Discussion Topic |
|
This thread has been locked |
froodish
Social climber
Portland, Oregon
|
|
The NYT editorial board weighs in...
Considering the enormous value of the information he has revealed, and the abuses he has exposed, Mr. Snowden deserves better than a life of permanent exile, fear and flight. He may have committed a crime to do so, but he has done his country a great service. It is time for the United States to offer Mr. Snowden a plea bargain or some form of clemency that would allow him to return home, face at least substantially reduced punishment in light of his role as a whistle-blower, and have the hope of a life advocating for greater privacy and far stronger oversight of the runaway intelligence community...
http://www.nytimes.com/2014/01/02/opinion/edward-snowden-whistle-blower.html?_r=0
|
|
command error
Trad climber
Colorado
|
|
Knowledge of the NSA iphone exploit is a gift to hackers.
Just knowing its possible does most of the work to figure it out.
And most of this NSA snooping is automated anyway. You set
monitoring gear on an iphone and text some keywords that
should trigger their interest and capture signal traffic.
|
|
paganmonkeyboy
climber
mars...it's near nevada...
|
|
nah000 gave a much mor elegant reply than the 'Bullshit !' I was going to come back with.
the fact that you're the least likely to die from terrorist attack is exactly due to massive security efforts.
This is just plain WRONG. Completely and utterly WRONG. And I repeat my question - How does spying on every American accomplish this ? How does sending NSA data to the DEA information leading to drug busts for instance have ANY affect on terrorist actions ?
We're number one in this though !! Yah !!!
http://rt.com/news/us-biggest-threat-peace-079/
|
|
Yak-Chik
Trad climber
Phoenix
|
|
Oh wow!
Either Apple Computer told the NSA about the iphone backdoor
or the government accidentally stumbled onto it. Right!
Which is like guessing the winning lottery numbers but many times harder
given 32bit encryption.
Even since iOS 7 was released, vulnerabilities have been patched which
could allow full compromise without the knowledge of the user.
Usually you need two vulnerabilities to accomplish this: an arbitrary
code execution vulnerability to gain control, and a privilege escalation
vulnerability to gain admin or root privileges.
Once you have this, you can install whatever software you want.
This, incidentally, is how jailbreaking works.
Every jailbreak is based on at least one security flaw in iOS.
We know these work, so we know that what the NSA claims is perfectly
possible.
http://www.zdnet.com/no-surprise-the-nsa-can-hack-iphones-7000024691/
|
|
froodish
Social climber
Portland, Oregon
|
|
About the author:
Christina Sarich is a musician, yogi, humanitarian and freelance writer who channels many hours of studying Lao Tzu, Paramahansa Yogananda, Rob Brezny, Miles Davis, and Tom Robbins into interesting tidbits to help you Wake up Your Sleepy Little Head, and See the Big Picture. Her blog is Yoga for the New World. Her latest book is Pharma Sutra: Healing the Body And Mind Through the Art of Yoga.
Great source there Klimmer ;-)
|
|
froodish
Social climber
Portland, Oregon
|
|
The Reuters link makes no mention of Snowden. I stand by my assertion that a dozen crap blogs saying: "so and so said Snowden said such and such" without a credible citation == crap.
|
|
froodish
Social climber
Portland, Oregon
|
|
Why would I trust Kissinger? He's a tool and a liar.
|
|
TomCochrane
Trad climber
Santa Cruz Mountains and Monterey Bay
|
|
"Considering the enormous value of the information he has revealed, and the abuses he has exposed, Mr. Snowden deserves better than a life of permanent exile, fear and flight. He may have committed a crime to do so, but he has done his country a great service. It is time for the United States to offer Mr. Snowden a plea bargain or some form of clemency that would allow him to return home, face at least substantially reduced punishment in light of his role as a whistle-blower, and have the hope of a life advocating for greater privacy and far stronger oversight of the runaway intelligence community. ...
When someone reveals that government officials have routinely and deliberately broken the law, that person should not face life in prison at the hands of the same government."
New York Times editorial
|
|
WBraun
climber
|
|
he New York Times has, kind of, admitted that it messed up its big front-page story that used a "vector analysis" to pin the blame for the Aug. 21 Sarin attack on the Syrian government, an assertion that was treated by Official Washington as the slam-dunk proof that President Bashar al-Assad gassed his own people.
But you'd be forgiven if you missed the Times' embarrassing confession, since it was buried on page 8, below the fold, 18 paragraphs into a story under the not-so-eye-catching title, "New Study Refines View Of Sarin Attack in Syria."
We were right all along while a lot of you nutcases swallowed the drool from these fuk head mainstream media tools ....
|
|
TomCochrane
Trad climber
Santa Cruz Mountains and Monterey Bay
|
|
Jan 16, 2014 - 12:41am PT
|
http://news.yahoo.com/nsa-spy-computers-via-radio-snowden-leaks-show-222347303.html
NSA can spy on computers via radio, Snowden leaks show
Snowden fallout continues, as news organizations use leaks to probe how the NSA is breaking into computers not linked to the Internet and, mistakenly, believed to be not open to attack.
Christian Science Monitor
By Peter Grier 6 hours ago
The National Security Agency can spy on computers that aren’t physically connected to the Internet. That’s a takeaway from a big New York Times story Wednesday on NSA technical capabilities.
How? One method is to use small radio transceivers concealed within otherwise normal-looking USB plugs. These spy plugs (code name: “Cottonmouth I”) can sweep through an affected machine and broadcast stolen information to hidden relay stations up to eight miles away.
A relative of this program involves tiny circuit boards physically inserted into computers, either at the factory or via clandestine methods on-site. They allow the NSA to connect to computers which users believe to be safely insulated from Internet-based hacker attacks.
All told, the US has implanted spy software in some 100,000 computers around the world, according to David Sanger and Thom Shanker of the Times, under the overall auspices of a program named “Quantum." (Yes, a 2008 James Bond movie was called “Quantum of Solace," but that’s apparently a coincidence.) Iran has been a target, as well as Russian military networks, drug cartels, and European Union trade institutions. But the biggest focus of US interest here is China, particularly Chinese cyberwar capabilities.
“The United States has targeted Unit 61398, the Shanghai-based Chinese Army unit believed to be responsible for many of the biggest cyberattacks on the United States, in an effort to see attacks being prepared,” write Messrs. Sanger and Shanker.
Parts of this story have previously appeared elsewhere. The German news magazine Der Spiegel has published a list of NSA products that included “Cottonmouth," for instance. A Danish paper has printed a map showing where Quantum incursions occurred.
These pieces all appear based on documents provided by NSA leaker Edward Snowden, though the Times supplemented its story with extensive further reporting. In fact, the Times may have had the gist of these revelations for some time: The paper notes that, at the request of US intelligence officials, it previously withheld some details of the foreign infiltration program when writing about clandestine US efforts to derail Iran’s nuclear program in 2012.
That history shows how much publication standards have changed, writes Harvard Law School professor Jack Goldsmith at the Lawfare national security legal blog.
Wednesday’s revelations don’t deal with the privacy of US citizens, he notes. The infiltration program appears to deal exclusively with surveillance of foreign systems and intelligence – precisely the sort of thing the NSA is supposed to do. Quantum does not appear to push against any sort of NSA legal limits.
In 2012, the Times agreed not to talk about the program. In 2014, it went ahead. The big difference may be the environment created by Mr. Snowden in which all of the NSA’s activities appear to be fair game for public discussion.
“The particularly bad news for the NSA is that the NYT is more discreet than foreign journalistic outlets,” writes Mr. Goldsmith.
Goldsmith adds that US intrusion of foreign networks appears to be similar to the sorts of things the US complains that China is doing. This obvious hypocrisy isn’t going to help the US in its efforts to get Beijing to rein in Chinese cyber units.
The US doesn’t use NSA capabilities to steal trade secrets in the name of bettering the bottom line of particular US firms, an NSA spokesman told the Times for Wednesday’s story. But China considers economic secrets a legitimate intelligence target and may not be swayed by this argument, given that US diplomats routinely pressure other countries to do things – such as buy US aircraft – that benefit specific national firms.
“It’s all cheating in the name of national strength. If it’s acceptable for us to do it, we really can’t perform moral outrage that our rivals are doing it,” writes surveillance and intelligence expert Marcy Wheeler on her "emptywheel" blog.
Against this background, President Obama on Friday is expected to announce some tightening in the way the NSA handles millions of US phone records, among other things. He’s also expected to outline some broader oversight procedures for the process which determines which foreign leaders become NSA targets.
The speech caps a months-long review of NSA activities by a White House panel of outside experts appointed in response to Snowden’s revelations.
|
|
Lorenzo
Trad climber
Oregon
|
|
Jan 19, 2014 - 12:00am PT
|
Oh, great.
Now I'm under surveillance 'cause I clicked on this page.
|
|
Lorenzo
Trad climber
Oregon
|
|
Jan 19, 2014 - 02:22am PT
|
as if you wernt under priviously
General Alexander? Is that you?
Oh crap.
|
|
Lorenzo
Trad climber
Oregon
|
|
Jan 19, 2014 - 03:05am PT
|
Honest General. I don't know that guy. He just lives in the same part of the country.
|
|
Lorenzo
Trad climber
Oregon
|
|
Jan 19, 2014 - 12:42pm PT
|
Aw, man....
Why is my front facing camera winking at me?
|
|
|
SuperTopo on the Web
|