Skip to content

BERNDPULCH.ORG – BERND-PULCH.ORG – Stasi Liste, KGB Liste, Stasi List, KGB List

BERND PULCH, STASI LIST, KGB LIST, STASI LISTE, KGB Liste, Stasi Namen, Stasi Namen alphabetisch, Offshore List, Offshore Liste, Leaks List, Leaks Liste

Recent Posts

  • Must See Video – The Intelligence War
  • Michael Moore – In Trumpland – Full Movie
  • Kid’s shows, Erotica And Other Odd Diversions Of History’s Most Ruthless Men – Mao Zedong Was A Classical Poet
  • Kid’s shows, Erotica And Other Odd Diversions Of History’s Most Ruthless Men – Idi Amin Loved Children’s Cartoons
  • STASI-Film – Auftrag erfüllt (MfS-Propagandafilm) Mit Ehepaar Guillaume

Archives

  • December 2019
  • November 2019
  • October 2019
  • September 2019
  • August 2019
  • July 2019
  • June 2019
  • May 2019
  • April 2019
  • March 2019
  • February 2019
  • January 2019
  • December 2018
  • November 2018
  • October 2018
  • August 2018
  • July 2018
  • May 2018
  • April 2018
  • March 2018
  • February 2018
  • January 2018
  • December 2017
  • November 2017
  • October 2017
  • September 2017
  • August 2017
  • July 2017
  • June 2017
  • May 2017
  • April 2017
  • March 2017
  • February 2017
  • January 2017
  • December 2016
  • November 2016
  • October 2016
  • September 2016
  • August 2016
  • July 2016
  • June 2016
  • May 2016
  • April 2016
  • March 2016
  • February 2016
  • January 2016
  • December 2015
  • November 2015
  • October 2015
  • September 2015
  • August 2015
  • July 2015
  • June 2015
  • May 2015
  • April 2015
  • March 2015
  • February 2015
  • January 2015
  • December 2014
  • November 2014
  • October 2014
  • September 2014
  • August 2014
  • July 2014
  • June 2014
  • May 2014
  • April 2014
  • March 2014
  • February 2014
  • January 2014
  • December 2013
  • November 2013
  • October 2013
  • September 2013
  • August 2013
  • July 2013
  • June 2013
  • May 2013
  • April 2013
  • March 2013
  • February 2013
  • January 2013
  • December 2012
  • November 2012
  • October 2012
  • September 2012
  • August 2012
  • July 2012
  • June 2012
  • May 2012
  • April 2012
  • March 2012
  • February 2012
  • January 2012
  • December 2011
  • November 2011
  • October 2011
  • September 2011
  • August 2011
  • July 2011
  • June 2011
  • May 2011
  • April 2011
  • March 2011
  • February 2011
  • January 2011

Categories

  • AFGHANISTAN
  • AFRICA
  • ALBANIA
  • Albrecht Sass
  • ALEXANDER VON HOLST
  • ALGERIA
  • aline kleinwächter
  • Aman
  • AMERICAN SAMOA
  • Andorra
  • Andorra
  • Angola
  • Anguilla
  • anne holst
  • ANNE VON HOLST
  • Annette von Holst
  • ANONYMOUS
  • Argentina
  • Azerbaijan
  • Bahamas
  • bananenrepublik
  • BELEIDIGUNGEN
  • BERND PULCH
  • BILDERBERG
  • Cambodia
  • CHINA
  • CHRISTIAN
  • CIA NAMES
  • COMEDY
  • COMMUNISTS
  • CONFIDENTIAL
  • Congo
  • Corruption
  • CRYPTOME
  • Cuba
  • cyber mobbing
  • CYBER-STASI
  • CYBERCRIME
  • CYBERPUNK
  • cybersecurity
  • DEA
  • DEPARTMENT OF JUSTICE
  • DHS
  • die bewertung
  • Diffamierer & Erpresser
  • dirty money
  • DOCUMENTARY
  • Donald Trump
  • doreen trampe
  • Dr. Thomas Schulte
  • DROHUNGEN
  • DRUG CARTELS
  • eagle it
  • ECONOMY
  • EDITORIAL
  • EEV
  • ehrenfried stelzer
  • ENERCROX
  • erich mielke
  • Ethopia
  • EU
  • EUROPE
  • EUROZONE
  • FAMILIE LORCH
  • FASHION
  • Fälscher & Manipulateure
  • fbi
  • FEATURE FILM
  • FEMEN
  • FINANCE INDUSTRY
  • firmenwelten
  • FOOTBALL LEAKS
  • Frank Maiwald
  • Friedhelm Laschütza
  • FUTURE
  • Ganoven & Netzwerke
  • gerd bennewirtz
  • GLOBAL WITNESS
  • gomopa
  • gomopa im
  • gomopa und immobilienzeitung
  • gomopa-iz connection
  • gomopa4kids
  • google
  • Gregor Schulmeister
  • GRU
  • HISTORY
  • HOLLYWOOD
  • HUMAN RIGHTS
  • illegal
  • Indonesia
  • Intelligence
  • INTERNET CRIME
  • Investigativ
  • IRAN
  • Iraq
  • ISRAEL
  • Istvan Cocron
  • jan mucha
  • jochen resch
  • johann sternberg
  • JOHN F KENNEDY
  • Joint Chiefs of Staff
  • JOURNALISM
  • karsten trampe
  • KGB
  • kgb agent
  • KGB AGENT LIST
  • kgb list
  • KGB SPIES
  • KGB SPIES NAMES
  • kgb spy
  • kgb-agent-list
  • kgb-spies-lists
  • KIM KARDASHIAN
  • KLAUS
  • klaus maurischat
  • komplizen
  • korrupte journalisten
  • korrupte juristen
  • LA FRANCE
  • LAW
  • MAFIA
  • malaysia
  • manfred resch
  • mark vornkahl
  • Mathias Schillo
  • MEDIA
  • Medienhaus Gersöne UG
  • meinrad-fuchsgruber
  • Menard Fuchsgruber
  • MERIDIAN CAPITAL
  • MEXICAN MAFIA
  • Meyer Kreuzfahrt
  • mobbing
  • MONEY LAUNDERING
  • mord
  • MORDDROHUNGEN
  • Mossack Fonseca
  • MOVIES
  • mucha-klarenthal mutmassliches-gomopa-duo-klaus-maurischat-und-peter-ehlers
  • MURDER AND EXECUTIONS
  • MURDER OF JOURNALISTS AND TRUTHSEEKERS
  • MUSIC
  • nato
  • NAZI
  • NEWS
  • NORTH KOREA
  • North Korea Nuclear Test Site
  • NUCLEAR WAR
  • OFFSHORE
  • onkel jochen
  • PAKISTAN
  • PANAMA
  • PEOPLE
  • peter ehlers
  • peter reski
  • Pierre Gersöne
  • POLITICS
  • PROTEST AND OCCUPY MOVEMENT INTERNATIONAL
  • PROTEST MOVEMENT
  • PUBLIC INTELLIGENCE
  • pulch
  • PUTIN
  • ra resch
  • ra-johannes-fiala
  • ra-thomas-schulte
  • raimund maurus
  • rainer-von-holst
  • RELAX
  • resch
  • ruf mörder
  • RUSSIA
  • SATIRE
  • SCHLAMPE VON HOLST
  • science
  • scoredex
  • sebastian sanders
  • SECRECY NEWS
  • SECRET
  • Secret Agency
  • SECRET SOCIETIES
  • SECURE
  • securitate
  • Sex
  • SEXY
  • shin bet
  • SHOAH
  • siegfried siewert
  • Special Forces
  • SPIES
  • SPORTS
  • stalin
  • stalker
  • STASI
  • stasi klarenthal
  • stasi list
  • stasi liste
  • STASI NAMES-STASI NAMEN
  • stasi wiesbaden
  • stasi-Gehaltsliste
  • stasi-geheim
  • stasi-hinrichtung tag-stasi
  • Stasi-Justiz
  • stasi-moerder
  • stasi-mord
  • stasibraut
  • stasiliste
  • statsanwaeltin porten
  • STUDY
  • sven schmidt
  • sven schmidt black lion
  • sven schmidt eagle it
  • Switzerland
  • SYRIA
  • TAX HAVEN
  • TERRORISM
  • THE CIA
  • THE FBI
  • THE HALL OF SHAME
  • THE INVESTMENT MAGAZINE – THE ORIGINAL – DAS INVESTMENT MAGAZIN – DAS ORIGINAL
  • THE IS ISLAMIC STATE
  • THE MOSSAD
  • THE NATIONAL SECURITY
  • THE NATIONAL SECURITY AGENCY (NSA)
  • THE PANAMA PAPERS
  • The Secret List of Off-Shore-Companies, Persons and Adresses
  • The U.S. AIR FORCE
  • The U.S. Army
  • The U.S. NAVY
  • THE WHITE HOUSE
  • thomas bremer
  • thomas promny
  • TOP TEN
  • TOP-SECRET
  • Ukraine
  • UNITED NATIONS
  • US AIR FORCE
  • US ARMY
  • usa
  • VENEZUELA
  • VIDEO
  • Video – Die enttarnten STASI-Spione
  • WAR
  • Warnmeldungen
  • WEST BANK
  • WIKILEAKS
  • WILHELM LORCH
  • Wirtschaft
  • Wirtschaftswarnung
  • WOMEN PROTEST

Meta

  • Register
  • Log in
  • Entries feed
  • Comments feed
  • WordPress.com

Enter your email address to follow this blog and receive notifications of new posts by email.

Join 1,219 other followers

Member of The Internet Defense League

Pages

  • “”GoMoPa” – Wie Cyberkriminelle Unternehmen ausplündern”
  • “Das mutmaßlich tödliche Wein-Präsent an Heinz Gerlach”
  • “Die bezahlten Reisen und Immobilien von Thomas und Beate Porten – mutmaßlich Korruption und mutmaßlich Amtsmißbrauch”
  • “Die Killer-Bibel” Toxdat – die 900 Seiten-Mordstudie von „GoMoPa“-Mastermind und Resch-Protege´ STASI-Oberst Ehrenfried Stelzer
  • “Die Liquidation der GoMoPa”
  • “Enthüllt – Der geheime Beratungsvertrag zwischen “GoMoPa” und Dolphin”
  • “Enthüllt – Der geheime Beratungsvertrag zwischen “GoMoPa” und EEV”
  • “Enttarnt – Der mutmassliche Macher von “Gomopacrime” und “Investigoo” – Rainer von Holst”
  • “Enttarnt – Frank Maiwald – STASI-Spitzel und “GoMoPa”-Chefredakteur”
  • “Enttarnt – Johann Sternberg, “GoMoPa”-Redakteur, Drogenbeschaffer und Trojanisches Pferd – Kürzel “sa””
  • “Experte enthüllt Jan Mucha mutmaßlicher Agent/Spitzel – Expert – Jan Mucha suspected Agent/Spy”
  • “GoMoPa Crime Unzensiert” – Weihnachtsausgabe mit pikanten Details zu den Cybercrime-Gangstern
  • “GoMoPa” – Wie Cyberkriminelle Unternehmen ausplündern
  • “GoMoPa”-Genossen: Mutmaßliche IM – heutige IZ, Mucha, Porten, Ehlers…”AHA, daher wußte “GoMoPa” dies!”
  • “Insider enthüllen mutmaßliche GoMoPa-Gesellschafter”-Liste
  • “Kinder-Sexualaufklärung” unter falscher Flagge – “GoMoPa 4 Kids” – Over and Out !
  • “Mutmasslicher Bankrott-Tourist-Scharlatan von Holst steckt wohl hinter Überfall auf dubiose “GoMoPa”und Einbruch”
  • “Negative SEO”-Experte von “GoMoPa” belastet Maurischat und Peter Ehlers
  • “TAGESSCHAU” bestätigt unsere Haltung zu “GoMoPa” & Genossen
  • “Weltrekord-GoMoPa stellt Rechnung an Finanzunternehmen für Artikelnutzung von € 130.000,-: Originaldokument”
  • “►Mutmasslicher STASI-Mord an “GoMoPa”-Bremer-EEV-Geschäfts”freund” Eisenhauer”
  • A-Z- 2.000 Stasi Offiziere im besonderen Einsatz OibE – “Schläferliste der STASI in Westdeutschland”- STASI-SLEEPER LIST A-Z
  • AMOKLAUFENDE STASI-GoMoPA-TERRORISTEN; “KINDER-SEXUALAUFKLÄRER” UND rufMÖRDER BEKOMMEN IMMER MEHR GEGENWIND
  • AN OVERVIEW OF THE HEAVY CYBERATTACKS ON OUR WEBSITES TO STOP THE TRUTH DONE BY THE SUSPECTS
  • ANONYME STASI-SCHEI**HAUS-FLIEGEN – NOMEN EST OMEN
  • BERND PULCH – MAGISTER ARTIUM – DER BEWEIS SO ECHT WIE UNSER INVESTMENT MAGAZIN – DAS ORIGINAL ECHT IST
  • BGH-Urteil gegen den Suchmaschinen-Terror der “GoMoPa”-“Nawito”-Genossen
  • CREDO: Freedom, Human Rights, Peace and a Democratic Society need Investigative Journalism
  • DAS BETRUGSURTEIL GEGEN “BENNEWIRTZ” UND “PETER EHLERS” “GoMoPa”-PARTNER “MAURISCHAT” UND “VORNKAHL” WG BETRUGES AM EIGENEN ANLEGER
  • DAS SYSTEM “GoMoPa”-Google
  • Der “freiwillige” Beratungsvertrag zwischen “GoMoPa” und estavis
  • DER “GoMoPa” ADRESSEN-FRIEDHOF BUCHSTABE A UND DIE GEFÄLSCHTEN MITGLIEDERZAHLEN
  • DER BEWEIS “DAS INVESTMENT MAGAZIN” DAS ORIGINAL IST ECHT
  • DER BEWEIS: “GoMoPa”-ERPRESST MERIDIAN CAPITAL “GoMoPa”-CEO MAURISCHAT WIRD VOM BKA VERHAFTET
  • DER BEWEIS: DER MAGISTER-TITEL VON BERND PULCH IST ECHT
  • Der Beweis: Meridian Capital über die Fälschung der anonymen “GoMoPa”-Scheisshausfliegen
  • Der Beweis: Wer geschmiert wurde: STASI-“GoMoPa” und dessen Ableger “Nawito”
  • DER STASI-MORD AN HEINZ GERLACH WEIL ER DAS STASI KOMPLOTT DURCHSCHAUTE
  • Die “GoMoPa”-Opfer-Liste
  • Die Bilanz der “GoMoPa” – GmbH 2008
  • Die Bilanz der “GoMoPa” – GmbH 2009
  • DIE BILANZ DER “GoMoPa”-GmbH 2010
  • DIE FREI ERFUNDENEN LÜGEN VON “GoMoPa”, UND DEREN SCHEI*SHAUSFLIEGENBLOG, EXTREMNEWS, DIE BEWERTUNG: FALL PROFESSOR MINISTER SCHELTER
  • Die gesamte deutsche Presse verabscheut “GoMoPa”
  • Die Geschäftsführung der “GoMoPa” GmbH – angeblich in New York – mutmasslich in Verden
  • DIE STASI-FÄLSCHER: Meridian Capital about GoMoPa STASI-FÄLSCHUNGEN DER “GoMoPa”
  • FAZ – FRANKFURTER ALLGEMEINE ZEITUNG ÜBER “GoMoPa”
  • GEFÄLSCHER LEBENSLAUF VON STASI-“GoMoPa”-“CEO”-“KLAUS MAURISCHAT”
  • GERD BENNEWIRTZ ,”NUN GoMoPa”, VERSUCHT ERNEUT “GoMoPa”-KRITISCHE STELLEN LÖSCHEN ZU LASSEN
  • Google macht Top-Terrorist Atta zum Star-Studenten – Methode Cyber-STASI “GoMoPa”
  • Idendity Theft Cyber-STASI – PULCH ORIGINAL-trademark pirates-Markenpiraten
  • Insider – Verfassungsschutz kümmert sich um “GoMoPa”-Nazi-Ableger “Berlin Journal”
  • Juricon über “GoMoPa” inklusive STASI-Verbindung
  • Meridian Capital about GoMoPa STASI-FÄLSCHUNGEN DER “GoMoPa”
  • MERIDIAN CAPITAL ÜBER DIE SERIEN-RUFMÖRDER, FÄLSCHER UND GEWOHNHEITSVERBRECHER DER STASI-”GoMoPa”
  • MORD-DROHUNG WG PUBLIKATION DER STASI-LISTEN MIT KLARNAMEN
  • Mutmasslich wie bei estavis – debis select “unterwirft sich “GoMoPa”, dem Exklusiv-”Nachrichten-Dienst” zu Heinz Gerlachs Todesursache
  • Original STELLUNGNAHME VON MERIDIAN CAPITAL ZU “GoMoPa”
  • PETER EHLERS VON “DAS INVESTMENT”: “BUNDESKANZLERIN ANGELA MERKEL UND BUNDESFINANZMINISTER WOLFGANG SCHÄUBLE SIND DEUTSCHLANDS BEKANNTESTE HEHLER!”
  • REPORT MÜNCHEN – VON ARSEN ÜBER DIOXIN BIS ZYANKLAI – DER GIFTSCHRANK DER STASI UND IHRE OPFER
  • So wollte “GoMoPa” mich erpressen
  • So wollte SJB-Bennewirtz für die fingierte STASI-”GoMoPa” Artikel bei uns löschen – So eng arbeiten SJB und “GoMoPa” zusammen
  • STASI-EXPERTE: RUFMORD AN JUSTIZMINISTER IST STASI-RACHE-AKT
  • STASI-NAMEN ALPHABETISCH BUCHSTABE A-BA – STASI-NAMES IN ALPHABETICAL ORDER – A-BA
  • STASI-Opfer dokumentieren die Morde und die Mordstudie von STASI-Oberst Ehrenfried Stelzer
  • Statement about the dubious “colportations” of “Nawito” – MENTAL AND PHYSICAL CYBERATTACKS
  • Statement of Magister Bernd Pulch
  • Stellungnahme von Magister Bernd Pulch
  • Stellungnahme von Stefan Schramm
  • Strafanzeigen gegen “GoMoPa” in der Presse
  • TOP SECRET – Review of Federal Reserve System Financial Assistance to AIG in Financial Crisis
  • WIE MICH DIE “GoMoPa”-SCHEISSHAUSFLIEGEN MIT GOOGLE-EINTRÄGEN ERPRESSEN WOLLTEN

Social

Follow Us

Tag: Nsa Phone Number

NSA nimmt wohl auch deutsche Putin-Freunde, Hiwis, Financiers, Sponsoren und Media-Kunden in Ueberwachung

NSA nimmt wohl auch deutsche Putin-Freunde, Hiwis, Financiers, Sponsoren und Media-Kunden in Ueberwachung

Nach Informationen aus dem Umkreis der NSA werden nunmehr wohl alle deutschen Putin-Unterstuetzer erfasst und beleuchtet.

Anlass ist das Wirken von Ex-Kanzler Gerhard Schroeder fuer Putin und die Mueller Untersuchung der Russland Kontakte von Trump.

Putin war selbst in der DDR lange Jahre taetig

Hierzu zaehlen die Linke, alle dieser Gruppierung zuzuordnenden Unternehmen, alle ehemaligen KGB- und STASI-Agenten und STASI-IM und deren Unternehmen und Beteiligungsgesellschaften.

Hinzu kommen deren Kunden, Finanziers und Sponsoren.

Dies betrift wohl insbesondere “Neues Deutschland”, und “GoMoPa”, als auch die mutmasslich unterwanderten “Das Investment” und  “Immobilien Zeitung” sowie “Die Bewertung” berichten die Washington-Insider, die auch von verstaerkten militaerischen Konflikten weltweit ausgehen.

Deutschland als wichtiges NATO-Land neben den USA und mit der DDR-Historie gilt als besonders wichtig und kritisch  fuer die NSA-Analysen.

Die betroffenen Unternehmen und Personen muessen mit Sanktionen und internationalen FBI-Haftbefehlen wie im Fall der FIFA fuer die mutmasslich korrupte WM-Vergabe an Putins Russland rechnen, die auch in der Schweiz vollstreckt wurden.

Rate this:

Share this:

  • Facebook
  • Reddit
  • Email
  • Print
  • Twitter
  • LinkedIn
  • Pinterest
  • Tumblr
  • Pocket
  • Telegram
  • WhatsApp
  • Skype

Like this:

Like Loading...
By Bernd Pulchin BERND PULCH, pulch, PUTIN, THE NATIONAL SECURITY AGENCY (NSA)April 14, 2018May 11, 2018187 Words

Exclusive Breaking News – The NSA Sets Up New Cyber Center – TOP SECRET – Original Plans and Photos

Exclusive Breaking News – The NSA Sets Up New Cyber Center – TOP SECRET – Original Plans and Photos

Rate this:

Share this:

  • Facebook
  • Reddit
  • Email
  • Print
  • Twitter
  • LinkedIn
  • Pinterest
  • Tumblr
  • Pocket
  • Telegram
  • WhatsApp
  • Skype

Like this:

Like Loading...
By Bernd Pulchin BERND PULCH, CRYPTOME, PUTIN, THE NATIONAL SECURITY AGENCY (NSA), TOP-SECRETSeptember 21, 201731 Words

Insider – NSA erfasst deutsche Putin-Freunde, Hiwis, Financiers, Sponsoren und Media-Kunden

Insider – NSA erfasst deutsche Putin-Freunde, Hiwis, Financiers, Sponsoren und Media-Kunden

Nach Informationen aus dem Umkreis der NSA werden nunmehr alle deutschen Putin-Unterstuetzer erfasst und beleuchtet.

Anlass ist das Wirken von Ex-Kanzler Gerhard Schroeder fuer Putin.

Putin war selbst in der DDR lange Jahre taetig

Hierzu zaehlen die Linke, alle dieser Gruppierung zuzuordnenden Unternehmen, alle ehemaligen KGB- und STASI-Agenten und STASI-IM und deren Unternehmen und Beteiligungsgesellschaften.

Hinzu kommen deren Kunden, Finanziers und Sponsoren.

Dies betrift wohl insbesondere “Neues Deutschland”, und “GoMoPa”, als auch die mutmasslich unterwanderten “Das Investment” und  “Immobilien Zeitung” sowie “Die Bewertung” berichten die Washington-Insider, die auch von verstaerkten militaerischen Konflikten weltweit ausgehen.

Deutschland als wichtiges NATO-Land neben den USA und mit der DDR-Historie gilt als besonders wichtig und kritisch  fuer die NSA-Analysen.

Die betroffenen Unternehmen und Personen muessen mit Sanktionen und internationalen FBI-Haftbefehlen wie im Fall der FIFA fuer die mutmasslich korrupte WM-Vergabe an Putins Russland rechnen, die auch in der Schweiz vollstreckt wurden.

 

Rate this:

Share this:

  • Facebook
  • Reddit
  • Email
  • Print
  • Twitter
  • LinkedIn
  • Pinterest
  • Tumblr
  • Pocket
  • Telegram
  • WhatsApp
  • Skype

Like this:

Like Loading...
By Bernd Pulchin BERND PULCH, COMMUNISTS, CONFIDENTIAL, gomopa, gomopa im, gomopa und immobilienzeitung, gomopa-iz connection, pulch, THE NATIONAL SECURITY AGENCY (NSA)September 6, 2017September 6, 2017178 Words

Leaks Unlimited – With NSA contractor Martin arrested, other leakers may still be at large

Leaks Unlimited – With NSA contractor Martin arrested, other leakers may still be at large

Earlier this month we learned the name of a second person who stole top secret documents from the US National Security Agency (NSA). After Edward Snowden admitted doing so publicly in June 2013, the FBI has now arrested the 51-year old Harold T. Martin III at his home in Maryland.

Martin hoarded lots of classified documents, not only from NSA but also from a number of other military and intelligence agencies. The FBI is still comparing them with those from the recent Shadow Brokers leak and a range of other NSA leaks from the past few years, but given what’s known now, it seems likely that at least one other leaker is still at large.


The house of Harold T. Martin III in Glen Burnie, Maryland
(photo: Jose Luis Magana/The Associated Press)

The New York Times reported that when the FBI raided Martin’s house on August 27, they found paper documents and many terabytes of highly classified information, even going back the 1990s. At least six documents were from 2014. It was reported that Martin first took the classified documents on paper, later on CDs and more recently on thumb drives.

The reason why Harold Martin brought home and stored such large numbers of top secret documents isn’t yet clarified. One suggestion is that he may have used them forresearch for his dissertation about “new methods for remote analysis of heterogeneous & cloud computing architectures”, which he was working on at the University of Maryland.

Documents from multiple agencies

It should be noted that not everything Martin stole comes from NSA. In the official charges there are no names of the agencies where the documents come from, they are only described as highly classified, including ones that are marked as Top Secret and Sensitive Compartmented Information (SCI).

> See also: The US Classification System

With the documents going back to the 1990s, he may well have started hoarding them from the places where he worked in those days. From 1987 to 2000, Martin served at the US Navy, achieving the rank of lieutenant, but he left active duty in 1992.

As the Washington Post found out, he then took a variety of tech jobs with government contractors, like at Computer Sciences Corp. (CSC) somewhere in the 1990s and later, until 2009, at Tenacity Solutions, for which he worked at the Office of the Director of National Intelligence (ODNI).

In 2009, Harold Martin started to work for Booz Allen Hamilton, for which he was a contractor at NSA from 2012 to 2015, when Booz transferred him to the Pentagon’s Office of Acquisition, Technology and Logistics (AT&L), which is responsible for often highly sensitive and classified procurement programs. There he stayed until the moment of his arrest last August.

Officials have meanwhile said that Martin took classified documents not only from NSA, but also from his other workplaces, including ODNI and AT&L.

It’s interesting as well that in the charges against Martin, a whole paragraph is dedicated to the at least six documents from 2014, which are described as being produced “through sensitive government sources, methods, and capabilities”. As signals intelligence is traditionally seen as the most sensitive capability, maybe just these six documents are from NSA.


The building of the Office of the Director of National Intelligence (ODNI)
where Harold Martin worked as a contractor before 2009
(photo: Microsoft, via Cryptome.org – click to enlarge)

Shadow Brokers investigation

After the “Shadow Brokers” disclosed a large set of secret NSA hacking tools last August, the FBI began investigating this leak. At the same time there was a lot of speculation: was NSA hacked from the outside? Had an NSA hacker been sloppy? Were the tools leaked by an insider? Maybe the same insider responsible for earlier leaks that hadn’t been attributed to Snowden?

> See also: Is the Shadow Brokers leak the latest in a series?

On September 22, it was reported that during the FBI investigation, NSA officials had said that a former agency operative had carelessly left the hacking tool files available on a remote computer, where Russian hackers found them. If that’s correct, then it seems likely that the FBI traced Harold Martin when they were looking for that careless NSA hacker. It has not yet been confirmed that Martin was that person though.

Harold Martin was working at NSA’s hacking division TAO around the time when the tools were considered to be left exposed, somewhere after October 18, 2013, but a former TAO hacker told the Washington Post that Martin “worked in the unit’s front office carrying out support roles such as setting up accounts, not conducting actual operations.”

Even if Martin was the man who left the hacking tools exposed, then we still don’t know who found them and published them under the name Shadow Brokers. It’s not very likely that this was done by Martin himself, as Shadow Brokers published additional messages on August 28, October 1 and October 15, when he was already in custody. The actual publication can therefore be the work of for example Russian, Iranian or North Korean hackers or even independent hacktivists.

Other sources?

Could Harold Martin also be the source of earlier leaks, that were not attributed to Edward Snowden? In theory he could have been that “second source” next to Snowden: none of these other leaked documents (like the TAO catalog, XKEYSCORE code, tasking lists and end reports) are newer than 2015, when Martin left NSA. Contrary to this Martin is described as very patriotic, which doesn’t fit the fact that these particular leaks were clearly meant to harm and embarrass the US and NSA.

> See also: Leaked documents that were not attributed to Snowden

Also, Martin hasn’t (yet) been charged with espionage or the attempt to provide classified information to a third party or a foreign government – which doesn’t seem something the US government would leave out or keep secret after the recent and unprecedented statement in which the Office of the Director of National Intelligence accused Russia of hacking the Democratic National Committee (DNC) and other political organizations.

Should the FBI investigation confirm that Harold Martin was only responsible for leaking the NSA hacking tools (after which unknown others published them) and that none of his documents were provided to foreign intelligence agencies or showed up in the earlier revelations, then there’s most likely yet another leaker from inside NSA.

The Shadow Brokers leak standing alone and not related to the earlier non-Snowden leaks is of some importance, because only among the stuff published by the Shadow Brokers there are files with a date (October 18, 2013) after the day that Snowden left NSA (May 20, 2013).

This means that when Harold Martin is the initial source of the Shadow Brokers files, we can no longer exclude the possibility that the earlier leaks do come from the Snowden trove. If that would be the case, then someone with access to them went rogue and had them published on his own account. But it should also be noted that both Glenn Greenwald and Bruce Schneier explicitly said that some of these leaked documents did not come from Snowden.

The more likely option is therefore that there’s still another leaker at large, someone with a more evil intent than Harold Martin and Edward Snowden – a conclusion which is not very comforting and which also raises questions about NSA’s internal security…


Some NSA buildings at the Friendship Annex (FANX) complex near Baltimore
(photo: live.com, via Cryptome.org – click to enlarge)

NSA’s internal security measures

The NSA’s hacking division TAO, where Harold Martin worked for some time, isapparently not located in the well-known NSA headquarters building at Fort Meade, but in one or more leased office buildings outside, one of them at an office complex calledFriendship Annex (FANX) near Baltimore. TAO also has units at NSA’s four Cryptologic Centers across the US.

Entrance to the highly secured TAO headquarters building is strictly controlled: one has to go through an imposing steel door, protected by armed guards, and entrance is only possible after entering a six-digit code and passing a retinal scanner to ensure that only specially cleared individuals are allowed in.

Such security measures are more aimed at keeping outsiders out, than at insiders in. And when it comes to finding inside moles of hostile foreign intelligence agencies, the NSA is also said to have a rather bad track record. The Manning and Snowden leaks made NSA painfully aware of this and so preventive insider-threat detection programs were put in place.

It’s not clear whether these new systems failed in the case of Harold Martin, or that they simply weren’t yet implemented at the TAO location where he worked – anti-leak software that was designed by Raytheon to “spot attempts by unauthorized people to access or download data” was also not yet installed at the NSA facility in Hawaii when Snowden was working there.

Tracking what employees are doing inside is one thing, checking what they take out is another. But according to The Washington Post, the NSA (like other agencies) does notimpose universal checks of personnel and their belongings as they enter and leave agency buildings. Security guards only conduct random checks and use their discretion in order to keep en build the trust of the employees.

“If you have a bag full of stuff, you’re probably going to get stopped” said a former TAO operator to the Post, but, in general, “Disneyland has more physical security checks than we had”. Additionally, NSA facilities will have detection gates, but it seems that it was easier for Snowden to walk out with his thousands of documents than many would have thought.

As former NSA general counsel Rajesh De explained, it is unlikely “you’re going to be able to stop every incident of somebody taking documents if they’re determined to do so. But the real question is how quickly can you detect it, how quickly can you mitigate the harm of any such incident.”


An old sign inside the NSA headquarters building
showing what kind of items are not allowed in.
(screenshot from a documentary about NSA)

Conclusion

Harold Martin stole a lot of classified documents from multiple military and intelligence agencies where he worked over the past 20 years, with maybe just a small number from NSA. The still ongoing FBI investigation has to make clear whether Martin was responsible for exposing the TAO hacking tools.

If not, then there has to be yet another careless NSA employee, but then it’s also still possible that the hacking tools came from a source responsible for a range of earlier leaks. So far it seems that Martin isn’t the source of those earlier leaks, which means that the so-called “second source” is still at large.

The case of Harold Martin also made clear that security measures at NSA, and other US agencies, were not as strict and tight as outsiders would have expected: even for someone without a strong ideological or financial drive like Martin it was apparently not that difficult to regularly walk out with top secret documents.

Many things have not yet been confirmed or clarified, but at least the Shadow Brokers leak and the subsquent arrest of Harold Martin created more awareness among the American public of the fact that there have been more leaks than just those from Snowden.

In August 2014, Bruce Schneier was probably one of the first who identified a second and a third leaker besides Snowden. Many more similar leaks followed and a full listof them was compiled on this weblog in December 2015 (still being updated). As an excerpt of this listing, a short overview of the most important non-Snowden leaks was published in The New York Times last week.

UPDATE:
Shortly after this blog posting was published, The New York Times came with a new report saying that the volume of classified documents Harold Martin had in his possesion is larger than those stolen by Edward Snowden and even than those of the Panama Papers from 2015.
FBI investigators apparently also found that the TAO hacking tools were among Martin’s documents, but because he is not very cooperative, it is still not clear how they came in the hands of the mysterious Shadow Brokers, who subsequently published them. So far there’s no evidence that Martin was hacked or that he sold information.
He seems to have hoarded all these documents in order to get better at his job, as he is described as someone who imagined himself a top spy and an important player in the world of digital espionage.

On Thursday, October 20, government lawyers said they would prosecute Harold Martin under the Espionage Act because of stealing classified information. The FBI found the huge amount of 50 terabytes of data at his home, but it is not yet clear how much of that is classified. Also foundwere “hard-copy documents that were seized from various locations during the search that comprise six full bankers’ boxes worth of documents” with “Many of the documents marked ‘Secret’ and ‘Top Secret,’ also bear special handling caveats. The information stolen by the Defendant also appears to include the personal information of government employees”.

Links and Sources

– John Schindler: It’s Time to Rename NSA the National INsecurity Agency
– The Washington Post: NSA contractor thought to have taken classified material the old-fashioned way
– Daily Beast: Democrats Say WikiLeaks Is a Russian Front, U.S. Intelligence Isn’t So Sure
– Defense One: Data-Theft Arrest Shows that Insider Threat Remains Despite Post-Snowden Security Improvements
– John Schindler: Has the Russian Mole inside NSA finally been arrested?
– New York Times: N.S.A. Suspect Is a Hoarder. But a Leaker? Investigators Aren’t Sure.
– The Cipher Brief: First on The Cipher Brief: Snowden’s Boss Shares Lessons Learned

Leak Detection, Leak Down Test, Leak Down Tester, Leak Detector, Leak Definition, Leak In Spanish, Leak Detection Pump, Leak Seal, Leak Stopper, Leakforums, Leak And Sons Funeral Home, Leak Alarm, Leak Ap Gov, Leak Amniotic Fluid, Leak Alert, Leak Around Chimney, Leake And Watts, Leek And Potato Soup, Leaked Albums, Leak At Water Meter, Leak B Gone, Leak Bros, Leak Barrier, Leak Base, Leak Bali, Leak Barrier Ms300, Leak Busters, Leak Behind Shower, Leak Behind Wall, Leak Before Break, Leak Channels, Leakcanary, Leak Crossword Clue, Leak Check, Leak Channels Definition, Leak Controller, Leak Code, Leak Catcher, Leak City, Leak Ceiling, Leak Detection, Leak Down Test, Leak Down Tester, Leak Detector, Leak Definition, Leak Detection Pump, Leak Detection Equipment, Leak Doctor, Leak Definition Government, Leak Defense System, Leak Ender 2000, Leak En Espanol, Leak Eliminators, Leaked Early, Leak Electric, Leak Experts, Leak En Francais, Leak Early Album, Leak Exhaust, Leak Emoji, Leakforums, Leak Freeze, Leek Food, Leak Finders, Leak Fix, Leakfrog, Leak Fixer, Leak Fix Spray, Leaked Forms, Leak Famous.com, Leak Gopher, Leak Guard, Leak Gif, Leak Geeks, Leak Guard Protection, Leaky Gut, Leak Garbage Disposal, Leak Guardian, Leak Girl, Leak Gopher Vs Fortrezz, Leak Heart Valve, Leak House Of Cards, Leak Hunters, Leak Hack, Leak Hose, Leek Hustle, Leak House Of Cards Season 5, Leak Head Gasket, Leek Hunting, Leek Herb, Leak In Spanish, Leak In Ceiling, Leak In Roof, Leak In Radiator, Leak In Basement, Leak In Pool, Leak In Tire, Leak In Basement Wall, Leak In The Boat, Leak In Heart, Leek Jack, Leak Jones, Leak Jet, Leak Jokes, Leak Jacob, Leek Jack Campus Girl, Leek Jack Lyrics, Leak Journalism, Leak James Comey, Leek Jack Age, Leak Kingdom, Leak King, Leak Kitchen Faucet, Leek Knife, Leak Kitchen Sink, Leak Kanseng, Leak Kitchen Sink Drain, Leak Khan Bombak Sne, Leak K Channels, Leaky Kohler Faucet, Leak Lock, Leak Live, Leak Like A Siv, Leak Locators, Leak Less, Leak Like A Sieve, Leak Location Services, Leak Light, Leak Lock Sds, Leak League Of Legends, Leak Meaning, Leak Masters, Leak Memory Chapel, Leak Meme, Lake Mead, Leak Music, Leak Master Roofing, Leak Movie, Leak Memorial, Leak Meaning In Hindi, Leak No More, Leak News, Leak No More For Dogs, Leak Nutrition, Leak Near Me, Leak No More Reviews, Leak No More York Pa, Leak Near Water Meter, Leaked Nsa, Leak No Stallin, Leak Off Test, Leak Out, Leak Oil, Leak Of Information, Leek Onion, Leak On Ceiling, Leak Of Orange Is The New Black, Leak On Roof, Leak Out Meaning, Leak Or Leakage, Leak Project, Leak Proof Underwear, Leak Proof, Leak Proof Travel Bottles, Leak Proof Containers, Leek Plant, Leak Proof Tape, Leak Proof Water Bottle, Leak Proof Bag, Leak Project Youtube, Leak Quotes, Leek Quiche, Leak Quizlet, Leek Quiche Recipes, Leek Quinoa, Leek Quiche Bacon, Leek Quiche Healthy, Leek Quiche Crustless, Leek Quiche Epicurious, Leek Quiche Allrecipes, Leak Repair, Leak Repair Tape, Leak Rate Calculator, Leak Rate, Leak Reddit, Leek Recipes, Leak Rate Units, Leak Rate Conversion, Leak Repair Spray, Leak Repair Putty, Leek Soup, Leak Seal, Leak Stopper, Leak Synonym, Leak Stop, Leak Sealer, Leek Spin, Leak Seal Tape, Leak Squad, Leak Source, Leak Test, Leak Tape, Leak Tester, Leak Threads, Leak Tamer, Leak Tech, Leak Tec, Leak Tools, Leak Test Solution, Leak Tracing Powder, Leak Under Sink, Leak Under Car, Leak Urine, Leak Under Toilet, Leak Under Slab, Leak Under Bathroom Floor, Leak Under Dishwasher, Leak Under Washer, Leak Under Toilet Tank, Leak Under House, Leak Video, Leek Vegetable, Leak Valve, Leak Veggie, Leek Veggie, Leek Vs Onion, Leek Vs Scallion, Leek Vegetable Soup, Leak Vrf To Global, Leak Or Leakage, Leak Wizard, Leak Water, Leak Website, Leak Wall House Rockingham Nc, Leak Week, Leaked White House, Leaked Winner, Leak Washington Post, Leak Water Heater, Leak Wrap, Leak Xenforo, Leak Xur, Leak Xbox One, Leak Xur 3 April, Leak You, Leak Your Ex, Leak Youtube, Leak Your Number, Leak Year, Leak You Up And Down, Leak Young Og Project, Leak Leaky, Leak Make Your Future Bleak, Liveleak Youtube, Leak Zip, Leak Z10, Leak Z4, Leak Zelda, Leak Zimbabwe, Leak Zhang Ziyi, Leak Zelda Wii U, Leak Zombies, Zircon Leak Alert, Zero Leak Gold, Nsa Jobs, Nsa Director, Nsa Softball, Nsa Meaning, Nsa Careers, Nsa Definition, Nsa Headquarters, Nsa Surveillance, Nsa Spying, Nsa Internships, Nsa Acronym, Nsa Address, Nsa Advisor, Nsa Agent, Nsa Alabama, Nsa Annapolis, Nsa Agent Salary, Nsa Arc, Nsa Approved Shredders, Nsa Agreement, Nsa Building, Nsa Bahrain, Nsa Budget, Nsa Bethesda, Nsa Baseball, Nsa Badge, Nsa Benefits, Nsa Building Nyc, Nsa Budget 2016, Nsa Backdoor, Nsa Careers, Nsa Chief, Nsa Colorado, Nsa Crane, Nsa Cyber Security, Nsa Conference, Nsa Csfc, Nsa Cae, Nsa Crypto Challenge, Nsa Css, Nsa Director, Nsa Definition, Nsa Data Center, Nsa Day Of Cyber, Nsa Director Salary, Nsa Data Collection, Nsa Domestic Surveillance, Nsa Datasheet, Nsa Deputy Director, Nsa Datasheet Is Called, Nsa Employment, Nsa Edward Snowden, Nsa Exploits, Nsa Employees, Nsa Email, Nsa Evaluated Products List, Nsa Echelon, Nsa Emblem, Nsa Encryption, Nsa Eternal Blue, Nsa Fastpitch, Nsa Florida Youth, Nsa Fort Meade, Nsa Flynn, Nsa Florida, Nsa Friend, Nsa Facebook, Nsa Fort Gordon, Nsa Foia, Nsa Facts, Nsa Georgia, Nsa Glassdoor, Nsa Government, Nsa Grindr, Nsa Github, Nsa Gift Shop, Nsa Game, Nsa Grants, Nsa Gif, Nsa Guy, Nsa Headquarters, Nsa Head, Nsa Hacking Tools, Nsa Hawaii, Nsa Hampton Roads, Nsa Hacked, Nsa History, Nsa Hiring Process, Nsa Hacking Tools Leaked, Nsa Headquarters Address, Nsa Internships, Nsa Industries, Nsa Intelligence Analyst, Nsa Indiana, Nsa Influence 2017, Nsa Iad, Nsa Ias 2017, Nsa India, Nsa Illinois, Nsa Insurance, Nsa Jobs, Nsa Juice Plus, Nsa Job Openings, Nsa Jobs Utah, Nsa Jobs Salary, Nsa Jokes, Nsa Job Requirements, Nsa Jurisdiction, Nsa Jobs In Md, Nsa Japan, Nsa Keywords, Nsa Kunia, Nsa Kc, Nsa Key, Nsa Kentucky, Nsa Kmi, Nsa Kankakee, Nsa Korea, Nsa Kaspersky, Nsa Keith Alexander, Nsa Leaker, Nsa Logo, Nsa Leak, Nsa Locations, Nsa Listening, Nsa Leader, Nsa Login, Nsa Leadership, Nsa Language Analyst, Nsa Leaked Tools, Nsa Meaning, Nsa Meme, Nsa Media, Nsa Meet, Nsa Mid South, Nsa Mike Rogers, Nsa Museum, Nsa Mcmaster, Nsa Maryland, Nsa Mission Statement, Nsa News, Nsa Naples, Nsa Name Generator, Nsa North, Nsa Number, Nsa Norfolk, Nsa Nyc, Nsa Nashville, Nsa Nursing, Nsa New Orleans, Nsa Orlando, Nsa Opm Test, Nsa Online Test, Nsa Offices, Nsa Obama, Nsa Organization, Nsa Operational Interview, Nsa Only, Nsa Org Chart, Nsa Of 1947, Nsa Prism, Nsa Police, Nsa Panama City, Nsa Police Officer, Nsa Phone Number, Nsa Philadelphia, Nsa Pay Scale, Nsa Play, Nsa Polygraph, Nsa Purpose, Nsa Quantum Computer, Nsa Quotes, Nsa Qualifications, Nsa Quantum, Nsa Quizlet, Nsa Questions, Nsa Qualifier, Nsa Quantum Computer Farm, Nsa Quartet, Nsa Quiz, Nsa Rogers, Nsa Requirements, Nsa Rules, Nsa Recruiting, Nsa Relationship, Nsa Rule Book, Nsa Ransomware, Nsa Russia, Nsa Responsibilities, Nsa Reno, Nsa Softball, Nsa Surveillance, Nsa Spying, Nsa Slang, Nsa Salary, Nsa Stands For, Nsa Soccer, Nsa Softball Rules, Nsa Scholarship, Nsa Scandal, Nsa Texas, Nsa Tournaments, Nsa Tools, Nsa Trump, Nsa Tao, Nsa Tools Leaked, Nsa Twitter, Nsa Tinder, Nsa Test, Nsa Training, Nsa Utah, Nsa Urban, Nsa Usa, Nsa Utah Facility, Nsa Unmasking, Nsa Utah Jobs, Nsa Unconstitutional, Nsa Umpire, Nsa Under Obama, Nsa Uniform, Nsa Vs Cia, Nsa Visitor Center, Nsa Virginia, Nsa Vs Fbi, Nsa Vs Cia Vs Fbi, Nsa Virus, Nsa Visitor Control Center, Nsa Vpn, Nsa Vanilla, Nsa Violation Of Privacy, Nsa Wiki, Nsa Whistleblower, Nsa Washington, Nsa Wiretapping, Nsa Website, Nsa Water Filter, Nsa Watchlist, Nsa World Series, Nsa Wikileaks, Nsa Wannacry, Nsa Xkeyscore, Nsa Xbox One, Nsa Xeno World Qualifier, Nsa Xkeyscore Download, Nsa Xcode, Nsa Xbox Live, Nsa Xeno Tournament, Nsa Xkeyscore Presentation, Nsa X, Nsa X Files, Nsa Youtube, Nsa Yogurt, Nsa Young Investigator Grant, Nsa Youth Florida, Nsa Yearly Budget, Nsa Yottabyte, Nsa Youth Program, Nsa Youth, Nsa Yellow Dots, Nsa Yakima, Nsa Zero Day, Nsa Zip Code, Nsa Zeus, Nsa Zimmermann Telegram, Nsa Zimbabwe, Nsa Za, Nsa Zero Day Exploit, Nsa Zyxel, Nsa Zero Division, Nsa Zone Store

Rate this:

Share this:

  • Facebook
  • Reddit
  • Email
  • Print
  • Twitter
  • LinkedIn
  • Pinterest
  • Tumblr
  • Pocket
  • Telegram
  • WhatsApp
  • Skype

Like this:

Like Loading...
By Bernd Pulchin BERND PULCH, CRYPTOME, THE NATIONAL SECURITY AGENCY (NSA), WIKILEAKSOctober 25, 2016July 15, 20173,649 Words

Cryptome – Germany Outlaws NSA Xkeyscore, Orders Data Axed

Cryptome – Germany Outlaws NSA Xkeyscore, Orders Data Axed

https://cryptome.org/2016/09/de-nixes-xkeyscore-netzpolitik-16-0902.pdf

 

Nsa Jobs, Nsa Director, Nsa Softball, Nsa Meaning, Nsa Careers, Nsa Definition, Nsa Headquarters, Nsa Surveillance, Nsa Spying, Nsa Internships, Nsa Acronym, Nsa Address, Nsa Advisor, Nsa Agent, Nsa Alabama, Nsa Annapolis, Nsa Agent Salary, Nsa Arc, Nsa Approved Shredders, Nsa Agreement, Nsa Building, Nsa Bahrain, Nsa Budget, Nsa Bethesda, Nsa Baseball, Nsa Badge, Nsa Benefits, Nsa Building Nyc, Nsa Budget 2016, Nsa Backdoor, Nsa Careers, Nsa Chief, Nsa Colorado, Nsa Crane, Nsa Cyber Security, Nsa Conference, Nsa Csfc, Nsa Cae, Nsa Crypto Challenge, Nsa Css, Nsa Director, Nsa Definition, Nsa Data Center, Nsa Day Of Cyber, Nsa Director Salary, Nsa Data Collection, Nsa Domestic Surveillance, Nsa Datasheet, Nsa Deputy Director, Nsa Datasheet Is Called, Nsa Employment, Nsa Edward Snowden, Nsa Exploits, Nsa Employees, Nsa Email, Nsa Evaluated Products List, Nsa Echelon, Nsa Emblem, Nsa Encryption, Nsa Eternal Blue, Nsa Fastpitch, Nsa Florida Youth, Nsa Fort Meade, Nsa Flynn, Nsa Florida, Nsa Friend, Nsa Facebook, Nsa Fort Gordon, Nsa Foia, Nsa Facts, Nsa Georgia, Nsa Glassdoor, Nsa Government, Nsa Grindr, Nsa Github, Nsa Gift Shop, Nsa Game, Nsa Grants, Nsa Gif, Nsa Guy, Nsa Headquarters, Nsa Head, Nsa Hacking Tools, Nsa Hawaii, Nsa Hampton Roads, Nsa Hacked, Nsa History, Nsa Hiring Process, Nsa Hacking Tools Leaked, Nsa Headquarters Address, Nsa Internships, Nsa Industries, Nsa Intelligence Analyst, Nsa Indiana, Nsa Influence 2017, Nsa Iad, Nsa Ias 2017, Nsa India, Nsa Illinois, Nsa Insurance, Nsa Jobs, Nsa Juice Plus, Nsa Job Openings, Nsa Jobs Utah, Nsa Jobs Salary, Nsa Jokes, Nsa Job Requirements, Nsa Jurisdiction, Nsa Jobs In Md, Nsa Japan, Nsa Keywords, Nsa Kunia, Nsa Kc, Nsa Key, Nsa Kentucky, Nsa Kmi, Nsa Kankakee, Nsa Korea, Nsa Kaspersky, Nsa Keith Alexander, Nsa Leaker, Nsa Logo, Nsa Leak, Nsa Locations, Nsa Listening, Nsa Leader, Nsa Login, Nsa Leadership, Nsa Language Analyst, Nsa Leaked Tools, Nsa Meaning, Nsa Meme, Nsa Media, Nsa Meet, Nsa Mid South, Nsa Mike Rogers, Nsa Museum, Nsa Mcmaster, Nsa Maryland, Nsa Mission Statement, Nsa News, Nsa Naples, Nsa Name Generator, Nsa North, Nsa Number, Nsa Norfolk, Nsa Nyc, Nsa Nashville, Nsa Nursing, Nsa New Orleans, Nsa Orlando, Nsa Opm Test, Nsa Online Test, Nsa Offices, Nsa Obama, Nsa Organization, Nsa Operational Interview, Nsa Only, Nsa Org Chart, Nsa Of 1947, Nsa Prism, Nsa Police, Nsa Panama City, Nsa Police Officer, Nsa Phone Number, Nsa Philadelphia, Nsa Pay Scale, Nsa Play, Nsa Polygraph, Nsa Purpose, Nsa Quantum Computer, Nsa Quotes, Nsa Qualifications, Nsa Quantum, Nsa Quizlet, Nsa Questions, Nsa Qualifier, Nsa Quantum Computer Farm, Nsa Quartet, Nsa Quiz, Nsa Rogers, Nsa Requirements, Nsa Rules, Nsa Recruiting, Nsa Relationship, Nsa Rule Book, Nsa Ransomware, Nsa Russia, Nsa Responsibilities, Nsa Reno, Nsa Softball, Nsa Surveillance, Nsa Spying, Nsa Slang, Nsa Salary, Nsa Stands For, Nsa Soccer, Nsa Softball Rules, Nsa Scholarship, Nsa Scandal, Nsa Texas, Nsa Tournaments, Nsa Tools, Nsa Trump, Nsa Tao, Nsa Tools Leaked, Nsa Twitter, Nsa Tinder, Nsa Test, Nsa Training, Nsa Utah, Nsa Urban, Nsa Usa, Nsa Utah Facility, Nsa Unmasking, Nsa Utah Jobs, Nsa Unconstitutional, Nsa Umpire, Nsa Under Obama, Nsa Uniform, Nsa Vs Cia, Nsa Visitor Center, Nsa Virginia, Nsa Vs Fbi, Nsa Vs Cia Vs Fbi, Nsa Virus, Nsa Visitor Control Center, Nsa Vpn, Nsa Vanilla, Nsa Violation Of Privacy, Nsa Wiki, Nsa Whistleblower, Nsa Washington, Nsa Wiretapping, Nsa Website, Nsa Water Filter, Nsa Watchlist, Nsa World Series, Nsa Wikileaks, Nsa Wannacry, Nsa Xkeyscore, Nsa Xbox One, Nsa Xeno World Qualifier, Nsa Xkeyscore Download, Nsa Xcode, Nsa Xbox Live, Nsa Xeno Tournament, Nsa Xkeyscore Presentation, Nsa X, Nsa X Files, Nsa Youtube, Nsa Yogurt, Nsa Young Investigator Grant, Nsa Youth Florida, Nsa Yearly Budget, Nsa Yottabyte, Nsa Youth Program, Nsa Youth, Nsa Yellow Dots, Nsa Yakima, Nsa Zero Day, Nsa Zip Code, Nsa Zeus, Nsa Zimmermann Telegram, Nsa Zimbabwe, Nsa Za, Nsa Zero Day Exploit, Nsa Zyxel, Nsa Zero Division, Nsa Zone Store

Rate this:

Share this:

  • Facebook
  • Reddit
  • Email
  • Print
  • Twitter
  • LinkedIn
  • Pinterest
  • Tumblr
  • Pocket
  • Telegram
  • WhatsApp
  • Skype

Like this:

Like Loading...
By Bernd Pulchin BERND PULCH, CRYPTOME, THE NATIONAL SECURITY AGENCY (NSA)September 7, 2016July 15, 2017673 Words

Revealed – E-Mails from Inside the NSA Bureaucracy

Revealed – E-Mails from Inside the NSA Bureaucracy

Earlier this month, the NSA declassified a huge set of internal e-mails, following FOIA-requests about the issue of whether Edward Snowden had raised concerns about the NSA’s surveillance programs through proper channels inside the agency.

> Download the declassified e-mails (very large pdf)

Here, we will take a look at the administrative details these internal NSA e-mails provide. Next time we will see what their content says about the concerns that Snowden claimed to have raised.


Internal e-mail from NSA director Michael Rogers. In the signature block we see his
NSANet and SIPRNet e-mail addresses and his non-secure phone number (all redacted)
(Click to enlarge – See also: NSA director Alexander’s phones)

E-mail addresses

Except from the classification markings, the NSA’s internal e-mails aren’t very different from those exchanged by most other people around the world. But they do show for example some details about the internal communications networks of the agency.

From the signature blocks underneath the e-mails we learn that, depending on their function and tasks, NSA employees have e-mail addresses for one or more of the following four computer networks:

– NSANet for messages classified up to Top Secret/SCI (Five Eyes signals intelligence). On this network the address format for e-mail is jjdoe@nsa

– JWICS for messages classified up to Top Secret/SCI (US intelligence). The address format is jjdoe@nsa.ic.gov

– SIPRNET for messages classified up to Secret (mainly US military). The address format is jjdoe@nsa.smil.mil

– UNCL for unclassified messages, likely through NIPRNet. The address format is jjdoe@nsa.gov

> See for more: US military and intelligence computer networks

For e-mail, all NSA employees have display names in a standardized format: first comes their family name, given name and middle initial, sometimes followed by “Jr” or a high military rank. Then follows “NSA” and the proper organizational designator, then “USA” for their nationality and finally “CIV” for civilian employees, “CTR” for contractors, “USN” for Navy, “USA” for Army or “USAF” for Air Force members.

Thus, the display name of the current NSA director is “Rogers Michael S ADM NSA-D USA USN”, while that of the previous director was “Alexander Keith B GEN NSA-D USA USA”. In 2012, Snowden had the display name “Snowden Edward J NSA-FHX4 USA CTR”:


E-mail from Snowden as systems administrator in Hawaii, August 2012
The redacted part of the classification marking
seems to hide a dissemination marking *
(Click to enlarge)

The organizational designator FHX4 is interesting. FH stands for Field station Hawaii, but X4, being unit 4 of division X, is still a mystery. The field station divisions have the same designators as those at NSA headquarters, where there’s also a division X, but so far no document gave an indication what it does.

The signature block shows that Snowden worked as a systems administrator for Dell’s Advanced Solutions Group and that he was deployed at the Technology Department of NSA’s Cryptologic Center in Hawaii, more specifically at the Office of Information Sharing. The latter has the organizational designator (F)HT322 and is therefore different from that in Snowden’s display name.

> See the list of NSA’s Organizational Designators

In the declassified messages we only see display names, not the actual e-mail addresses behind them. Therefore, only the classification markings on the messages provide an indication on which network they were exchanged.

From an e-mail that was declassified earlier we know that in April 2013 Snowden used the address “ejsnowd@nsa.ic.gov”, which is the format for the JWICS network, but was apparently used on NSANet.*

From one of the declassified e-mails about NSA’s internal investigation it seems that Snowden had just two mail accounts: “we have his TS [Top Secret] NSANet email and his UNCLASSIFIED NSA.gov email”, but this is followed by some redacted lines.*

Finally, the signature blocks of some NSA employees also provide a link to their dropbox for sending them files that may be too large for e-mail. Such dropboxes have addresses like “http://urn.nsa.ic.gov/dropbox/%5B…%5D”.


Example of an NSA message, with in the signature block e-mail addresses for JWICS and an
unclassified network, and phone numbers for the NSTS and the non-secure phone networks
OPS 2B is the wider and lower one of the two black NSA headquarters buildings
(Click to enlarge)

Telephone numbers

Besides e-mail addresses, many messages also have phone numbers in the signature blocks. They show numbers for one or more of the telephone systems used at NSA:

– NSTS, which stands for National Secure Telephone System and is NSA’s internal telephone network for secure calls. Numbers for this network have the format 969-8765 and are often marked with “(s)” for “secure”

– STE, which stands for Secure Terminal Equipment, being a telephone device capable of encrypting phone calls on its own. Telephone numbers can be written in the format (301) 234-5678 or as STE 9876.

– BLACK, CMCL or Commercial, which are numbers for non-secure telephones that may also access the public telephone network. They have the regular format (301) 234-5678 and are often marked with “(b)” for “black” (as opposed to “red”) or with “(u)” for unclassified.


The NSA/CSS Threat Operations Center (NTOC) at NSA headquarters, with from left to right:
an STE secure phone, a probably non-secure telephone and a phone for the NSTS
(Photo: NSA, 2012 – Click to enlarge)

TIKICUBE

Finally, releasing such a huge set of documents in which many parts had to be redacted always bears the risk that something is overlooked. That also happened this time, as in one e-mail from an investigator from NSA’s Counterintelligence Investigations unit Q311 they forgot to redact the codeword TIKICUBE:

TIKICUBE appears to be a unit of the Investigations Division Q3. Whether this might be a special unit investigating the Snowden leak isn’t clear though.

The abbreviations behind the investigators name are: CFE for Certified Fraud Examiner and CISSP for Certified Information Systems Security Professional.

We also see that this investigation division is not located at the NSA headquarters complex at Fort Meade, but at FANX. This stands for Friendship Annex, a complex of NSA office buildings in Linthicum, near Baltimore, some 12 km. or 7.5 miles north-east of Fort Meade.

The famous blue-black glass headquarters buildings are OPS 2A and OPS 2B, while the SIGINT division is apparently in the flat 3-story building from the late 1950s, designated OPS 1.

 

Nsa Jobs, Nsa Director, Nsa Softball, Nsa Meaning, Nsa Careers, Nsa Definition, Nsa Headquarters, Nsa Surveillance, Nsa Spying, Nsa Internships, Nsa Acronym, Nsa Address, Nsa Advisor, Nsa Agent, Nsa Alabama, Nsa Annapolis, Nsa Agent Salary, Nsa Arc, Nsa Approved Shredders, Nsa Agreement, Nsa Building, Nsa Bahrain, Nsa Budget, Nsa Bethesda, Nsa Baseball, Nsa Badge, Nsa Benefits, Nsa Building Nyc, Nsa Budget 2016, Nsa Backdoor, Nsa Careers, Nsa Chief, Nsa Colorado, Nsa Crane, Nsa Cyber Security, Nsa Conference, Nsa Csfc, Nsa Cae, Nsa Crypto Challenge, Nsa Css, Nsa Director, Nsa Definition, Nsa Data Center, Nsa Day Of Cyber, Nsa Director Salary, Nsa Data Collection, Nsa Domestic Surveillance, Nsa Datasheet, Nsa Deputy Director, Nsa Datasheet Is Called, Nsa Employment, Nsa Edward Snowden, Nsa Exploits, Nsa Employees, Nsa Email, Nsa Evaluated Products List, Nsa Echelon, Nsa Emblem, Nsa Encryption, Nsa Eternal Blue, Nsa Fastpitch, Nsa Florida Youth, Nsa Fort Meade, Nsa Flynn, Nsa Florida, Nsa Friend, Nsa Facebook, Nsa Fort Gordon, Nsa Foia, Nsa Facts, Nsa Georgia, Nsa Glassdoor, Nsa Government, Nsa Grindr, Nsa Github, Nsa Gift Shop, Nsa Game, Nsa Grants, Nsa Gif, Nsa Guy, Nsa Headquarters, Nsa Head, Nsa Hacking Tools, Nsa Hawaii, Nsa Hampton Roads, Nsa Hacked, Nsa History, Nsa Hiring Process, Nsa Hacking Tools Leaked, Nsa Headquarters Address, Nsa Internships, Nsa Industries, Nsa Intelligence Analyst, Nsa Indiana, Nsa Influence 2017, Nsa Iad, Nsa Ias 2017, Nsa India, Nsa Illinois, Nsa Insurance, Nsa Jobs, Nsa Juice Plus, Nsa Job Openings, Nsa Jobs Utah, Nsa Jobs Salary, Nsa Jokes, Nsa Job Requirements, Nsa Jurisdiction, Nsa Jobs In Md, Nsa Japan, Nsa Keywords, Nsa Kunia, Nsa Kc, Nsa Key, Nsa Kentucky, Nsa Kmi, Nsa Kankakee, Nsa Korea, Nsa Kaspersky, Nsa Keith Alexander, Nsa Leaker, Nsa Logo, Nsa Leak, Nsa Locations, Nsa Listening, Nsa Leader, Nsa Login, Nsa Leadership, Nsa Language Analyst, Nsa Leaked Tools, Nsa Meaning, Nsa Meme, Nsa Media, Nsa Meet, Nsa Mid South, Nsa Mike Rogers, Nsa Museum, Nsa Mcmaster, Nsa Maryland, Nsa Mission Statement, Nsa News, Nsa Naples, Nsa Name Generator, Nsa North, Nsa Number, Nsa Norfolk, Nsa Nyc, Nsa Nashville, Nsa Nursing, Nsa New Orleans, Nsa Orlando, Nsa Opm Test, Nsa Online Test, Nsa Offices, Nsa Obama, Nsa Organization, Nsa Operational Interview, Nsa Only, Nsa Org Chart, Nsa Of 1947, Nsa Prism, Nsa Police, Nsa Panama City, Nsa Police Officer, Nsa Phone Number, Nsa Philadelphia, Nsa Pay Scale, Nsa Play, Nsa Polygraph, Nsa Purpose, Nsa Quantum Computer, Nsa Quotes, Nsa Qualifications, Nsa Quantum, Nsa Quizlet, Nsa Questions, Nsa Qualifier, Nsa Quantum Computer Farm, Nsa Quartet, Nsa Quiz, Nsa Rogers, Nsa Requirements, Nsa Rules, Nsa Recruiting, Nsa Relationship, Nsa Rule Book, Nsa Ransomware, Nsa Russia, Nsa Responsibilities, Nsa Reno, Nsa Softball, Nsa Surveillance, Nsa Spying, Nsa Slang, Nsa Salary, Nsa Stands For, Nsa Soccer, Nsa Softball Rules, Nsa Scholarship, Nsa Scandal, Nsa Texas, Nsa Tournaments, Nsa Tools, Nsa Trump, Nsa Tao, Nsa Tools Leaked, Nsa Twitter, Nsa Tinder, Nsa Test, Nsa Training, Nsa Utah, Nsa Urban, Nsa Usa, Nsa Utah Facility, Nsa Unmasking, Nsa Utah Jobs, Nsa Unconstitutional, Nsa Umpire, Nsa Under Obama, Nsa Uniform, Nsa Vs Cia, Nsa Visitor Center, Nsa Virginia, Nsa Vs Fbi, Nsa Vs Cia Vs Fbi, Nsa Virus, Nsa Visitor Control Center, Nsa Vpn, Nsa Vanilla, Nsa Violation Of Privacy, Nsa Wiki, Nsa Whistleblower, Nsa Washington, Nsa Wiretapping, Nsa Website, Nsa Water Filter, Nsa Watchlist, Nsa World Series, Nsa Wikileaks, Nsa Wannacry, Nsa Xkeyscore, Nsa Xbox One, Nsa Xeno World Qualifier, Nsa Xkeyscore Download, Nsa Xcode, Nsa Xbox Live, Nsa Xeno Tournament, Nsa Xkeyscore Presentation, Nsa X, Nsa X Files, Nsa Youtube, Nsa Yogurt, Nsa Young Investigator Grant, Nsa Youth Florida, Nsa Yearly Budget, Nsa Yottabyte, Nsa Youth Program, Nsa Youth, Nsa Yellow Dots, Nsa Yakima, Nsa Zero Day, Nsa Zip Code, Nsa Zeus, Nsa Zimmermann Telegram, Nsa Zimbabwe, Nsa Za, Nsa Zero Day Exploit, Nsa Zyxel, Nsa Zero Division, Nsa Zone Store

Rate this:

Share this:

  • Facebook
  • Reddit
  • Email
  • Print
  • Twitter
  • LinkedIn
  • Pinterest
  • Tumblr
  • Pocket
  • Telegram
  • WhatsApp
  • Skype

Like this:

Like Loading...
By Bernd Pulchin BERND PULCH, CONFIDENTIAL, TOP-SECRETAugust 22, 2016July 16, 20171,722 Words

NSA – Is the Shadow Brokers leak the latest in a series ?

NSA – Is the Shadow Brokers leak the latest in a series ?

Earlier this week, a group or an individual called the Shadow Brokers published a large set of files containing the computer code for hacking tools. They were said to be from the Equation Group, which is considered part of the NSA’s hacking division TAO.

The leak got quite some media attention, but so far it was not related to some earlier leaks of highly sensitive NSA documents. These show interesting similarities with the Shadow Brokers files, which were also not attributed to Edward Snowden, but seem to come from an unknown second source.

Screenshot of some computer code with instructions
from the Shadow Brokers archive

The Shadow Brokers files

Since August 13, the ShadowBrokers posted a manifesto and two large encrypted files on Pastebin, on GitHub, on Tumblr and on DropBox (the latter three closed or deleted meanwhile).

One of the encrypted files could be decrypted into a 301 MB archive containing a large number of computer codes for server side utility scripts and exploits for a variety of targets like firewalls from Cisco, Fortinet and Shaanxi. The files also include different versions of several implants and instructions on how to use them, so they’re not only the malware that could have been found on the internet, but also files that were only used internally.

A full list of the exploits in this Shadow Brokers archive can be found here.

https://musalbas.com/2016/08/16/equation-group-firewall-operations-catalogue.html

Security experts as well as former NSA employees considered the files to be authentic, and earlier today the website The Intercept came with some unpublished Snowden documents that confirm the Shadow Brokers files are real.

Besides the accessible archive, Shadow Brokers also posted a file that is still encrypted, and for which the key would only be provided to the highest bidder in an auction. Would the auction raise 1 million bitcoins (more than 500 million US dollars), then Shadow Brokers said they would release more files to the public. This auction however is likely just meant to attract attention.

Screenshot of a file tree from the Shadow Brokers archive

From the Snowden documents?

According to security experts Bruce Schneier and Nicholas Weaver the new files aren’t from the Snowden trove. Like most people, they apparently assume that Snowden took mostly powerpoint presentations and internal reports and newsletters, but that’s not the whole picture. The Snowden documents also include various kinds of operational data, but this rarely became public.

Most notable was a large set of raw communications content collected by NSA under FISA and FAA authority, which also included incidentally collected data from Americans, as was reported by The Washington Post on July 5, 2014. The Snowden documents also include technical reports, which are often very difficult to understand and rarely provide a newsworthy story on their own.

Someone reminded me as well that in January 2015, the German magazine Der Spiegel published the full computer code of a keylogger implant codenamed QWERTY, which was a component of the NSA’s WARRIORPRIDE malware framework. So with the Snowden trove containing this one piece of computer code, there’s no reason why it should not contain more.

Contradicting the option that the Shadow Brokers files could come from Snowden is the fact that some of the files have timestamps as late as October 18, 2013, which is five months after Snowden left NSA. Timestamps are easy to modify, but if they are authentic, then these files have to be from another source.

A second source?

This brings us to a number of leaks that occured in recent years and which were also not attributed to Snowden. These leaks involved highly sensitive NSA files and were often more embarrassing than stuff from the Snowden documents – for example the catalog of hacking tools and techniques, the fact that chancellor Merkel was targeted and intelligence reports proving that NSA was actually successful at that.

> See Leaked documents that were not attributed to Snowden

It is assumed that these and some other documents came from at least one other leaker, a “second source” besides Snowden, which is something that still not many people are aware of. The files that can be attributed to this second source have some interesting similarities with the Shadow Brokers leak. Like the ANT catalog published in December 2013, they are about hacking tools and like the XKEYSCORE rules published in 2014 and 2015 they are internal NSA computer code.

This alone doesn’t say much, but it’s the choice of the kind of files that makes these leaks look very similar: no fancy presentations, but plain technical data sets that make it possible to identify specific operations and individual targets – the kind of documents many people are most eager to see, but which were rarely provided through the Snowden reporting.

As mainstream media became more cautious in publishing such files, it is possible that someone who also had access to the Snowden cache went rogue and started leaking documents just for harming NSA and the US – without attributing these leaks to Snowden because he would probably not approve them, and also to suggest that more people followed Snowden’s example.

Of course the Shadow Brokers leak can still be unrelated to the earlier ones. In that case it could have been that an NSA hacker mistakenly uploaded his whole toolkit to a server outside the NSA’s secure networks (also called a “staging server” or “redirector” to mask his true location) and that someone was able to grab the files from there – an option Snowden also seems to favor.

Diagram showing the various stages and networks involved
in botnet hacking operations by NSA’s TAO division

An insider?

Meanwhile, several former NSA employees have said that the current Shadow Brokers leak might not be the result of a hack from the outside, but that it’s more likely that the files come from an insider, who stole them like Snowden did earlier.

Of course it’s easier for an insider to grab these files than for a foreign intelligence agency, let alone an ordinary hacker, to steal them from the outside. But if that’s the case, it would mean that this insider would still be able to exfiltrate files from NSA premises (something that shouldn’t be possible anymore after Snowden), and that this insider has the intent to embarrass and harm the NSA (Snowden at least said he just wanted to expose serious wrongdoings).

Here we should keep in mind that such an insider is not necessarily just a frustrated individual, but can also be a mole from a hostile foreign intelligence agency.

Russian intelligence?

On Twitter, Edward Snowden said that “Circumstantial evidence and conventional wisdom indicates Russian responsibility”, but it’s not clear what that evidence should be. It seems he sees this leak as a kind of warning from the Russians not to take revenge for the hack of the Democratic National Committee (DNC) e-mails, which was attributed to Russian intelligence.

This was also what led Bruce Schneier to think it might be the Russians, because who other than a state actor would steal so much data and wait three years before publishing? Not mentioned by Schneier is that this also applies to the documents that can be attributed to the second source: they are also from before June 2013.

A related point of speculation is the text that accompanied the Shadow Brokers files, which is in bad English, as if it was written by a Russian or some other non-western individual. This is probably distraction, as it looks much more like a fluent American/English speaker who tried to imitate unexperienced English.

The text also holds accusations against “Elites”, in a style which very much resembles the language used by anarchist hacker groups, but that can also be faked to distract from the real source.

Screenshot of some file folders from the Shadow Brokers archive

Conclusion

With the authenticity of the Shadow Brokers files being confirmed, the biggest question is: who leaked them? There’s a small chance that it was a stupid accident in which an NSA hacker uploaded his whole toolkit to a non-secure server and someone (Russians?) found it there.

Somewhat more likely seems the option that they came from an insider, and in that case, this leak doesn’t stand alone, but fits into a series of leaks in which, since October 2013, highly sensitive NSA data sets were published.

So almost unnoticed by the mainstream media and the general public, someone was piggybacking on the Snowden-revelations with leaks that were often more embarrassing for NSA than many reportings based upon the documents from Snowden.

Again, obtaining such documents through hacking into highly secured NSA servers seems less likely than the chance that someone from inside the agency took them. If that person was Edward Snowden, then probably someone with access to his documents could have started his own crusade against NSA.

If that person wasn’t Snowden, then it’s either another NSA employee who was disgruntled and frustrated, or a mole for a hostile foreign intelligence agency. For an individual without the protection of the public opinion like Snowden, it must be much harder and riskier to conduct these leaks than for a foreign state actor.

Former NSA counterintelligence officer John Schindler also thinks there could have been a (Russian) mole, as the agency has a rather bad track record in finding such spies. If this scenario is true, then it would be almost an even bigger scandal than that of the Snowden-leaks.

Update:
On August 21, NSA expert James Bamford also confirmed that TAO’s ANT catalog wasn’t included in the Snowden documents (Snowden didn’t want to talk about it publicly though). Bamford favors the option of a second insider, who may have leaked the documents through Jacob Appelbaum and Julian Assange.

Nsa Jobs, Nsa Director, Nsa Softball, Nsa Meaning, Nsa Careers, Nsa Definition, Nsa Headquarters, Nsa Surveillance, Nsa Spying, Nsa Internships, Nsa Acronym, Nsa Address, Nsa Advisor, Nsa Agent, Nsa Alabama, Nsa Annapolis, Nsa Agent Salary, Nsa Arc, Nsa Approved Shredders, Nsa Agreement, Nsa Building, Nsa Bahrain, Nsa Budget, Nsa Bethesda, Nsa Baseball, Nsa Badge, Nsa Benefits, Nsa Building Nyc, Nsa Budget 2016, Nsa Backdoor, Nsa Careers, Nsa Chief, Nsa Colorado, Nsa Crane, Nsa Cyber Security, Nsa Conference, Nsa Csfc, Nsa Cae, Nsa Crypto Challenge, Nsa Css, Nsa Director, Nsa Definition, Nsa Data Center, Nsa Day Of Cyber, Nsa Director Salary, Nsa Data Collection, Nsa Domestic Surveillance, Nsa Datasheet, Nsa Deputy Director, Nsa Datasheet Is Called, Nsa Employment, Nsa Edward Snowden, Nsa Exploits, Nsa Employees, Nsa Email, Nsa Evaluated Products List, Nsa Echelon, Nsa Emblem, Nsa Encryption, Nsa Eternal Blue, Nsa Fastpitch, Nsa Florida Youth, Nsa Fort Meade, Nsa Flynn, Nsa Florida, Nsa Friend, Nsa Facebook, Nsa Fort Gordon, Nsa Foia, Nsa Facts, Nsa Georgia, Nsa Glassdoor, Nsa Government, Nsa Grindr, Nsa Github, Nsa Gift Shop, Nsa Game, Nsa Grants, Nsa Gif, Nsa Guy, Nsa Headquarters, Nsa Head, Nsa Hacking Tools, Nsa Hawaii, Nsa Hampton Roads, Nsa Hacked, Nsa History, Nsa Hiring Process, Nsa Hacking Tools Leaked, Nsa Headquarters Address, Nsa Internships, Nsa Industries, Nsa Intelligence Analyst, Nsa Indiana, Nsa Influence 2017, Nsa Iad, Nsa Ias 2017, Nsa India, Nsa Illinois, Nsa Insurance, Nsa Jobs, Nsa Juice Plus, Nsa Job Openings, Nsa Jobs Utah, Nsa Jobs Salary, Nsa Jokes, Nsa Job Requirements, Nsa Jurisdiction, Nsa Jobs In Md, Nsa Japan, Nsa Keywords, Nsa Kunia, Nsa Kc, Nsa Key, Nsa Kentucky, Nsa Kmi, Nsa Kankakee, Nsa Korea, Nsa Kaspersky, Nsa Keith Alexander, Nsa Leaker, Nsa Logo, Nsa Leak, Nsa Locations, Nsa Listening, Nsa Leader, Nsa Login, Nsa Leadership, Nsa Language Analyst, Nsa Leaked Tools, Nsa Meaning, Nsa Meme, Nsa Media, Nsa Meet, Nsa Mid South, Nsa Mike Rogers, Nsa Museum, Nsa Mcmaster, Nsa Maryland, Nsa Mission Statement, Nsa News, Nsa Naples, Nsa Name Generator, Nsa North, Nsa Number, Nsa Norfolk, Nsa Nyc, Nsa Nashville, Nsa Nursing, Nsa New Orleans, Nsa Orlando, Nsa Opm Test, Nsa Online Test, Nsa Offices, Nsa Obama, Nsa Organization, Nsa Operational Interview, Nsa Only, Nsa Org Chart, Nsa Of 1947, Nsa Prism, Nsa Police, Nsa Panama City, Nsa Police Officer, Nsa Phone Number, Nsa Philadelphia, Nsa Pay Scale, Nsa Play, Nsa Polygraph, Nsa Purpose, Nsa Quantum Computer, Nsa Quotes, Nsa Qualifications, Nsa Quantum, Nsa Quizlet, Nsa Questions, Nsa Qualifier, Nsa Quantum Computer Farm, Nsa Quartet, Nsa Quiz, Nsa Rogers, Nsa Requirements, Nsa Rules, Nsa Recruiting, Nsa Relationship, Nsa Rule Book, Nsa Ransomware, Nsa Russia, Nsa Responsibilities, Nsa Reno, Nsa Softball, Nsa Surveillance, Nsa Spying, Nsa Slang, Nsa Salary, Nsa Stands For, Nsa Soccer, Nsa Softball Rules, Nsa Scholarship, Nsa Scandal, Nsa Texas, Nsa Tournaments, Nsa Tools, Nsa Trump, Nsa Tao, Nsa Tools Leaked, Nsa Twitter, Nsa Tinder, Nsa Test, Nsa Training, Nsa Utah, Nsa Urban, Nsa Usa, Nsa Utah Facility, Nsa Unmasking, Nsa Utah Jobs, Nsa Unconstitutional, Nsa Umpire, Nsa Under Obama, Nsa Uniform, Nsa Vs Cia, Nsa Visitor Center, Nsa Virginia, Nsa Vs Fbi, Nsa Vs Cia Vs Fbi, Nsa Virus, Nsa Visitor Control Center, Nsa Vpn, Nsa Vanilla, Nsa Violation Of Privacy, Nsa Wiki, Nsa Whistleblower, Nsa Washington, Nsa Wiretapping, Nsa Website, Nsa Water Filter, Nsa Watchlist, Nsa World Series, Nsa Wikileaks, Nsa Wannacry, Nsa Xkeyscore, Nsa Xbox One, Nsa Xeno World Qualifier, Nsa Xkeyscore Download, Nsa Xcode, Nsa Xbox Live, Nsa Xeno Tournament, Nsa Xkeyscore Presentation, Nsa X, Nsa X Files, Nsa Youtube, Nsa Yogurt, Nsa Young Investigator Grant, Nsa Youth Florida, Nsa Yearly Budget, Nsa Yottabyte, Nsa Youth Program, Nsa Youth, Nsa Yellow Dots, Nsa Yakima, Nsa Zero Day, Nsa Zip Code, Nsa Zeus, Nsa Zimmermann Telegram, Nsa Zimbabwe, Nsa Za, Nsa Zero Day Exploit, Nsa Zyxel, Nsa Zero Division, Nsa Zone Store, Shadow Broker Dlc, Shadow Broker Mass Effect, Shadow Broker Vulnerability, Shadow Broker Nsa, Shadow Broker Dossiers, Shadow Broker Mass Effect 2, Shadow Broker Download, Shadow Broker Ship, Shadow Broker Tools, Shadow Brokers Leak, Shadow Broker Attack, Shadow Broker Andromeda, Shadow Broker Achievements, Shadow Broker After Beating Game, Shadow Broker Agent, Shadow Broker Adalah, Shadow Broker Analysis, Shadow Broker Agent Mass Effect 2, Shadow Broker Arrested, Shadow Broker Archive, Shadow Broker Base, Shadow Broker Base Investment Opportunities, Shadow Broker Book, Shadow Broker Boss Fight, Shadow Broker Before Or After, Shadow Broker Bug, Shadow Broker Base Model, Shadow Brokers Bbc, Shadow Broker Blog, Shadow Broker Base Video Archive, Shadow Broker Crash, Shadow Broker Cve, Shadow Broker Cisco, Shadow Broker Cyber Attack, Shadow Broker Cerberus, Shadow Broker Cyber Threat, Shadow Broker Comments, Shadow Broker Cyber Security, Shadow Broker Comments Squadmates, Shadow Broker Companion Comments, Shadow Broker Dlc, Shadow Broker Dossiers, Shadow Broker Download, Shadow Broker Definition, Shadow Brokers Dump, Shadow Broker Dlc Crash, Shadow Broker Dlc Review, Shadow Broker Dlc Ps3, Shadow Broker Dlc Glitch, Shadow Broker Dlc Cost, Shadow Broker Exploits, Shadow Broker Eternal Blue, Shadow Broker Exploit List, Shadow Broker Equation Group, Shadow Broker Eternal Champion, Shadow Broker Exploits Download, Shadow Broker Effects On Mass Effect 3, Shadow Broker Ending, Shadow Broker Mass Effect 2, Shadow Broker Mass Effect, Shadow Broker Files, Shadow Broker Fight, Shadow Broker Fuzzbunch, Shadow Broker Files Garrus, Shadow Broker Framework, Shadow Broker Fb.py, Shadow Broker Facebook, Shadow Broker Forces Mass Effect 3, Shadow Broker Free Download, Shadow Broker Files Legion, Shadow Broker Github, Shadow Broker Group, Shadow Broker Garrus, Shadow Broker Grunt, Shadow Broker Glitch, Shadow Broker Guide, Shadow Broker Dlc Glitch, Shadow Broker Mission Glitch, Shadow Broker After Beating Game, Cz Shadow Gunbroker, Shadow Broker Hack, Shadow Broker Hackers, Shadow Broker Hack Nsa, Shadow Broker Hug Liara, Shadow Broker Hack Terminals, Shadow Broker Hatch, Shadow Broker Dlc How To Start, Lair Of The Shadow Broker How To Start, Lair Of The Shadow Broker How Long, Lair Of The Shadow Broker Hours, Shadow Broker Investments, Shadow Broker Identity, Shadow Broker Information Terminals, Shadow Broker Pc, Shadow Broker Insanity, Shadow Broker Intel, Shadow Broker Illusive Man, Shadow Broker Ilium, Shadow Broker In Underworld Empire, Giving Shadow Broker Info Cerberus, Shadow Brokers June, Shadow Brokers Juniper, Shadow Brokers July, Shadow Brokers June Dump, Shadow Brokers January, Shadow Brokers June Release, Shadow Brokers June 2017, Shadow Brokers Join, Shadow Broker Jack, Shadow Broker Jak Zainstalowa\u0107, Shadow Broker Kb, Shadow Broker Kahoku, Shadow Broker Keeps Crashing, Liara Shadow Broker Kiss, Shadow Broker Who To Kill, Kasumi Shadow Broker Dossier, Lair Of The Shadow Broker Key, Lair Of The Shadow Broker Keygen, Shadow Broker Leaks, Shadow Broker Liara, Shadow Broker Legion, Shadow Broker Logs, Shadow Brokers Lost In Translation, Shadow Brokers Linux, Shadow Broker List, Shadow Brokers Leak Download, Shadow Brokers Letter To Trump, Shadow Brokers List Of Exploits, Shadow Broker Mass Effect, Shadow Broker Mass Effect 2, Shadow Broker Mass Effect 1, Shadow Broker Malware, Shadow Broker Meaning, Shadow Broker Microsoft, Shadow Broker Microsoft Patch, Shadow Broker Ms17-010, Shadow Broker Morinth, Shadow Broker Model Ship, Shadow Broker Nsa, Shadow Broker News, Shadow Brokers Nsa Tools, Shadow Brokers Nsa Tools Download, Shadow Brokers Nsa Hack, Shadow Brokers Nsa Leaks, Shadow Brokers Nsa Hacking Tools, Shadow Brokers North Korea, Shadow Brokers New Release, Shadow Brokers Nytimes, Shadow Broker Observer, Shadow Broker Oracle, Shadow Broker Oddjob, Shadow Broker Ost, Shadow Broker Investment Opportunities, Shadow Broker Before Or After, Shadow Broker Comments On Squad, Shadow Broker Effects On Mass Effect 3, Shadow Broker Door Wont Open, Origin Shadow Broker, Shadow Broker Patch, Shadow Broker Password, Shadow Broker Paragon Interrupt, Shadow Broker Planet, Shadow Broker Ps3, Shadow Broker Paragon, Shadow Broker Parking Lot, Shadow Broker Dlc Price, Shadow Broker Data Points, Liara Shadow Broker Paragon Interrupt, Shadow Broker Quotes, Shadow Broker Quest, Liara Shadow Broker Quest, Mass Effect Shadow Broker Quotes, Lair Of The Shadow Broker Quotes, Mass Effect 2 Shadow Broker Quotes, Shadow Broker Release, Shadow Broker Race, Shadow Broker Rdp, Shadow Broker Rdp Exploit, Shadow Broker Romance, Shadow Broker Reddit, Shadow Broker Ransomware, Shadow Broker Romance Liara, Shadow Broker Review, Shadow Broker Rapid7, Shadow Broker Ship, Shadow Broker Smb, Shadow Broker Species, Shadow Broker Smb Exploit, Shadow Broker Solaris, Shadow Broker Subscription, Shadow Broker Smb Vulnerability, Shadow Broker Ship Model, Shadow Broker Support Team, Shadow Broker Squad, Shadow Broker Tools, Shadow Broker Twitter, Shadow Broker Terminals, Shadow Broker Tool Dump, Shadow Broker Tali, Shadow Broker Tools Download, Shadow Broker Timeline, Shadow Broker Threat, Shadow Broker Toolkit, Shadow Broker Tutorial, Shadow Broker Unique Dialogue, Shadow Broker Upgrades, Shadow Broker Update, Shadow Broker Underworld Empire, Shadow Broker Upgrades Mass Effect 3, Shadow Broker Dlc Upgrades, Lair Of The Shadow Broker Unique Dialogue, Shadow Broker Dlc Not Showing Up, Underworld Shadow Broker, Lair Of The Shadow Broker Upgrade Locations, Shadow Broker Vulnerability, Shadow Broker Video Archive, Shadow Broker Virus, Shadow Broker Vs Illusive Man, Shadow Broker Voice, Shadow Broker Vasir, Shadow Broker Base Videos, Lair Of The Shadow Broker Vasir Bug, Shadow Broker Windows, Shadow Broker Wiki, Shadow Broker Wannacry, Shadow Broker Wikileaks, Shadow Broker Walkthrough, Shadow Broker Wet Squad, Shadow Broker Website, Shadow Broker Windows 2003, Shadow Broker Windows Exploit, Shadow Broker Windows 10, Shadow Broker Dlc Xbox, Lair Of The Shadow Broker Xbox 360, Shadow Broker Yahg, Shadow Broker Youtube, Shadow Broker Zero Day, Shadow Broker Zcash, Shadow Broker Zaeed, Shadow Broker Jak Zainstalowa\u0107

Rate this:

Share this:

  • Facebook
  • Reddit
  • Email
  • Print
  • Twitter
  • LinkedIn
  • Pinterest
  • Tumblr
  • Pocket
  • Telegram
  • WhatsApp
  • Skype

Like this:

Like Loading...
By Bernd Pulchin BERND PULCH, CRYPTOME, TOP-SECRETAugust 22, 2016July 16, 20173,170 Words

Posts navigation

Older posts
BERNDPULCH.ORG – BERND-PULCH.ORG – Stasi Liste, KGB Liste, Stasi List, KGB List
loading Cancel
Post was not sent - check your email addresses!
Email check failed, please try again
Sorry, your blog cannot share posts by email.
Cancel
%d bloggers like this: