[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Intercept: NSA MONKEYROCKET: Cryptocurrency / AnonBrowser Service - Full Take Tracking Users, Trojan SW




"agency working to unmask Bitcoin users about six months before
Ulbricht was arrested, and that it had worked to monitor Liberty
Reserve around the same time"
"American spies were also working to crack Liberty Reserve"
"analysts have .. tracked down senders / receivers of Bitcoin"
the agency was interested in surveilling some competing
cryptocurrencies, "Bitcoin is #1 priority,"

"using this â??browsing product,â?? which â??the NSA can then exploit.â??

"These programs involve ventures with US companies."
Staff travel to "Virginia partner / these extremely patriotic
business associates" highly cloaked.

Partner provided first/last name metadata... large influx of
traffic... ftp process... causing disk space to fill up

Powers also used for traditional police work
â??other targeted users will include those... International / Organised
Crime and Narcotics...Follow-The-Money" missions

cyber targets that utilize online e-currency services...
Thereâ??s no elaboration on who is considered a â??cyber target.â??

that the NSA would â??launch an entire operation ... under false
pretensesâ?? just to track targets is â??pernicious,â?? ... Such a practice
could spread distrust of privacy software in general, particularly in
areas like Iran where such tools are desperately needed by dissidents.
This â??feeds a narrative that the U.S. is untrustworthy,â??

"Despite Bitcoinâ??s reputation for privacy... you should really lower
your expectations of privacy on this network.â??

financial privacy â??is something that matters incrediblyâ?? to the
Bitcoin community, and expects that â??people who are privacy conscious
will switch to privacy-oriented coinsâ?? after learning of the NSAâ??s
work here.

If the governmentâ??s criminal investigations secretly relied on NSA
spying, that would be a serious concern. Individuals facing criminal
prosecution have a right to know how the government came by its
evidence, so that they can challenge whether the governmentâ??s methods
were lawful. That is a basic principle of due process. The government
should not be hiding the true sources for its evidence in court by
inventing a different trail.


Civil liberties advocates have long suspected that the Justice
Department is underreporting Section 702 cases in order to limit court
challenges to the controversial law. Some theorize that the government
conceals Section 702 use through a process known as â??parallel
construction,â?? in which evidence obtained from the warrantless
surveillance authority is reobtained through traditional FISA
authorization, and the government only discloses the latter authority
in U.S. District Court. One defense lawyer referred to this practice
in a court filing as â??launderingâ?? Section 702 evidence.

The government intercepts Americansâ?? emails and phone calls in vast
quantities using this spying law and stores them in databases for
years,â?? said Patrick Toomey, staff attorney for the American Civil
Liberties Unionâ??s National Security Project. â??FBI agents around the
country then go searching through that trove of data as a matter of
course, including in domestic criminal investigations.

If the FBI uses parallel construction to conceal intelligence
community information, it would not be the only federal law
enforcement agency doing so. In 2013, Reuters obtained documents from
the U.S. Drug Enforcement Administration that showed how agents were
trained to â??recreateâ?? investigative trails to conceal how intelligence
intercepts helped to identify criminal targets.