Fourteen Eyes Global Mass Surveillance - Protect Yourself

NSA logo



Global Mass Surveillance 






- The Fourteen Eyes

The UKUSA Agreement is an agreement between the United Kingdom, United States, Australia, Canada, and New Zealand to cooperatively collect, analyze, and share intelligence. Members of this group, known as the Five Eyes, focus on gathering and analyzing intelligence from different parts of the world. While Five Eyes countries have agreed to not spy on each other as adversaries, leaks by Snowden have revealed that some Five Eyes members monitor each other's citizens and share intelligence to avoid breaking domestic laws that prohibit them from spying on their own citizens. The Five Eyes alliance also cooperates with groups of third-party countries to share intelligence (forming the Nine Eyes and Fourteen Eyes), however Five Eyes and third-party countries can and do spy on each other.
During the 2013 NSA leaks
Internet spying scandal, the surveillance agencies of the "Five Eyes"
have been accused of intentionally spying on one another's citizens and
willingly sharing the collected information with each other, allegedly
circumventing laws preventing each agency from spying on its own
citizens.

The 2013 NSA leaks are not entirely new, but rather, they are a
confirmation of earlier disclosures about the UK-US espionage alliance.
For example, the British newspaper The Independent reported back in 1996 that the U.S. National Security Agency "taps UK phones" at the request of the British intelligence agency MI5, thus allowing British agents to evade restrictive limitations on domestic telephone tapping.

The mutual surveillance and sharing of information between allies of the UK and US resurfaced again during the 2013 mass surveillance disclosures. As described by the news magazine Der Spiegel, this was done to circumvent domestic surveillance regulations:
Britain's GCHQ intelligence agency can spy on anyone but
British nationals, the NSA can conduct surveillance on anyone but
Americans, and Germany's BND (Bundesnachrichtendienst)
foreign intelligence agency can spy on anyone but Germans. That's how a
matrix is created of boundless surveillance in which each partner aids
in a division of roles.
They exchanged information. And they worked together extensively. That
applies to the British and the Americans, but also to the BND, which
assists the NSA in its Internet surveillance
According to The Guardian, the "Five Eyes" community is an exclusive club where new members "do not seem to be welcome":
It does not matter how senior you are, and how close a friend you think you are to Washington or London, your communications could easily be being shared among the handful of white, English-speaking nations with membership privileges.
In 2013, Canadian federal judge Richard Mosley strongly rebuked the Canadian Security Intelligence Service (CSIS)
for outsourcing its surveillance of Canadians to overseas partner
agencies. A 51-page ruling says that the CSIS and other Canadian federal
agencies are illegally enlisting U.S. and British allies in global surveillance dragnets, while keeping domestic federal courts in the dark.






Who is required to hand over the encryption keys to authorities?

Mandatory key disclosure laws require individuals to turn over encryption keys to law enforcement conducting a criminal investigation. How these laws are implemented (who may be legally compelled to assist) vary from nation to nation, but a warrant is generally required. Defenses against key disclosure laws include steganography and encrypting data in a way that provides plausible deniability.

Steganography involves hiding sensitive information (which may be encrypted) inside of ordinary data (for example, encrypting an image file and then hiding it in an audio file). With plausible deniability, data is encrypted in a way that prevents an adversary from being able to prove that the information they are after exists (for example, one password may decrypt benign data and another password, used on the same file, could decrypt sensitive data).










* (people who know how to access a system may be ordered to share their knowledge, however, this doesn't apply to the suspect itself or family members.)


Surveillance Self-Defense

Tips, Tools and How-tos for Safer Online Communications

 

 VPN providers with extra layers of privacy

All providers listed here are outside the US, use encryption, accept Bitcoin, support OpenVPN and have a no logging policy.

ProtonVPNFreeYes325 SwitzerlandProtonVPN.com
hide.meFreeYes160+ Malaysiahide.me
FrootVPN$ 35.88No27 SwedenFrootVPN.com
VPN.ht$ 39.99No128 Hong KongVPN.ht
Trust.Zone$ 39.95Yes164 SeychellesTrust.Zone
Proxy.sh$ 40No300+ SeychellesProxy.sh
VPNTunnel35.88 €No800+ SeychellesVPNTunnel.com
AzireVPN45 €Yes22 SwedenAzireVPN.com
Cryptostorm$ 52Yes28 IcelandCryptostorm.is
blackVPN49 €Yes31 Hong KongblackVPN.com
VPNArea$ 59Yes204 BulgariaVPNArea.com
AirVPN54 €Yes162 ItalyAirVPN.org
Mullvad60 €Yes281 SwedenMullvad.net
NordVPN$ 83.88Yes5200+ PanamaNordVPN.com
OVPN.com84 €Yes67 SwedenOVPN.com
IVPN$ 100Yes38 GibraltarIVPN.net
ExpressVPN$ 99.95 Yes148 British Virgin IslandsExpressVPN.com
Perfect Privacy119.99 €No54 SwitzerlandPerfect-Privacy.com

 

Why is it not recommended to choose a US-based service?

Services based in the United States are not recommended because of the country's surveillance programs, use of National Security Letters
(NSLs) and accompanying gag orders, which forbid the recipient from
talking about the request. This combination allows the government to secretly force companies to grant complete access to customer data and transform the service into a tool of mass surveillance.

An example of this is Lavabit – a discontinued secure email service created by Ladar Levison. The FBI requested
Snowden's records after finding out that he used the service. Since
Lavabit did not keep logs and email content was stored encrypted, the
FBI served a subpoena (with a gag order) for the service's SSL keys.
Having the SSL keys would allow them to access
communications (both metadata and unencrypted content) in real time for
all of Lavabit's customers, not just Snowden's.

Ultimately, Levison turned over the SSL keys and shut down the service at the same time. The US government then threatened Levison with arrest, saying that shutting down the service was a violation of the court order.


 

What is a warrant canary?

A warrant canary is a posted document stating that an organization has
not received any secret subpoenas during a specific period of time. If
this document fails to be updated during the specified time then the
user is to assume that the service has received such a subpoena and
should stop using the service.




click
here :: Parrot Security Professional tools for security testing,
software development and privacy defense, all in one place.











WikiLeaks-related Twitter court orders








Browser Recommendation

 

Browser Fingerprint - Is your browser configuration unique?

Your Browser sends information that makes you unique amongst millions of users and therefore easy to identify.

When you visit a web page, your browser voluntarily sends information
about its configuration, such as available fonts, browser type, and
add-ons. If this combination of information is unique, it may be
possible to identify and track you without using cookies.


You need to find what most browsers are reporting,
and then use those variables to bring your browser in the same
population. This means having the same fonts, plugins, and extensions
installed as the large installed base. You should have a spoofed user agent string
to match what the large userbase has. You need to have the same
settings enabled and disabled, such as DNT and WebGL. You need your
browser to look as common as everyone else. Disabling JavaScript, using
Linux, or even the TBB, will make your browser stick out from the
masses.

Modern web browsers have not been architected to assure personal web
privacy. Rather than worrying about being fingerprinted, it seems more
practical to use free software plugins
like Privacy Badger, uBlock Origin and Disconnect. They not only
respect your freedom, but your privacy also. You can get much further
with these than trying to manipulate your browser's fingerprint.




DEF CON 25 - Roger Dingledine - Next Generation Tor Onion Services




WebRTC IP Leak Test - Is your IP address leaking?

WebRTC is a new communication protocol that relies on JavaScript that can leak your actual IP address from behind your VPN. 

While software like NoScript prevents this, it's probably a good idea to block this protocol directly as well, just to be safe.

test browser now

How to disable WebRTC in Firefox?

In short: Set "media.peerconnection.enabled" to "false" in "about:config".
Explained:
  1. Enter "about:config" in the firefox address bar and press enter.
  2. Press the button "I'll be careful, I promise!"
  3. Search for "media.peerconnection.enabled"
  4. Double click the entry, the column "Value" should now be "false"
  5. Done. Do the WebRTC leak test again.
If you want to make sure every single WebRTC related setting is really disabled change these settings:
  1. media.peerconnection.turn.disable = true
  2. media.peerconnection.use_document_iceservers = false
  3. media.peerconnection.video.enabled = false
  4. media.peerconnection.identity.timeout = 1
Now you can be 100% sure WebRTC is disabled.


test browser again





Firefox Privacy Add-ons



Privacy Badger

Stop Tracking with Privacy Badger

Privacy Badger is a browser add-on that stops
advertisers and other third-party trackers from secretly tracking where
you go and what pages you look at on the web. Privacy Badger learns
about trackers as you browse by inspecting external resources websites
request. Please be aware that Google Analytics is considered first-party
by Privacy Badger, which means that Google Analytics will not be
blocked if you do not use another blocker, such as uBlock Origin.

uBlock

Block Ads and Trackers with uBlock Origin

An efficient wide-spectrum-blocker
that's easy on memory, and yet can load and enforce thousands more
filters than other popular blockers out there. It has no monetization
strategy and is completely open source.
We recommend Firefox but uBlock Origin also works in other browsers
such as Safari, Opera, and Chromium. Unlike AdBlock Plus, uBlock does
not allow so-called "acceptable ads".
Cookie AutoDelete

Automatically Delete Cookies with Cookie AutoDelete

Automatically removes cookies when they are no longer used by open
browser tabs. With the cookies, lingering sessions, as well as
information used to spy on you, will be expunged.

HTTPS Everywhere

Encryption with HTTPS Everywhere

A Firefox, Chrome, and Opera extension that encrypts your
communications with many major websites, making your browsing more
secure. A collaboration between The Tor Project and the Electronic
Frontier Foundation.
Decentraleyes

Block Content Delivery Networks with Decentraleyes

Emulates Content Delivery Networks locally by intercepting requests,
finding the required resource and injecting it into the environment.
This all happens instantaneously, automatically, and no prior
configuration is required.  
Source code: GitLab (self-hosted).








uMatrix

Stop cross-site requests with uMatrix

Many websites integrate features which let other websites track you,
such as Facebook Like Buttons or Google Analytics. uMatrix gives you
control over the requests that websites make to other websites. This
gives you greater and more fine-grained control over the information
that you leak online.

NoScript

Be in total control with NoScript Security Suite 

Highly customizable plugin to selectively allow JavaScript, Java,
and Flash to run only on websites you trust. Not for casual users, it
requires technical knowledge to configure.



How the Feds Caught Russian Mega-Carder Roman Seleznev



Firefox: Privacy Related "about:config" Tweaks

Preparation:

  1. Enter "about:config" in the firefox address bar and press enter.
  2. Press the button "I'll be careful, I promise!"
  3. Follow the instructions below...

Getting started:

privacy.firstparty.isolate = true

A result of the Tor Uplift effort, this preference isolates all browser identifier sources (e.g. cookies) to the first party domain, with the goal of preventing tracking across different domains. (Don't do this if you are using the Firefox Addon "Cookie AutoDelete" with Firefox v58 or below.)


privacy.resistFingerprinting = true



A result of the Tor Uplift effort, this preference makes Firefox more resistant to browser fingerprinting.


privacy.trackingprotection.enabled = true



This is Mozilla's new built-in tracking protection. It uses Disconnect.me filter list, which is redundant if you are already using uBlock Origin 3rd party filters, therefore you should set it to false if you are using the add-on functionalities.


browser.cache.offline.enable = false



Disables offline cache.


browser.safebrowsing.malware.enabled = false

Disable Google Safe Browsing malware checks. Security risk, but privacy improvement.
browser.safebrowsing.phishing.enabled = false

Disable Google Safe Browsing and phishing protection. Security risk, but privacy improvement.
browser.send_pings = false

The attribute would be useful for letting websites track visitors' clicks.
browser.sessionstore.max_tabs_undo = 0


Even with Firefox set to not remember history, your closed tabs are stored temporarily at Menu -> History -> Recently Closed Tabs.
browser.urlbar.speculativeConnect.enabled = false


Disable preloading of autocomplete URLs. Firefox preloads URLs that autocomplete when a user types into the address bar, which is a concern if URLs are suggested that the user does not want to connect to.

dom.battery.enabled = false
Website owners can track the battery status of your device.

dom.event.clipboardevents.enabled = false

Disable that websites can get notifications if you copy, paste, or cut something from a web page, and it lets them know which part of the page had been selected.

geo.enabled = false

Disables geolocation.

media.eme.enabled = false


Disables playback of DRM-controlled HTML5 content, which, if enabled, automatically downloads the Widevine Content Decryption Module provided by Google Inc. Details

DRM-controlled content that requires the Adobe Flash or Microsoft Silverlight NPAPI plugins will still play, if installed and enabled in Firefox.

media.gmp-widevinecdm.enabled = false

Disables the Widevine Content Decryption Module provided by Google Inc., used for the playback of DRM-controlled HTML5 content.

media.navigator.enabled = false

Websites can track the microphone and camera status of your device.

network.cookie.cookieBehavior = 1

Disable cookies

0 = Accept all cookies by default
1 = Only accept from the originating site (block third-party cookies)
2 = Block all cookies by default
network.cookie.lifetimePolicy = 2

cookies are deleted at the end of the session

0 = Accept cookies normally
1 = Prompt for each cookie
2 = Accept for current session only
3 = Accept for N days

network.http.referer.trimmingPolicy = 2

Send only the scheme, host, and port in the Referer header

0 = Send the full URL in the Referer header
1 = Send the URL without its query string in the Referer header
2 = Send only the scheme, host, and port in the Referer header

network.http.referer.XOriginPolicy = 2

Only send Referer header when the full hostnames match. (Note: if you notice significant breakage, you might try 1 combined with an XOriginTrimmingPolicy tweak below.)

0 = Send Referer in all cases
1 = Send Referer to same eTLD sites
2 = Send Referer only when the full hostnames match

network.http.referer.XOriginTrimmingPolicy = 2

When sending Referer across origins, only send scheme, host, and port in the Referer header of cross-origin requests.

0 = Send full url in Referer
1 = Send url without query string in Referer
2 = Only send scheme, host, and port in Referer

webgl.disabled = true

WebGL is a potential security risk.

browser.sessionstore.privacy_level = 2

This preference controls when to store extra information about a session: contents of forms, scrollbar positions, cookies, and POST data.

0 = Store extra session data for any site. (Default starting with Firefox 4.)
1 = Store extra session data for unencrypted (non-HTTPS) sites only. (Default before Firefox 4.)
2 = Never store extra session data

network.IDN_show_punycode = true

Not rendering IDNs as their Punycode equivalent leaves you open to phishing attacks that can be very difficult to notice.

extensions.blocklist.url = https://blocklists.settings.services.mozilla.com/v1/blocklist/3/%20/%20/

Limit the amount of identifiable information sent when requesting the Mozilla harmful extension blocklist.

Optionally, the blocklist can be disabled entirely by setting extensions.blocklist.enabled to false for increased privacy, but decreased security.

Related Information

  • ffprofile.com - Helps you to create a Firefox profile with the defaults you like.
  • mozillazine.org - Security and privacy-related preferences.
  • user.js Firefox hardening stuff
    - This is a user.js configuration file for Mozilla Firefox that's
    supposed to harden Firefox's settings and make it more secure.
  • Privacy Settings - A Firefox add-on to alter built-in privacy settings easily with a toolbar panel.

Privacy-Conscious Email Providers - No Affiliates













ProtonmailWWW
Tor
2013 Switzerland500 MBFreeAcceptedBuilt-inYes
DisrootWWW2015 Netherlands2 GBFreeAcceptedBuilt-inYes
TutanotaWWW2011 Germany1 GBFreeNoBuilt-inYes
MailfenceWWW2013 Belgium500 MBFreeAcceptedBuilt-inYes
mailbox.orgWWW2014 Germany2 GB12 €AcceptedBuilt-inYes
PosteoWWW2009 Germany2 GB12 €NoBuilt-inNo
RunboxWWW1999 Norway1 GB$ 19.95YesNoYes
NeomailboxWWW2003 Switzerland1 GB$ 49.95AcceptedBuilt-inYes
StartMailWWW2014 Netherlands10 GB$ 59.95AcceptedBuilt-inYes
Kolab NowWWW2010 Switzerland2 GB$ 60AcceptedNoYes

Interesting Email Providers Under Development

  • Confidant Mail - An
    open-source non-SMTP cryptographic email system optimized for large file
    attachments. It is a secure and spam-resistant alternative to regular
    email and online file drop services. It
    uses GNU Privacy Guard (GPG) for content encryption and authentication, and TLS 1.2 with ephemeral keys for transport encryption.

Become Your Own Email Provider with Mail-in-a-Box

Mail-in-a-Box
Take it a step further and get control of your email with this
easy-to-deploy mail server in a box. Mail-in-a-Box lets you become your
own mail service provider in a few easy steps. It's sort of like making
your own Gmail, but one you control from top
to bottom. Technically, Mail-in-a-Box turns a fresh cloud computer into a
working mail server. But you don't need to be a technology expert to
set it up. More: https://mailinabox.email/

Privacy Email Tools

  • gpg4usb - A very easy to use and small portable editor to encrypt and decrypt any text-message or -file. For Windows and Linux. GPG tutorial.
  • Mailvelope - A browser extension that enables the exchange of encrypted emails following the OpenPGP encryption standard.
  • Enigmail - A security
    extension to Thunderbird and Seamonkey. It enables you to write and
    receive email messages signed and/or encrypted with the OpenPGP standard.
  • TorBirdy - This extension configures Thunderbird to make connections over the Tor anonymity network.
  • Email Privacy Tester - This tool will send an Email to your address and perform privacy-related tests.

Related Information

  • Aging 'Privacy' Law Leaves Cloud E-Mail Open to Cops
    - Data stored in the cloud for longer than 6 months is considered
    abandoned and may be accessed by intelligence agencies without
    a warrant. Learning: Use an external email client like Thunderbird or
    Enigmail, download your emails and store them locally. Never leave them
    on the server.
  • With May First/Riseup Server Seizure, FBI Overreaches Yet Again
  • Autistici/Inventati server compromised
    - The cryptographic services offered by the Autistici/Inventati server
    have been compromised on 15th June 2004. It was discovered on 21st June
    2005. One year
    later. During an enquiry on a single mailbox, the Postal Police may have
    tapped for a whole year every user's private communication going
    through the server autistici.org/inventati.org.


    Email Clients

    Thunderbird

    ThunderbirdMozilla
    Thunderbird is a free, open source, cross-platform email, news, and
    chat client developed by the Mozilla Foundation. Thunderbird is an
    email, newsgroup, news feed, and chat (XMPP, IRC, Twitter) client.

    OS: Windows, macOS, Linux, BSD.

    Claws Mail

    Claws MailClaws
    Mail is a free and open source, GTK+-based email and news client. It
    offers easy configuration and an abundance of features. It is included
    with Gpg4win, an encryption suite for Windows.

    OS: Windows, macOS, Linux, BSD, Solaris, Unix.

    Worth Mentioning

    • K-9 Mail - An independent mail application for Android. It supports both POP3 and IMAP mailboxes, but only supports push mail for IMAP.
    • GNU Privacy Guard - Email Encryption. GnuPG is a GPL Licensed alternative to the PGP suite of cryptographic software. Tutorial. Use GPGTools for macOS.
    • Mailpile (Beta) - A modern, fast web-mail client with user-friendly encryption and privacy features.
    •  

    Email Alternatives

    Bitmessage

    BitmessageBitmessage
    is a P2P communications protocol used to send encrypted messages to
    another person or to many subscribers. It is decentralized and
    trustless,
    meaning that you need-not inherently trust any entities like root
    certificate authorities. It uses strong authentication which means that
    the sender of a message cannot be spoofed, and it aims to hide
    "non-content" data.

    OS: Windows, macOS, Linux.

    RetroShare

    RetroShareRetroshare
    creates encrypted connections to your friends. Nobody can spy on you.
    Retroshare is completely decentralized. This means there are no central
    servers. It is entirely Open-Source and free. There are no costs, no ads
    and no Terms of Service.

    OS: Windows, macOS, Linux.

    Worth Mentioning

    • I2P-Bote - End-to-end encrypted decentralized mail system within the I2P network.


    DEF CON 22 - Zoz - Don't Fuck It Up!





     

    Privacy Respecting Search Engines

    searx

    searxAn open source
    metasearch engine, aggregating the results of other search engines
    while not storing information about its users. No logs, no ads and no
    tracking.

    Tor



    StartPage

    StartPageGoogle
    search results, with complete privacy protection. Behind StartPage is a
    European company that has been obsessive about privacy since 2006.

    DuckDuckGo

    DuckDuckGoThe search engine that doesn't track you. Some of DuckDuckGo's code is free software hosted at GitHub, but the core is proprietary. The company is based in the USA.

    Tor

    Firefox Addon


    • Google search link fix
      - Firefox extension that prevents Google and Yandex search pages from
      modifying search result links when you click them. This is useful when
      copying links but it also helps privacy by preventing the search engines
      from recording your clicks. (Open Source)

    Worth Mentioning


    • Qwant - Qwant's philosophy is based
      on two principles: no user tracking and no filter bubble. Qwant was
      launched in France in February 2013. Privacy Policy.

    • MetaGer - An open source metasearch engine, which is based in Germany. It focuses on protecting the user's privacy.

     

     

    Encrypted Instant Messenger

    Mobile: Signal

    Mobile: SignalSignal
    is a mobile app developed by Open Whisper Systems. The app provides
    instant messaging, as well as voice and video calling.
    All communications are end-to-end encrypted. Signal is free and open
    source, enabling anyone to verify its security by auditing the code. The
    development team is supported by community donations and grants. There
    are no advertisements,
    and it doesn't cost anything to use.

    OS: Android, iOS, macOS, Windows, Linux

    Riot.im

    beta
    Riot.imRiot.im is a decentralized free-software chatting application based on the Matrix
    protocol, a recent open protocol for real-time communication offering
    E2E encryption. It can bridge other communications via others protocols
    such as IRC too.

    OS: Android, iOS, macOS, Windows, Linux, Web

    Desktop: Ricochet

    Desktop: RicochetRicochet uses the Tor network to reach your contacts without relying on messaging servers. It creates a hidden service, which is used to rendezvous with
    your contacts without revealing your location or IP address. Instead of a username, you get a unique address that looks like ricochet:rs7ce36jsj24ogfw. Other Ricochet users can use this address to send a contact request - asking to be
    added to your contacts list.

    OS: Windows, macOS, Linux.

    Worth Mentioning

    • ChatSecure - ChatSecure is a free and open source messaging app that features OTR encryption over XMPP.
    • Cryptocat - Encrypted open source messenger. Supports file sharing and multiple devices. Available for Windows, Linux and macOS.
    • Kontalk - A community-driven
      instant messaging network. Supports end-to-end encryption. Both
      client-to-server and server-to-server channels are fully encrypted.
    • Conversations
      - An open source Jabber/XMPP client for Android 4.4+ smartphones.
      Supports end-to-end encryption with either OMEMO or openPGP. There is
      also Conversations Legacy which still supports OTR.
    • Wire experimental (more info) - A free software End-to-End Encrypted chatting application that supports instant messaging, voice, and video calls.

    Related Information

     

     

    Encrypted Video & Voice Messenger

    Mobile: Signal

    Mobile: Signal

    Signal
    is a mobile app developed by Open Whisper Systems. The app provides
    instant messaging, as well as voice and video calling.
    All communications are end-to-end encrypted. Signal is free and open
    source, enabling anyone to verify its security by auditing the code. The
    development team is supported by community donations and grants. There
    are no advertisements,
    and it doesn't cost anything to use.

    OS: Android, iOS, macOS, Windows, Linux

    Wire

    WireWire
    is an app developed by Wire Swiss GmbH.
    The Wire app allows users to exchange end-to-end encrypted instant
    messages, as well as make voice and video calls. Wire is free and open
    source, enabling anyone to verify its security by auditing the code.
    The development team is backed by Iconical and they will monetize in the
    future with premium features/services.

    Caution: The company keeps a list of all the users you contact until you delete your account.

    OS: Android, iOS, macOS, Windows, Linux, Web

    Linphone

    Linphone

    Linphone
    is an open source SIP Phone and a free voice over IP service, available
    on mobile and desktop environments and on web browsers. It supports
    ZRTP for end-to-end encrypted voice and video communication.

    OS: iOS, Android, Windows Phone, Linux, Windows, macOS, Browser (Web)

    Worth Mentioning

    • Jitsi - Jitsi is a free and open source multiplatform voice (VoIP), videoconferencing and instant messaging application.
    • Tox - Experimental A free and open-source, peer-to-peer, encrypted instant messaging and video calling software.
    • Jami (formerly Ring/SFLphone) - Gives you a full control over your communications and an unmatched level of privacy.

    File Sharing

    OnionShare

    OnionShareOnionShare
    is an open source tool that lets you securely and anonymously share a
    file of any size. It works by starting a web server, making it
    accessible as a Tor onion service, and generating an unguessable URL to
    access and download the files. It doesn't require setting up a server on
    the internet somewhere or using a third-party filesharing service. You
    host the file on your own computer and use a Tor onion service to make
    it temporarily accessible over the internet.

    Tor


    OS: Windows, macOS, Linux.

    Magic Wormhole

    Magic Wormhole

    Get
    things from one computer to another, safely. This package provides a
    library and a command-line tool named wormhole, which makes it possible
    to get arbitrary-sized files and directories (or short pieces of text)
    from one computer to another. The two endpoints are identified by using
    identical "wormhole codes": in general, the sending machine generates
    and displays the code, which must then be typed into the receiving
    machine. The codes are short and human-pronounceable, using a
    phonetically-distinct wordlist. The receiving side offers tab-completion
    on the codewords, so usually only a few characters must be typed.
    Wormhole codes are single-use and do not need to be memorized.

    OS: cross-platform (python)

    Encrypted Cloud Storage Services

    Nextcloud - Choose your hoster

    Nextcloud - Choose your hosterSimilar
    functionally to the widely used Dropbox, with the difference being that
    Nextcloud is free and open-source, and thereby allowing anyone to
    install and operate it without charge on a private server, with no
    limits on storage space or the number of connected clients.

    Client OS: Windows, macOS, Linux, BSD, Unix, iOS, Android, Fire OS. Server: Linux.

    Least Authority S4 - For Experts

    Least Authority S4 - For ExpertsS4
    (Simple Secure Storage Service) is Least Authority's verifiably secure
    off-site backup system for individuals and businesses. 100% client-side
    encryption and open source transparency. 250GB for $9.95/month or 5TB
    for $25.95/month. Servers are hosted with Amazon S3 in the US.

    OS: Linux, Windows, macOS, OpenSolaris, BSD. (Installation for advanced users)

    Worth Mentioning

    • Cryptomator - Free client-side AES encryption for your cloud files. Open source software: No backdoors, no registration.
    • CryptPad - Free and end-to-end encrypted real time collaboration sharing folders, media, and documents.

    Self-Hosted Cloud Server Software

    Pydio

    PydioPydio
    is open source software that turns instantly any server (on-premise,
    NAS, cloud IaaS or PaaS) into a file sharing platform for your company.
    It is an alternative
    to SaaS Boxes and Drives, with more control, safety and privacy, and
    favorable TCOs.

    OS: Windows, macOS, Linux, iOS, Android.

    Tahoe-LAFS

    Tahoe-LAFSTahoe-LAFS
    is a Free and Open decentralized cloud storage system. It distributes
    your data across multiple servers. Even if some of the servers fail or
    are
    taken over by an attacker, the entire file store continues to function
    correctly, preserving your privacy and security.

    OS: Windows, macOS, Linux.

    Nextcloud

    NextcloudSimilar
    functionally to the widely used Dropbox, with the difference being that
    Nextcloud is free and open-source, and thereby allowing anyone to
    install and operate it without charge on a private server, with no
    limits on storage space or the number of connected clients.

    Client OS: Windows, macOS, Linux, BSD, Unix, iOS, Android, Fire OS. Server: Linux.

    Worth Mentioning

    • CryptPad - End-to-end encrypted real time collaboration sharing folders, media, and documents (open-source).

    Secure Hosting Provider

    BAHNHOF

    BAHNHOF

    BAHNHOF is a widely known 'bullet-proof' hosting company

    Colocation: DataCell

    Colocation: DataCell

    DataCell is a data center providing secure colocating in Switzerland and Iceland.

    VPS/Web Hosting: Orange Website

    VPS/Web Hosting: Orange Website

    Orange Website is an Icelandic web hosting provider that prides themselves in protecting online privacy and free speech.

    Secure File Sync Software

    SparkleShare

    SparkleShare

    SparkleShare
    creates a special folder on your computer. You can add remotely hosted
    folders (or "projects") to this folder. These projects will be
    automatically
    kept in sync with both the host and all of your peers when someone adds,
    removes or edits a file.

    OS: Windows, macOS, Linux.

    Syncthing

    Syncthing

    Syncthing
    replaces proprietary sync and cloud services with something open,
    trustworthy and decentralized. Your data is your data alone and you
    deserve to
    choose where it is stored, if it is shared with some third-party and how
    it's transmitted over the Internet.

    OS: Windows, macOS, Linux, Android, BSD, Solaris.

    Worth Mentioning


    • git-annex - Allows
      managing files with git, without checking the file contents into git.
      While that may seem paradoxical, it is useful when dealing with files
      larger than git can currently easily handle,
      whether due to limitations in memory, time, or disk space.

    Password Manager Software

    Bitwarden - Cloud/Self-host

    Bitwarden - Cloud/Self-hostBitwarden
    is a free and open source password manager. It aims to solve password
    management problems for individuals, teams, and business organizations.
    Bitwarden is among the easiest and safest solutions to store all of your
    logins and passwords while conveniently keeping them synced between all
    of your devices. If you don't want to use the Bitwarden cloud, you can
    easily host your own Bitwarden server.

    OS: Windows, macOS, Linux, iOS, Android, Web.

    KeePass / KeePassXC - Local

    KeePass / KeePassXC - LocalKeePass
    is a free open source password manager, which helps you to manage your
    passwords in a secure way. All passwords in one database, which is
    locked with one
    master key or a key file. The databases are encrypted using the best and
    most secure encryption algorithms currently known: AES and Twofish. See
    also: KeePassXC with official native cross-platform support for Windows/macOS/Linux.

    OS: Windows, macOS, Linux, iOS, Android, BSD.

    LessPass - Browser

    LessPass - BrowserLessPass
    is a free and open source password manager that generates unique
    passwords for websites, email accounts, or anything else based on a
    master password and information you know. No sync needed. Uses PBKDF2
    and SHA-256. It's advised to use the browser addons for more security.

    OS: Windows, macOS, Linux, Android.

    Worth Mentioning


    • Master Password - Master
      Password is based on an ingenious password generation algorithm that
      guarantees your passwords can never be lost. Its passwords aren't
      stored: they are generated on-demand from your name, the site and your
      master password. No syncing, backups or internet access needed.

    • Password Safe - Whether the answer is
      one or hundreds, Password Safe allows you to safely and easily create a
      secured and encrypted username/password list. With Password Safe all you
      have to do is create and remember
      a single "Master Password" of your choice in order to unlock and access
      your entire username/password list.


    Calendar and Contacts Sync

    Nextcloud

    NextcloudNextCloud
    is a suite of client-server software for creating and using file
    hosting services. This includes calendar sync via CalDAV and contacts
    sync via CardDAV. Nextcloud is free and open-source, thereby allowing
    anyone to install and operate it without charge on a private server.

    Client OS: Windows, macOS, Linux, BSD, Unix, iOS, Android, Fire OS. Server: Linux.

    Email Providers

    Email ProvidersMany email providers also offer calendar and or contacts sync services. Refer to the Email Providers section to choose an email provider and check if they also offer calendar and or contacts sync.

    OS: depends on email provider.

    EteSync

    EteSyncEteSync
    is a secure, end-to-end encrypted and journaled personal information
    (e.g. contacts and calendar) cloud synchronization and backup for
    Android and any OS that supports CalDAV/CardDAV. It costs $14 per year
    to use, or you can host the server yourself for free.

    Client OS: Android, Web. Server OS: Linux.

    Worth Mentioning


    • fruux - a unified contacts/calendaring system that works across platforms and devices.

    • Flock - a discontinued calendar and contacts sync service by Open Whisper Systems. Despite being shut down the source code is still available on GitHub.

    • cloud backups -
      consider regularly exporting your calendar and or contacts and backing
      them up on a separate storage drive or uploading them to cloud storage
      (ideally after encrypting them).

    File Encryption Software

    VeraCrypt - Disk Encryption

    VeraCrypt - Disk EncryptionVeraCrypt
    is a source-available freeware utility used for on-the-fly encryption.
    It can create a virtual encrypted disk within a file or encrypt a
    partition
    or the entire storage device with pre-boot authentication. VeraCrypt is a
    fork of the discontinued TrueCrypt project. It was initially released
    on June 22, 2013. According to its developers, security improvements
    have been implemented and issues
    raised by the initial TrueCrypt code audit have been addressed.

    OS: Windows, macOS, Linux.

    GNU Privacy Guard - Email Encryption

    GNU Privacy Guard - Email EncryptionGnuPG
    is a GPL Licensed alternative to the PGP suite of cryptographic
    software. GnuPG is compliant with RFC 4880, which is the current IETF
    standards track specification
    of OpenPGP. Current versions of PGP (and Veridis' Filecrypt) are
    interoperable with GnuPG and other OpenPGP-compliant systems. GnuPG is a
    part of the Free Software Foundation's GNU software project, and has
    received major funding from the German
    government. GPGTools for macOS.

    OS: Windows, macOS, Linux, Android, BSD.

    PeaZip - File Archive Encryption

    PeaZip - File Archive EncryptionPeaZip
    is a free and open-source file manager and file archiver made by
    Giorgio Tani. It supports its native PEA archive format (featuring
    compression, multi volume
    split and flexible authenticated encryption and integrity check schemes)
    and other mainstream formats, with special focus on handling open
    formats. It supports 181 file extensions (as of version 5.5.1).

    macOS alternative: Keka is a free file archiver.

    OS: Windows, Linux, BSD.

    Worth Mentioning

    • Cryptomator - Free client-side AES encryption for your cloud files. Open source software: No backdoors, no registration.
    • miniLock - Browser plugin for
      Google Chrome / Chromium to encrypt files using a secret passphrase.
      Easy to use. From the developer of Cryptocat.
    • AES Crypt - Using a powerful
      256-bit encryption algorithm, AES Crypt can safely secure your most
      sensitive files. For Windows, macOS, Linux and Android.
    • DiskCryptor - A full disk and
      partition encryption system for Windows including the ability to
      encrypt the partition and disk on which the OS is installed.
    • Linux Unified Key Setup (LUKS)
      - A full disk encryption system for Linux using dm-crypt as the disk
      encryption backend. Included by default in Ubuntu. Available for Windows
      and Linux.

    Self-contained Networks

    Tor Browser

    Tor BrowserThe
    Tor network is a group of volunteer-operated servers that allows people
    to improve their privacy and security on the Internet. Tor's users
    employ this network by connecting through a series of virtual tunnels
    rather than making a direct connection, thus allowing both organizations
    and individuals to share information over public networks without
    compromising their privacy. Tor is an effective censorship circumvention
    tool.

    Tor


    OS: Windows, macOS, Linux, iOS, Android, OpenBSD.

    I2P Anonymous Network

    I2P Anonymous NetworkThe
    Invisible Internet Project (I2P) is a computer network layer that
    allows applications to send messages to each other pseudonymously and
    securely. Uses include anonymous
    Web surfing, chatting, blogging and file transfers. The software that
    implements this layer is called an I2P router and a computer running I2P
    is called an I2P node. The software is free and open source and is
    published under multiple licenses.

    OS: Windows, macOS, Linux, Android, BSD / Solaris.

    The Freenet Project

    The Freenet ProjectFreenet
    is a peer-to-peer platform for censorship-resistant communication. It
    uses a decentralized distributed data store to keep and deliver
    information, and
    has a suite of free software for publishing and communicating on the Web
    without fear of censorship. Both Freenet and some of its associated
    tools were originally designed by Ian Clarke, who defined Freenet's goal
    as providing freedom of speech
    on the Internet with strong anonymity protection.

    OS: Windows, macOS, Linux.

    Worth Mentioning

    • ZeroNet - Open, free and uncensorable websites, using Bitcoin cryptography and BitTorrent network.
    • RetroShare - Open Source cross-platform, Friend-2-Friend and secure decentralized communication platform.
    • GNUnet - GNUnet provides a strong foundation of free software for a global, distributed network that provides security and privacy.
    • IPFS - A peer-to-peer hypermedia protocol to make the web faster, safer, and more open. (important privacy warning)

    Decentralized Social Networks

    Mastodon

    MastodonMastodon
    is a social network based on open web protocols and free, open-source
    software. It is decentralized like e-mail. It also has the most users,
    and the most diverse (in terms of interests) users, looks good, and is
    easy to setup.

    diaspora*

    diaspora*diaspora*
    is based on three key philosophies: Decentralization, freedom and
    privacy. It is intended to address privacy concerns related to
    centralized social
    networks by allowing users set up their own server (or "pod") to host
    content; pods can then interact to share status updates, photographs,
    and other social data.

    Friendica

    FriendicaFriendica
    has an emphasis on extensive privacy settings and easy server
    installation. It aims to federate with as many other social networks as
    possible. Currently,
    Friendica users can integrate contacts from Facebook, Twitter, Diaspora,
    GNU social, App.net, Pump.io and other services in their social
    streams.

    Worth Mentioning

    • GNU Social - An open sourced, free and decentralized social network compatible with Mastodon and Friendica.

    Related Information

    Domain Name System (DNS)

    Njalla - Domain Registration

    Njalla - Domain RegistrationNjalla
    only needs your email or jabber address in order to register a domain
    name for you. Created by people from The Pirate Bay and IPredator VPN.
    Accepted Payments: Bitcoin, Litecoin, Monero, DASH, Bitcoin Cash and
    PayPal. A privacy-aware domain registration service.

    Tor

    DNSCrypt - Tool

    DNSCrypt - ToolA
    protocol for securing communications between a client and a DNS
    resolver. The DNSCrypt protocol uses high-speed high-security
    elliptic-curve cryptography and
    is very similar to DNSCurve, but focuses on securing communications
    between a client and its first-level resolver.

    OpenNIC - Service

    OpenNIC - ServiceOpenNIC
    is an alternate network information center/alternative DNS root which
    lists itself as an alternative to ICANN and its registries. Like all
    alternative
    root DNS systems, OpenNIC-hosted domains are unreachable to the vast
    majority of the Internet. Only specific configuration in one's DNS
    resolver makes these reachable, and very few Internet service providers
    have this configuration.

    Worth Mentioning

    • NoTrack - A network-wide DNS server which blocks Tracking sites. Currently works in Debian and Ubuntu.
    • Namecoin - A decentralized DNS open source information registration and transfer system based on the Bitcoin cryptocurrency.
    • Pi-hole - A network-wide DNS server for the Raspberry Pi. Blocks advertising and tracking domains for all devices on your network.

    Digital Notebook

    Standard Notes

    Standard NotesStandard
    Notes is a simple and private notes app that makes your notes easy and
    available everywhere you are. Features end-to-end encryption on every
    platform, and a powerful desktop experience with themes and custom
    editors.

    OS: Windows, macOS, Linux, iOS, Android, Web.

    Turtl

    TurtlTurtl
    lets you take notes, bookmark websites, and store documents for
    sensitive projects. From sharing passwords with your coworkers to
    tracking research on an article you're writing, Turtl keeps it all safe
    from everyone but you and those you share with.

    OS: Windows, macOS, Linux, Android.


    Worth Mentioning

    • Paperwork - Open source and self-hosted solution. For PHP / MySQL servers.
    • Org-mode - A major mode for GNU
      Emacs. Org-mode is for keeping notes, maintaining TODO lists, planning
      projects, and authoring documents with a fast and effective plain-text
      system.

    Paste Services

    PrivateBin

    PrivateBinPrivateBin
    is a minimalist, open source online pastebin where the server has zero
    knowledge of pasted data. Data is encrypted/decrypted in the browser
    using 256bit AES. It is the improved version of ZeroBin.

    Zerobin.net

    Zerobin.netZerobin
    is a minimalist, open source online pastebin where the server has zero
    knowledge of pasted data. Data is encrypted/decrypted in the browser
    using 256bit AES.

    Tor

    Ghostbin

    GhostbinGhostbin
    supports encryption, expiration, sessions, grant users to edit your
    notes and pastes up to one megabyte. You can also create your own
    account to keep track of your pastes.

    The software is good but ghostbin.com's security is worrisome.

    Worth Mentioning

    • disroot.org - Free privacy-friendly service that offers PrivateBin and other applications.

    Productivity Tools

    CryptPad

    CryptPadCryptPad
    is a private-by-design alternative to popular office tools and cloud
    services. All content is end-to-end encrypted. It is free and open
    source, enabling anyone to verify its security by auditing the code. The
    development team is supported by donations and grants. No registration
    is required, and it can be used anonymously via Tor browser.

    OS: Linux, macOS, Windows, Web.

    Etherpad

    EtherpadEtherpad
    is a highly customizable Open Source online editor providing
    collaborative editing in really real-time. Etherpad allows you to edit
    documents collaboratively in real-time, much like a live multi-player
    editor that runs in your browser. Write articles, press releases, to-do
    lists, etc.

    OS: Windows, macOS, Linux.

    Write.as

    Write.asWrite.as
    is a cross-platform, privacy-oriented blogging platform. It's anonymous
    by default, letting you publish without signing up. If you create an
    account, it doesn't require any personal information. No ads,
    distraction-free, and built on a sustainable business model.

    Tor


    OS: Windows, macOS, Linux, Android, iOS, Chrome OS, Web.

    Worth Mentioning

    • Cryptee - Free privacy-friendly service for storing Documents, files and Photos
    • EtherCalc - EtherCalc is a web
      spreadsheet. Data is saved on the web, and people can edit the same
      document at the same time. Changes are instantly reflected on all
      screens. Work together on inventories, survey forms, list management,
      brainstorming sessions.
    • disroot.org - Free privacy-friendly service that offers Etherpad, EtherCalc and PrivateBin.
    • dudle - An
      online scheduling application, which is free and OpenSource. Schedule
      meetings or make small online polls. No email collection or the need of
      registration.
    • LibreOffice - Free and open source office suite

    PC Operating Systems

    Qubes OS

    Qubes OSQubes
    is an open-source operating system designed to provide strong security
    for desktop computing. Qubes is based on Xen, the X Window System, and
    Linux, and can run most Linux applications and utilize most of the Linux
    drivers.

    Tor

    Debian

    DebianDebian
    is a Unix-like computer operating system and a Linux distribution that
    is composed entirely of free and open-source software, most of which is
    under the GNU General Public License, and packaged by a group of
    individuals known as the Debian project.

    Tor

    Trisquel

    TrisquelTrisquel
    is a Linux-based operating system derived from Ubuntu. The project aims
    for a fully free software system without proprietary software or
    firmware and uses Linux-libre, a version of the Linux kernel with the
    non-free code (binary blobs) removed.

    Warning

    Worth Mentioning

    • OpenBSD - A project that
      produces a free, multi-platform 4.4BSD-based UNIX-like operating system.
      Emphasizes portability, standardization, correctness, proactive
      security and integrated cryptography.
    • Arch Linux - A simple,
      lightweight Linux distribution. It is composed predominantly of free and
      open-source software, and supports community involvement. Parabola is a
      completely open source version of Arch Linux.
    • Whonix - A Debian GNU/Linux
      based security-focused Linux distribution. It aims to provide privacy,
      security and anonymity on the internet. The operating system consists of
      two virtual machines, a "Workstation"
      and a Tor "Gateway". All communication are forced through the Tor
      network to accomplish this.
    • Subgraph OS - Another Debian
      based Linux distribution, it features security hardening which makes it
      more resistant to security vulnerabilities. Subgraph runs many desktop
      applications in a security sandbox to limit their risk in case of
      compromise.
      By default, it anonymizes Internet traffic by sending it through the Tor
      network. Note: It is still in alpha, and much testing and bug fixing
      still has to be done.

    Live CD Operating Systems

    Tails

    TailsTails
    is a live operating system, that starts on almost any computer from a
    DVD, USB stick, or SD card. It aims at preserving privacy and anonymity,
    and helps to: Use the Internet anonymously and circumvent censorship;
    Internet connections go through the Tor network; leave no trace on the
    computer; use state-of-the-art cryptographic tools to encrypt files,
    emails and instant messaging.

    KNOPPIX

    KNOPPIXKnoppix
    is an operating system based on Debian designed to be run directly from
    a CD / DVD (Live CD) or a USB flash drive (Live USB), one of the first
    of its kind for any operating system. When starting a program, it is
    loaded from the removable medium and decompressed into a RAM drive. The
    decompression is transparent and on-the-fly.

    Puppy Linux

    Puppy LinuxPuppy
    Linux operating system is a lightweight Linux distribution that focuses
    on ease of use and minimal memory footprint. The entire system can be
    run from RAM with current versions generally taking up about 210 MB,
    allowing the boot medium to be removed after the operating system has
    started.

    Worth Mentioning

    • Tiny Core Linux
      - A minimal Linux operating system focusing on providing a base system
      using BusyBox and FLTK. The distribution is notable for its size (15 MB)
      and minimalism, with additional functionality
      provided by extensions.

    Mobile Operating Systems

    LineageOS

    LineageOSLineageOS
    is a free and open-source operating system for smartphones and tablets,
    based on the official releases of Android by Google. It is the
    continuation of the CyanogenMod project.

    Worth Mentioning

    • Replicant - An open-source operating system based on Android, aiming to replace all proprietary components with free software.
    • OmniROM - A free software operating system for smartphones and tablet computers, based on the Android mobile platform.
    • MicroG - A project that aims to
      reimplement the proprietary Google Play Services in the Android
      operating system with a FLOSS replacement.

    Android Privacy Add-ons

    NetGuard

    Control your traffic with NetGuard

    NetGuard provides simple and advanced ways to block
    certain apps' access to the internet without the help of root
    privileges. Applications and addresses can individually be allowed or
    denied access to your Wi-Fi and/or mobile connection, allowing you to
    control which apps are able to call home or not.



















    Welcome To The Oven (The End Of Censorship)









































    https://github.com/sbilly/awesome-security

    Surveillance Self-Defense

    https://canyouseeme.org/




    +++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++










    https://nsa.gov1.info/surveillance/
    https://archive.is/wip/75whA
     








    Surveillance Techniques: How Your Data Becomes Our Data


    In 2001, NSA published the secret "Transition 2001" report defining our strategy for the 21st century. No longer could we simply access analog communications using conventional means, the new digital world of globally-networked encrypted communications required a dramatic change to our surveillance strategy: NSA would need to "live on the network".
    We've turned our nation's Internet and telecommunications companies into collection partners by installing filters in their facilities, serving them with secret court orders, building back doors into their software and acquiring keys to break their encryption.


    Backdoor Searches

    Section 702 of the Foreign Intelligence Surveillance Act (FISA) provides us with a bonanza of "incidental" data collected from ordinary Americans communicating with foreigners targeted by this sweeping law. This convenient loophole allows us to peruse this database in our never-ending search for the elusive "needle in a haystack".

    Our Domestic Intercept Stations

    NSA technicians have installed intercept stations at key junction points, or switches, throughout the country. These switches are located in large windowless buildings owned by the major telecommunication companies and control the domestic internet traffic flow across the nation. A fiber optic splitter is placed on the incoming communication lines and routes the traffic to an NSA intercept station for processing.

    View a sample route that internet data traverses from a home in Toronto to the San Francisco Art Institute passing through several NSA intercept stations.

    NSA domestic surveillance flowchart

    NSA map of listening posts and domestic surveillance
    Larger version of map
    More information about this map

    Bulk Collection of U.S. Citizens' Phone Records

    In the past, we used our close partnership with the FBI to collect bulk telephone records on an ongoing basis using a Top Secret order from the Foreign Intelligence Surveillance Court (FISC). The metadata we collected from this program gave us information about what communications you sent and received, who you talked to, where you were when you talked to them, the lengths of your conversations, and what kind of device you were using.

    In mid-2015, Congress passed the USA Freedom Act sadly ending this valuable bulk collection program for the time being.

    The PRISM Program:  Our #1 Source of Raw Intelligence

    Our partners at the FBI DITU (Data Intercept Technology Unit) extract information from the servers of nine major American internet companies: Microsoft, Yahoo, Google, Facebook, PalTalk, AOL, Skype, YouTube, and Apple. This important partnership gives us direct access to audio, video, photographs, e-mails, documents and connection logs for each of these systems.

    Established in 2007, the Top Secret PRISM program has allowed us to closely track targeted individuals over time. Our ability to conduct live surveillance of search terms has given us important insights into their thoughts and intentions.

    NSA PRISM program chart
    This slide lists our information providers and the type of data available to our analysts

    NSA PRISM data flow - FBI DITU NSA
    This slide illustrates how the collected PRISM data flows through multiple NSA systems and databases

    To learn more about the PRISM program, view additional PRISM slides.

    Google Cloud Exploitation

    The NSA "MUSCULAR" program allows us to conveniently conduct large-scale data gathering outside the jurisdiction of the Foreign Intelligence Surveillance Court by secretly tapping into the communication links between Google's data centers outside the U.S. The Special Source Operations (SSO) group discovered a clever way around Google's security measures giving us full access to the rich data Google stores on the cloud for its users.

    NSA SSO slide - Google cloud exploitation

    Cellphone Tracking

    Our bulk cellphone location tracking program captures almost 5 billion records a day and feeds into a massive 27 terabyte database storing information about the locations of a hundred million devices. By tapping into the cables that connect the mobile networks globally and working with our corporate partners to install intercept equipment, we can apply mathematical techniques that enable our analysts to map cellphone owners' relationships by correlating their patterns of movement over time with thousands or millions of other phone users who cross their paths. This "Co-traveler" program allows us to look for unknown associates of known intelligence targets by tracking people whose movements intersect.

    Spying Toolbox: The ANT Catalog

    When the data we seek resides in places we cannot access using the above surveillance techniques, we rely on the technical experts in the Tailored Access Operations Group and their specialized tools from the ANT Product Catalog. The categories of available tools are listed below.

    Click on an icon above to view the related ANT products

    FBI Aviation Surveillance Operations (FBI Hawk Owl Project)

    An FBI fleet of over one hundred specially-modified Cessna planes equipped with sophisticated camera systems in steerable mounts that can provide detailed video, night vision, and infrared thermal imaging quietly fly circular routes daily around many major U.S. cities trackingtargets and gathering intelligence. Some of the planes use “augmented reality” software and sophisticated surveillance technology capable of tracking thousands of cellphones users.

    FBI Aerial Surveillance in the Continental U.S.

    Zoom in and click on the red map markers to view images of the unusual flight patterns in the FBI's targeted areas. View the map in full-screen mode.

    FBI Aerial Surveillance in Hawaii


    S. 1595: Protecting Individuals From Mass Aerial Surveillance Act of 2015

    In June 2015, a Senate bill was introduced to "protect" our citizens from Mass Aerial Surveillance. We are happy to report that no action has been taken on this bill and we have every confidence that Congress will agree with us that mass surveillance "IS" protection for our citizens. You can track the progress of this ill-advised bill below.

    Our Undersea Cable Tapping Strategy

    By tapping into the worldwide network of undersea cables, our OAKSTAR, STORMBREW, BLARNEY and FAIRVIEW systems can process data as it flows across the internet. Each system is responsible for different types of intercepted data. For example, the BLARNEY system gathers metadata describing who is speaking to whom and through which networks and devices.

    There are two methods employed for tapping into the undersea cable network. A modified nuclear submarine houses the technicians and gear needed to place the physical taps on the undersea cables along strategic points in the network. The second method involves using intercept probes at the point where the cables connect to the landing stations in various countries. These probes capture and copy the data as it flows onward.
    map of NSA undersea cable interceptsView an interactive map of worldwide undersea cables
    This map illustrates our worldwide data collection access points

    XKeyscore: Our Real-Time Internet Monitoring Capability

    As data flows through our worldwide data collection points, the XKeyscore system indexes and stores this information in a rolling three-day buffer database containing all internet activity passing through each collection site. XKeyscore is a massive distributed Linux cluster with over 700 servers distributed around the world.

    The theory behind XKeyscore is simple: People spend a large amount of time on the web performing actions that are anonymous. We can use this traffic to detect anomalies which can lead us to intelligence by itself, or provide a selection path for further inquiries. Examples of anomalous events: Someone searching the web for "suspicious stuff" or someone who is using encryption.

    This slide shows a worldwide map of the XKeyscore server locations



    This slide shows how metadata is extracted and stored in the XKeyscore database

    Learn more about the XKeyscore system.

    Tracking Our Surveillance Data: Boundless Informant

    The "Boundless Informant" mapping tool provides our analysts the means to track intelligence collection statistics worldwide. Using a color-coded map, we can quickly determine the volume of collection data we have by geographical location. This global heat map assigns each nation a color code based on its surveillance intensity ranging from green (least subjected to surveillance) through yellow and orange to red (most surveillance). With the monthly domestic intelligence collection volume at almost three billion pieces, the United States is assigned the color orange.

    NSA surveillance map - Boundless Informant

    Learn more about the Boundless Informant program

    Surveillance Data from Other Sources

    In addition to our own data collection activities, the Domestic Surveillance Directorate receives a constant flow of information from other sources. For more information about these sources, see Our Partners  below






















    ++++++++++++++++++++++++++++++++++++++++++++++++



    Our Partners

    Domestic Surveillance is a team sport. Our success depends upon our partnership with other federal, state, and local agencies. The USA PATRIOT Act was passed in 2001 for the purpose of "Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism". This far-reaching law gave us a wide range of new tools to detect and prevent terrorism. Our partners transmit a steady flow of intelligence information 24-hours a day from across the nation. The incoming data is indexed, stored, and shared throughout the Intelligence Community on our massive cloud computing network.




    Suspicious Activity Reporting - Fusion Centers



    The Nationwide Suspicious Activity Reporting (SAR) Initiative (NSI) is a collaborative effort led by the U.S. Department of Justice in partnership with the Department of Homeland Security, the FBI, and state and local law enforcement partners. This initiative establishes a national capacity for gathering, documenting, processing, analyzing, and sharing SAR information gathered by fusion centers across the county.

    Located in states and major urban areas, fusion centers are uniquely situated to empower front-line law enforcement, public safety, fire service, emergency response, public health, and private sector security personnel to gather and share domestic threat-related information.
    Fusion Centers Location Map
    map of fusion center locationsClick on map to locate your local fusion center

    Suspicious Activity Reporting (SAR) Information Flow

    Suspicious Activity Reporting SAR information flow diagram

    National Counterterrorism Center



    The National Counterterrorism Center (NCTC) operates as a partnership of more than 16 organizations including the CIA, FBI, State Department, Defense Department, Homeland Security; and other agencies that provide unique expertise such as the Departments of Energy, Treasury, Agriculture, Transportation, and Health and Human Services.

    The NCTC is the primary organization for analyzing and integrating all foreign and domestic terrorism-related intelligence possessed or acquired by the United States. It was also recently given the authority to examine the government files of U.S. citizens for possible criminal behavior, even if there is no reason to suspect them.

    FBI Terrorist Screening Center


    FBI Terrorist Screening Center
    The FBI Terrorist Screening Center (TSC) was established in 2003 by Homeland Security Presidential Directive 6 which directed that a center be established to consolidate the government's approach to terrorism screening. The TSC maintains the U.S. government's consolidated Terrorist Watch list, a single database of identifying information about those known or reasonably suspected of being involved in terrorist activity.

    Terrorist screening database information flow

    FBI Surveillance Aircraft

    FBI airplanes equipped with high-tech cameras and sophisticated surveillance technology capable of tracking thousands of cellphones below fly circular routes daily around many major U.S. cities trackingtargets and gathering intelligence. The clickable map below shows the unusual flight patterns in some of the targeted areas. View full size map.

    Other Partnerships We Can Publicly Disclose


    FBI - The FBI is our go-to partner for much of our nation's domestic surveillance needs:
    • Information collected from the use of National Security Letters authorized by the PATRIOT Act
    • Phone calls and text messages from the FBI Digital Collection System (DCSNet)
    • "Google-like" search capability of citizen information from the FBI Law Enforcement National Data Exchange Program (N-DEx)
    • Cell phone location tracking from the Stingray "IMSI catchers" (International Mobile Subscriber Identity) masquerading as cell phone towers
    • Massive FBI data-mining project with more than 1.5 billion government and private-sector records about citizens and foreigners collected by the FBI’s National Security Analysis Center (NSAC)

    CIA - The Central Intelligence Agency has publicly committed to increasing its data collection efforts. CIA Chief Technology Officer Gus Hunt explains why: "The value of any piece of information is only known when you can connect it with something else that arrives at a future point in time. Since you can't connect dots you don't have, we fundamentally try to collect everything and hang on to it forever."

    DHS - TSA airline passenger data; surveillance data from unmanned domestic Predator B drones patrolling the northern and southern borders

    Treasury - Cash Transaction Reporting and Suspicious Activity Reporting data

    U.S. Postal Service - The exterior of every piece of paper mail processed in the United States is photographed and stored by the "Mail Isolation Control and Tracking program". Some post offices have installed hidden cameras outside to capture and record the license plates and facial features of customers leaving the parking lots.

    United States Congress - In 2011, Congress extended three key provisions of the PATRIOT Act for another four years. (Senate vote / House vote).  In 2012, Congress reauthorized the FISA Amendments Act. (Senate vote / House vote).  In 2015, both houses of Congress passed the USA Freedom Act which legally codifies our dragnet data collection while happily appeasing the civil liberties folks (a double win!).

    State/Local government - Electronic transit cards; electronic toll collectors; vehicle information and location data captured by license plate readers; public transportation video/audio surveillance systems

    British Spy Agency GCHQ - The GCHQ (UK Government Communications Headquarters) through its "Mastering the Internet" and "Global Telecoms Exploitation" programs uses secret agreements with commercial companies allowing them to tap into the transatlantic fiber-optic cables carrying the world's phone calls and internet traffic. The GCHQ processes, stores, and shares this information with the NSA via the Tempora program.

    Yahoo - Secretly searches all of its customers' incoming emails for specific character strings provided by the NSA/FBI.
    NSA logo
















































































































































    Comments