Investigation – Jupiter Broadcasting https://www.jupiterbroadcasting.com Open Source Entertainment, on Demand. Thu, 15 Feb 2018 08:33:11 +0000 en-US hourly 1 https://wordpress.org/?v=5.5.3 https://original.jupiterbroadcasting.net/wp-content/uploads/2019/04/cropped-favicon-32x32.png Investigation – Jupiter Broadcasting https://www.jupiterbroadcasting.com 32 32 A Storm is Coming | Unfilter 269 https://original.jupiterbroadcasting.net/122392/a-storm-is-coming-unfilter-269/ Thu, 15 Feb 2018 00:31:11 +0000 https://original.jupiterbroadcasting.net/?p=122392 RSS Feeds: Video Feed | MP3 Feed | HD Torrent | iTunes Become an Unfilter supporter on Patreon: — Show Notes — Links: Nancy Pelosi raised nearly $50 million for Democrats in 2017 – Washington Times Stormy Daniels believes Trump lawyer broke nondisclosure agreement over alleged affair | TheHill Stormy Daniels’ manager says the porn […]

The post A Storm is Coming | Unfilter 269 first appeared on Jupiter Broadcasting.

]]>
RSS Feeds:

Video Feed | MP3 Feed | HD Torrent | iTunes

Become an Unfilter supporter on Patreon:

Patreon

— Show Notes —

Links:

The post A Storm is Coming | Unfilter 269 first appeared on Jupiter Broadcasting.

]]>
I Love It | Unfilter 244 https://original.jupiterbroadcasting.net/116586/i-love-it-unfilter-244/ Wed, 12 Jul 2017 20:39:22 +0000 https://original.jupiterbroadcasting.net/?p=116586 RSS Feeds: Video Feed | MP3 Feed | HD Torrent | iTunes Become an Unfilter supporter on Patreon: — Show Notes — Links: Trump ‘pressed’ Putin on election meddling but he denied it, Rex Tillerson says – ABC News Jokes about Trump being gay draw on deep-rooted stereotypes about gay men and power. BOMBSHELL: New […]

The post I Love It | Unfilter 244 first appeared on Jupiter Broadcasting.

]]>
RSS Feeds:

Video Feed | MP3 Feed | HD Torrent | iTunes

Become an Unfilter supporter on Patreon:

Patreon

— Show Notes —

Links:

The post I Love It | Unfilter 244 first appeared on Jupiter Broadcasting.

]]>
Collusion to Obstruction | Unfilter 241 https://original.jupiterbroadcasting.net/116026/collusion-to-obstruction-unfilter-241/ Wed, 21 Jun 2017 21:54:43 +0000 https://original.jupiterbroadcasting.net/?p=116026 RSS Feeds: Video Feed | MP3 Feed | HD Torrent | iTunes Become an Unfilter supporter on Patreon: — Show Notes — Links Man on a Wire: Mike Pence’s Tightrope Act – POLITICO Magazine Berniecrat Announces Primary Rematch With Debbie Wasserman Schultz | Observer Alex Jones releases recorded phone calls with Megyn Kelly – NY […]

The post Collusion to Obstruction | Unfilter 241 first appeared on Jupiter Broadcasting.

]]>
RSS Feeds:

Video Feed | MP3 Feed | HD Torrent | iTunes

Become an Unfilter supporter on Patreon:

Patreon

— Show Notes —

Links

The post Collusion to Obstruction | Unfilter 241 first appeared on Jupiter Broadcasting.

]]>
The Panda Patriot | Unfilter 238 https://original.jupiterbroadcasting.net/115231/the-panda-patriot-unfilter-238/ Wed, 31 May 2017 21:32:25 +0000 https://original.jupiterbroadcasting.net/?p=115231 RSS Feeds: Video Feed | MP3 Feed | HD Torrent | iTunes Become an Unfilter supporter on Patreon: — Show Notes — Links WikiLeaks on Twitter: “BREAKING: Sweden has dropped its case against Julian Assange and will revoke its arrest warrant Background: https://t.co/UHj8QtwrTh” Trump Told Russians That Firing ‘Nut Job’ Comey Eased Pressure From Investigation […]

The post The Panda Patriot | Unfilter 238 first appeared on Jupiter Broadcasting.

]]>
RSS Feeds:

Video Feed | MP3 Feed | HD Torrent | iTunes

Become an Unfilter supporter on Patreon:

Patreon

— Show Notes —

Links

The post The Panda Patriot | Unfilter 238 first appeared on Jupiter Broadcasting.

]]>
Comey Gets Canned | Unfilter 236 https://original.jupiterbroadcasting.net/114581/comey-gets-canned-unfilter-236/ Wed, 10 May 2017 19:56:31 +0000 https://original.jupiterbroadcasting.net/?p=114581 RSS Feeds: Video Feed | MP3 Feed | HD Torrent | iTunes Become an Unfilter supporter on Patreon: — Show Notes — Links: Obama’s Account of New York Years Often Differs From What Others Say – The New York Times FCC to investigate, ‘take appropriate action’ on Colbert’s Trump rant | TheHill Court Orders Release […]

The post Comey Gets Canned | Unfilter 236 first appeared on Jupiter Broadcasting.

]]>
RSS Feeds:

Video Feed | MP3 Feed | HD Torrent | iTunes

Become an Unfilter supporter on Patreon:

Patreon

— Show Notes —

Links:

The post Comey Gets Canned | Unfilter 236 first appeared on Jupiter Broadcasting.

]]>
Clickbait Currency | Unfilter 234 https://original.jupiterbroadcasting.net/114236/clickbait-currency-unfilter-234/ Wed, 26 Apr 2017 21:03:03 +0000 https://original.jupiterbroadcasting.net/?p=114236 RSS Feeds: Video Feed | MP3 Feed | HD Torrent | iTunes Become an Unfilter supporter on Patreon: — Show Notes — Links: Treasury refuses to give Exxon Mobil special waiver to drill in sanctioned Russia NSA Blimp Spied in the United States Why Soviet Weather Was Secret, a Critical Gap in Korea, and Other […]

The post Clickbait Currency | Unfilter 234 first appeared on Jupiter Broadcasting.

]]>
RSS Feeds:

Video Feed | MP3 Feed | HD Torrent | iTunes

Become an Unfilter supporter on Patreon:

Patreon

— Show Notes —

Links:

The post Clickbait Currency | Unfilter 234 first appeared on Jupiter Broadcasting.

]]>
Wikileaks Melts the Media | Unfilter 210 https://original.jupiterbroadcasting.net/104226/wikileaks-melts-the-media-unfilter-210/ Wed, 26 Oct 2016 22:10:48 +0000 https://original.jupiterbroadcasting.net/?p=104226 RSS Feeds: Video Feed | MP3 Feed | OGG Feed | HD Torrent | Mobile Torrent | iTunes Become an Unfilter supporter on Patreon: — Show Notes — Links: White House clarifies President Obama did know Hillary Clinton’s personal email | Daily Mail Online CIA Prepping for Possible Cyber Strike Against Russia – NBC News […]

The post Wikileaks Melts the Media | Unfilter 210 first appeared on Jupiter Broadcasting.

]]>
RSS Feeds:

Video Feed | MP3 Feed | OGG Feed | HD Torrent | Mobile Torrent | iTunes

Become an Unfilter supporter on Patreon:

Patreon

— Show Notes —

Links:

The post Wikileaks Melts the Media | Unfilter 210 first appeared on Jupiter Broadcasting.

]]>
Clearly Rigged | Unfilter 184 https://original.jupiterbroadcasting.net/98841/clearly-rigged-unfilter-184/ Wed, 13 Apr 2016 21:35:25 +0000 https://original.jupiterbroadcasting.net/?p=98841 More fallout from the Panama Papers gets picked up in this week’s episode, plus we discuss the mounting pressure against the rigged 2016 elections system, Russia buzz’s our planes & CNN has some hot propaganda. Plus we reveal our secret plans & pack our Overtime full of news you should know! Direct Download: Video | […]

The post Clearly Rigged | Unfilter 184 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

More fallout from the Panama Papers gets picked up in this week’s episode, plus we discuss the mounting pressure against the rigged 2016 elections system, Russia buzz’s our planes & CNN has some hot propaganda.

Plus we reveal our secret plans & pack our Overtime full of news you should know!

Direct Download:

Video | MP3 Audio | OGG Audio | Torrent | YouTube

RSS Feeds:

Video Feed | MP3 Feed | OGG Feed | HD Torrent | Mobile Torrent | iTunes

Become an Unfilter supporter on Patreon:

Patreon

— Show Notes —

Episode Links

The post Clearly Rigged | Unfilter 184 first appeared on Jupiter Broadcasting.

]]>
Nuke Penetration Testing | Unfilter 139 https://original.jupiterbroadcasting.net/79772/nuke-penetration-testing-unfilter-139/ Wed, 01 Apr 2015 21:33:42 +0000 https://original.jupiterbroadcasting.net/?p=79772 Up against the clock six world powers are attempting to secure a historic deal with Iran. Whats this deal exactly about & what is at stake? Is there really a last minute big issue holding everything up? We’ll break it all down. Plus Obama’s executive action against cyber attacks & we dig deep into the […]

The post Nuke Penetration Testing | Unfilter 139 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

Up against the clock six world powers are attempting to secure a historic deal with Iran. Whats this deal exactly about & what is at stake? Is there really a last minute big issue holding everything up? We’ll break it all down.

Plus Obama’s executive action against cyber attacks & we dig deep into the government corruption file this week.

Direct Download:

Video | MP3 Audio | OGG Audio | Torrent | YouTube

RSS Feeds:

Video Feed | MP3 Feed | OGG Feed | HD Torrent | Mobile Torrent | iTunes

Become an Unfilter supporter on Patreon:

Foo

Show Notes:

Executive Order — “Blocking the Property of Certain Persons Engaging in Significant Malicious Cyber-Enabled Activities” | The White House

U.S. Creates First Sanctions Program Against Cybercriminals : The Two-Way : NPR

The U.S. wants to slap sanctions on cybercriminals. President Obama issued an executive order Wednesday creating the nation’s first sanctions program to combat “malicious” cyberattacks and cyberspying.

President Obama said cyberthreats pose one of “the most serious economic and national security challenge” to the U.S., and that the executive order offers a “targeted tool” for countering that threat.

Obama’s Diplomatic Gamble On Iran Adding Instability In Middle East

Even before he became president, Barack Obama was imagining the possibilities of a diplomatic breakthrough with Iran. His willingness to reverse decades of official U.S. hostility was one of the things that set Obama apart on the campaign trail.

Obama’s Diplomatic Gamble On Iran Adding Instability In Middle East

Even before he became president, Barack Obama was imagining the possibilities of a diplomatic breakthrough with Iran. His willingness to reverse decades of official U.S. hostility was one of the things that set Obama apart on the campaign trail.

The post Nuke Penetration Testing | Unfilter 139 first appeared on Jupiter Broadcasting.

]]>
CIA vs Senate | Unfilter 89 https://original.jupiterbroadcasting.net/53282/cia-vs-senate-unfilter-89/ Wed, 12 Mar 2014 21:18:30 +0000 https://original.jupiterbroadcasting.net/?p=53282 After five years the Senate’s investigation into the Central Intelligence Agencies torture programs has bursted into the light when a massive fight went public.

The post CIA vs Senate | Unfilter 89 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

After five years the Senate’s investigation into the Central Intelligence Agencies torture programs has bursted into the light when a massive fight between top Senate officials and the CIA went public in a big way.

Taking to the floor, traditionally an intelligence agency apologist, blasted the CIA we’ll break it all down.

Plus Snowden makes his first public appearance, Greenwald reveals how the NSA spreads malware, your feedback, and much much more.

Direct Download:

Video | MP3 Audio | OGG Audio | Torrent | YouTube

RSS Feeds:

Video Feed | MP3 Feed | OGG Feed | HD Torrent | Mobile Torrent | iTunes

Become an Unfilter Supporter:

— Show Notes —


NSA is Crazy

Snowden rocks SXSW: FULL SPEECH

Speaking remotely from Russia on Monday, former National Security Agency contractor Edward Snowden told attendees at the SXSW Interactive conference in Austin, Texas that encryption is still a powerful deterrent against government surveillance.

The surprising thing was how much time Snowden spent on technical details like the mechanics of end-to-end encryption or the importance of solid encryption standards, rather than the political problems of NSA reform. “They are setting fire to the future of the internet,” he told the crowd, in what seemed designed to be the standout quote of the talk “And the people in the room now, you guys are the firefighters.”

“Giving Hypocrisy a Bad Name”: NSA-Backing Senate Intel Chair Blasts CIA for Spying on Torture Probe

How the NSA Plans to Infect ‘Millions’ of Computers with Malware – The Intercept

The classified files – provided previously by NSA whistleblower Edward Snowden – contain new details about groundbreaking surveillance technology the agency has developed to infect potentially millions of computers worldwide with malware “implants.”


Featured photo - How the NSA Plans to Infect ‘Millions’ of Computers with Malware
Featured photo – How the NSA Plans to Infect ‘Millions’ of Computers with Malware

The covert infrastructure that supports the hacking efforts operates from the agency’s headquarters in Fort Meade, Maryland, and from eavesdropping bases in the United Kingdom and Japan. GCHQ, the British intelligence agency, appears to have played an integral role in helping to develop the implants tactic.

In some cases the NSA has masqueraded as a fake Facebook server, using the social media site as a launching pad to infect a target’s computer and exfiltrate files from a hard drive. In others, it has sent out spam emails laced with the malware.

Documents analyzed by The Intercept show how the NSA has aggressively accelerated its hacking initiatives in the past decade by computerizing some processes previously handled by humans. The automated system – codenamed TURBINE – is designed to “allow the current implant network to scale to large size (millions of implants) by creating a system that does automated control implants by groups instead of individually.”

The agency’s solution was TURBINE. Developed as part of TAO unit, it is described in the leaked documents as an “intelligent command and control capability” that enables “industrial-scale exploitation.”

TURBINE was designed to make deploying malware much easier for the NSA’s hackers by reducing their role in overseeing its functions. The system would “relieve the user from needing to know/care about the details,” the NSA’s Technology Directorate notes in one secret document from 2009. “For example, a user should be able to ask for ‘all details about application X’ and not need to know how and where the application keeps files, registry entries, user application data, etc.”

In a top-secret presentation, dated August 2009, the NSA describes a pre-programmed part of the covert infrastructure called the “Expert System,” which is designed to operate “like the brain.” The system manages the applications and functions of the implants and “decides” what tools they need to best extract data from infected machines.

“When they deploy malware on systems,” Hypponen says, “they potentially create new vulnerabilities in these systems, making them more vulnerable for attacks by third parties.”

Mikko Hypponen, an expert in malware who serves as chief research officer at the Finnish security firm F-Secure said

The ramifications are starkly illustrated in one undated top-secret NSA document, which describes how the agency planned for TURBINE to “increase the current capability to deploy and manage hundreds of Computer Network Exploitation (CNE) and Computer Network Attack (CNA) implants to potentially millions of implants.” (CNE mines intelligence from computers and networks; CNA seeks to disrupt, damage or destroy them.)

Eventually, the secret files indicate, the NSA’s plans for TURBINE came to fruition. The system has been operational in some capacity since at least July 2010, and its role has become increasingly central to NSA hacking operations.

The TURBINE implants system does not operate in isolation.

It is linked to, and relies upon, a large network of clandestine surveillance “sensors” that the agency has installed at locations across the world.

The NSA’s headquarters in Maryland are part of this network, as are eavesdropping bases used by the agency in Misawa, Japan and Menwith Hill, England.

The sensors, codenamed TURMOIL, operate as a sort of high-tech surveillance dragnet, monitoring packets of data as they are sent across the Internet.

When TURBINE implants exfiltrate data from infected computer systems, the TURMOIL sensors automatically identify the data and return it to the NSA for analysis.

The NSA began rapidly escalating its hacking efforts a decade ago. In 2004, according to secret internal records, the agency was managing a small network of only 100 to 150 implants. But over the next six to eight years, as an elite unit called Tailored Access Operations (TAO) recruited new hackers and developed new malware tools, the number of implants soared to tens of thousands.

The agency sought $67.6 million in taxpayer funding for its Owning the Net program last year. Some of the money was earmarked for TURBINE, expanding the system to encompass “a wider variety” of networks and “enabling greater automation of computer network exploitation.”

In one secret post on an internal message board, an operative from the NSA’s Signals Intelligence Directorate describes using malware attacks against systems administrators who work at foreign phone and Internet service providers. By hacking an administrator’s computer, the agency can gain covert access to communications that are processed by his company. “Sys admins are a means to an end,” the NSA operative writes.

The internal post – titled “I hunt sys admins” – makes clear that terrorists aren’t the only targets of such NSA attacks. Compromising a systems administrator, the operative notes, makes it easier to get to other targets of interest, including any “government official that happens to be using the network some admin takes care of.”

Two implants the NSA injects into network routers, HAMMERCHANT and HAMMERSTEIN, help the agency to intercept and perform “exploitation attacks” against data that is sent through a Virtual Private Network, a tool that uses encrypted “tunnels” to enhance the security and privacy of an Internet session.

The implants also track phone calls sent across the network via Skype and other Voice Over IP software, revealing the username of the person making the call. If the audio of the VOIP conversation is sent over the Internet using unencrypted “Real-time Transport Protocol” packets, the implants can covertly record the audio data and then return it to the NSA for analysis.

But not all of the NSA’s implants are used to gather intelligence, the secret files show. Sometimes, the agency’s aim is disruption rather than surveillance. QUANTUMSKY, a piece of NSA malware developed in 2004, is used to block targets from accessing certain websites. QUANTUMCOPPER, first tested in 2008, corrupts a target’s file downloads.

Other selectors the NSA uses can be gleaned from unique Google advertising cookies that track browsing habits, unique encryption key fingerprints that can be traced to a specific user, and computer IDs that are sent across the Internet when a Windows computer crashes or updates.

What’s more, the TURBINE system operates with the knowledge and support of other governments, some of which have participated in the malware attacks.

Classification markings on the Snowden documents indicate that NSA has shared many of its files on the use of implants with its counterparts in the so-called Five Eyes surveillance alliance – the United Kingdom, Canada, New Zealand, and Australia.


:– William P
:– Robert T
:– Jonathan H
:– Oscar C
:– Martin S
:– Austin J
:– John G
:– Carl M

– Thanks for Supporting Unfilter –

  • Thanks to our 362 Unfilter supporters!

  • Supporter perk: Downloadable Pre and Post show. Extra clips, music, hijinks, and off the cuff comments. The ultimate Unfiltered experience. ‘

  • Supporter perk: Exclusive BitTorrent Sync share of our production and non-production clips, notes, and more since the NSA scandal broke in episode 54. The ultimate Unfiltered experience, just got more ultimate.

  • Supporter Perk: Past 5 supporters shows, in a dedicated bittorrent sync folder.


CIA vs the Senate

Behind Clash Between C.I.A. and Congress, a Secret Report on Interrogations

What the C.I.A. did next opened a new and even more rancorous chapter in the struggle over how the history of the interrogation program will be written. Agency officials began scouring the digital logs of the computer network used by the Senate staff members to try to learn how and where they got the report. Their search not only raised constitutional questions about the propriety of an intelligence agency investigating its congressional overseers, but has also resulted in two parallel inquiries by the Justice Department — one into the C.I.A. and one into the committee.

A deal was struck between Leon E. Panetta, the director of the C.I.A., and Senator Dianne Feinstein of California, the intelligence committee’s Democratic chairwoman, to make millions of documents available to the committee at a C.I.A. facility near the agency’s headquarters in Langley, Va. The documents covered roughly five years: from the inception of the program until September 2006, when all of the C.I.A.’s prisoners were transferred to the American military prison at Guantánamo Bay, Cuba.

At the same time, Mr. Panetta ordered the C.I.A. to conduct its own review of the documents, a move designed to help the agency better understand the volumes of the material it had agreed to hand over to its congressional overseers.

Some people who have read the review memos said that parts of them were particularly scorching in their analysis of extreme interrogation methods like waterboarding, which the memos described as providing little intelligence of any value.

According to a recent court filing in a Freedom of Information Act lawsuit, the C.I.A. created a “network share drive” segregated from the main agency network, a provision intended to allow the committee to work in private.

It is unclear how or when committee investigators obtained parts of the Panetta review. One official said that they had penetrated a firewall inside the C.I.A. computer system that had been set up to separate the committee’s work area from other agency digital files, but exactly what happened will not be known until the Justice Department completes its inquiry.

Senator Mark Udall of Colorado disclosed the existence of the review during an open hearing on Dec. 17.

C.I.A. officials had come to suspect that committee investigators working at the Virginia facility had seen at least a version of the internal review. Senior officials at the agency ordered a search of several years’ worth of digital audit logs that the C.I.A. uses to monitor its computer systems.

In January, the C.I.A. presented the results of its search to the intelligence committee in a tense meeting that ignited the most recent confrontation. The day after the meeting, Senator Feinstein wrote a letter to Mr. Brennan demanding answers for why the C.I.A. carried out the search, which she suggested had violated the constitutional separation of powers and undermined the committee’s oversight role.

Dianne Feinstein launches scathing attack on CIA over alleged cover-up

  • Intelligence committee chair accuses CIA of smear campaign
  • Feinstein alleges CIA broke law and violated constitution
  • CIA director John Brennan denies thwarting investigation
  • Dianne Feinstein statement – full text

Feinstein: CIA searched Intelligence Committee computers

Feinstein described the escalating conflict as a “defining moment” for Congress’s role in overseeing the nation’s intelligence agencies and cited “grave concerns” that the CIA had “violated the separation-of-powers principles embodied in the United States Constitution.”

The CIA: the double life of Dianne Feinstein

The senator’s contradictory nature was on show for all to see on Tuesday, when she delivered an extraordinary speech from the Senate floor. It amounted to the biggest and most public rift between Congress and the spy community since the 9/11 attacks. Ms Feinstein, who chairs the Senate intelligence committee, which has oversight of America’s myriad spy agencies, accused the CIA of breaking into the committee’s computers. It is an extremely serious charge: a breach of the constitution, the executive branch tampering with the elected branch. She described it as “a defining moment for the oversight of our intelligence community”.

The day after Edward Snowden revealed himself as a whistleblower last June, she was among the first to brand him a traitor. In the face of revelation after revelation, she praised the professionalism of the NSA. She defended mass data collection as a necessity, arguing that the NSA had to have access to the whole “haystack” to find the one needle, the terrorist.

Panetta Review

The Panetta Review was a secret internal review conducted by Leon Panetta, then the Director of the United States Central Intelligence Agency, of enhanced interrogation techniques previously used by the CIA during the administration of George W. Bush. The review led to a series of memoranda that, as of March 2014, remained classified. According to The New York Times, the memoranda “cast a particularly harsh light” on the Bush-era interrogation program, and people who have read them have said parts of the memos are “particularly scorching” of techniques such as waterboarding, which the memos describe as providing little valuable intelligence

Legacy of Ashes: The History of the CIA

If you’re a Supporter check your inbox!

Call us: 1.425.312.1756

Follow the Us:

The post CIA vs Senate | Unfilter 89 first appeared on Jupiter Broadcasting.

]]>