Society X

the Great Universe

Tag: NSA

Renoir: General Network Visualization and Manipulation Program

by 5ocietyx

RENOIR-NSA

With the recent revelations by Edward Snowden regarding the NSA’s domestic spying programmes, a great deal of attention has focused on this clandestine agencies ability to slurp network traffic and decrypt its contents.

How it then analyses and visualises this mountain of data is somewhat more opaque.

One way this is achieved is detailed on their own website’s research section. You can find the link here. A brief description follows:

Renoir is a general-purpose desktop program for manipulating and visualizing networks, otherwise known as graphs. It is written in Java to run on any platform that supports the Java Virtual Machine. Through a well-developed GUI, users can manipulate, analyze, and picture graphs. The program is very general, and applicable to visualizing any information expressing associations.

Renoir offers a variety of both automated and manual layout operations for conveying information. It provides user control of node icons, node color, node labeling, link colors, link styles, link labeling, and a host of other preferences. Graphical elements can have any number of attributes of varying types, including text, numbers, sound, and pictures. Attributes may be local or reside on other computers or in databases. Renoir offers unique capabilities to abstract the graph particularly when the graph gets complex, presenting simplified diagrams with details, which can be expanded and/or contracted real-time.

From what they describe it would appear United States Patent Number 6,515,666 otherwise known as ‘Renoir’ is one way they go about it.

Written in Java, Renoir is network-enabled graphing software, very similar to a tool the 5ociety has itself utilized recently provided by Gephi when attempting to analyse the chatter on the ‘Savile Outed as a Paedo‘ mega-thread on the David Icke Forums.

You can play around with the alpha version here (allow 30 secs to load).

Renoir was of course a famous French Impressionist painter. Impressionist painting characteristics include relatively small, thin, yet visible brush strokes that together form an interpretation of reality. The brush strokes of the NSA’s graphing software are the nodes and the picture of reality they form would appear to be whatever the operative wants to graph.

It is quite easy to see how this would potentially work. The operative could easily scale from a national or even regional level right down to an individual and their associated groups and personal profile that may include real-time communications.  And they could do all this from the comfort of their laptop sat in polo shirt, shorts and sneakers eating doughnuts.

Total Information Awareness logo

For all its generalised power, ‘Renoir’ is merely one small component of the overall capabilities of the U.S.’s  ‘Total Information Awareness’ programme that some say has taken on an artificial intelligence of its own and is known by the nickname ‘Mr Computer’ and is considered to be a digital ‘superconsciousness’.

If you are interested in exploring this technology further, please express your interest in writing to the:

National Security Agency
NSA Technology Transfer Program
9800 Savage Road, Suite 6541
Fort George G. Meade, Maryland 20755-6541

Or simply leave a comment in the section below and we’re sure they’ll pick it up saving you the bother 😉

Sources:
http://www.nsa.gov/research/tech_transfer/fact_sheets/renoir.shtml

The SAVILLE Programme

by 5ocietyx

philips_crypto_logo

SAVILLE is a classified NSA Type 1 encryption algorithm. It is used broadly, often for voice encryption, and implemented in a large number of encryption devices.

Little is known publicly about the algorithm itself due to its classified nature and inclusion in the NSA’s Suite A. Some documentation related to the KYK-13 fill device and statements made by military officials suggest that SAVILLE has a 128-bit key. On the AIM microchip, it runs at 4% of the clock rate (compare DES at 76% and BATON at 129%). The Cypris chip mentions 2 modes; specifications for Windster and Indictor specify that they provide Saville I.

STU-I   KY-70 Secure Telephone

The funky STU-I KY-70 Secure Telephone implemented the SAVILLE cryptographic algorithm

Some devices and protocols that implement SAVILLE:

  • The VINSON family (voice encryption)
  • APCO Project 25 (single-channel land mobile radios) (Saville has algorithm ID 04)
  • Versatile encryption chips: AIM, Cypris, Sierra I/II, Windster, Indictor, Presidio, Railman

Source: 
http://en.wikipedia.org/wiki/SAVILLE

According to cryptomuseum.com

In the Early 1980s, Philips Usfa in Eindhoven (Netherlands) received a first description of SAVILLE, because it was developing its Spendex-40 and Spendex-50 narrow band and wide band secure voice equipment. Unlike before with Aroflex, that used a Philips Usfa designed crypto logic, this time it was decided to implement an existing and already approved NATO crypto logic.

Clearly, this had a number of advantages. First of all interoperability with existing NATO equipment like STU II and VINSON. Secondly, it was anticipated that the NATO approval by SECAN would take much less time, by not having to evaluate the crypto logic.

Rumour had it in those days, that there was a third reason. By implementing SAVILLE in a new national development, the NLNCSA would automatically receive all baseline documentation regarding the crypto logic, which would otherwise not be obvious at all.

Still, to Philips Usfa and its cryptography aware employees it seemed quite peculiar that cryptographic equipment using a foreign, NSA-developed crypto logic, was used to protect top secret information. SAVILLE was implemented in hardware, more precisely in circuits comprising a custom gate array and standard integrated circuits, by Philips Usfa in the first half of the 1980s.

Source:
http://www.cryptomuseum.com/crypto/usa/saville.htm

National Security Agency HQ

by 5ocietyx

NSA HQ

http://en.wikipedia.org/wiki/National_Security_Agency

Malevolent Machines: National Security Agency Servers

by 5ocietyx

NSA servers

Late 1999: NSA Begins ‘Trailblazer’ Data Mining Program
The National Security Agency begins building a massive data-mining system, code-named “Trailblazer,” that is intended to sift through reams of digital communications intercepts and find nuggets of information relevant to national security. The program’s task is huge—to sort through the 2 million bits of data the NSA collects every hour—and one made even more complex by the relatively new types of wireless, Internet, cell phone, and instant messaging communications now becoming ever more commonplace.

http://www.historycommons.org/context.jsp?item=civilliberties_115#civilliberties_115

Menwith Hill eavesdropping base undergoes massive expansion

by 5ocietyx

Menwith Hill

America’s largest eavesdropping centre in Britain, Menwith Hill in North Yorkshire, is being expanded in a multimillion-pound programme as it becomes increasingly vital to US intelligence and military operations, according to a study of the controversial base released on Thursday.

The base, which plays a key role in the global network of the National Security Agency (NSA), GCHQ’s American partner, now includes 33 radomes – commonly called “golf balls” after the white sheeting protecting the satellite receiving and transmission stations – and is undergoing a big construction programme.

The study describes the programme, called Project Phoenix, as “one of the largest and most sophisticated high technology programmes carried out anywhere in the UK over the last 10 years”. Work on it has been reserved for US-based arms corporations including Lockheed Martin and Northrop Grumman, and their personnel with high-level security clearance, it notes.

Though the base is officially called RAF Menwith Hill, most of the staff there are US employees of the NSA. The total number of people working there is due to increase from 1,800 last year (of whom 400 were British) to 2,500 in 2015.

Full Article:

http://www.guardian.co.uk/world/2012/mar/01/menwith-hill-eavesdropping-base-expansion

%d bloggers like this: