoor are likely accessible to the NSA – and in an unintended ironic twist, perhaps even to the Chinese. The backdoor is called “Trusted Computing,” developed and promoted by the Trusted Computing Group, founded a decade ago by the all-American tech companies AMD, Cisco, Hewlett-Packard, IBM, Intel, Microsoft, and Wave Systems. Its core element is a chip, the Trusted Platform Module (TPM)

Video cameras

Face Recognition

RFID systems

Nicknamed "Powder" or "Dust", these chips consist of 128-bit ROM (Read Only Memory) that can store a 38-digit number.


  • In passports, corporate service cards, consumer goods, ...
  • Ex-IBM Employee reveals TV Abandoned Analog Band to Make Room for RFID Chips
  • Hitachi Develops World's Smallest RFID Chip
    • The Japanese giant Hitachi has developed the world's smallest and thinnest Radio Frequency Identification (RFID) chip. Measuring only 0.15 x 0.15 millimeters in size and 7.5 micrometers thick, the wireless chip is a smaller version of the previous record holder - Hitachi's 0.4 x 0.4 mm "Micro-Chip". The company used semiconductor miniaturization and electron beam technology to write data on the chip substrates to achieve this decrease in size. The new chips have a wide range of potential applications from military to transportation, logistics and even consumer electronics. According to the Nikkei website, Hitachi is now planning on developing an even smaller RFID chip using 65-nanometer lithographic technology.
  • Walt Disney bets the kingdom on hyper-invasive RFID tracking of park guests

Entertainment devices

  • Digital TV's
  • Online game consoles
    • Players’ behaviour in the game is monitored by companies who aim to understand the new opportunities for emerging real-life markets. A whole new class of corporate game player has emerged. These players research the habits of people via their avatars and market both virtual and real products inside and outside these worlds to other players. p.77 - 36. Virtual Tracking
      • XBox One: A device brought into your home with 4 microphones, 2 cameras, an infrared motion sensor, and a license to freely record and upload your activity… "to the maximum extent permitted by law, we may monitor your communications and may disclose information about [18]
  • Phone-home set-top boxes







European Union

    • "UE FP7 INDECT Project: "Intelligent information system supporting observation, searching and detection for security of citizens in urban environment. Project Description: Intelligent information system supporting observation, searching and detection for security of citizens in urban environment.
    • The main objectives of the INDECT project are:
      • to develop a platform for: the registration and exchange of operational data, acquisition of multimedia content, intelligent processing of all information and automatic detection of threats and recognition of abnormal behaviour or violence,
      • to develop the prototype of an integrated, network-centric system supporting the operational activities of police officers, providing techniques and tools for observation of various mobile objects,
      • to develop a new type of search engine combining direct search of images and video based on watermarked contents, and the storage of metadata in the form of digital watermarks,[2].
    • The main expected results of the INDECT project are:
      • to realise a trial installation of the monitoring and surveillance system in various points of city agglomeration and demonstration of the prototype of the system with 15 node stations,
      • implementation of a distributed computer system that is capable of acquisition, storage and effective sharing on demand of the data as well as intelligent processing,
      • construction of a family of prototypes of devices used for mobile object tracking,
      • construction of a search engine for fast detection of persons and documents based on watermarking technology and utilising comprehensive research on watermarking technology used for semantic search,
      • construction of agents assigned to continuous and automatic monitoring of public resources such as: web sites, discussion forums, UseNet groups, file servers, p2p networks as well as individual computer systems,
      • elaboration of Internet based intelligence gathering system, both active and passive, and demonstrating its efficiency in a measurable way.[3]

United Kingdom

  • British Council
    • "Private sector language schools with whom the British Council compete complain about the state subsidized competition. While the language teaching makes a profit, the accounting is not transparent and if it were privatized, it is doubtful the it could be promoted in the way it is at present." (wikipedia)
  • MI5
    • "MI5, which has a target of increasing its current 3,000 staff to 4,000 by 2011, also insisted that it wanted to improve relations with Muslim communities." [19]



  • DIS ("Dipartimento delle Informazioni per la Sicurezza" - secret service)
    • AISI ("Agenzia Informazioni e Sicurezza Interna" - national)
    • AISE ("Agenzia Informazioni e Sicurezza Esterna" - international)




  • CNI "Centro Nacional de Inteligencia" Employees +/- 2200. The National Intelligence Center (Spanish: Centro Nacional de Inteligencia, CNI) is the Spanish official intelligence agency. Its headquarters are located in the A-6 motorway near Madrid. The CNI is the successor of the Centro Superior de Información de la Defensa, Higher Centre for Defense Intelligence. Its main target areas are North Africa and South America and it operates in more than 80 countries. CNI's budget for 2010 is approximately 255 million euros. [22]


  • CNSAS ("National Council for the Study of Securitate Archives") (Romania)

North America

United States

  • See also:
    • US secret service IP's: "Now, if you scan these IP addresses, you will find that they all match up...the list is somewhat outdated I suspect, but since they all match up (...) If you trace these IPs most will lead back to "The Internet Access Company" [??], and they also go through Cogent Communications, a Washington DC based tech company that has been doing quite well for being a very young business."


“The technotronic era involves the gradual appearance of a more controlled society. Such a society would be dominated by an elite, unrestrained by traditional values. (...) The capacity to assert social and political control over the individual will vastly increase. It will soon be possible to assert almost continuous surveillance over every citizen and to maintain up-to-date, complete files, containing even most personal information about the health or personal behavior of the citizen in addition to more customary data. These files will be subject to instantaneous retrieval by the authorities.”-Zbigniew Brzezinski, protegé of David Rockefeller, cofounder of the Trilateral Commission, and NSA to Jimmy Carter, from his 1971 book Between Two Ages[23]

  • William Binney, a former official with the National Security Agency, recently said that domestic surveillance in the U.S. has increased under President Obama, and trillions of phone calls, emails and other messages sent by U.S. citizens have been intercepted by the government. In fact, in an interview with Democracy Now, the official-turned-whistleblower claims that the government currently possesses copies of almost all emails sent and received in the United States. Binney, who is regarded as one of the best mathematicians and code breakers in NSA history, says he left the agency in late 2001 after he learned about its plan to use the September 11th terrorist attacks as an excuse to launch a controversial data collection program on its own citizens. One commercial company he claims to have participated in the program is AT&T, which he says handed over more than 320 million records of citizen-to-citizen communications that took place within the U.S. The program, which Binney says he helped create, was never meant for domestic surveillance but the agency has supposedly been spying on U.S. citizens for more than a decade now. According to Binney, once the software intercepts a transmission it will then build profiles on every person referenced in the data. The NSA is now in the process of building a $2 billion data storage facility in Utah that is bigger than anything Google (GOOG) or Apple (AAPL) has ever built, and Binney calculates that the facility will be able to store 100 years worth of the world’s electronic communications. [24]
  • The NSA is building an enormous spy center, probably the biggest ever, in Bluffdale Utah. When construction is completed in 2013, the heavily fortified $2 billion facility will encompass 1 million square feet, including four 25,000-square-foot areas to house endless rows of high-powered servers. The center will be fed data collected by the agency’s eavesdropping satellites, overseas listening posts, and secret monitoring rooms in telecom facilities throughout the US. [25]
    • The NSA Is Building the Country’s Biggest Spy Center
    • NSA whistle blowers warn that the US government can use surveillance to ‘see into your life’
    • The National Security Agency (NSA) headquarters in Fort Meade, Maryland. Among other forms of intelligence-gathering, the NSA secretly collects the phone records of millions of Americans, using data provided by telecom firms AT&T, Verizon and BellSouth. "Every day, collection systems at the National Security Agency intercept and store 1.7 billion e-mails, phone calls and other types of communications. And the Obama administration has formally demanded that it have access to any and all forms of internet communication."[26]
    • XKeyscore presentation from 2008 – read in full
      • Training materials for the XKeyscore program detail how analysts can use it and other systems to mine enormous agency databases and develop intelligence from the web [27]
The NSA Revelations All in One Chart [4]


  • The National Security Agency has obtained direct access to the systems of Google, Facebook, Apple and other US internet giants, according to a top secret document obtained by the Guardian. The NSA access is part of a previously undisclosed program called PRISM, which allows officials to collect material including search history, the content of emails, file transfers and live chats, the document says.... In a statement, Google said: "Google cares deeply about the security of our users' data. We disclose user data to government in accordance with the law, and we review all such requests carefully. From time to time, people allege that we have created a government 'back door' into our systems, but Google does not have a back door for the government to access private user data." Some of the world's largest internet brands are claimed to be part of the information-sharing program since its introduction in 2007. Microsoft – which is currently running an advertising campaign with the slogan "Your privacy is our priority" – was the first, with collection beginning in December 2007. It was followed by Yahoo in 2008; Google, Facebook and PalTalk in 2009; YouTube in 2010; Skype and AOL in 2011; and finally Apple, which joined the program in 2012. The program is continuing to expand, with other providers due to come online. [28]


  • Reinhard Gehlen also had profound influence in helping to create the National Security Council, from which the National Security Act of 1947 was derived. This particular piece of legislation was implemented to protect an unconscionable number of illegal government activities, including clandestine mind control programs. [29]
  • The CIA was founded by William Donovan, a Knight of Malta who had been awarded the highest award in the Roman Catholic Church. The first director of the CIA, Allen Dulles, was a Knight of Malta whose nephew, Avery Dulles, was a prominent Jesuit priest. CIA directors William Colby, William J. Casey, John McCone, Allen Dulles, George Tenet, and Leon Panetta have all been either Knights of Malta or Jesuit-trained. [30]
    • National Intelligence Council is small think tank of senior analysts reporting to the Director of Central Intelligence that produces estimates on priority national security issues for the President and his top advisers. [31] by John C. Gannon - "John C. Gannon, ... Department of Homeland Security ... was a member of the Jesuit Volunteer Corps and is affiliated with [Jesuit] Georgetown University while an ex-CIA officer" [Eric Jon Phelps, email interview with 'mpm', April 2006]. [32]
  • The current CIA head - who was also the 9/11-era NSA head - Michael Hayden was Jesuit trained at Georgetown University. [33]




  • DEA
    • An investigation by Reuters found a secretive DEA unit known as the Special Operations Division (SOD) has been helping state and local law enforcement with drug busts by providing information collected from intelligence intercepts, wiretaps, informants and a “massive database of telephone records.” [43]
  • tolink: ODNI, NIC, NNSA, DOJ, ATF, FINCEN, PFIAB, IOSS, NICX, the U.S. Marshals, Customs, the USPS Postal Inspectors, the Secret Service, Treasury, SBU (Ukraine), ASIS, NZSIS, BND, CSIC, CNI, NBH, ABW, SEID, SISD, the FSB, PRC Intelligence, ROC MJIB, the Japanese Naicho, and all of the U.S., SEATO and ASEAN Defense Departments.




  • GRU (1918, created by Jesuit coadjutor Lenin)
  • Foreign Intelligence Service (Russia)
    • "KGB's archives affords me a glimpse at Vatican's Intelligence Service":
      • "Stanislav Lekarev, a well-placed investigative reporter and a former Soviet official, reveals the results of his heart-to-heart with a friend that still has access to the documents from KGB's 5th Chief Directorate that was also responsible for dealing with religious dissent. Despite the Holy See's curt, Jesuit-like denial of having any involvement in intelligence activities, the archives shed rare light on the Vatican's well-though-thinly-cloaked clandestine activities in USSR. Vatican's Secret Service is a well-compartmentalized into its many cover organizations conveniently subdivided by their religious activities that afford the Holy See the advantages over any other intelligence service. The strategically important service is the responsibility of the Jesuits. The order is under the direct command of the pontiff. The Jesuits manage information-gathering functions for the Vatican. Thus the Russian department is conveniently set up under the cover of the Congregation of the Eastern Churches, Actione Catolica, Russia Christiana, and has its operations center at the St. Georgio Institute in Medona, and at the Modesto Monastery in Seriate, a picturesque suburb of Milan. The department that runs its agents in Russia is the mysterious Russicum [44], which has a legitimate appearance of any other Catholic outreach facility, recruiting into its ranks residents of Eastern Europe. Information gathering takes place under the guise of very conventional missionary activity, a non-governmental charity work, seemingly innocent purchase of a government's archives. The Russian desk is still run by its Vatican's former USSR directorate which bears the name of the St. Teresa Russian Catholic College. The external and hands-on operations are also performed by the Dominican Order. The order uses its international resources to exfiltrate its agents, to discredit undesirable officials, and other cloak and dagger operations. Its low-profile department of Sodalicium Pianium is responsible for internal security, taking care of the Vatican's own heretics, and vetting out Vatican's security apparatus. Thus Vatican has plenty of organizations to also collaborate with other intelligence agencies. Joint projects with CIA, MI6, SDECE and Mossad has been through The Sovereign Military and Hospitaller Order of St. John of Jerusalem of Rhodes and of Malta. Pinochet and the Polish Solidarnosc (Solidarity) are good examples of Vatican's intelligence networking par excellence."
      • "Vatican intelligence has spied on Russia for many years"
    • [Russia’s Security Service Could Gain Powers Formerly Associated With Soviet KGB]
      • Russia’s parliament is considering a new law that would extend the powers of the country’s secret security agency, the FSB. If the bill is passed, it would restore practices once associated with the infamous KGB. Russia’s security services have steadily regained power and influence under Prime Minister Vladimir Putin, himself a former KGB officer. Human rights advocates are concerned that the new measures could further curtail the rights of government critics and the independent media.



  • ...


  • ISI
    • Many in the Pakistani government, including slain former Prime Minister Benazir Bhutto, have called the intelligence agency "a state within a state," working beyond the government's control and pursuing its own foreign policy. [45]