19:18 PM PDT
Quick Note: An Incoming Call from a Relative was Cut off, when I attempted to call this person back, it went into voice mail. I have also attempted to Text Message this Relative, along with another Relative, and in both cases, it is complete NO RESPONSE.
What this shows is the MAN IN THE MIDDLE - via FOX ACID SERVER - that will IMMEDIATELY CUT OFF - My Ability to COMMUNICATE FREELY with OUTSIDE Parties, and the ILLEGAL and CRIMINAL BLOCKING of not just Online, Internet, Email, but HEAVY TELECOMMUNICATION - CRIMINAL OBSTRUCTION -
From the Original Der Spiegel Article that Identified Tailored Access Operations (TAO), the elite Electronic Warfare and Computer Network Exploitation that transpires
One of the hackers' key tasks is the offensive infiltration of target computers with so-called implants or with large numbers of Trojans. They've bestowed their spying tools with illustrious monikers like "ANGRY NEIGHBOR," "HOWLERMONKEY" or "WATERWITCH." These names may sound cute, but the tools they describe are both aggressive and effective.
According to details in Washington's current budget plan for the US intelligence services, around 85,000 computers worldwide are projected to be infiltrated by the NSA specialists by the end of this year. By far the majority of these "implants" are conducted by TAO teams via the Internet.
(The "Implants"/AntChips are powered by a CTX4000 which generates a Continuous Radar Waveform into the Living Space of the Target in order to Infiltrate (hack, wiretap, monitor, etc) and Ex-filtrate (remove, alter, destroy documents, etc.) Information, and acts like an Internet Connection to Infiltrate and Ex-Filtrate information. )
from the but-of-course dept
To trick targets into visiting a FoxAcid server, the NSA relies on its secret partnerships with US telecoms companies. As part of the Turmoil system, the NSA places secret servers, codenamed Quantum, at key places on the internet backbone. This placement ensures that they can react faster than other websites can. By exploiting that speed difference, these servers can impersonate a visited website to the target before the legitimate website can respond, thereby tricking the target's browser to visit a Foxacid server.
In the academic literature, these are called "man-on-the-middle" attacks, and have been known to the commercial and academic security communities. More specifically, they are examples of "man-on-the-side" attacks.
They are hard for any organization other than the NSA to reliably execute, because they require the attacker to have a privileged position on the internet backbone, and exploit a "race condition" between the NSA server and the legitimate website. This top-secret NSA diagram, made public last month, shows a Quantum server impersonating Google in this type of attack.
The NSA uses these fast Quantum servers to execute a packet injection attack, which surreptitiously redirects the target to the FoxAcid server. An article in the German magazine Spiegel, based on additional top secret Snowden documents, mentions an NSA developed attack technology with the name of QuantumInsert that performs redirection attacks. Another top-secret Tor presentation provided by Snowden mentions QuantumCookie to force cookies onto target browsers, and another Quantum program to "degrade/deny/disrupt Tor access".Schneier also notes that this is basically the same technique the Chinese have used for their Great Firewall. In other words, the complicit nature of the telcos in basically giving the NSA and GCHQ incredibly privileged access to the backbone is part of what allows them to conduct those kinds of man-in-the-middle attacks. It still amazes me that there isn't more outrage over the role of the major telcos in all of this.