i recently came to possess a printed out slide deck detailing an nsa collection program against telegram. i got it very accidentally, i live in a building with many national security-types and found the printout in the trash area. sounds crazy, not sure who's it was or why they took it out of a secure facility, but weirder things have happened. in a past life i used to work in government and even held a security clearance at times, and the program seems plausible to me. not going to post the slides themselves, don't want anyone to get in trouble, but i have no problem summarizing.
* the nsa collection program is called JUICYSTUFF. sometimes abbreviated JUST or JUST*. the program has buckets for different targets. JUSTRUMORS = russia, JUSTCHAOS = china, JUSTDISORDER = north korea, JUSTINSIGHT = iran, JUSTHAVOC = violent extremist organizations, JUSTMIRE = rest of world, JUSTSILENCE = telegram bots, etc.
* the program primarily uses two technical tools, TEMPTINGBAKE, sometimes abbreviated TEBA, and HUNTINGGLASS. both work by spoofing target users when interacting with telegram servers.
* TEMPTINGBAKE is the more sophisticated tool. given a telegram user id, it can collect the user's contact list, messages and media. it can only collect content accessible and readable on telegram servers so not things like secret chats. because its so sensitive nsa limits it to a few hundred targets per day. there are thousands of targeted users on TEMPTINGBAKE collection so most are collected every several weeks.
* HUNTINGGLASS requires a user id and additional telegram key information associated with the target user. nsa can usually provide this from other data holdings. it collects the same information as TEMPTINGBAKE.
* total telegram users targeted is in the 10s of thousands. tasking users is managed by an internal nsa jira instance. the target management aspect of the collection program is called JUDICIOUSHARVEST.
* nsa runs the program for the whole us intelligence community and the five eyes.
fair to have some skepticism about this, would love to see if any anons have heard of this program (i hadn't) or have ideas for figuring out accuracy. i hope the fact that this was printed means someone else out there with more knowledge is trying to get the word out. there's too much organizing that unfortunately happens on telegram not more secure methods imo, so i consider this as a warning. maybe telegram even tacitly allows the program so they can maintain their facade of user privacy.
>27051
And yet, you only know about the veracity of the Snowden leaks because of journalists.
Sure they work for corporate overlords with all the auto-censoring that comes with it, yet what I said is still true. Maybe you're not old enough to remember the hundreds of leak about the 5 eyes program that only a few believed to be true a few decades ago. They chose to believe them without any proof, they were right in the end but that doesn't make it very smart to believe everything posted on the Internet, it's on the same level as believing any other unsourced conspiracy theory.
>27052
>Have you seen what Snowden's slides looked like? They can easily be faked, they're not that interesting. The only way to verify OP is through doxing OP, and that's dumb to want.
And that's why we need journalists, people paid to work hours to verify the authenticity of them lmao.
Do you really think they received the slides and decided to post them straight away? No. It took 3 weeks for the first article to be posted, and they were halfway into his trove 6 months later. Because they searched for sources, analyzed metadata and discussed with Snowden in order to, at least, verify some info were real.
There's dozen of uni papers about the challenge of verifying those leaks, which goes into more details.
>The only way to verify OP is through doxing OP, and that's dumb to want
No. Most whistleblowers don't get prosecuted, we only focus on Snowden, Winner and Assange because they leaked massive troves and did mistakes, turning them into martyrs in some ways. Medias did not know how to properly leak & verify their leak at the time and some did mistakes, like sharing slides with hidden watermarks directly with the NSA and exposing their source. But by now they have developed guidelines to not make the same mistakes and assume everything is watermarket or contains small typos to detect the source of the leak.
Now let's focus on OP's post.
>printed top secret report
>in the trash
>outside of a 'secure facility'
>printed slides because why not
>about Telegram (hot rn because of all the news surrounding the arrest of Pavel)
I'm sorry but I'm calling BS on this one. And it's just my opinion. I prefer to have people verifying at least a single point of this before going head first into it and choosing to believe it with all fibers of my body. You do you.
It reads just like a creation of someone who have read the publicly accessible Vault 7 leak.
Don't get me wrong, the Intel community is most likely spying on telegram, yes, as it's absolutely not and encrypted messaging application (at least not by default, with a weak encryption anyway when activated), and it's smart to assume they do. But this post with details anyone can imagine, nah fam, I'm not believing it until someone can reach another source and put his reputation in line.
TLDR: can be true, most likely a program exist, but we can't take OP's words as true just because we like it and believe it's true.