General Discussion
Related: Editorials & Other Articles, Issue Forums, Alliance Forums, Region ForumsHoly. Fucking. Shit. The candle flickers... (NSA)
The odd bit of information about how the NSA is Storing all encrypted traffic that it encounters has been rattling around between what passes for synapses in my noggin.
Today, whilst working from my house, I log in to my corporate Virtual Private Network (using Cisco's VPN) and it hits me. This session is likely being logged. I will bet dollars to donuts that the NSA has a Cisco back door. That would mean that anyone with access to that NSA DB will have access to all the VPN traffic in the US.
ALL the VPN traffic. That's all the financials being sent back to the home offices, orders taken, emails, for virtually any corporation.
Are you groking this? ALL the VPN traffic for GE, Google, Microsoft, Apple, Monsanto, ... Name one that doesn't use VPN to protect their IT internals.
Merger proposals, buy lists, big orders, expansion plans, outsourcing plans, etc. Just the ticket if some venture capitalist wanted to know which way the market was blowing, eh? Good thing no one with access would ever notice that is at their fingertips. Good thing no one at a big firm would try to buy in to that DB.
Even if the NSA doesn't exploit it, I bet there are more than 1 or 2 one percenters trying to.
Cleita
(75,480 posts)enrichment. Why do you think it was so broad based and encompassing? If it had been the government and not private companies, the eavesdropping would have been more targeted, maybe organizations that might be harboring terrorists, knowingly or unknowingly, but EVERYBODY? That's only for profit, IMHO.
napoleon_in_rags
(3,991 posts)cantbeserious
(13,039 posts)Last edited Tue Jun 25, 2013, 09:42 PM - Edit history (1)
I personally no longer trust the US government based on just what we do know today.
hootinholler
(26,449 posts)The incestuous relationships between the CIA and Wall St. bother me already. That some contractor like Booze Allen muckety mucks could tap it is astounding.
You know those fuckers would tap it to find investments.
KT2000
(20,588 posts)They have corporate clients as well as government. Is the only firewall between them people like Snowden who think of it as their own personal info? Money is a more successful enticement than anything.
hootinholler
(26,449 posts)go west young man
(4,856 posts)..of course they are tapping into it for info on trading. Cheney and his chums will do anything for a buck. Link to their combined "asset" management webpage. http://www.carlyle.com/our-business/portfolio-of-investments/booz-allen-hamilton-inc
paparush
(7,964 posts)Where does our data go then?
Or when a contractor decides to go rogue and sell our secrets to the highest bidder.
It's so rife for blackmail and extortion.
Demeter
(85,373 posts)So you can guarantee that it's illegal, immoral, and blackmail.
leveymg
(36,418 posts)hootinholler
(26,449 posts)I knew they would screw me over then, but I kinda trusted them on the big stuff, like the Iron Curtain. I was naive.
leveymg
(36,418 posts)hootinholler
(26,449 posts)I'm too young for the ol up the river shit. I was a bubblehead on a boomer.
Likewise, Mark. We should get a beverage sometime you're in DC. PM me.
alterfurz
(2,475 posts)...what the government is actually doing is worse than you imagine. -- William Blum
We are so beyond fucked now that the light from fucked won't reach us for 10,000 years. -- Roseanne Barr
Xipe Totec
(43,890 posts)scarletwoman
(31,893 posts)Last I saw, 60% of the NSA's surveillance is being handled by private contractors - you know, corporations who work for profit.
hootinholler
(26,449 posts)Long time
scarletwoman
(31,893 posts)Last edited Fri Jun 28, 2013, 06:54 PM - Edit history (1)
doing what I can:
I don't care whether you approve or disapprove of Edward Snowden's leaks. What REALLY outrages me
Principiis obsta and Finem respice -- Resist the beginnings and Consider the end.
The Origins of the Overclass by Steve Kangas
(Edited to fix the other two links that I had originally included in this post - but which became invisible - after finding out what went wrong thanks to Skinner in the ATA group.)
hootinholler
(26,449 posts)I am oblivious at times. I had rec'd that thread.
scarletwoman
(31,893 posts)MrMickeysMom
(20,453 posts)That ought to tell you a great deal...
Hey, what a great jobs program. We literally have it all the way up and down the chain in government!
leveymg
(36,418 posts)eventually.
Encryption says, please target me. Idiots.
cui bono
(19,926 posts)It's kind of the reverse of those who say I have nothing to hide so I don't care. But in both cases it doesn't matter if you have anything to hide or not, you are supposed to be able to expect to have a right to privacy.
TransitJohn
(6,932 posts)Progressive dog
(6,920 posts)I missed the part in the post where the NSA is a particular race.
hootinholler
(26,449 posts)There were a number of threads last week where this was explored seriously and sarcastically.
I took it as a positive comment.
Doctor_J
(36,392 posts)unless that's two words. I forget
hay rick
(7,643 posts)Some private NSA contractors would have access to a whole lot of encrypted and supposedly privileged commercial information that is not classified for national security purposes. I don't suppose anyone would be tempted to act on or sell such information...
Ilsa
(61,698 posts)never did, did they?
pscot
(21,024 posts)between NSA and Silicon Valley?
nadinbrzezinski
(154,021 posts)It s so much...that making sense of all.
backscatter712
(26,355 posts)Make it sufficiently strong, and all the computers at Fort Meade and their new Utah facility won't be able to crack it.
hootinholler
(26,449 posts)They will rely on Cisco to provide VPN security, which is strongly encrypted. My bet is that the NSA has been able to strong arm a master key out of Cisco.
nadinbrzezinski
(154,021 posts)Encryption puts a red flag.
leveymg
(36,418 posts)backscatter712
(26,355 posts)Encrypt your data using a strong algorithm like AES, Blowfish, RSA (with a 4096-bit key), and all of the NSA's state-of-the-art supercomputers could be running continuously until the heat-death of the universe, and still won't be able to crack your encryption.
They can red-flag it and store it if they want, but they won't be able to reassemble the digital guacamole into the avocado.
leveymg
(36,418 posts)Hmmm . . . we'll start with the goacamole with gispacjo soup. and then for a main course . . .
If it were only so simple. The NSA isn't really there to break codes, anymore, anyway. It's all about profiling and these days - unless you're with Citigroup (in which case they KNOW you're breaking the law), your strong encryption just moves you a hop or two closer to the attention of an analyst. Carry on.
backscatter712
(26,355 posts)Bruce Schneier, for example.
But you're right - it's all about the metadata. They don't need to actually read the contents of your emails anymore - when they have your entire social network mapped out, they can figure out what you're doing without bothering with decrypting the message body.
...unless...
you use anonymous remailers to conceal the destination of your emails, and you use Tor to encrypt your web-surfing and make it difficult to figure out where you're surfing to, and so on.
I'll simply say that the technology is there to foil the NSA, but it is a bit of a pain in the ass to use.
LondonReign2
(5,213 posts)to defend ourselves against our own government?
backscatter712
(26,355 posts)By all rights, we should have a government that doesn't pull this shit. Not on its own citizens.
LondonReign2
(5,213 posts)How prescient
JoeyT
(6,785 posts)But I bet it would be possible to get a secret court to issue a warrant you weren't allowed to tell anyone about demanding you give them your encryption keys.
It's not like they've got a history of being out in the open or particularly troubled about anyone's rights.
backscatter712
(26,355 posts)They beat you with a rubber hose until you disclose the decryption key.
PoliticAverse
(26,366 posts)either by discovery of a successful attack or by a breakthrough in mathematics ?
AtheistCrusader
(33,982 posts)If they can, then you can bet they can muster the horsepower THEN to open it like a packet of peanuts.
backscatter712
(26,355 posts)Let them store it.
AtheistCrusader
(33,982 posts)Not a chance that encryption would hold ten years. Not a snowball's chance at the heart of the sun. That's a free market consumer solution to 'mining' encrypted bits attached to a few dollars.
That ain't shit compared to the money and the desire behind NSA decryption programs. If they need millions of hours of compute time to crack it, they will build that capacity. (Assuming they haven't already)
ConservativeDemocrat
(2,720 posts)The most likely method of breaking such an encryption would be to (after an appropriate court order had authorized it) use a key-logger to determine your private-key. For most keyboards this can be done from the street just by listening in to the faint RF signals. From there, all the encrypted traffic could be unlocked, even if you'd removed it from your computer.
Also, since we're on the subject, this clearly cannot be used to snoop on VPNs due to the sheer volume and mundanity of such. Most likely they're talking about storing encrypted emails.
- C.D. Proud Member of the Reality Based Community
AtheistCrusader
(33,982 posts)Ten more years of moore's law and whatever technologies replace integrated circuits in the coming years when we hit atomic limits on photolithography.
Time is not on your side. (To say nothing of undiscovered weaknesses in various encryption methods themselves.)
ConservativeDemocrat
(2,720 posts)Except for your parenthetical point about undiscovered weaknesses in the encryption methods, and maybe quantum computing (though that seems to have a serious limit in terms of how much can be entangled), there is no way that any expected advances in technology, or moore's law, will do anything to break hard encryption.
Brute force computation at the atomic limits on photolithography would still not be crackable at the heat death of the universe.
- C.D. Proud member of the Reality Based Community
ellennelle
(614 posts)not to throw aspersions on your asparagus
fwiw, when news there was to be the TIA i think in '03, it occurred to me that ultimately the folks who would end up benefitting most from that kind of info were the corporations, all those companies that manage to keep us enslaved in one form or another. in our jobs, by our things, to our consumption.
and make no mistake, this is the final crafting of the fascist state. especially when you remember that the very definition of fascism is governance by business; mussolini famously noted that fascism might just as well be called corporatism because it is a merger of state and corporate power. merger? more like corporate power swallowing the state.
mcclatchy's recent revelations about not just nsa's inside info on everything and everybody, but their agenda to propagate lies to manipulate the citizenry (think advertising from hell) - this is the real nightmare.
and we're in it. to my mind, the most effective means for all of us to shut it down is to break with the enslavement. the only way to do it is to stop feeding the beast. yup; pull the plug, cut the umbilicus, and - as john oliver alluded to recently - join the smug amish.
i know this makes me something of a luddite, but hey - any better ideas?
MNBrewer
(8,462 posts)hootinholler
(26,449 posts)Unless you're an asshole about it.
yodermon
(6,143 posts)perhaps Fucking Fascism, but fascism none the less
truedelphi
(32,324 posts)As in, 'Fuck it, we are now the Fourth Reich."
And when listening by accident usually to major people who are part of the Corporate MIC coup that has taken over America, "Shut up you fucking Fascist!" i said that a lot last week when stumbling upon a C Span recorded coverage of the Senate Committee on Intelligence and Surveillance, or what ever committee it was that Senators Di Feinstein and McCaskill were chairing last week.
Aerows
(39,961 posts)Hell, they have backdoors in all kinds of things.
Recursion
(56,582 posts)I can think of a million reasons that's impossible; I'm more curious why you think that's obvious.
hootinholler
(26,449 posts)Shit that defy explanation until the corner cases are fully explored.
I'll accept one technically solid reason why the NSA wouldn't have one.
Recursion
(56,582 posts)Your VPN gateway is (if you're doing it right) not your router, and you can tell if data is going anywhere you don't want it to.
hootinholler
(26,449 posts)Who wrote the monitor that is telling you everything is copecetic? Cisco. Consider the links in post 34
What do I know, I'm no security specialist, I just an old school programmer who laughs at them in meetings when they suggest some brain dead scheme that makes nothing more secure. Once in a while you come across a good one, then you pay attention.
Recursion
(56,582 posts)This isn't difficult
If data is getting out of my network, I can see it.
I built my router myself. Did the NSA hypnotize me and make me insert code into the my routing tables?
hootinholler
(26,449 posts)The packets are still visible on the net segment for each hop in the route. Your routing tables, first don't accept code, and second only identify the host (router or gateway) that you drop your packets to. Unless you're using some sort of quantum entangled point to point routing, oh wait, that would be a modem, not a router and in any event what happens to your packets after you hand them off is out of your control. It's why IP makes no specification about packet order at the receiving side.
I agree, though. This isn't difficult.
Recursion
(56,582 posts)The VPN device has no idea where it is. If it tries to phone home, I would see that in my router. Agreed?
hootinholler
(26,449 posts)My understanding is that they are just slurping the fat pipe.
You could well be right that your router protects you, how many corporations have implemented their own? Do you connect to Cisco on the other end of the VPN connection? Did you implement Cisco's VPN protocol from scratch?
PoliticAverse
(26,366 posts)One one of the original 'IT magicks': http://cm.bell-labs.com/who/ken/trust.html
hootinholler
(26,449 posts)Yes, along those lines, I was a programmer cub when that was written, earning a living working on hardware analysis.
leveymg
(36,418 posts)by all telcos and later for all ISPs routers. The entire Internet and fiber optic backbone inside the US is bugged, and that is mandatory by law. The same switches and routers are sold by CISCO and the others around the world. Everyone uses them to bug their networks. China included. So do we.
Recursion
(56,582 posts)Doesn't apply to anything on my LAN. I'm not a telecom.
If my VPN gateway device itself has a back door, how is the data getting through my router (that I built myself) without my seeing it?
Some of this woo is kind of amusing.
leveymg
(36,418 posts)If you have a private network bigger than your building, NSA will be interested. How do you connect remotely - your own cable or sat? Do your routers have an air space or are they connected to the web at some level?
Recursion
(56,582 posts)So, as I said at the start of this subthread, there's no "back door" to a VPN appliance on my LAN for the NSA.
The reality is bad enough; why make shit up?
leveymg
(36,418 posts)It must be someone v-e-r-y important to take so much trouble.
Recursion
(56,582 posts)That's what a lot of actual admins do.
leveymg
(36,418 posts)what you're talking about. My point is, I acknowledge that I'm an amateur, and have dealt with many IT admins and security pros working for major companies in my line of work. I know enough to know how unlikely it is that anyone is going to defeat NSA using off-the-shelf equipment and software that you or I could buy or build.
Recursion
(56,582 posts)This isn't some hackathon. I'm just saying if a VPN box tried to phone home, you would be able to tell that was happening.
HiPointDem
(20,729 posts)darkangel218
(13,985 posts)I haven't seen whilst in a while :p
hootinholler
(26,449 posts)I just like the word, use it all the time.
darkangel218
(13,985 posts)JDPriestly
(57,936 posts)Research and drafts of legal documents for law firms including criminal defense firms.
All your data are mine. That's what the NSA is saying to all of America. I think that commuting via computer and encrypted connection to work from your office may be a thing of the past.
Catherina
(35,568 posts)Allegedly, possibly, Snowden told them that but the reference to Snowden saying that came from one paper and it's been disputed. Personally, I don't believe he did because of other reports I read because this pissing match has been going on for a while. I think Chinese tech companies figured now is as good a time as any to oust Cisco. I certainly would if I were in their shoes, especially knowing how easy it is to hack into surveillance cameras with Cisco technology. Cisco's excuse is that this "bug" isn't really a bug, it's a feature.
So much irony here.
http://www.dailykos.com/story/2013/06/20/1217520/-NSA-Shenanigans-is-the-CISCO-Kid-ding
Snowden says NSA used Cisco to spy: China media
By Michael Kitchen
CSCO
LOS ANGELES (MarketWatch) -- A Chinese media report quoted former National Security Agency contract Edward Snowden as saying the U.S. government used Cisco Systems Inc. routers to spy on Chinese networks. The report on the Chinese-language site Techweb.com, dated Tuesday, also said that Cisco had been involved in many major Chinese Internet infrastructure projects, including those of military and government networks. However, an English-language report on TechinAsia.com, which cited the Techweb report and other Chinese media accounts, questioned whether Snowden in fact named Cisco, as some of the reports incorrectly named Cisco as part of the NSA's "Prism" operation.
http://www.marketwatch.com/story/snowden-says-nsa-used-cisco-to-spy-china-media-2013-06-18
By Sreeja VN | June 25 2013 6:33 AM
Edward Snowden, who leaked the National Security Agency's secret surveillance program and claimed the U.S. used equipment made by Cisco Systems Inc. (NASDAQ:CSCO) to spy on China, could have dealt a blow to the U.S. company's $2 billion in annual sales there -- after Chinese media said Cisco poses a security threat and urged a shift to domestic suppliers.
Earlier this month, Snowden claimed the NSA had monitored mobile and computer networks in China using Cisco routers, prompting Chinese media to denounce the company's products and describe products made by certain U.S. companies as a terrible security threat."
Chinese daily Sina claimed eight major U.S. companies -- Cisco, International Business Machines Corp. (NYSE:IBM), Google Inc. (NASDAQ: GOOG), Qualcomm Inc. (NASDAQ: QCOM), Intel Corp. (NASDAQ: INTC), Apple Inc. (NASDAQ:APPL), Oracle Corp. (NASDAQ:ORCL) and Microsoft Corp. (MSFT) -- are U.S. government's proxies in the surveillance program. Sina's report also claimed that China's national security is vulnerable to attacks from the U.S.
In an editorial this week, Global Times, a major Chinese newspaper, said that the country should develop its own Internet technology. Chinese media reports said efforts to reduce reliance on U.S. companies will help China ward off security threats and benefit domestic companies at the same time.
...
http://www.ibtimes.com/cisco-faces-challenges-chinese-media-urge-switching-domestic-products-national-security-reasons-wake
By Bloomberg News - 2013-06-25T03:13:07Z
Cisco Systems Inc. (CSCO) faces a backlash in China, where it generates about $2 billion in annual sales, after state-run media said the company poses a security threat and urged a shift toward domestic suppliers.
While Cisco has said it didnt participate in U.S. surveillance programs revealed earlier this month by former government contractor Edward Snowden, state-owned Chinese media outlets are calling for the company to face restrictions there.
China should develop its own Internet technology, the Global Times newspaper wrote in an editorial this week, alleging that the U.S. can attack China almost at will. U.S. companies, including Cisco, represent a terrible security threat, China Daily reported, citing an industry source it didnt identify. Shenzhen-based Huawei Technologies Co. is poised to benefit from any clients seeking Cisco alternatives.
No Monitoring
Cisco does not monitor communications of private citizens or government organizations in China or anywhere in the world, Earnhardt said in an e-mailed statement. We sell the same equipment globally, including both China and the United States, with no customization for purposes of such programs.
...
http://www.bloomberg.com/news/2013-06-25/cisco-china-sales-vulnerable-as-media-urge-domestic-shift.html
Note the weasel phrasing "Cisco does not monitor communications".
hootinholler
(26,449 posts)Thanks for the links about Cisco and the NSA!
Saves me some googlefoo!
I didn't realize there's a candle flickering smiley either.
Catherina
(35,568 posts)while making dinner lol, I wanted to come back and edit to thank you because, even though I'd read about it, it was great someone confirmed it with their own observation. The whisteblowers had indicated this without going into too much details so I started googling about the technology inside computers, cameras, TVs etc... None of it was very reassuring. Thank you for your
hootinholler
(26,449 posts)At least my salary would indicate that.
I was just astounded by the broadness of it. Seems like the GWOT is not about individuals (or terrorism) at all.
Catherina
(35,568 posts)I agree with you, the breadth of this is absolutely astounding.
Back Doors, Remote Access, Vulnerable Code - Are Chinese Routers Spying On Us?
Huawei staff performing routine maintenance - (Huawei)
By Paul Laubacher
Nouvel Observateur/Worldcrunch
Chinese routers from Huawei and ZTE are "a threat" for the United States, or even the world, according to a U.S. Congressional intelligence committee report made public on October 8. The committee suspects that these machines, which transmit Internet communications, could be working for the Chinese government.
...
The House Intelligence Committee's conclusions are stark. "Based on available classified and unclassified information, Huawei and ZTE cannot be trusted to be free of foreign state influence and thus pose a security threat to the United States and to our systems."
...
The congressmen launched their investigation because of the unclear relations between the Chinese government and the two companies. They believe that Beijing could use the two companies' products to conduct economic and military warfare, or even cyber-attacks. With Huawei and ZTE, according to the committee, China would have "the means, opportunity and motive to use telecommunications companies for malicious purposes."
The American authorities have suspected for a long time that chips, routers, and other digital equipment from China could be equipped with "back doors," hidden access that would allow an ill-intentioned remote user to connect, giving the Chinese government the chance to access sensitive information as it passes through the machines.
...
http://www.worldcrunch.com/tech-science/back-doors-remote-access-vulnerable-code-are-chinese-routers-spying-on-us-/huawei-zte-lindner-security-vulnerability-espionage/c4s9821/
By Neil McAllister in San Francisco, 18th October 2012
...
Earlier this month, Intelligence Committee chair Mike Rogers said, "China is known to be the major perpetrator of cyber espionage, and Huawei and ZTE failed to alleviate serious concerns throughout this important investigation. American businesses should use other vendors."
But according to Reuters' anonymous sources, those "serious concerns" weren't much more than hunches. Not only did the Congressional probe fail to link Huawei and ZTE to current spying activities, but it found no evidence that either company had engaged in espionage in the past.
Rather, the Intelligence Committee made its recommendation based on "a general sense of foreboding" about what might happen if the Chinese government asked network equipment vendors to help gather intelligence from US customers, according to former CIA analyst Chris Johnson.
That foreboding may have been seeded, at least in part, by the Chinese vendors' US-based competition. Last week, The Washington Post claimed to have uncovered a Cisco marketing document that painted Huawei as a security risk, using language very similar to that found in the Intelligence Committee's report.
...
http://www.theregister.co.uk/2012/10/18/huawei_spying_probe_returned_nothing/
hootinholler
(26,449 posts)I dare Rachael Maddow to tie this up in a bundle and do a half hour on it.
Catherina
(35,568 posts)Purveyor
(29,876 posts)'conspiracy theory' bullshit, as it would have been declared?
Redemption to all the lost souls that warned us.
Just saying...
Jarla
(156 posts)But then it gets muddied with the Jews and the Vatican and the Royal Family wanting to destroy our national sovereignty and form a One World Government and they're all being controlled by reptilian ALIENS!
And the latest trend is that every major event is just a psyop. Like, all of those Boston bombing victims were just actors.
Purveyor
(29,876 posts)Ruby the Liberal
(26,219 posts)Hate to say it, but I trust no-one and assume everything is monitored. I hope I am not labled as paranoid over that. It isn't paranoia, it is a lack of trust in general, better safe than sorry. I have a memory stick so why not type it up and take it to work in the morning type of thinking.
Why I am one of the last holdouts that refuses to get a facebook account.
Welcome to the new 'normal'.
railsback
(1,881 posts)or else you could be breaking rocks in the Gulag tomorrow.
hootinholler
(26,449 posts)That isn't even close to the point, but, welcome to DU anyway.
grasswire
(50,130 posts)Mind boggling.
Octafish
(55,745 posts)...Money Launderers, Child Molesters, etc., etc., etc., so of course We the People can trust them to do the right thing. Heartwarming.
Like what Steve Kangas was talking about...
The Origins of the Overclass
EXCERPT...
Although many people think that the CIAs primary mission during the Cold War was to "deter communism," Noam Chomksy correctly points out that its real mission was "deterring democracy." From corrupting elections to overthrowing democratic governments, from assassinating elected leaders to installing murderous dictators, the CIA has virtually always replaced democracy with dictatorship. It didnt help that the CIA was run by businessmen, whose hostility towards democracy is legendary. The reason they overthrew so many democracies is because the people usually voted for policies that multi-national corporations didn't like: land reform, strong labor unions, nationalization of their industries, and greater regulation protecting workers, consumers and the environment.
So the CIAs greatest "successes" were usually more pro-corporate than anti-communist. Citing a communist threat, the CIA helped overthrow the democratically elected Mohammed Mussadegh government in Iran in 1953. But there was no communist threat the Soviets stood back and watched the coup from afar. What really happened was that Mussadegh threatened to nationalize British and American oil companies in Iran. Consequently, the CIA and MI6 toppled Mussadegh and replaced him with a puppet government, headed by the Shah of Iran and his murderous secret police, SAVAK. The reason why the Ayatollah Khomeini and his revolutionaries took 52 Americans hostage in Tehran in 1979 was because the CIA had helped SAVAK torture and murder their people.
CONTINUED...
http://www.huppi.com/kangaroo/L-overclass.html
hootinholler
(26,449 posts)Damn always amazed with what you find.
Octafish
(55,745 posts)Who has gotten away with mass murder, lying America into wars for profit, torturing children, and then bragged about it?
Heh heh heh.
mwooldri
(10,303 posts)Even if the NSA does store all this data indefinitely, once a file is decrypted and it becomes known that it was decrypted.. would the owner of that data have grounds to sue the Government for violating the DMCA?
Just wondering....
BigMike63
(6 posts)Still works.
leveymg
(36,418 posts)suffragette
(12,232 posts)Last edited Wed Jun 26, 2013, 10:11 AM - Edit history (1)
Thanks for going into more detail about what it means in action.
VanillaRhapsody
(21,115 posts)Been trying to get others to see this is MUCH bigger than just the NSA....
alfredo
(60,077 posts)Now that "American" corporations are no longer loyal to the US, they become potential enemies.
Yo_Mama
(8,303 posts)unless there are robust systems in effect to detect and correct the misuse.
Turbineguy
(37,372 posts)They have planted nano-transmitters in your food. They know when you scratch your ass. Not only that, they are actually interested.
This must be the most cost effective government program in the history of the world. The NSA, in addition to its regular duties, knows everything about everything. And they do all this on a measly $10 billion per year.
hootinholler
(26,449 posts)Nano-transmitters? Really?
Cast your asparagus elsewhere please.
Progressive dog
(6,920 posts)what some on here think, that I was only certain it was sarcasm from the "scratch your ass" part.
Fire Walk With Me
(38,893 posts)siligut
(12,272 posts)Help people who are stuck in the "it's only metadata" mentality.
Fire Walk With Me
(38,893 posts)siligut
(12,272 posts)And then bolding of certain word sequences? This is DU, but it is still an Internet message board. I do something similar in thinking the material should stand on its own.
thesquanderer
(11,993 posts)Their computers were not networked together, because it would make them too vulnerable.
DeSwiss
(27,137 posts)K&R
KoKo
(84,711 posts)adieu
(1,009 posts)Must never be president.
snot
(10,538 posts)The question is, how do we limit the damage the powerful can do to us?"
Chris Hedges, "The Failure of the Liberal Class in the United States," address to the Poverty Scholars Program, April 10, 2010.
tex-wyo-dem
(3,190 posts)And I wouldn't doubt it a bit.
Just for the record, encrypted data would include all cell phone traffic, most email and Internet traffic, and text messages. Most data these days is encrypted in some way. But your point is well taken.
It's no question that the ultra connected, uber wealthy would use any means possible to attain more wealth...money is god to them.
Corruption Inc
(1,568 posts)We should just let all criminals get away with their spying crimes, torture crimes, war crimes, banking crimes, etc...
Or so we are told...
cprise
(8,445 posts)and becoming more so, with chips that can almost effortlessly encrypt all output becoming common in PCs made within the last few years. VPNs at work are now de rigueur and they are catching on in the home. And online commerce is actually founded on encryption.
Without access to the keys, recording of encrypted data streams means that the spies have to store data in its heaviest, least-digestible form. It is actually far easier to capture unencrypted data because then it can be categorized, de-duplicated and compressed... not to mention hold some possibility of garnering a near-term advantage. OTOH, cracking decent encryption is like trying to build a livable city on another planet... its easier to talk smack about it to try and impress people.
Let the trend toward encryption continue... The more people use it, the more online privacy and verification of trust we will all have.
mhatrw
(10,786 posts)avaistheone1
(14,626 posts)k&r
blackspade
(10,056 posts)This also means that the Feds have access to all of the crooked Wall Street transactions, associated e-mails, etc.
Good thing the government is well captured by Corporate interests.......
xtraxritical
(3,576 posts)ReRe
(10,597 posts)It's by James Bamford, appeared in Wired on Mar 2012. It's quite long, but definitely worth the read for everyone. What you said is true.
http://www.Wired.com/threatlevel/2012/03/ff_nsadatacenter/all/
midnight
(26,624 posts)WillyT
(72,631 posts)TrogL
(32,822 posts)Not that we're specifically worried about the NSA, we're worried about anything that slips in.
It's just too much work for them to go through everything to discover that the email that they'd spent so much time and effort decrypting is somebody sending a picture of a pony to their grandson.
Rosa Luxemburg
(28,627 posts)There must be some pretty lame stuff out there. They must be very bored most of the time.
AtheistCrusader
(33,982 posts)tavalon
(27,985 posts)Was this before coffee or after coffee. Not that it matters. You are spot on.
hootinholler
(26,449 posts)Considering that I drink a pot every morning I'm at home.
sofa king
(10,857 posts)We can now safely assume that the Chinese had far more information than Snowden did, seeing as they let him go. If he had something--anything--that they needed he would have been treated as an intelligence asset and never let go.
That suggests that NSA is acting as a foreign intelligence agency in the service of the Chinese, exactly as the Luftwaffe's bad encryption security made them act as a foreign intelligence agency in the service of the Allies. NSA is collecting information on everyone, all the Chinese have to do is get to the information they want, using their own information sources to refine their searches.
That's going to allow them to recruit spies and stay a step ahead of the FBI. It may have already been instrumental in identifying Snowden as a disgruntled contractor and recruiting him.
There is an invisible hand of espionage, and it works like this: when you collect information on your own subjects, your enemies have at least as many uses for the intelligence you generate as you do.
Progressive dog
(6,920 posts)but they make me ill.
They might just capitalize on it before they go public, so you probably beat them to it.
sabrina 1
(62,325 posts)to catch a terrorist, because none of it made any sense.
And the only time they get this upset is when MONEY is involved. So what are they REALLY trying to hide? I think you are on to it. It's about MONEY, and business.
And anyone who gets in the way, as Binney said, will be crushed. Unless, maybe, they've gone too far this time.
aquart
(69,014 posts)But it's a reasonable question. Why not ask Cisco and your elected representatives before you go all Alex Jones?
truedelphi
(32,324 posts)Like just how does the small to mid business owner make sure there is no back door?
Gone are the days when people send off for kits by which to build their own machines. The average business person buys from MicroSoft, and even if not from MicroSoft, how do you get a Mother Board that is not Intel (Intel = CIA. Worked for them, know it to be true!)
I carefully researched my anti virus software company. I paid a bit more, but hey - at least I would be free from the NSA people. (Made this decision some months ago.)
And guess what? Ninety days ago, That company was obtained for Big Bucks by Norton. Don't know how aware you are of Norton, but their motto could well be:
"We are so incompetent at finding viruses and trojan horses, we might not be NSA connected, but then again, maybe we are."
So please tell us more. I would love to know how to not be spied on. Also, pls note, the PTB just released a statement that encryption tells them that we are the ones to be spied on! So encrypting is only a red flag to help the NSA know where you, their problem child, are!
hootinholler
(26,449 posts)I don't think I'm out there with ol' Alex, but answer this: If they can't crack it, why store it?
Personally, I would be astounded if the NSA didn't have a back door. All it would take is a subtle flaw in the random number generator.
Mustellus
(328 posts).. for years, because they could not break it. Its reputed to be nearly undecipherable. For years the Government argued that it would give bad guys a way to communicate without any way for them to snoop.
What finally broke the logjam was the banks. They got tired of their wire transfers and such going back and forth in normal ASCII, so that anyone with a keyboard who knew could forge one and be an instant millionaire.
I suspect they keep this encrypted stuff because (1) they are anally retentive, and (2) they might have reason to get your laptop some day if they get a search warrant, say... and that would give them the keys.
Let me say it again: If they were listening in on everything, we'd be at full employment.
idwiyo
(5,113 posts)network departments to the likes of Verizon or AT&T. They used to have their own, company run and operated site routers. Guess fucking who operates those routers now? Guess where IPSEC tunnel starts and where encryption is done? Yep, on a fucking site router that company doesn't even have access to. Now, can someone please tell me what fucking MORON will trust sending their UN-encypted
data to the router operated by Verizon, AT&T, etc.
BTW, those site switches? No sweat, if there are any, they will be under the tender and loving care of the Verizon and AT&T.
welcome to the Brand New World of Corporate Espionage, courtesy of GCHQ and NSA.
woo me with science
(32,139 posts)Once you start thinking along these lines, you realize that the possibilities for profit from this surveillance are endless.
Corporate profiteers buy power and influence in governments precisely to think along these lines...and to implement what they conceive...
We are no longer citizens with Constitutional rights and protections when governments are sold to corporate interests. We become merely "human resources" to be exploited for profit, like cattle on a farm.