| Home - Latest News | Introduction | Bayside Prophecies | Directives from Heaven | Order Form | Testimonies | Veronica Lueken | Miraculous Photos | Bible | Radio Program |

 These Last Days News - January 15, 2014

NSA Uses Radio Waves to Spy on Computers Without Internet...

"It is known through history that once a country has given itself over to all manner of paganism and sin, it is not long before that country falls into a system of dictatorship, bringing great sorrow, even murder to the masses.” – Jesus, May 26, 1979

The New York Times reported on January 14, 2014:

The National Security Agency has implanted software in nearly 100,000 computers around the world that allows the United States to conduct surveillance on those machines and can also create a digital highway for launching cyberattacks.

While most of the software is inserted by gaining access to computer networks, the N.S.A. has increasingly made use of a secret technology that enables it to enter and alter data in computers even if they are not connected to the Internet, according to N.S.A. documents, computer experts and American officials.

The technology, which the agency has used since at least 2008, relies on a covert channel of radio waves that can be transmitted from tiny circuit boards and USB cards inserted surreptitiously into the computers. In some cases, they are sent to a briefcase-size relay station that intelligence agencies can set up miles away from the target.

The radio frequency technology has helped solve one of the biggest problems facing American intelligence agencies for years: getting into computers that adversaries, and some American partners, have tried to make impervious to spying or cyberattack. In most cases, the radio frequency hardware must be physically inserted by a spy, a manufacturer or an unwitting user.

The N.S.A. calls its efforts more an act of “active defense” against foreign cyberattacks than a tool to go on the offensive. But when Chinese attackers place similar software on the computer systems of American companies or government agencies, American officials have protested, often at the presidential level.

Among the most frequent targets of the N.S.A. and its Pentagon partner,United States Cyber Command, have been units of the Chinese Army, which the United States has accused of launching regular digital probes and attacks on American industrial and military targets, usually to steal secrets or intellectual property. But the program, code-named Quantum, has also been successful in inserting software into Russian military networks and systems used by the Mexican police and drug cartels, trade institutions inside the European Union, and sometime partners against terrorism like Saudi Arabia, India and Pakistan, according to officials and an N.S.A. map that indicates sites of what the agency calls “computer network exploitation.”

“What’s new here is the scale and the sophistication of the intelligence agency’s ability to get into computers and networks to which no one has ever had access before,” said James Andrew Lewis, the cybersecurity expert at the Center for Strategic and International Studies in Washington. “Some of these capabilities have been around for a while, but the combination of learning how to penetrate systems to insert software and learning how to do that using radio frequencies has given the U.S. a window it’s never had before.”

No Domestic Use Seen

There is no evidence that the N.S.A. has implanted its software or used its radio frequency technology inside the United States. While refusing to comment on the scope of the Quantum program, the N.S.A. said its actions were not comparable to China’s.

“N.S.A.'s activities are focused and specifically deployed against — and only against — valid foreign intelligence targets in response to intelligence requirements,” Vanee Vines, an agency spokeswoman, said in a statement. “We do not use foreign intelligence capabilities to steal the trade secrets of foreign companies on behalf of — or give intelligence we collect to — U.S. companies to enhance their international competitiveness or increase their bottom line.”

Over the past two months, parts of the program have been disclosed in documents from the trove leaked by Edward J. Snowden, the former N.S.A. contractor. A Dutch newspaper published the map of areas where the United States has inserted spy software, sometimes in cooperation with local authorities, often covertly. Der Spiegel, a German newsmagazine, published the N.S.A.'s catalog of hardware products that can secretly transmit and receive digital signals from computers, a program called ANT. The New York Times withheld some of those details, at the request of American intelligence officials, when it reported, in the summer of 2012, on American cyberattacks on Iran.

The President is scheduled to announce on Friday what recommendations he is accepting from an advisory panel on changing N.S.A. practices. The panel agreed with Silicon Valley executives that some of the techniques developed by the agency to find flaws in computer systems undermine global confidence in a range of American-made information products like laptop computers and cloud services.

Embracing Silicon Valley’s critique of the N.S.A., the panel has recommended banning, except in extreme cases, the N.S.A. practice of exploiting flaws in common software to aid in American surveillance and cyberattacks. It also called for an end to government efforts to weaken publicly available encryption systems, and said the government should never develop secret ways into computer systems to exploit them, which sometimes include software implants.

Richard A. Clarke, an official in the Clinton and Bush administrations who served as one of the five members of the advisory panel, explained the group’s reasoning in an email last week, saying that “it is more important that we defend ourselves than that we attack others.”

“Holes in encryption software would be more of a risk to us than a benefit,” he said, adding: “If we can find the vulnerability, so can others. It’s more important that we protect our power grid than that we get into China’s.”

From the earliest days of the Internet, the N.S.A. had little trouble monitoring traffic because a vast majority of messages and searches were moved through servers on American soil. As the Internet expanded, so did the N.S.A.'s efforts to understand its geography. A program named Treasure Map tried to identify nearly every node and corner of the web, so that any computer or mobile device that touched it could be located.

A 2008 map, part of the Snowden trove, notes 20 programs to gain access to big fiber-optic cables — it calls them “covert, clandestine or cooperative large accesses” — not only in the United States but also in places like Hong Kong, Indonesia and the Middle East. The same map indicates that the United States had already conducted “more than 50,000 worldwide implants,” and a more recent budget document said that by the end of last year that figure would rise to about 85,000. A senior official, who spoke on the condition of anonymity, said the actual figure was most likely closer to 100,000.

That map suggests how the United States was able to speed ahead with implanting malicious software on the computers around the world that it most wanted to monitor — or disable before they could be used to launch a cyberattack.

A Focus on Defense

In interviews, officials and experts said that a vast majority of such implants are intended only for surveillance and serve as an early warning system for cyberattacks directed at the United States.

“How do you ensure that Cyber Command people” are able to look at “those that are attacking us?” a senior official, who compared it to submarine warfare, asked in an interview several months ago.

“That is what the submarines do all the time,” said the official, speaking on the condition of anonymity to describe policy. “They track the adversary submarines.” In cyberspace, he said, the United States tries “to silently track the adversaries while they’re trying to silently track you.”

If tracking subs was a Cold War cat-and-mouse game with the Soviets, tracking malware is a pursuit played most aggressively with the Chinese.

The United States has targeted Unit 61398, the Shanghai-based Chinese Army unit believed to be responsible for many of the biggest cyberattacks on the United States, in an effort to see attacks being prepared. With Australia’s help, one N.S.A. document suggests, the United States has also focused on another specific Chinese Army unit.

Documents obtained by Mr. Snowden indicate that the United States has set up two data centers in China — perhaps through front companies — from which it can insert malware into computers. When the Chinese place surveillance software on American computer systems — and they have, on systems like those at the Pentagon and at The Times — the United States usually regards it as a potentially hostile act, a possible prelude to an attack. Mr. President laid out America’s complaints about those practices to President Xi Jinping of China in a long session at a summit meeting in California last June.

At that session, Mr. President tried to differentiate between conducting surveillance for national security — which the United States argues is legitimate — and conducting it to steal intellectual property.

“The argument is not working,” said Peter W. Singer of the Brookings Institution, a co-author of a new book called “Cybersecurity and Cyberwar.” “To the Chinese, gaining economic advantage is part of national security. And the Snowden revelations have taken a lot of the pressure off” the Chinese. Still, the United States has banned the sale of computer servers from a major Chinese manufacturer, Huawei, for fear that they could contain technology to penetrate American networks.

An Old Technology

The N.S.A.'s efforts to reach computers unconnected to a network have relied on a century-old technology updated for modern times: radio transmissions.

In a catalog produced by the agency that was part of the Snowden documents released in Europe, there are page after page of devices using technology that would have brought a smile to Q, James Bond’s technology supplier.

One, called Cottonmouth I, looks like a normal USB plug but has a tiny transceiver buried in it. According to the catalog, it transmits information swept from the computer “through a covert channel” that allows “data infiltration and exfiltration.” Another variant of the technology involves tiny circuit boards that can be inserted in a laptop computer — either in the field or when they are shipped from manufacturers — so that the computer is broadcasting to the N.S.A. even while the computer’s user enjoys the false confidence that being walled off from the Internet constitutes real protection.

The relay station it communicates with, called Nightstand, fits in an oversize briefcase, and the system can attack a computer “from as far away as eight miles under ideal environmental conditions.” It can also insert packets of data in milliseconds, meaning that a false message or piece of programming can outrace a real one to a target computer. Similar stations create a link between the target computers and the N.S.A., even if the machines are isolated from the Internet.

Computers are not the only targets. Dropoutjeep attacks iPhones. Other hardware and software are designed to infect large network servers, including those made by the Chinese.

Most of those code names and products are now at least five years old, and they have been updated, some experts say, to make the United States less dependent on physically getting hardware into adversaries’ computer systems.

The N.S.A. refused to talk about the documents that contained these descriptions, even after they were published in Europe.

“Continuous and selective publication of specific techniques and tools used by N.S.A. to pursue legitimate foreign intelligence targets is detrimental to the security of the United States and our allies,” Ms. Vines, the N.S.A. spokeswoman, said.

But the Iranians and others discovered some of those techniques years ago. The hardware in the N.S.A.'s catalog was crucial in the cyberattacks on Iran’s nuclear facilities, code-named Olympic Games, that began around 2008 and proceeded through the summer of 2010, when a technical error revealed the attack software, later called Stuxnet. That was the first major test of the technology.

One feature of the Stuxnet attack was that the technology the United States slipped into Iran’s nuclear enrichment plant at Natanz was able to map how it operated, then “phone home” the details. Later, that equipment was used to insert malware that blew up nearly 1,000 centrifuges, and temporarily set back Iran’s program.

But the Stuxnet strike does not appear to be the last time the technology was used in Iran. In 2012, a unit of the Islamic Revolutionary Guards Corps moved a rock near the country’s underground Fordo nuclear enrichment plant. The rock exploded and spewed broken circuit boards that the Iranian news media described as “the remains of a device capable of intercepting data from computers at the plant.” The origins of that device have never been determined.

On Sunday, according to the semiofficial Fars news agency, Iran’s Oil Ministry issued another warning about possible cyberattacks, describing a series of defenses it was erecting — and making no mention of what are suspected of being its own attacks on Saudi Arabia’s largest oil producer.

"The children of God will face enslavement by the enemies of God, known as your world Christianity, unless you pray and carry the banner of Faithful and True to God the Father." - Our Lady of the Roses, September 7, 1974

"My children, I repeat, 666, known forever in the Book of life, the Bible, as the man of perdition, is not one man, but the forces of evil gathered like vultures to destroy the Christian and Christianity, to enslave the good and make powerful the bad, to make sin a way of life until each and every living creature of knowledgeable age must make the decision: Who is your master, man or God?" - Our Lady of the Roses, April 9, 1977

We urgently need your prayers and financial support to be able to continue to create these web pages.  Click here... Thank you in advance.

We strongly encourage you to print and/or email copies of this web page to all the bishops and clergy.  Also, email or mail a copy of this web page to the news media and as many other people as possible.     Email a copy of this page to everyone you know.

 When you pray the Holy Rosary, you have Our Lady's hand in your hand.  When you pray the Holy Rosary, you have the power of God in your hands.  Start now!  Let's All Pray the Rosary Together Around the World for Our Perseverance During the Coming Persecution... Click here...

 The Virgin Mary's Bayside Prophecy Books are Available in E-book Version.  Click Here Now!

The Awesome Bayside Prophecies...  http://www.tldm.org/Bayside/default.htm
These prophecies came from Jesus, Mary, and the saints to Veronica Lueken at Bayside, NY, from 1968 to 1995:

FALLEN TO SATAN
"We send from the Eternal Kingdom of the Lord high God in Heaven a warning to mankind. A great War will be soon upon you, claiming many lives throughout your earth. You will prepare yourselves and the souls of those you love. 
     "Your country has fallen to satan. Many countries throughout your world have given themselves to satan. The leaders in your country need many prayers.” – St. Michael, June 18, 1975

“YOU HOLD THE BALANCE”
"Your country, the United States of America, and many other countries of the world are being deceived. While they go forward seeking peace, the enemies of your God and your country are fast preparing to attack. Pray a constant vigilance of prayer, and recognize the faces of evil about you. Pray for the leaders of your country, My children. You hold the balance for the fate of your country.” – Our Lady, August 21, 1976

COUNTRY UNPROTECTED
"As I have warned you in the past, My children, while foolish man ran about crying peace, love, and brotherhood, planning to disarm, to leave your country unprotected, others whom your leaders shake hands with are planning your destruction. 
     "My children, an arsenal of arms now are being gathered throughout the world. They are major instruments of destruction. It is the regime of terror that man has brought upon himself by rejecting his God. 
     "Your country, the United States and America, has become a land of pagans. Your country and America and many countries of the world have given themselves over to all manner of pleasures of the flesh and defilement of the human body and desecration of their bodies and their spirits.” – Our Lady, February 1, 1978

FURY OF AN ANGRY GOD
"Sin has become a way of life in your country and all of the nations of earth! I say unto you: many hearts shall grieve, but too late will they seek to do penance! Too late will they seek to right the wrong. As you sow, you shall reap! And as you are sowing now, you shall reap the fury of an angry God.” - Jesus, May 28, 1977

WRATH OF THE FATHER
"Much tribulation lies ahead, but these trials have been brought upon you by man. As it was in the days of Noe, so it is in your day that man is prideful and arrogant, seeking to place scientific knowledge above the Father. Rationalization for sin, so that sin now is a way of life! Souls in darkness, homes in darkness, and churches in darkness--whatever will become of you? You ask for the wrath of the Father upon you!” - St. Paul, March 24, 1974

PRAY FOR LEADERS
"The leaders of your country and the leaders throughout the world have taken upon themselves a measure of sin creating insanity. 
     "In the light of the Spirit descending from Heaven, you shall be given the knowledge of truth, My children. Accept it and take it as your candle, for you must now go throughout your world saving your brothers, preparing them for what lies ahead.” – Our Lady, September 13, 1975

FRANKLIN ROOSEVELT
"Your leader, Roosevelt, is in hell! Franklin Roosevelt, My child. His spirit is one of darkness. He enters anew upon earth from the abyss.  My child, I do not expect you to understand at this time all I am having you repeat." - Our Lady, September 13, 1975

TED KENNEDY
"Many have been baptized--washed clean in the Faith, and now have chosen to destroy.
     "I sent you, My child, into your capital city to approach two with great power. We were not mistaken in the reaction, My child; More prayers are needed. You will write, and you must give out the knowledge without hesitating, that Heaven expects and commands the last of his clan [Ted Kennedy] in manhood to speak out and defend his Faith in your city of Washington! If he does not, My child, he will be condemned. He will be taken, My child, when he is unprepared.
     "Warn him once more, My child and My children, in the mercy that you have for your brothers. Speak out without fear, My child. It is too late; the hour grows late. You must now speak out and use the name. 
     "You will write to Ted Kennedy and tell him that he faces eternal damnation."  - Our Lady, September 6, 1975

SIN A WAY OF LIFE
"My child and My children, as it was in the past, so it shall be. There are many now foul deeds being committed upon the earth that cry to Heaven for retribution. The leaders of your country have lost their way, My child and My children. They are now making sin a way of life.” – Our Lady, October 6, 1992

Directives from Heaven... http://www.tldm.org/directives/directives.htm

D87 - Divinity of Jesus Christ  PDF Logo PDF  Order copies...
D88 - Martyrdom  PDF Logo PDF  Order copies...
D134 - U.S. Government Leaders PDF Logo PDF  Order copies...
D266 - 
Persecution  PDF LogoPDF  Order copies...
D329 - Revolution  PDF LogoPDF  
Order copies...   

EDITOR'S COMMENT:  Evil is accelerating and the Anti-Christ forces are gaining power in the world.  When the persecution starts, all Christian web sites on the internet will be forced to close.  Be sure to have in your possession all the following items: the Bayside Prophecy books, Bayside Medals, Douay-Rheims Bibles, the Protection Packets, Candles, Sacramentals, and Religious Books.  Purchase these items now while they are still available!  You will urgently need them in the days ahead.  Also, you can print out all PDF files for the Directives from Heaven and all of the Bayside Prophecies.  Copy Our Lady's messages and the Directives from Heaven now while they are still available!  Pray to the Holy Spirit for wisdom and guidance on how to prepare now and for the days ahead when the Antichrist is revealed.  Viva Cristo Rey!

Articles…

Seattle Archbishop condemns gay "marriage," fears State-made theology, lawsuits
http://www.tldm.org/News9/homosexualityArchbishopBrunett.htm

The Tyrant State: Prophetic warnings of Pope John Paul II
http://www.tldm.org/News11/TyrantState.htm

Australia's Cardinal Pell warns of coming 'war' on Church from biotech, gay 'rights', Islamic fears
http://www.tldm.org/News11/CardinalPellComingWarAgainstChurch.htm

Catholic school nurse settles lawsuit against employer over sex-ed order
http://www.tldm.org/News11/CatholicSchoolNurseSettlesLawsuit.htm

Terms "father", "mother, "wife", "husband" being legally suppressed in more nations by homosexuals
http://www.tldm.org/News11/TermsFatherMotherSuppressedInMoreNations.htm

Court rules British Airways may prohibit crosses but not symbols of other religions
http://www.tldm.org/News11/BritishAirwaysProhibitsCrosses.htm

Why Canadians are forbidden to express their Church's teaching
http://www.tldm.org/News12/WhyCanadiansAreForbiddenToExpressChurch'sTeaching.htm

UK, Canada ran neck and neck in 2006 race to exterminate religious freedom
http://www.tldm.org/News10/UKCanadaExterminatingReligiousFreedom.htm

Pope Benedict: 'false prophets' are the ones fighting Christmas
http://www.tldm.org/Christmas/PopeFalseProphetsFightingChristmas.htm
 

Archbishop Chaput candid about Islamic persecution of Christians
http://www.tldm.org/News8/IslamicPersecutionOfChristians.htm

Students barred from wearing Christian chastity symbol in UK school
http://www.tldm.org/News9/PersecutionUK.htm

Valedictorian speech cut off at the name of Christ
http://www.tldm.org/News9/PersecutionValedictorianSpeech.htm

Muslim terrorists behead 14-year-old Christian boy
http://www.tldm.org/News9/MuslimsBeheadChristianBoy.htm

Beheaded Christian girls were Ramadan 'trophies'
http://www.tldm.org/News9/IndonesianMilitantsBeheadGirls.htm

British Airways backs down on cross ban after international outrage
http://www.tldm.org/News9/PersecutionBritishAirways.htm

Two Catholic men sentenced to ten years in prison for “blasphemy”
http://www.tldm.org/News9/PersecutionPakistan.htm

Click here to email this page to a friend.

There are 4 things you must have to survive the days ahead:

1.) The Douay-Rheims Holy Bible...

"You must all obtain a copy of the Book of life and love, the Bible. Do not accept the new mods. Try to find in your bookstores the old Bibles, My children, for many are being changed to suit the carnal nature of man.  I repeat, sin has become a way of life." - Our Lady, October 6, 1992  
    "I must ask you all to read but a few short chapters a day now, the Book of life and love, your Bible. Knowledge must be gained for all the disciples of My Son, for you will be attacked by scientific minds. But do not be concerned what you will say to them when accosted, for the words will be given to you by the Spirit." - Our Lady, April 10, 1976
  (Order Form)

2.)  The total Virgin Mary’s Bayside Prophesies in 6 paperback books...

The Virgin Mary brings directions from God, the Father in Heaven on how to survive the end times.  God, the Father, through the Virgin Mary, tells what is coming, how to prepare for it, how to survive it, and how to even stop it.  These six volumes along with the Bible are most important to save yourself and your loved ones.  Order it now.  Tomorrow may be to late.  These 6 pocket size paperback books costs $33.00.   (Order Form)

3.)  Heaven's Home Protection Packet...

Heaven’s Home Protection Packet...
Our Lord stated we must have crucifixes upon the outside of all of our outside doors. In the "Heaven’s Home Protection Packet" there are instructions, four crucifixes, a tube of special cement for wooden or metal crucifixes. Wooden crucifixes adhere better to the doors when the aluminum strap is removed from the back. Put a light coat of cement on the back of the crucifix and then press it to the outside of the door. If you have any problems, you can call us at 616-698-6448 for assistance. This Heaven’s Home Protection Packet is available for a donation of $7.00 plus $3.00 shipping and handling. Send $10.00 to TLD Ministries, P.O. Box 40, Lowell, MI 49331. Item # P15  (Order Form)

Crucifix on front and back door...  The only real protection against terrorists...
Jesus - "Pray and wear your sacramentals. And, also, My children, I ask you again to place a crucifix upon your door. Both front and back doors must have a crucifix. I say this to you because there will be carnage within your areas, and this will pass you by if you keep your crucifix upon your doors." (6-30-84) (Testimonies of lives and homes saved by the crucifixes.)  http://www.tldm.org/news/crucifix.htm    (Order Form)

4.) Heaven's Personal Protection Packet...

Heaven’s Personal Protection Packet . . .
Our Lady tells us to be protected from all evil, we must wear the following sacramentals around our necks: a Rosary, a crucifix, the St. Benedict medal, Our Lady of the Roses medal, the Miraculous Medal, and the scapular. We have all of these sacramentals in a packet we call "Heaven's Personal Protection Packet." This packet is available for a donation of $6.00 plus $3.00 shipping and handling. Send $9.00 to TLD Ministries, P.O. Box 40, Lowell, MI 49331. Item # P5  (Order Form)

    Our Lady of the Roses, Mary Help of Mothers promises to help protect our children. On September 13, 1977, She said, "He has an army of ogres wandering now throughout your country and all of the countries of the world. They are in possession of great power; so wear your sacramentals, and protect your children and your households. Learn the use every day of holy water throughout your household. Insist even with obstructions, insist that your children always wear a sacramental. One day they will understand that they will repel the demons."
    On February 1, 1974, Our Lady said, "My children, know the value of these sacramentals. Guard your children well. You must awaken to the knowledge that you will not be protected without the sacramentals. Guard your children's souls. They must be surrounded with an aura of purity. Remove them if necessary from the sources of contamination, be it your schools or even false pastors."
    This Heaven’s Personal Protection Packet is available for a donation of $6.00 plus $3.00 shipping and handling. Send $9.00 to TLD Ministries, P.O. Box 40, Lowell, MI 49331. You may use your MasterCard, VISA, or American Express and call 1-616-698-6448.  Item # P5
(Order Form)

| Home - Latest News | Introduction | Bayside Prophecies | Directives from Heaven | Order Form | Testimonies | Veronica Lueken | Miraculous Photos | Bible | Radio Program |

"My children, My little humble children, I appeal to you as your Mother, go forward on foot, knock on the doors; bring the light to your brothers and sisters.  For those who have been given great grace, much is expected of them." - Our Lady of the Roses  May 26, 1976

We encourage everyone to print or email copies of this web page to all the Bishops and all the clergy.  Also, email or send this web page to the news media and as many people as possible.

My gift to help spread Our Lady of the Roses' messages to the world.
Amount: $  

The electronic form of this document is copyrighted.    
Quotations are permissible as long as this web site is acknowledged through hyperlink to: http://www.tldm.org
Copyright © These Last Days Ministries, Inc. 1996 - 2013   All rights reserved.
P.O. Box 40                   616-698-6448
Lowell, MI 49331-0040
Revised:
July 31, 2018