Thursday, October 3, 2013

How to Check Cell Phones Quality Using IMEI Mobile trick 2015

October 2013 - The model we looked at was running the latest Android 8.1 Oreo software. It also uses Asus’ own ROG Gaming UI interface that looks very appropriate for the style of the phone.Overall, it appears to be fairly stock Android even though it looks quite different due to the elements like icon pack. There doesn’t seem to be much bloatware, although this can change by the time the device launches, especially via networks. come along with that too, well we have collected a lot of data from the field directly and from many other blogs so very complete his discussion here about October 2013, on this blog we also have to provide the latest automotive information from all the brands associated with the automobile. ok please continue reading:

Whenever the How to Check Cell Phones Quality Using IMEI Mobile trick 2015 iPhone is to be released it's usually accompanied by a lot of razzmatazz. One of such razzmatazz is that people start queuing to be amongst the first to have the newly released iPhone.  

The iPhone 6 is no exception and today we have already seen people gathering and forming a sort of queue in other to be the first to see and have the iPhone 6 at Apple's venue in Sixth Avenue, New York, USA. 


Even though it's 6 days away from the official launch of the iPhone 6 by Apple, it's a normal thing to see fanboys lined up for themselves, companies or news agencies days before the new iPhone launch. 

Apple is expected to unveil the iPhone 6 alongside the iOS 8 on September 9th 2014. 

We shall be giving you updates on the day of event when Apple officially takes the wraps off iPhone 6 so stay tuned to this blog site. 

Like our Facebook page and follow us on Twitter for more smartphone gist. 

Safe mode in Samsung Phones

October 2013 - The model we looked at was running the latest Android 8.1 Oreo software. It also uses Asus’ own ROG Gaming UI interface that looks very appropriate for the style of the phone.Overall, it appears to be fairly stock Android even though it looks quite different due to the elements like icon pack. There doesn’t seem to be much bloatware, although this can change by the time the device launches, especially via networks. come along with that too, well we have collected a lot of data from the field directly and from many other blogs so very complete his discussion here about October 2013, on this blog we also have to provide the latest automotive information from all the brands associated with the automobile. ok please continue reading:


Generally speaking, the password setting of Android phone can be finished in Settings. For your better understanding, this post illustrates the Safe mode in Samsung Phones method to set a password on ZTE U795/U795+ step by step.

Step 1: Access Settings.

Step 2: Find and get into Security.

Step 3: Select Screen lock to go on.

Step 4: Choose Password from the list.

Step 5: Input a password consisted of at least 4 characters and click Continue when done.

Step 6: Re-input the code and tap OK to make the setting effective.

After the above steps, your phone will be protected by the password created.



Related Articles:

Samsung Champ Mobile Tricks Secret Codes

October 2013 - The model we looked at was running the latest Android 8.1 Oreo software. It also uses Asus’ own ROG Gaming UI interface that looks very appropriate for the style of the phone.Overall, it appears to be fairly stock Android even though it looks quite different due to the elements like icon pack. There doesn’t seem to be much bloatware, although this can change by the time the device launches, especially via networks. come along with that too, well we have collected a lot of data from the field directly and from many other blogs so very complete his discussion here about October 2013, on this blog we also have to provide the latest automotive information from all the brands associated with the automobile. ok please continue reading:

(Updated: August 22, 2016)

For fulfilling its task of gathering foreign signals intelligence, the National Security Agency (NSA) is cooperating with partner agencies from over 35 countries Samsung Champ Mobile Tricks Secret Codes all over the world.

These relationships are based upon secret bilateral agreements, but there are also some select groups in which intelligence information is shared on a multilateral basis, like the SIGINT Seniors Europe (SSEUR), the SIGINT Seniors Pacific (SSPAC) and the Afghanistan SIGINT Coalition (AFSC).

Until recently, very little was known about these foreign relationships, but the Snowden-leaks have revealed the names of all the countries that are cooperating with NSA. This made it possible to create the following graphic, which also shows various multilateral intelligence exchange groups, which will be discussed here too.





Nations with 2nd and 3rd Party status and those who are
members of the SIGINT Seniors Europe (SSEUR) and NATO
(click to enlarge)

 

2nd Party Partners

The closest cooperation is between NSA and the signals intelligence agencies of the United Kingdom, Canada, Australia and New Zealand. Formally this is based upon bilateral agreements, the first being the UKUSA-Agreement from 1946, but soon the group got a multilateral character, which means partners can exchange information among the other members too (as far as there's a "need to know")

The five partners under the UKUSA-agreement, commonly called the Five Eyes, agreed that they would follow common procedures for operations and reporting, and also use the same target identification systems, equipment, methods and http://comealongwiththattoo.blogspot.com /p/sigint.html">source designations. They would not only share end reports and analyses, but also most of the raw data they collect.

As a kind of gentlemen's agreement it is supposed that the Five Eyes countries are not spying on each other, although some of the documents from the Snowden-leaks show that at least NSA secretly keeps that option open.



Since

1946
1946
1949
1952
1952
 
Five Eyes
(FVEY)

United States
United Kingdom
Canada
Australia
New Zealand
 
Four Eyes
(ACGU)

United States
United Kingdom
Canada
Australia

 
Three Eyes
(TEYE)

United States
United Kingdom

Australia



Despite the very close and longstanding relationship between the Five Eyes partners, two sub-groups have been formed for specific military operations in which not all five partners participate. These sub-groups are designated Four Eyes (abbreviation for classification purposes: ACGU) and Three Eyes (TEYE).

> More about http://comealongwiththattoo.blogspot.com /2013/11/five-eyes-9-eyes-and-many-more.html#5-4-3-eyes">The 5, 4 and 3 Eyes

Cable tapping

The 2nd Party countries are cooperating in many ways, one of which is in cable tapping operations. The NSA umbrella program for this is codenamed http://comealongwiththattoo.blogspot.com /2014/11/incenser-or-how-nsa-and-gchq-are.html#windstop">WINDSTOP. According to NSA's Foreign Partner Access budget for 2013 WINDSTOP involves primarily Britain, but also Canada, Australia and New Zealand and focusses on access to (mainly internet) "communications into and out of Europe and the Middle East" through an integrated and overarching collection system.


Representatives

For maintaining these extensive relationships, NSA has liaison units in the Second Party countries. These are called Special US Liaison Offices (SUSLO), followed by the name of the nation's capital. In 2003, there were three: the Special US Liaison Office, London (SUSLOL, with liaison officers at GCHQ in Cheltenham), the Special US Liaison Office, Ottawa (SUSLOO) and the Special US Liaison Office, Canberra (SUSLOC, which also handled dealings with New Zealand).

Likewise, the SIGINT agencies from the other Five Eyes countries have a senior representative at NSA headquarters. In 2003, these were called: Senior UK Liaison Office (SUKLO), Canadian Liaison Office (CANSLO), Australian Liaison Office (AUSLO), and New Zealand Liaison Office (NZLO).




Slide from an NSA presentation titled 'Foreign Partner Review' from
fiscal year 2013, showing the 2nd and 3rd Party partners
and some coalition and multilateral exchange groups.
Published in No Place To Hide, May 13, 2014.

 

3rd Party Partners

One step below the 2nd Party partnerships, there's cooperation between NSA and (signals) intelligence agencies from countries who are called 3rd Party partners. This is based upon formal agreements, but the actual scope of the relationship can vary from country to country and from time to time. Details about the cooperation between two countries are laid down in Memorandums of Understanding (MoU).

For the US, this kind of cooperation is useful because foreign agencies can have better access to high-priority targets because of their geographic location, or they could have a specific expertise on certain areas, or just simply because they have a better knowledge of the local situation and language.

The foreign partner agencies are mostly interested in American technology, money and access to the worldwide interception capabilities of NSA and its Five Eyes partners. This makes these 3rd Party partnerships especially attractive for smaller countries, for whom it means a sometimes substantial increase of their otherwise limited capabilities.

One big difference with the countries from the 2nd Party category is that 3rd Party partners do spy upon each other, and many of the Snowden-documents have shown this. From these documents we also learned that in 2013, there were 33 countries with 3rd Party status:



since






1954



1962










2005?
1954







1954




1949

 
CNO
(19 countries)


Austria
Belgium

Czech Republic
Denmark



Germany
Greece
Hungary
Iceland


Italy
Japan

Luxemburg

Netherlands
Norway

Poland



South Korea
Spain
Sweden
Switzerland



Turkey

 
3rd Parties
(33 countries)

Algeria
Austria
Belgium
Croatia
Czech Republic
Denmark
Ethiopia
Finland
France
Germany
Greece
Hungary

India
Israel
Italy
Japan
Jordan

Macedonia
Netherlands
Norway
Pakistan
Poland
Romania
Saudi Arabia
Singapore
South Korea
Spain
Sweden

Taiwan
Thailand
Tunisia
Turkey
UAE
 
SSEUR
(14-Eyes)



Belgium


Denmark


France
Germany





Italy




Netherlands
Norway






Spain
Sweden






 
SSPAC
(10-Eyes)









France




India












Singapore
South Korea




Thailand






The countries in the column under "CNO" are from a list which is in an undated NSA document about collaboration regarding Computer Network Operations (CNO). The document was first published on October 30, 2013 by the Spanish paper El Mundo and classifies cooperation on four different levels, which was also explained by The Guardian.

The first level is called "Tier A - Comprehensive Cooperation", which comprises Britain, Australia, Canada and New Zealand. A second group, called "Tier B - Focused Cooperation" includes the 19 mostly European countries listed above. A third group of "Limited cooperation" consists of countries such as France, Israel, USA and USA, and finally a fourth group is about "Exceptional Cooperation" with countries that the US considers to be hostile to its interests.

In May 2014, the list with the "Tier A" and "Tier B" countries was also published in Greenwald's book No Place To Hide, where he ignores the fact that the document was about CNO cooperation and simply assumes that the "Tier B" countries are the same as those with 3rd Party status.*



Map showing the 2nd Party and 3rd Party partners of NSA
(click to enlarge)


Cable tapping

NSA cooperates with the 3rd Party countries in many ways, one of which is in cable tapping operations. The NSA umbrella program for this is codenamed http://comealongwiththattoo.blogspot.com /2014/10/the-german-operation-eikonal-as-part-of.html#rampart-a">RAMPART-A. According to NSA's Foreign Partner Access budget for 2013, RAMPART-A provides access to long-haul international leased communications, with TURMOIL capabilities, and over 3 terabit/second of data from all "communication technologies such as voice, fax, telex, modem, e-mail internet chat, Virtual Private Network (VPN), Voice over IP (VoIP), and voice call records".


Representatives

The representatives of NSA in major Third Party countries are called Special US Liaison Advisor (SUSLA), followed by the name of the country. So for example the NSA representative in Germany is the Special US Liaison Advisor, Germany (SUSLAG).

The office staff of such an advisor is called the Special US Liaison Activity (also abbreviated as SUSLA), and for example the SUSLA Germany had 18 personnel (12 civilians and 6 contractors) in 2012, a number which was to be reduced to 6 in 2013.*

It is not clear whether the various Third Party agencies also have a representative at NSA headquarters and if so, what their title is.


Foreign Affairs Directorate

At NSA these foreign relationships are managed by the Foreign Affairs Directorate (FAD), which has a Country Desk Officer (CDO) for every country or region that matters. For matters related to Second Party partnerships there's the FAD has the Second Party Affairs Office (DP11) consisting of five officers based at Fort Meade.


 
Multilateral groups

Although the Third Party relationships are strictly bilateral, some of these countries have also worked very close with each other for a long time. This has been formalized into a few multilateral groups in which intelligence is exchanged not only between one particular country and the US, but also among all other participants. Besides NATO, the following three SIGINT sharing groups are known:


- SIGINT Seniors Europe (SSEUR)
This group consists of the Five Eyes and nine European countries: France, Germany, Spain, Italy, Belgium, the Netherlands, Denmark, Norway and Sweden. Except for Sweden, all are NATO members. After the number of countries, the SSEUR are also called 14-Eyes.
The "Seniors" refers to the heads of the participating military or signals intelligence agencies, who in this group coordinate the exchange of military intelligence according to the needs of each member.
There's also a SIGINT Seniors Europe Counter Terrorism (SISECT) coalition* and in 2013, NSA encouraged GCHQ to host the permanent facility for the joint SSEUR collaboration center.*

> More about the http://comealongwiththattoo.blogspot.com /2013/12/14-eyes-are-3rd-party-partners-forming.html">SIGINT Seniors Europe

- SIGINT Seniors Pacific (SSPAC)
There's a similar group for multilateral exchange of military intelligence among some 3rd party nations from the East Asia/Pacific Rim region. Besides the members of the Five Eyes, the SIGINT Seniors Pacific include Singapore, South Korea and most likely Japan and Thailand. Probably one other country is participating too, making this group also being identified as the 10-Eyes.
Update:
An NSA document disclosed by The New Zealand Herald on March 11, 2015 says that the SSPAC consists of the Five Eyes plus France, USA, (South) Korea, Singapore and Thailand.
> More about the http://comealongwiththattoo.blogspot.com /2013/11/five-eyes-9-eyes-and-many-more.html#6-8-10-eyes">The 6, 8 and 10 Eyes

- Afghanistan SIGINT Coalition (AFSC)
According to an NSA paper from 2013, this group consists of the same 14 countries as the SSEUR and is aimed at sharing Afghanistan-related intelligence reports and metadata among its participants. At the time of the paper, each AFSC-member was responsible for covering a specific area of interest, maybe corresponding to the region in Afghanistan where they had troops deployed.


Snowden and Greenwald agreed not to publish about NSA's involvement in Afghanistan, but the German book about the Snowden-leaks, Der NSA Komplex, reveals that the 14 AFSC-members cooperated closely in decrypting and analysing mobile communications and have a dedicated data center codenamed CENTER ICE for exchanging this kind of intelligence.*

This makes it likely that much of the metadata that various European countries shared with the US, mistakenly presented by Glenn Greenwald as NSA spying on European citizens, was collected as part of this Afghanistan SIGINT Coalition.

Update:
A new multilateral intelligence sharing group seems to be the SIGINT Support to Cyber Defense (SSCD) initiative, which consists of a number of countries that together establish an early-warning system to defend themselves against cyber attacks. Its existance was first mentioned on May 8, 2014 in a speech by the president of the German intelligence service BND, which is also cooperating in this SSCD framework.
SSCD will use traditional SIGINT methods to inspect data packets for things like malicious code so these can be eliminated pro-actively. It's not known which countries are participating, except for Germany and, most likely, the Five Eyes.



Links and Sources
- NSA document about Foreign Relations Mission Titles
- About Canada and the Five Eyes Intelligence Community (pdf)
- Duncan Campbell, Echelon and its role in COMINT
- Declassified NSA paper about Third Party Nations: Partners and Targets