Jump to content
Guests can now reply in ALL forum topics (No registration required!) ×
Guests can now reply in ALL forum topics (No registration required!)
In the Name of God بسم الله

The Snowden Revelations

Rate this topic


Recommended Posts

  • Replies 217
  • Created
  • Last Reply

Top Posters In This Topic

Top Posters In This Topic

Popular Posts

This was already known, though I suppose having it confirmed is something. 

POST 1   (salam)   I has been about a year since Ed Snowden's Documents -allegedly 1.7 million of them- has been moving into the public domain.   What portion so far has had the most significant ?  

Salam. I read the WashingtonPost article on that. Your other links were entertaining, too.

  • Veteran Member

(salam)

 

A light read on more published Snowden Revelations. Enter title to access:

 

Computer World, 19Jan15, "NSA secretly uses scapegoats, data mules and innocent victim's PCs for botnets", by Darlene Storm

 

--- another round of published testimony is shown to be a lie

 

-- NSA hacks other countries' espionage activities

Link to post
Share on other sites
  • Veteran Member

(salam)

 

DeutcheWelle, Wed 28Jan15, reports that FaceBook has a myriad of companies that are to track everything for everyone. It also reports FB as having 1.3 Billion users.  And, they watch 3 Billion videos per month.

 

PressTV, Wed28Jan15, "Canada Monitors 15 million file downloads a day: Report"

---- a continuance of the Snowden Revelations

--- the program is called "Leviathan" after the alleged Biblical sea monster

-- this is done on a global basis

 

 

opine: so l am on the SC --however CES (Communication Electronic Security) stereotypes this-- and l last downloaded to read a paper on polymers. This would mean what?

Only the hysterics know.

Link to post
Share on other sites
  • Veteran Member

(salam)

 

1] Note to above; BBC said FB has 1.39 Billion users

 

2] I watched a short documentary of George Orwell last night. The commentator said Orwell envisioned a "haunting and terrifying" world as it would exist "before the end of the 20th Century", in his book 1984

As itemized:

 

--- "a World held in the grip of fear" -opine: what did gov't last tell you to be afraid of or watch-out for? Seen anything "suspicious" lately?

 

--- "a World of absolute conformity" -opine: not the reaction-producing communist kind, but anything that does not challenge the status quo of "elites". Life styles are controlled.(Remember bombing the house in Philadelphia? Or the polygamist raids of the 1950s ?)

 

--- "a World of continuous surveillance" -opine: read anything above  :cry:

 

--- "a World of organized hatred" -opine: right now it is the Iranians and the Russians. Not Islamic State ("a problem" "to be contained" said Obomb'em) or the Taliban (news this 30th, gov't says they are not bad or enemies)

 

--- "a World of ceaseless war" -opine: "The Long War"/"Global War on Terrorism", the Russians because of the gas-to-sell-to-Europe in the Ukraine. What happened to the "Drug War" ?

 

--- "a World where pleasure is forbidden" -opine: anything other than drugs, sex, rock-n-roll and sports must be aesthetic

 

--- "a World where language and history are systematically destroyed" -opine: dumbed-downed-schools; in 1980 libraries were to throw-out anything published before 1950; where changes in hardware makes anything on old systems irretrievable (read a floppy disk or seen a VHS lately?) Who controls the Cloud? Never heard of a "page taken down"????

 

--- "a World where living people simply vanish" -opine: still happens, mostly in other countries; here in the US they go to prison and then control-by-parole.

 

--- In an excerpt from the film, a boys' choir sing "we are the children, we are the future", where Big Brother uses "the children, the children" as an excuse and an emotional to control society. I have seen this used for: a proposal to build sidewalks, gun-control, taxes to build another dumbed-downed school, ... and then combining this with the one just above: Etan Patz; look-around "Amber Alerts"  (a spying habit despite its positive possibilities, although most abducted children are dead in 3 hours)

 

--- from her name in the film, the Julia Effect, where others are coerced into informing on you !

 

--- from the film clip: (paraphrase) "we face a network of enemies who will do anything. But not a network as you and l think of. A network of individuals, acting alone, organized around an idea" (like the anti-abortion activists encouraged in the 1980s)  So we are now told of "intellectual leaders" (like "the Blind Sheikh"), and "lone wolves" like the "Shoe Bomber" and the "Underwear Bomber" (which ought to be caught at the airport to begin with).

 

:mad:

Edited by hasanhh
Link to post
Share on other sites
  • Veteran Member

(salam)

 

DeutscheWelle, 30Jan15, "German spy agency saves millions of phone records, says report", by Gabriel Borrud

 

part of subtitle:  "The German gov't was quick to announce plans to widen data retention against terrorism..." after the Paris attacks

 

--- the BND "...currently collects around 220 million pieces of metadata per day, far more than was currently thought"

 

-- some part, about 1%, is transferred to the NSA (US) directly

 

- 2 million pieces per day are stored for 10 years "...for extended period of 'long term analysis'..."

Link to post
Share on other sites
  • Veteran Member

(salam)

 

Just when you thought it was "safe" to go to Grandmother"s:

 

Wall Street Journal, 26Jan15, 1826EST, "US Spies on Millions of Drivers", by Devlin Barrett

 

-- from documents obtained by the ACLU

 

-- "through out the United States" license scanners, photographs and data basing is being done by the D.E.A. (Drug Enforcement Administration)

 

-- this has created a real time data base available to all law enforcement as part of the "drug war" (opine: another war, against drugs being legalized)

 

-- for 2010, DEA internal documents of this vast domestic spying operation show it netted only "...88 kilograms of cocaine, 8,336 kilograms of marijuana, and the collection of $866,380" after spending billions on equipment, contracting, and organizing.

 

-- to improve this program's perceived relevance, it is now connected to the Amber Alert system. ("the children" again --see post #39)

 

-- supposedly, DEA "...has reduced the time it holds the data from two years to 3 months, according to a Justice Department spokesman."  :lol:

 

-- photographs and scans take place at international borders (originally), at toll booths, in high drug traffic areas (like Florida, Georgia, Ohio and Nevada), at highway exits and entrances, city limits, and so forth

Link to post
Share on other sites
  • Veteran Member

(salam)

 

Can't Plan and Can't Pay, the N.S.A.  Way:

 

Salt Lake Tribune, 02Feb15,, 0857MST, "NSA Utah Data Center Using More Water", by Nate Carlise  (with some Internet data added in for clarity. See city and county websites and Wiki)

 

-- "We are unable to discuss the secure operations of the Utah Data Center", (NSA spokeswoman Vanee) Vines said, "Construction has been completed."

(translation: wasting water is a matter of "national security". Why didn't Nixon think of this???)

 

-- the Center also has "electrical problems"

(translation: like a gov't center on CBS' 60 Minutes in the 1980s, permission and scheduling from a control center was needed to plug in coffee makes or electric pencil sharpeners or the electrical system would not only "blow" a fuse, but damage would result)

 

-- "Water is essential to help cool the facility and computing components for the Center, a massive digital storage hub for the NSA and other intelligence agencies"

(translation: water is an esoteric problem in the planning stages, so building in a high desert with local rainfall of 15" per year is not view as a planning problem)

 

-- the USArmy Corps of Engineers planned for 1.7 million gallons per day for the Center

(translation: the Army never heard of the "ice cooling" done in some 1920s skyskrapers in NYC that are still in use. It is a closed, evaporative technology used for air conditioning) :wacko:

-- yet, Bluffdale City Council minutes relate that this was reduced to 1.2 million gallons per day

( is this a security leak? pun intended.! )

 

-- Bluffdale built a $3Million water-delivery-system and needs to repay the bond.

(questions:  Why didn't the Corp of Engineers build it if everything is so secret? And, why wasn't "impact funding" used like around military bases?)

 

-- Bluffdale is charging NSA the $2.05 per thousand gallon rate for 10,001 to 50,000 gallons, -->while the city (according to its own website) should be charging $3.35 per thousand gallons for 100,000+ per month usage rate as in August 2014, NSA 'used' 6.6 Million gallons

(translation: the citizens of Bluffdale are personally subsidizing the NSA)

 

-- elements of the contract and the billing are "redact"(ed) for the public

(question: is somebody being paid under-the-table????)  Can someone say "cover-up" ?

 

-- a proposed Utah bill, HB150, would forbid state and local entities from subsidizing the Feds  :yaali:

 

0pine:  This is reminiscent of the UK keeping hospital deaths a state secret. Bluffdale has an annual rainfall of 15 inches and 1-3 feet of snow in the nearby mountains.

 

Could not the stew-pee-doe Corp of Engineers built this unnecessary White-Stasi-Elephant on a cooler spot??? Like in Michigan and use lake water???

Naaahhhh. 100 degree temperatures in Utah's Summers is "better". :lol:

 

No wonder the town is called "bluff"-dale. Easy to fool. I wonder if they'd like to play high stakes poker????? :!!!:

Edited by hasanhh
Link to post
Share on other sites
  • 2 weeks later...
  • Veteran Member

(salam)

 

pcworld.com, 13Feb15, "Vint Cerf worries about a 'digital dark age', and your data could be at risk", by Katherine Noyes

 

----- "Now chief Internet evangelist at Google..."

 

---- spoke at the American Association for the Advancement of Science

 

--- bit rot -the loss of data from changing technologies

 

-- proposes a digital vellum to preserve data

 

- other projects and proposals have failed

Link to post
Share on other sites
  • Veteran Member

#2, 15Feb15

 

1]   redalertpolitics.com, 11Feb15, "Court rejects checks to NSA spying, citing 'state secrets'," by Maria Santos

 

---- in a new trick --the Stasi-forming gov't claims it cannot defend itself  "...lest it be forced to reveal 'state secret information'..."

 

--- the case, Jewel vs. NSA, brought by the Electronic Frontier Foundation in 2008

 

-- the case involves the Upstream Internet surveillance program

 

- the Stasi have claimed 'state secrets' since appeals began in 2009

 

 

2]  The names of other, current Sneaky-Stasi peeping-Tom programs include:

 

-- PINWHEEL  --initially to surveil Russian emails

 

-- in 2008, PINWHEEL was supplemented by EINSTEIN, the surveillance of the emails and surfing activities of federal employees

 

-- EINSTEIN was emplaced using the cover-story of "cyber security" (Fri,13Feb15, Obama pleads with Internet execs for "more sharing of information" using the same, lame, claim of cyber-security)

 

--within EINSTEIN is PINWALE which "bore down into text portions of emails to search for particular words and phrases"

 

-- WATCHHOUND is a cell-phone monitor

 

-- STINGRAY is a locator for cars and laptops

 

-- CELLBRITE -also writ CELLEBRITE- downloads personal info and connections from your cell phone

 

-- LOJACK is for the "tracking and recovery" of "stolen" vehicles and laptops

Link to post
Share on other sites
  • Veteran Member

(salam)

 

computerworld.com, 19Feb15, 1359PST, "Update: Spy agencies hacked SIM card maker's encryption"; based on article from The Intercept

 

The Intercept article is at:  http://www.firstlook.org/2015/02/19/great-sim-heist/  entitled "The Great SIM Heist" by Jeremy Scahill and Josh Begley

 

------ NSA and GCHQ hacked into "...SIM card maker Gemalto and taken (stole) smartphone encryption keys potentially used by (the) customers of hundreds of mobile phone carriers worldwide."

 

----- the evil-doers are the NSA and GCHQ (OK, so l used a bushism)

 

---- this is all detailed in a 2010 GCHQ document leaked by National Hero Edward Snowden [Opine: Snowden got GCHQ documents too? l didn't know that.!!!!!!  :!!!:  ]

 

--- how much mobile traffic the 2 agencies peeped into??? the article asks.

 

-- Gemalto, based in the Netherlands, "...produces about 2 billion SIM cards a year. (for) About 450 mobile carriers..."

 

- with these cards, snooping can be done without "the approval of the carriers or foreign gov'ts."

 

GCHQ also has access to billing services "allowing it to manipulate customers charges in an effort to hide surveillance on phones." [Opine: a few years ago I got my cell cutoff saying I owed $600. After paying, I got another cutoff for $400. Paid that. Then cancelled.  Then two months later l get this company letter saying I "may have been slammed". We used phone cards and a local number to call Morocco.] ******* _____ gov't. :realangery:

Link to post
Share on other sites
  • Veteran Member

(salam)

 

Opine: For Better Security, It ls Back To An Analogue World

 

New York Times, 16Feb15, "U.S. Embedded Spyware Overseas, Report Claims", by Nicole Perlroth and David E. Sanger

 

-------- "The United States has found a way to permanently embed surveillance and sabotage tools in computers and networks it has targeted..." (underline added -ed.)

 

------ "Equation Group" "appears to be a veiled reference to" the NSA and Cyber Command

 

---- "Some implants burrow so deep into the computer systems...that they infect the 'firmware', (that) embedded software that preps the computer's hardware before the operating system starts. It is beyond the reach of existing antivirus products and most security controls...making it virtually impossible to wipe out." (underline added -ed.)

 

--- [continuing this later in the article:] "The firm's (Kaspersky Lab) researchers say that what makes these attacks particularly remarkable is their way of attacking the actual firmware of the computers. Only in rare cases are (such) cybercriminals able to get into the actual guts of a machine." ... "But if the firmware becomes infected ... it can turn the most sophisticated computer into a useless piece of metal."

 

-- "In the past, security experts have warned about 'the race to the bare metal ' of a machine. (When this happens) ... "It means that we are practically blind and cannot detect hard drives that have been infected with this malware." (italics added -ed.)

 

- "The possibility of such an attack is one that math researchers at the National Institute of Standards and Technology ... have long cautioned about ... You have to replace the computer to recover from (this kind of) attack."

 

"Documents revealed by ... [national hero] Edward J. Snowden detailed the (NSA's) plans to leap the 'air-gaps' that separate computers from the outside world, including efforts to install specialized hardware on computers being shipped to a target country. That hardware can then receive low frequency radio waves broadcast(ed) from a suitcase-size device that the N.S.A. has deployed around the world."

Opine: the opposite is also very true. The computer becomes a continuous or, if selected,  a periodic broadcast station. A revealing example is the (by)1980, a landline telephone could be "tapped" at two miles distance by near-focusing on the desired landline. The "instrument sensitivity" is the key. A high school level demonstration is the Cavendish Experiment. When properly set up inside a building and the balance has come to rest, you know when some one walks past outside because the mirror moves out of position. This is gravitational, which is many orders of magnitude weaker than electromagnetics.

Link to post
Share on other sites
  • 2 weeks later...
  • Veteran Member

(salam)

No Change in Attitude and No Improvements in Craft

 

CBS NEWS, 02March15, 1901EST; "James Clapper: Post-attack critiques show desire for more surveillance" (underline added -ed.)

 

----- Director of National Intelligence, James Clapper (frmr D-DIA 1992-1995), citing "post event critiques and investigations", told Charlie Rose (PBS -02March2015), "A common theme of every one of those critiques has been that government should have been more intrusive". (boldface added- ed.)

 

Opine: What good will that do?

Examples:

The Underwear Bomber (aka Christmas Bomber) Umar Farouk Abdulmutallab (b. 1986, Nigeria) had tried to detonate an explosive device onboard North West Airlines Flight253 on Christmas Day, 2009 on the approach to Detroit. Known to intelligence, his Internet username was Farouk1986, he was president of University College London's student Islamic Society; on 11Nov09 UK intell informed the US about a "Umar Farouk" without the last name had spoken to the later assassinated Ayman al-Awaki "pledging jihad"; on 19Nov09, Umar's father contacted CIA in Abuja, Nigeria at the US Embassy; US intell stopped the Dept of State from revoking Abdulmutallab's visa because US intell was "investigating".

 

Boston Marathon Bombers -had been investigated by the FBI and then later flagged by a sharing Russian Intell during a trip to Chechnya.

 

Fort Hood shooter - Major Nidal Hasan -how do you know, without evaluation following up "concerns by co-workers, that an Army major is having a nervous breakdown and who behaved as a planned suicide will (he, among other things, was giving away his possessions) ? The source of Hasan's stress was from counseling soldiers' war stories. He also was not supervised by his chain-of-command.

 

As delineated above, "more" and "fear" are intell agencies' primary themes.

Link to post
Share on other sites
  • 3 weeks later...
  • Veteran Member

(salam)

 

... Meanwhile, on the domestic front:

 

YahooNews.com via AP, 18March15, "US sets new record for denying, censoring government files", by Ted Bridie

part of the info:

--- gov't "fully denied" 250,581 (39%) of all requests

 

-- answering initial requests now take "longer"

 

-the CIA denied every request

 

most denials are not appealed

 

http://finance.yahoo.com/news/us-sets-record-denying-censoring-114313578.html

Link to post
Share on other sites
  • 3 weeks later...
  • Veteran Member

(salam)

 

"... the Backdoors they have opened..."  <--under my avatar

 

This week, Pres.Obama  signed initiatives to go after hackers.

 

Now, since the intell communities trying to build a Stasi State have created a "Frankentell" --Frankenstein + intelligence,  emphasizing "tell" all security breaches.

 

http://finance.yahoo.com/news/stock-market-investors-ignoring-hacker-attacks-at-their-peril-165615733.html

 

"Hackers are breaking into public companies around the world and stealing every kind of data imaginable."

 

--and it is not just criminals. Remember that US intell officials were breaking into companies financial records and reports to play the stock market with insider information

Edited by hasanhh
Link to post
Share on other sites
  • Forum Administrators

Hacking people's private information has been lucrative. digitaltrends.com says that Radio Shack, in bankruptcy mode, wants to sell the names, home addresses, phone numbers, email addresses and purchase history of its customers. 

Link to post
Share on other sites
  • Veteran Member

(salam)

 

Snowden inadvertently close a massive DEA program "USTO" ("from the US to" any of 116 countries)

 

USTO existed from 1992 to Sept 2013 when Eric Holder, AG-US, closed it.

 

National Journal, 08April15,  "How Edward Snowden killed a Mass Surveillance Program", by Dustin Volz

http://nationaljournal.com/tech/how-edward-snowden-killed-a-mass-surveillance-program-20150408

--follow-on to USA Today article

USA Today, 07April15, "US Secretly tracked Billions of calls for decades", by Brad Heath

http://usatoday.com/story/news/2015/04/07/dea-bulk-telephone-surfeillance-operation/708086161

 

-- USTO was used as a blueprint for the NSA mass surveillance after 9-11

 

--the DEA was "drowning in toll records" then got help from the Pentagon to include supercomputers (opine: in violation of the Posse Comitatus Act  1878 -ed.)

 

--proposed by Bush 41 in 1989 as an asset in the War-on-Drugs

 

-- effectiveness was in decline as instant messaging and the internet displaced phone calls

Edited by hasanhh
Link to post
Share on other sites
  • Veteran Member

(salam)

 

as in post 49, "... and the Backdoors they have opened."

 

The best article is:

MENAFN.COM, "AT&T to pay $25 mn penalty for data breaches", 08April15

 

-- affected 280,000 customers

 

-- FCC says "... the lack of security at AT&T call centers in Mexico, Columbia and the Philippines allowed employees in those" places to compromise full or partial SSNs and data capable of unlocking controls, plus ID theft

 

--the breach in Mexico lasted 168 days

 

-- 40 employees in the Philippines sold info on 211,000 customers

 

Other articles can be found in search "AT&T + breach + fine"

Link to post
Share on other sites
  • 4 weeks later...
  • Veteran Member

(salam)

 

CNN is reporting Wed, 06May15 that the FAA will consider proposals for drone use with CNN's help.

 

Other:

 

2] Spiegel Online, Monday,04May15 (02May print article),"Amerika's Willing Helper: Intelligence Scandal Puts Merkel in Tight Place", staff writers

 

http://www.spiegel.de/international/germany/bnd-intelligence-scandal-puts-merkel-in-tight-place-a-1031944.html

 

---- Scandal erupted Thursday 30April with Der Spiegel article

 

--- the USA falsely advertised "cooperation" as anti-terror operations as Hamburg was the cell for the 9-11 attacks and in a late Oct 2001 meeting "blamed Germany" for the attacks.

 

-- hundreds of American agents flooded into Germany looking for "terrorists"

 

- BND secretly circumvented Chancellery oversight and "began writing its own rules".

 

Results Revealed: the US with BND spied on EADS (also a French company), Euro Copter, and other companies and then proceeded to invade the privacy of hundreds of German leaders.

 

Opine: After multiple lies and now this, I can see why Germany has broken ranks and has engaged lran in commercial talks.

 

Also, as we know from last year, the folks in the US -not just Gen Keith Alexander- were going into company records and reports to front run the stock markets --which explains the intense interest in Germany and connected-to-Germany companies.

 

Question: What will happen when the Polish connections get revealed? :cry:

Link to post
Share on other sites
  • Veteran Member

(salam)

 

As a result of the Snowden Revelations two years ago resulting in multiple court suits, we have:

 

Reuters, Thurs,07May2015, 1417hrsEDT, "NSA's phone spying program ruled illegal by appeals court", by Jonathan Stempel

 

http://www.reuters.com/article/2015/05/07/us-usa-security-nsa-idUSKBN0NS1IN20150507

 

------2nd Circuit Court of Appeals in Manhattan in a 97 page opinion written by Judge Gerard Lynch

 

-----this ruling pressures Congress to "replace or end" the program

 

---- said Section 215 was misused by NSA (opine: like above, "writing its own rules")

 

--- the Circuit Court of Appeals did not rule on the Constitutionality, but noted the "seriousness" of the concerns

 

-- this ruling voids a December 2013 ruling that allowed continuance of massed surveillance

 

- Also today, 07May15, the new AGUS (Attorney General of the US) Loretta Lynch testified in a budget hearing that this messed surveillance is "a vital tool"

 

(Opine: so, Loretta Lynch will defend the rights of peeping-Toms)

Link to post
Share on other sites
  • 2 weeks later...
  • Veteran Member

(salam)

 

Do not be misled, because there is a myriad of programs.

 

Bloomberg, 23May15, 1053EDT, "Failed Senate Votes Mean Wind-Down for NSA Phone Taps" by Alan Bjerge and Chris Strohm

 

"The US gov't is shutting down its surveillance program ..."

 

Notice the singular and only concerns Section 215.

 

Yesterday's news said the NSA began shut-down already in order to "make the June first deadline".

 

A commentator this past week said that the NSA records were only like bi-annual phone bills (records) and not the content of those calls.

 

Opine: If no content, there is not much point to have other record bases. This shut-down will save some money in such a totalitarian waste of money as these programs are.

Link to post
Share on other sites
  • Veteran Member

(salam)

 

Creepy:

 

ABCNews, 28May15, "How to Hide your location on Facebook Messenger"

 

--- via a Chrome app:  "location sharing"

 

-- called "Marauders Map" --so your 'friends' know where you are

 

http://abcnews.go.com/Technology/hide-location-facebook-messenger/story?id=31369106

 

Opine:

Since these phones can be controlled remotely (hacked into), any "marauder", molester or murderer can hack into a phone, install the app and know where you are.  Great for "ransom operations", grabbing children, and so forth. :mad:

Edited by hasanhh
Link to post
Share on other sites
  • Veteran Member

(salam)

 

1]  Lasers and Drones:  ABC World News Tonight, Fri, 29May15

---- reported 5 incidents of green lasers being aimed at pilots, of 37 in the last year, which is hazardous to aircraft and a federal crime

--- also reported was a jet that had to "pop up" 200 feet to avoid a mid-air collision with a drone near the NY airport

 

2] Motley Fool, 27May15 0830EDT, "Apple, Inc.  and Google, Inc. Team Up Against Uncle Sam"

 

--  http://nasdaq.com/article/apple-inc-and-google-inc-team-up-against-uncle-sam-cm480713

 

-- the tech aspects of this contentious issue between companies and the privacy necessary for them to maintain their business models and people's civil rights, and "Uncle Stasi"

 

- a keyword: "remote wipe"

 

Discusses China's security efforts

 

3] Benzinga, 29May15, 1224pm, "Why Your Strongest Password Is Still Vulnerable", by Louis Bedigian

 

-- vulnerability accessed by "password recovery" (which can be guess from social media -ed)

 

--tech info, here

 

No link because it was too long to be completely displayed.

 

Opine: this article is eerily similar in describing how to get into about any system using the "systems own design" as just happen with the 104,000 IRS accounts stolen -as reported this week.

 

4] this Sunday, 31May15, the US Senate will be in special session over re-authorizing peeping-Tom gov't activities.

 

So, E-MAIL your Senators this weekend. By Saturday  night will be best.

Link to post
Share on other sites
  • Forum Administrators

Never have been worried about too much, but I remember telling my family and relatives not to answer phone calls from unknown phone numbers and never call back random numbers you don't recognize to see why they were calling you. If the number is a spammer, they now have proof that you called them so they can call you back at any time. If the wrong number phone call is from a criminal, suddenly your phone number will be flagged as one of his/her contacts. You will be watched and/or questioned why you were talking on the phone with this criminal, etc. 

Link to post
Share on other sites
  • 1 month later...
  • Veteran Member

(salam)

 

PBS News Hour, Wed, 08July15

 

Reported on testimony before Congress about the "problems" the FBI, NSA and all are having with companies using encryption.

 

These agencies said that companies using encryption are hindering "national security" because they cannot read these companies every communication.

 

Scream with Laughter.  US companies are a national security threat?

 

AS we noted above, NSA especially was reading companies' financial reports to front run the stock market. Remember Gen. Alexander? as an example.

 

The report noted that Apple and other companies began enhancing their encryption as a direct result of the Snowden Revelations.

 

Other testimony said that encryption was highly necessary as a block against industrial espionage. (If there is anything left to steal.)

 

One of the guests supporting encryption in the reports discussion segment said that Google's list of people and sites monitored by court order and National Security Letters was hacked (allegedly "by China") and this information was stolen.

 

But the most shameless gov't agency statement was when they allege that "lSlL is using encryption to recruit" online.

Scream ... Scream  ... Scream with laughter again.

No wonder OPM and the rest of the gov't's sites were ripped-off by hacking. Just consider this: How can I recruit you with encryption unless you already have the key?  Like I am going to send you an encryption key. Which, of course, the NSA would intercept.

 

0pine:  I have heard  gov't  say a lot of stew-pid things in my life, but never anything so shamelessly ___ dang pathetic.

Edited by hasanhh
Link to post
Share on other sites
  • Veteran Member

(salam)

 

Gawd, what a gov't-responsible mess. :sick:

 

Washington Post, 09July15, 2033hrsEDT, "Hacks of OPM databases compromised 22.1 million people, federal authorities say", by Ellen Nakashima

 

http://washingtonpost.com/blogs/federal-eye/wp/2015/07/09/hack-of-security-clearance-system-affected-21-5-million-people-federal-authorities-say/

 

Note: an affiliated article writes that no gov't agency has an effective response to this "super-fiasco"

 

Info in the blog:

----employees, families and friends complete personal histories are now possessed by hackers, including for the people and their families in "the most sensitive jobs in gov't"

 

---21.5 million people in Office of Personnel Management respository, and "At least 4.2 million people ... (in) a separate data base ..."

[0pine: Wasn't "4 million" the number initially "leaked" ? Yes, it was ! ]

 

--- there was also an "overlap" of 3.6 million people (people in multiple systems that were hacked) which brings the per capita total to 22.1 million

 

--- includes "detailed" family and health information

 

--- the hackers operated from Oct14-April15 using stolen logins and passwords [See posts 60 and 54 above as probable conduits for leads into the systems]

 

 

--- also stolen are 1.1 million sets of fingerprints,

 

--the OPM Director is Katherine Archuleta

Link to post
Share on other sites
  • Veteran Member

(salam)

 

A good article, how OPM hack was discovered (Hint: by accident), everybody in the gov't system compromised (Opine Question: How many records were altered?)

 

And there ain't much they can do!

 

" What is the OPM Hack, and What it Means for You ", by Andre Infante, 16July15

 

http://www.makeuseof.com/tag/priority-whats-opm-hack-mean/

 

Half way through it mentions notifications to be sent out. Another article says no notifications have been sent out so far.

A third article says these "intrusions" began before Archuleta -who resigned last week- became Director-OPM.

There were no real security procedures  before 2013.

Link to post
Share on other sites
  • Veteran Member

(salam)

 

In post 55 above, the FAA is considering drones. To wit:

 

http://gizmodo.com/firefighters-cant-save-people-burning-in-cars-because-o-1718675039

 

Plus, in the last few weeks, drones have interfered with airports (and people flashing lasers).

 

OPINE:

Comments Sections pretend drones do not interfere with fire-fighters' aircraft. NO.  The plastic and metal is far more damaging to propellers and turbines than a bird strike.

So, for a few jobs, the FAA is going to endanger the public at large.

Link to post
Share on other sites
  • 3 weeks later...
  • Veteran Member

04Aug15:  CBS Morning News carried a report about drones as a General Threat --to include "Nat'l security"

 

So, to deliver drugs into prison, close an airport, interfere with firefighting, etc ...

 

Search: "Drones take over -CBS News";  www.cbsnews.com/drones/  for several described threats.

Link to post
Share on other sites
  • 2 weeks later...
  • Veteran Member

15Aug15

 

Propublica, "A Trail of Evidence Leading to AT&T's Partnership with the NSA", subtitle: "Documents provided by Edward Snowden mention a special relationship between the NSA and an unnamed telecommunications company. Here's how we figured out that's AT&T"

 

http://www/propublica.org/article/a-trail-of-evidence-leading-to-atts-partnership-with-the-nsa

 

A good article with slides excerpts and maps; Japan's 2011 earthquake; how the NSA spied on the UN (for $1million a year; ...

Link to post
Share on other sites
  • 4 weeks later...
  • Veteran Member

(salam)

 

NSA is to cease domestic surveillance in November.

Opine: It does look "odd" that gov't spies on US but can't do anything about illegal aliens. :wacko:

 

Some recent events:

 

1] Snowden has criticized the Putin Administration's Internet censorship, and Hillary R. Clinton's explanations about her email-server as fraudulent.

 

2] Buying Apps can be hazardous to your privacy. Remember the "doors" NSA opened for all of this?

http://fortune.com/2015/09/08/this-porn-app-secretly-takes-photos-of-you-then-demands-a-ransom/

 

3] http://sputniknews.com/europe/20150907/1026694366/schindler-bnd-nsa-mistake.html

What the head of the BND (Germany) testified to was that German intelligence never bothered to check on what phone numbers (fax included) and email addresses NSA requested. These are called "selectors".  (Note: this was one conduit for corporate developments and front-running the stock market information)

 

4] Compare this with post 62:

"NSA vulnerable to quantum computers"

http://www.engadget.com/2015/08/30/nsa-quantum-resistant-encryption/

 

5] And for your entertainment, search "Cherax snowden"

Edited by hasanhh
Link to post
Share on other sites
  • 3 weeks later...
  • Veteran Member

(salam)

 

Gawd, what a gov't-responsible mess. :sick:

 

Washington Post, 09July15, 2033hrsEDT, "Hacks of OPM databases compromised 22.1 million people, federal authorities say", by Ellen Nakashima

 

http://washingtonpost.com/blogs/federal-eye/wp/2015/07/09/hack-of-security-clearance-system-affected-21-5-million-people-federal-authorities-say/

 

Note: an affiliated article writes that no gov't agency has an effective response to this "super-fiasco"

 

Info in the blog:

----employees, families and friends complete personal histories are now possessed by hackers, including for the people and their families in "the most sensitive jobs in gov't"

 

---21.5 million people in Office of Personnel Management respository, and "At least 4.2 million people ... (in) a separate data base ..."

[0pine: Wasn't "4 million" the number initially "leaked" ? Yes, it was ! ]

 

--- there was also an "overlap" of 3.6 million people (people in multiple systems that were hacked) which brings the per capita total to 22.1 million

 

--- includes "detailed" family and health information

 

--- the hackers operated from Oct14-April15 using stolen logins and passwords [See posts 60 and 54 above as probable conduits for leads into the systems]

 

 

--- also stolen are 1.1 million sets of fingerprints,

-- also stolen are 1.1  million --NOW 5.6 million-- sets of fingerprints  *****

 

--the OPM Director is Katherine Archuleta

And post 64

 

Fortune Wed,23Sept15 1607hrs EDT  "Hackers Steal 5.6 million fingerprints of US gov't workers"

-- OPM said Wednesday

--but as the New York Times writes (same date as article relates) "...the rise of bio-metrics everywhere -including iPhones- could mean the severity is being downplayed." (underline added)

Link to post
Share on other sites
  • Forum Administrators

5] And for your entertainment, search "Cherax snowden"

Salam. I read the WashingtonPost article on that. Your other links were entertaining, too.

Link to post
Share on other sites

Join the conversation

You are posting as a guest. If you have an account, sign in now to post with your account.
Note: Your post will require moderator approval before it will be visible.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.


×
×
  • Create New...