Cisco Routers Backdoors #Talpiot

Operation Talpiot

Compiled by Lisa Phillips of OpDeepState.com

Cisco CEO to Visit Israel, Launch a Network of Tech Hubs Designed to Digitize Israel’s Peripheral Communities

Chuck Robbins, CEO of Cisco Systems, will meet with Israeli President Reuven Rivlin and visit Cisco’s local research and development centers while in the country

January 3, 2018

by Hagar Ravet

Chuck Robbins, CEO of San Jose, California-based networking hardware and telecommunication company Cisco Systems, will arrive on a 36-hour visit to Israel on March 5, Cisco said in a statement on Wednesday. Mr. Robbins will participate in the launch of Cisco’s country digitization acceleration (CDA) program, Cisco’s social initiative to digitize Israel’s peripheral communities and connect them with the country’s economic and technological center in Tel Aviv.

During his visit, Mr. Robbins will meet with Israeli President Reuven Rivlin, visit local Cisco research and development centers, and meet Israeli tech executives, entrepreneurs, and startups.

Oren Sagi, general manager of Cisco Israel, said in a statement that the planned visit is part of Cisco’s commitment to closing the socio-economic gap by technological means.

Speaking on a radio program by Israeli college the Interdisciplinary Center Herzliya earlier this month, Zika Abzuk, senior manager of business development in Cisco Israel, discussed Cisco’s CDA plan, saying that by summer, the company is set to launch 24 tech hubs in peripheral communities in Israel. “We are trying to accelerate the digitization of these areas to contribute to equality,” Ms. Abzuk said. “Israel is known as the Startup Nation, but the tech industry is a closed ecosystem. We want to push its walls, so it covers all of Israel.”

Ms. Abzuk said that Cisco has already established such hubs in several small towns in Israel’s southern region, as well as both in East and West Jerusalem. Ms. Abzuk also said that Cisco is exploring recreating the CDA initiative in Greece and other countries.

Mr. Robbins, who was appointed CEO of Cisco in 2015, first visited Israel in January of 2017, to mark the company’s 20 years of activity in the country. Cisco operates two research and development centers in Israel, in Jerusalem and the coastal city of Netanya, in Israel’s central region. Cisco has bought 13 Israel-based companies to date, for a combined sum of around $7 billion. In 2016, Cisco acquired cloud cybersecurity company CloudLock Inc. and chip developer startup Leaba Semiconductor Ltd.

Cisco bought Jerusalem-based video software company NDS Group Ltd. in 2012 for $5 billion, merging it into its Cisco Videoscape division, which has since downsized, letting go hundreds of employees in several layoff rounds. In January, Calcalist reported the company is now looking to sell NDS at a steep discount, and is holding discussions with several private equity funds, with a possible tag price of around $1 billion.

Source:  https://www.calcalistech.com/ctech/articles/0,7340,L-3733068,00.html

Backdoors Keep Appearing In Cisco’s Routers

July 19, 2018

by Lucian Armasu

Over the past few months, not one, not two, but five different backdoors joined the list of security flaws in Cisco routers.

Cisco Architecture for Lawful Intercept

Way back in 2004, Cisco wrote an IETF proposal for a “lawful intercept” backdoor for routers, which law enforcement could use to remotely log in to routers. Years later, in 2010, an IBM security researcher showed how this protocol could be abused by malicious attackers to take over Cisco IOS routers, which are typically sold to ISPs and other large enterprises.

Attackers could exploit these backdoors and not leave any audit trail. That’s how the lawful intercept protocol was designed so that ISP employees can’t tell when a law enforcement agent logs to the ISP’s routers (even though law enforcement is supposed to gain this access with a court order or other legal access request).

Furthermore, this protocol could be abused by ISP employees because no one else working for the ISP could then tell when someone gained access to the routers via Cisco’s Architecture for Lawful Intercept.

New “Undocumented Backdoors” Appear

In 2013, revelations made by German paper Der Spiegel showed that the NSA was taking advantage of certain backdoors in Cisco’s routers. Cisco denied accusations that it was working with the NSA to implement these backdoors.

In 2014, a new undocumented backdoor was found in Cisco’s routers for small businesses, which could allow attackers to access user credentials and issue arbitrary commands with escalated privileges.

In 2015, a group of state-sponsored attackers started installing a malicious backdoor in Cisco’s routers by taking advantage of many of the routers that kept the default administrative credentials, instead of changing them to something else.

In 2017, Cisco, with help from a Wikileaks data leak, discovered a vulnerability in its own routers that allowed the CIA to remotely command over 300 of Cisco’s switch models via a hardware vulnerability.

Five New Backdoors In Five Months

This year has brought five undocumented backdoors in Cisco’s routers so far, and it isn’t over yet. In March, a hardcoded account with the username “cisco” was revealed. The backdoor would have allowed attackers to access over 8.5 million Cisco routers and switches remotely.

That same month, another hardcoded password was found for Cisco’s Prime Collaboration Provisioning (PCP) software, which is used for remote installation of Cisco’s video and voice products.

Later this May, Cisco found another undocumented backdoor account in Cisco’s Digital Network Architecture (DNA) Center, used by enterprises for the provisioning of devices across a network.

In June, yet another backdoor account was found in Cisco’s Cisco’s Wide Area Application Services (WAAS), a software tool for Wide Area Network (WAN) traffic optimization.

The most recent backdoor was found in the Cisco Policy Suite, a software suite for ISPs and large companies that can manage a network’s bandwidth policies. The backdoor gives an attacker root access to the network and there are no mitigations against it, other than patching the software with Cisco’s update.

Whether or not the backdoor accounts were created in error, Cisco will need to put an end to them before this lack of care for security starts to affect its business.

Source:  https://www.tomshardware.com/news/cisco-backdoor-hardcoded-accounts-software,37480.html

Cisco Commits to Sustainable Development of Russian Technology Innovation Agenda Through $1B Multi-Year Investment

June 24, 2010

Cisco CEO Chambers Signs MoU with Viktor Vekselberg to Establish Physical Presence in Skolkovo; Announces I-Prize Contest for Russia; Extends Venture Capital Investment by $100M

SAN JOSE, Calif. and MOSCOW – June 23, 2010 – In a meeting today in San Jose, President of the Russian Federation Dmitry Medvedev and Cisco Chairman and CEO John Chambers discussed a wide-ranging series of collaborative initiatives that will underpin the Russian Federation’s technology innovation agenda. During the meeting, Cisco made a firm commitment to invest $1B USD to drive entrepreneurship and sustainable innovation in Russia as a partner in achieving the country’s goals.   Cisco has identified a five phase collaborative approach over this next decade through which this $1B investment will be staged.  The five phases will run in parallel. During the meeting today, John Chambers and Viktor Vekselberg also signed a memorandum of understanding to underline its firm commitment to the Skolkovo Project as the platform for this innovation initiative.

  1. A focused effort to attract talent, ideas and investment in partnership with the venture capital community forms the basis of the first phase.  Cisco today announced that it will extend its existing venture commitment to Russia’s innovation economy with an incremental $100M.   Through direct innovation-enabling investments and a deepening of its collaborative model with Almaz Capital Partners, Cisco aims to further stimulate the venture community which enables Russia’s innovation agenda.  In extending its longstanding focus on talent development, Cisco also today committed to increase the number of Cisco Networking Academies to 300 across the country.
  1. As part of our second phase of establishing an innovation and venture platform in the country, Cisco announced a firm commitment to establish a dedicated physical presence in Skolkovo.   The collaborative memorandum of understanding (MoU) signed today will form a platform for Cisco’s future cooperation with the government and local businesses.  Cisco will immediately begin applying resources in terms of business development, thought leadership, services and consulting to shape this commitment.  Cisco aims to establish Skolkovo as the first of a next-generation of Smart+Connected Communities in Russia, and establish a collaborative model for Russia’s future sustainable social, economic and environmental development.
  1. As part of phase three, Cisco is now extending its dedicated Cisco research and development capability in Russia.  It is our intent that along with the Skolkovo infrastructure build out, Senior Vice President Marthin De Beer will establish a second global headquarters for our Emerging Technologies Group and will locate key members of its engineering team in Skolkovo.   Cisco aims to initiate several internal Cisco start-up business units using the Skolkovo innovation platform, and will contribute to transforming Skolkovo into one of the most advanced technology regions in the world.  Cisco already operates dedicated manufacturing and development for Russia-specific routing technologies, and will look to extend its engineering expertise throughout the region.
  1. Phase four will focus on collaboration in the areas of go-to-market models for the creation and success of start-ups in partnership with the Russian venture capital community.   In alignment with this effort, and as an initial focus to catalyze the spirit of innovation, Cisco also announced the third phase of its I-Prize competition, open specifically to entrepreneurial teams in Russia to identify ideas and participate in Cisco start-ups which have the potential to become Cisco’s next billion dollar businesses.  Cisco will provide $175,000 USD in overall prize money for the winning Russian teams in the contest, as part of the multi-year investment announced today, and envisions extending and commercializing the winning concept from the Russian I-Prize through its presence in Skolkovo.
  1. In the fifth phase, Cisco will build a model for partnering with existing businesses, venture capital and technology companies in Russia. By building a collaborative model that showcases how to successfully partner with existing leading-edge Russian teams, Cisco will look to work on joint development projects in areas such as smart grid, financial services, service provider models, financing, broadband implementation and social networking to develop exportable products, solutions and business models.  Cisco will also look to extend the value of its physical facilities in Skolkovo over time through the use of collaborative technologies to develop a broader virtual presence to drive innovation throughout Russia and beyond.  The intention is to help replicate a series of Smart+Connected Community Innovation Centers around the world that are first physical locations and then eventually virtual.

Key Facts

Skolkovo Project

  • The Skolkovo Project plans were publicly announced last March by President Medvedev and aim to develop a technology and innovation hub in Russia. Built around President Medvedev’s priorities for economic development and modernization, the Skolkovo project will focus on areas in information and communication technology as well as biotech, energy and nuclear technology. The project will be managed and financed by a consortium of public and private organizations in Russia.
  • According to the MoU, Cisco will share with the Fund global best practices and expertise in the creation of innovation centers and put forward this expertise to the development of the Skolkovo Project. Special emphasis will be put on the creation of a culture of innovation, collaboration and replicable business models.
  • One of the areas of focus for Cisco and the Skolkovo project will be for Cisco to play a key role in the design of ‘Technopolis Skolkovo’, a framework that will be based on the business model behind the Cisco Globalisation Centre East in Bangalore, India.
  • ‘Technopolis Skolkovo’ will be designed to fully reflect the concepts of Cisco Smart+Connected Communities and will serve as a best practice facility in multiple focus areas such as: Smart Connected Buildings, Smart Grid, Smart Connected Real Estate, Safety and Security, Connected Transportation, Education, and Healthcare.
  • Cisco and the Fund will also work on other ICT and Entrepreneurship skills development programs that are created based on existing Cisco education and training programs and initiatives such as the Cisco Entrepreneur Institute program.  Cisco’s Entrepreneur Institute, already successfully operating in countries such as the US, Turkey and Mexico, provides a practical curriculum for entrepreneurs and small business owners to develop their full potential.

Cisco I-Prize for Russia

  • The Cisco I-Prize, now entering its third stage, is a global innovation competition that has mined collective wisdom to identify and develop new business models and opportunities for Cisco.  The winning team from the first round of the I-Prize contest was in fact a joint Russian – German team whose ideas made a significant contribution to Cisco’s connected energy strategy.
  • In Russia, Cisco is announcing its intention to tap collaborative innovation, and to help stimulate this type of creativity and will offer total prize money of $175,000 for this initial contest.    Cisco will award a prize of $100,000 USD to the winning entry, the second winning team will receive $50,000 and the third team $25,000.   Further details on how to enter and categories for entry will be announced shortly.  If successful, Cisco will examine running additional I-Prize contests in Russia to further stimulate innovation.
  • The Russian contest is intended to attract talent and ideas that have the potential to become new start-up ventures that could be based in the new ‘Technopolis Skolkovo’.   The winning idea and team will likely also represent an opportunity for investment by Cisco and/or venture capital firms.

Cisco’s longstanding commitment to Innovation and Skills Development

  • To date, Cisco has made both direct and indirect venture investments in locations such as the US, China, India, Israel, South Korea, Mexico and across Europe, including Russia.
  • Cisco is extending and accelerating our investments in markets in which we are already present, and we are entering into new markets with exciting new teams and partnerships as part of our overall strategy of global market investment.
  • In 2008, Cisco announced a $30M USD anchor investment in the Almaz Capital Russia Fund I, L.P., as part of an initial $60M USD close of a venture capital fund that focuses on Russia and the Commonwealth of Independent States (CIS), in collaboration with Almaz Capital Partners.
  • Cisco has been an active participant in developing technology education initiatives in Russia for several years and currently has 133 active Cisco Networking Academies delivering educational programs across the country of which 54 are based in the Moscow area.  With this announcement and with this announcement will increase the number to 300

Executive Quotes

    • President Dmitry Medvedev, president of the Russian Federation

“During the next decade Russia should become a country in which the welfare and the good quality of life is ensured by its intellectual, rather than natural, resources, its innovative economy.  The Skolkovo Project embodies the focus that we are placing both on innovation and public private partnership and we welcome the significant commitments that Cisco is making with us today to support Russia’s future.”

    • Viktor Vekselberg, president of the Fund for the Development of Russia’s Center for Elaboration and Commercialization of New Technologies

“We are very excited to have Cisco’s support in advancing the Skolkovo project.  As a key global technology organization, Cisco is a front-runner for advancing innovation models.  We view the Skolkovo project as a truly international initiative, and it is my view that instead of reinventing the bicycle, we should learn from the successful models that originated in the US. We look forward to a successful cooperation with Cisco.”

    • John T. Chambers, chairman and chief executive officer, Cisco

“President Medvedev’s vision of transforming economic development through innovation is closely aligned with Cisco’s belief that the innovative application of technology can have a positive impact on a country’s competitiveness, diversification of its industry base, its ability to create jobs and improve quality of life for its citizens. Cisco is aggressively hiring talent and investing in innovation as we capture market transitions. Our approach is to grow jobs and investments aligned with the growth and opportunity in our business, here in the United States and globally where we see countries investing in education, infrastructure and innovation. Russia is clearly doing just that, which for Cisco represents an opportunity to grow our global business and our innovation platform.”

    • Paul Mountford, president of Emerging Markets for Cisco

“Russia is rapidly building out its communications infrastructure, which presents a unique opportunity for local entrepreneurs to develop new technologies and applications. Cisco is committed to support the building of entrepreneurial capacity in Russia and looks forward to catalyze and accelerate tech innovation and intends to become a defining player in taking technology investment in the region to the next level. We see a clear economic benefit to Cisco, and it is our belief that the I-Prize innovation competition for Russia we are announcing today has the potential to generate between 200 – 300 new ideas by tapping into these new sources of collective development.”

Supporting Resources:

Source:  https://newsroom.cisco.com/press-release-content?type=webcontent&articleId=5582254

Uncovering the DoD Sith Lords that Control Your Laptop

One of the best ways to describe the U.S. Department of Defense and DARPA (Defense Advanced Research Projects Agency) is to use the Star Wars moniker “Evil Empire” to describe its international, secretive agenda to take over the world and turn all of us into neo-feudal slaves who have no choice but to give allegiance to the controllers of the universe—Darth Vader and the Sith Lords.

DARPA “Vader” has controlled technological innovation since 1958 when it was created by the military-driven Evil Empire, a/k/a Department of Defense. Every emerging technology from the Evil Empire leads humanity into the science fiction fate of machines controlling humans, much like Darth Vader became a weapon that was half man and half machine. There is much wisdom and truth that lies behind the first Star Wars movie, and its story was given to humanity as a warning of how the Evil Empire and its Death Star planned to destroy the entire planet.

Folks, this is no longer science fiction. This battle for Earth is going on now and we, like the Rebel Alliance, must join forces to destroy the imperial forces of Darth Vader.

Aside: Do you know the real back story of Star Wars? If not, see Star Wars: The Secret Weapon and Why George Lucas has Kept It Hidden

Folks at the DoD should read science fiction so that they can see how their actions—individually and collectively–are leading humanity into the evil destiny commonly found in sci-fi: robot wars, cyborgs turning against humans, computer take-over of the world, endless weapons, and, you guessed it – the Death Star. DARPA is the father of war-fighting, both conventional and digital. And as we all know, Darth Vader took his orders from the Evil Emperor. DARPA Vader is controlled by a man they called “Yoda,” but is in reality the Evil Emperor who leads a group called the Highlands Forum (Evil Empire Imperial Command) that directs all military research and development. 

Who is this Evil Emperor who looks as innocent as Yoda? His name is Andrew Marshall and for decades this single man has driven the Highland Forum (Evil Empire) into creating weapons of every sort that have been released into the corporate world and now control your laptop, phone, computer, and every other device with a microprocessor inside – especially the “Evil Intel Empire Inside.”

Intel Inside is found in our private digital devices and is, in fact, collecting “Intelligence” for the Department of Defense, CIA, and NSA who are all members of the Evil Empire. Yes, the one they call “Yoda” is actually the Evil Emperor in disguise who controls DARPA Vader and the evil Sith lords of war. He does not have lightning bolts shooting out of his fingers – unless of course he uses one of his many DARPA inventions to do so.

  • Save

 

Andrew Marshall

Andrew Marshall: Former Head of the Highlands Forum

The Evil Emperor, as we call Andrew Marshall, was the director of the United States Department of Defense‘s Office of Net Assessment from 1973 to 2015. He was appointed by Richard Nixon and remained in office during all successive administrations that followed until his retirement on January 2, 2015. Marshall created the Highlands Forum as a secret think tank for warfare innovation. All meetings are invitation only and not open to the public and no written records are kept. Marshall created this type of secret platform so that no one could prove the Highland Forum exists or has the greatest power over tech warfare on the planet.

DARPA and the Highlands Forum have essentially taken over the world and few people have noticed. From creating the devices that control all nuclear weapons to incubating the technologies that created the Internet (originally ARPANET), Intel microprocessors, Cisco routers, Google search engines, Facebook, the Internet of Things, I-phones, Microsoft software, MacAfee security software, and all conventional and digital warfare devices, among many others. The Highlands Forum has been the headquarters of the Evil Imperial Empire for five decades. The Evil Emperor Andrew Marshall has the blood of millions on his hands and yet he is considered an America hero instead of a warlord criminal.

There’s an Intel Inside

  • Save

To be truthful, this ad should read:

Intel “LOOKS” Inside

Ever wonder why Intel used to run those warm fuzzy ads letting us know that there was an “Intel Inside,” as if we had a choice of what microprocessor was inside our computer? They had a monopoly on microprocessors for decades and certainly end-use consumers didn’t have a choice of what components were inside their computers. Why would Intel spend money on ads to make us feel good about Intel? For goodness sake, it is just a microchip in your computer.

Key Point: What if we were to tell you that inside every Intel microprocessors is a smaller processor that lets the Sith Lords at Intel – who work for the Department of Defense –control every aspect of your computer remotely no matter what encryption codes you use.

Yes, the Evil Emperor (Andrew Marshall) was able to retire two years ago at age 94 knowing that the Empire’s control has reached into every digital device in the world through the good work of his best student, DARPA Vader. The only thing left for the Evil Emperor to do is activate the Death Star, which as you will see in the DARPA “future plans” below, has already been built. The question is: “Will Luke Skywalker show up and defeat the Evil Empire?”

Intel-Based PC’s Permanently Hackable

  • Save

To be truthful, this ad should read:

Intel “Controllers” of Tomorrow

All Intel microprocessor chips have a built-in backdoor that allows complete remote access to a PC, your PC, through a second physical processor embedded within the main processor which has its own operating system embedded on the chip. It is being advertised as something that will allow IT professionals the ability to remotely troubleshoot a PC. Intel’s latest x86 chips contain a secret backdoor with an embedded subsystem called the Management Engine (ME) that functions as a separate CPU and cannot be disabled, and the code is proprietary.

The Management Engine is a dedicated micro-controller on all recent Intel platforms. The first versions were included in the network card and later moved into the chipset where it shares flash with the BIOS but is completely independent of the CPU. It allows IT professionals to view the contents of hard drives, check the memory, hunt for problems on a machine remotely, or take over the system entirely.

Even an encrypted hard drive can be monitored and controlled by the “processor within the processor” that already has your encryption key. There is more than just the NSA monitoring your calls, emails, and transmissions — there is Intel (DARPA) “Inside” your computer. Intel collects “intelligence” but it also provides a backdoor to control, or turn off your computer at will just like it has been demonstrated that Cisco routers have a backdoor open to the NSA. A backdoor is a method of bypassing normal authentication in a cryptosystem used for securing unauthorized remote access to a computer.

Key Point: The word Intel was used for this DARPA product because it is collecting personal INTELLIGENCE from YOU that can be used against YOU anytime the Evil Empire decides it is to be done.

Why does DARPA, through Intel, have open access to all of your files and your computer? DARPA funded all of the original development of microprocessors. Intel is a front for DARPA and the military efforts to create, control, and weaponize all digital platforms through cyber-warfare. DARPA, ARPARNET, DARPANET, the Internet, and microprocessors are military creations that were allowed to come into the public market place only after the Department of Defense, and the CIA through In-Q-Tel, installed backdoors to control these powerful digital platforms of war fighting.

Some European-made chips used in defense contracts have a built-in “kill switch” that can be accessed remotely to disable a microprocessor remotely on weapons that use the chip. The Pentagon has realized that it no longer controls who manufactures the chips that go into its increasingly complex systems. Nearly every military system today contains some commercial hardware. No entity, no matter how well funded, can afford to manufacture its own safe version of every chip in every piece of equipment.

Vetting a chip is nearly impossible and requires a scanning electron microscope to examine the many layers of a chip and the millions or billions of transistors. Semiconductor chips are made in Singapore, Taiwan, China, Europe, but Intel designs and manufactures all their own chips in their own fabrication plants in America.

Defense Science Board, which advises the DoD on science and technology developments, warned in a report that the continuing shift to overseas chip fabrication would expose the Pentagon’s most mission-critical integrated circuits to sabotage. The board was especially alarmed that no existing tests could detect such compromised chips, which led to the formation of the DARPA Trust in IC program. Each year, secure government computer networks weather thousands of attacks over the Internet from places where most of our electronics are being manufactured. Any malefactor who can penetrate government security can find out what chips are being ordered by the DoD and then target them for sabotage.

In other words, DARPA Vader and the Evil Emperor are in open warfare with the rebellion that has hi-jacked the microprocessing industry in the infiltrated the Imperial Command.

Calling on Rebels of the Alliance to Take Out the Real Death Star

Fellow Patriots and Rebels of the Alliance, we have taken the plans of the Galactic Empire’s Death Star and trust that you will know what to do with this Intel. Rebels have been preparing themselves since 1977, when the first Star Wars was released, to face the real Evil Empire, Darth Vadar, the Sith Lords, and the Imperial Command. This is no longer a science fiction fantasy or sequel to the next Star Wars. This is the real war and all Rebels of the Alliance are called to save the galaxy, or at least western civilization.

A Citizens Intelligence Report was previously given in a recent article. If you have not armed yourself with this intelligence, please do so now. The CIA and Deep State Exposed. We need all Alliance Rebels to analyze the Death Star’s plans and identify vulnerable exhaust ports that connect to the main reactor.

In this additional intelligence report to fellow Alliance Rebels, we will show you the following to assist in your planning efforts in analyzing the Death Star:

Microprocessors, the Internet, Cisco Systems, Google, and Intel were all DARPA projects that were allowed to flourish with new technologies created and funded by the military for cyberwarfare.

Most high-tech moguls are simply “front men” selling DARPA and In-Q-Tel (the CIA’s DARPA) products that control our lives and spy on us continually.

Intel processors have a backdoor built into the microprocessor that allows complete monitoring and control over your personal computer.

Cisco Systems is a front for DARPA routers that were created with a backdoor for the NSA to spy on “virtually every exchange on the Internet.”

Cisco System’s “Internet of Things” plants net-bots in all devices under its control that can be activated remotely and used for cyber-attacks.

The Internet was first a DARPA project called the ARPANET which was created as an information technology weapon for cyberwarfare.

DARPA, the Inventors of Warfare Technology

In 1999, the CIA created its own venture capital investment firm, In-Q-Tel, to fund promising start-ups that might create technologies useful for intelligence agencies just as the Department of Defense had years earlier created DARPA. Both groups are controlled by the Highlands Forum (Group). The Highlands Forum provides the ideas and funding for the scientific weaponization of new inventions through cooperation between the military and corporate contractors. Its biggest successes recently have been led by the CIA’s In-Q-Tel in the development of high-tech network-based cyber-warfare.

In-Q-Tel contracts almost all of its work through SAIC (Science Applications International Corporation) which changed its name to Leidos in 2013. Leidos is among the top 10 largest defense contractors in the U. S. and has a symbiotic relationship with the NSA and U. S. intelligence agencies.

The Highland Forum, DARPA, and In-Q-Tel are secret multi-national high-tech think tanks for inventing and controlling innovations that can be turned into weapons. Military and information technology experts gather at the Forum meetings to consider the impacts of the globalization of IT on U. S. interests and warfare. The Forum developed the idea of “network-centric warfare” which is now a top concern of the military and the corporations that serve it.

DARPANET = Internet

In 1973, DARPA initiated a research program to investigate techniques and technologies for interlinking packet networks of various kinds. The objective was to develop communication protocols which would allow networked computers to communicate transparently across multiple, linked packet networks for the use of defense contractors. This was called the “Internetting Project” and the system of networks which emerged from the research was known as ARPANET, later to be called Internet.

In 1986, the U.S. National Science Foundation (NSF) initiated the development of the NSFNET which, today, provides a major backbone communication service for the Internet. The National Aeronautics and Space Administration (NASA) and the U.S. Department of Energy contributed additional backbone facilities in the form of the NSINET and ESNET respectively. Thus, the electronic connectivity of the Internet was advanced with government funding.

A great deal of support for the Internet community has come from the U.S. Federal Government, since the Internet was originally part of a federally-funded research program and, subsequently, has become a major part of the U.S. research infrastructure.

Cisco Systems – DARPA Routers

Once the ARPANET proved to be effective, routers were created that could handle exchanges between systems and computers. In 1998, virtually every Internet exchange went through a Cisco router. In 2010, a researcher at IBM publicly revealed a flaw in a Cisco operating system that allows a hacker to use a backdoor that was supposed to be available only to law enforcement agencies. The intruder could hi-jack the Cisco device and use it to spy on all communications passing through it, including the content of e-mails, leaving products vulnerable to attack, particularly ubiquitous software programs like those produced by Microsoft. These backdoors put millions of customers and their private information at risk and jeopardizes the security of electrical power facilities, public utilities, and transportation systems.

Cisco has been accused of remotely monitoring users’ connections through Cisco’s Linksys E2700, E3500, E4500 devices. They have been reported to be remotely updated to a firmware version that forces users to register for a cloud service which allows Cisco to monitor their network use and ultimately shut down the cloud service account and render the affected router unusable.

Cisco has also been accused of building into their routers a firewall backdoor developed by NSA. The Tailored Access Operations (TAO) unit and other NSA employees intercept servers, routers and other network gear being shipped to organizations targeted for surveillance and install covert firmware onto them before they’re delivered. These Trojan horse systems were described by an NSA manager as being “some of the most productive operations in TAO because they pre-position access points into hard target networks around the world.”

The Creation of DARPA’s Google

The United States intelligence community funded, nurtured and incubated Google as a military weapon to control information. Seed-funded by the NSA (DARPA) and CIA (In-Q-Tel & SAIC), Google was one among a group of private sector start-ups co-opted by U.S. intelligence to control information warfare.

In 1994 (the same year the Highlands Forum –DARPA’s boss — was founded under the stewardship of the Office of the Secretary of Defense, the ONA, and DARPA) two PhD students at Stanford University, Sergey Brin and Larry Page, made their breakthrough on the first automated web crawling and page ranking application. That application remains the core component of what eventually became Google’s search service. Brin and Page had performed their work with funding from the Digital Library Initiative (DLI), a multi-agency program of the National Science Foundation (NSF), NASA and DARPA.

The NSA needed to control and monitor digital information, particularly the data flowing over the Internet. With its millions of customers around the world, Google is effectively a directory of people using the Internet. It stores users e-mail addresses and knows where they’re physically located, when they log in, and what they search for on the web. Google has a profile on every user. The government can “command” that any company must turn over that information, and it does so as part of the NSA’s Prism program, which Google had been participating in for years by the time it signed the cooperative agreement with the NSA.

Under Google’s terms of service, the company advises its users that it may share their personal information with outside organizations, including government agencies, in order to “detect, prevent, or otherwise address fraud, security or technical issues” and to “protect against harm to the rights, property or safety of Google.”

Intelligence Agencies Control Industry

No intelligence organization can survive if it doesn’t know its enemy. As expansive as the NSA’s network of sensors is, it’s sometimes easier to get precise intelligence about hacking campaigns from the targets themselves. That’s why the NSA partnered with Google. Google’s Sergey Brin is just one of hundreds of CEOs who have been brought into the NSA’s circle of secrecy. Starting in 2008, the agency began offering executives temporary security clearances, some good for only one day, so they could sit in on classified threat briefings.

Private high-level meetings are just one way the NSA has forged alliances with corporations. Several classified programs allow companies to share the designs of their products with the agency so it can inspect them for flaws and, in some instances, install backdoors or other forms of privileged access. The types of companies that have shown the NSA their products include computer, server, and router manufacturers; makers of popular software products, including Microsoft; Internet and e-mail service providers; telecommunications companies; satellite manufacturers; antivirus and Internet security companies; and makers of encryption algorithms.

The NSA helps the companies find weaknesses in their products. But it also pays the companies not to fix some of them. Those weak spots give the agency an entry point for spying or attacking foreign governments that install the products in their intelligence agencies, their militaries, and their critical infrastructure. Microsoft, for instance, shares zero day vulnerabilities in its products with the NSA before releasing a public alert or a software patch. McAfee, the Internet security company owned by Intel, provides the NSA, the CIA, and the FBI with network traffic flows, analysis of malware, and information about hacking trends.

Companies that promise to disclose holes in their products only to the spy agencies are paid for their silence. To an extent, these openings for government surveillance are required by law. Telecommunications companies in particular must build their equipment in such a way that it can be tapped by a law enforcement agency presenting a court order. But when the NSA is gathering intelligence abroad, it is not bound by the same laws. The surveillance it conducts via backdoors and secret flaws in hardware and software would be illegal in most of the countries where it occurs.

AT&T is Controlled by Homeland Security

The Homeland Security Department conducts meetings with companies through its “cross sector working groups” initiative. These sessions are a chance for representatives from the large group of companies with which the government shares intelligence to meet with one another and hear from U.S. officials. The attendees at these meetings often have security clearances and have undergone background checks and interviews. Between January 2010 and October 2013, the period for which public records are available, the government held at least 168 meetings with companies just in the cross sector working group. There have been hundreds more meetings broken out by specific industry categories, such as energy, telecommunications, and transportation.

Through this exchange of intelligence, the government has created a cyber security business. AT&T and CenturyLink are in effect its private sentries, selling protection to select corporations and industries. AT&T has one of the longest histories of any company participating in government surveillance. Most phone calls in the United States pass through AT&T equipment at some point, regardless of which carrier initiates them. The company’s infrastructure is one of the most important and frequently tapped repositories of electronic intelligence for the NSA and U.S. law enforcement agencies.

CenturyLink, which has its headquarters in Monroe, Louisiana, has been a less familiar name in intelligence circles over the years. In 2011, the company acquired Qwest Communications, which is now a part of the NSA’s extended security apparatus.

DARPA’s History

DARPA’s history is littered with death and destruction. DARPA and In-Q-Tel, through the Highlands Forum (Group), have driven research and development for the military that has cost American taxpayers trillions. This same technology is also shared with countries throughout the world through open source sharing. The U. S. military wants our enemies to have the technology so that they can be spied upon with ever more sophisticated technology and attacked with ever-better weapons.

Key Point: If both sides have the same technology and weapons, then the Military-Industrial Complex always needs more money to spend on bigger and better weapons, continually.

Areas of focus and discovery for DARPA over its history include: NASA space projects, information processing, ARPANET (Internet), ballistic missile defense, nuclear test detection, counterinsurgency, computer processing, behavioral sciences, materials sciences, sensors, surveillance, radar, infrared sensing, x-ray/gamma ray detection, global positioning satellites, information processing, tactical technologies, time-sharing systems, wide-area packet switching networks, packet radio networks, packet satellite networks, artificial intelligence, speech recognition, signal processing, robotics, hypermedia systems, virtual reality, personal computing, space technology, tactical armor, anti-armor programs, infrared sensing for space-based surveillance, high-energy laser technology, antisubmarine warfare, advanced cruise missiles, advanced aircraft, defense applications of advanced computing, integrated circuit research, submicrometer electronic technology and electron devices, very large-scale integration, charged particle beams, automatic target recognition, space based sensing, propulsion, aerospace planes, hypersonic research, strategic computing, advanced processing, networking technologies, lightweight satellites, interstellar travel, X-planes, computer security, and cyberwarfare, to name a few that have come into the public domain.

The list above is only the tip of the iceberg for DARPA projects. We do not know of the projects that are still classified, which could potentially be a much greater list. Every project of DARPA and In-Q-Tel have been weaponized before they are shared with the companies who then are the “front” for a DARPA sponsored company. DARPA and In-Q-Tel keep the encryption codes and build in backdoors so that they can always attempt to control the military weapons that have been released into the corporate world for public use.

Source:  http://totalrehash.com/uncovering-the-dod-sith-lords-that-control-your-laptop/

____________________

See also:  Lekem, BIRD, BARD & BSF: Covert and Legal Ways Soviet Israel Transfers United States’ Technology

CIA Helped Sell a Mapping Startup to Google. Now they won’t tell us why! In-Q-Tel/Keyhole – Lockheed Skunkworks Infiltrated by Israeli Spies for Decades & Silicon Valley was a Military Project from the Start

How the Clintons Sold Out U.S. National Interests to the Putin Regime + Cisco, Google & Intel

Israel – The Greatest Spy Machine of All Time

Operation Talpiot – Articles and Videos

The Feds’ 9,000 “Opportunity Zones” Will Allow Law Enforcement To Spy On 35 Million People

Be the first to comment

Leave a Reply

Your email address will not be published.


*


Share via
Copy link
Powered by Social Snap