risking his life to tell you about NSA surveillance [ot]

Search
Go

Discussion Topic

Return to Forum List
This thread has been locked
Messages 1361 - 1380 of total 1468 in this topic << First  |  < Previous  |  Show All  |  Next >  |  Last >>
nah000

climber
canuckistan
Topic Author's Reply - Oct 30, 2014 - 12:05am PT
oh look:

a patriot act provision that was justified as needed in order to assure the defeating of the terrorists [tm] is overwhelmingly being used in narcotics cases.

the search without notification [aka "snake and peek"] warrant was used 11129 times in 2013.

of those 11129 times 51 were used in terrorism cases and 9401 were used in narcotics cases.



let's all sing together: "O'er the laaaaaand of the freeeeeeeee and the hoooommme of the braaaave"*

*now including the following fine print read by an announcer in a quiet but hastily spoken voice: "freedoms and rights do not necessarily apply to the two-thirds of the population living within 100 miles of the border, those suspected of drug offences or terroristic thoughts, or those americans travelling in countries that are currently being remotely bombed. any remaining terms are subject to presidential discretion and may be curtailed without notice at any time. war is peace, freedom is slavery, ignorance is strength. thank you and good night."
dave729

Trad climber
Western America
Nov 28, 2014 - 09:22pm PT
Any ideas on how to defend against this?

Two Part Air Gap hacking of any isolated 'secure' computer.
No cable or wi-fi internet connection.

An installed rootkit virus records all a users keystrokes. Periodically it
generates an invisible FM radio signal using the computers video card.
The cable up to the video monitor acts as the transmitting antenna.

No Firewall watches for signals going to the video monitor.

So it sends the keystrokes plus computer ID via radio waves
several meters through the air to any smart cell phone
with an FM radio receiver.

The phone likely has a few Apple or Google apps that,
unknown to the phones owner,
have an extra function appended.
Listening for and recording these FM spy signals.

The data file is purposely small to remain hidden. It is sent
over the cell phone network to you know who.

http://lambda-diode.com/electronics/tempest/


couchmaster

climber
Dec 8, 2014 - 09:28am PT
Was writing a letter to my Senator re this: http://www.supertopo.com/climbing/thread.php?topic_id=2269866&tn=0 and also found this big news which I hadn't heard a breath of in the mainstream newz. This is big.

http://www.wyden.senate.gov/news/press-releases/wyden-introduces-bill-to-ban-government-mandated-backdoors-into-americans-cellphones-and-computers

"Thursday, December 4, 2014

Washington, D.C. – U.S. Senator Ron Wyden, D-Ore., today introduced the Secure Data Act to protect Americans’ privacy and data security. The bill prohibits government mandates to build backdoors or security vulnerabilities into U.S. software and electronics."

One small step for mankind in the right direction.......
Reilly

Mountain climber
The Other Monrovia- CA
Dec 8, 2014 - 09:35am PT
You know, with all this losing-our-freedoms hand-wringing and applauding of
passing laws restricting the spooks why isn't there an equal or greater outcry
over all the criminals who are after our identities and money? I'd like
to empower the NSA to go after those vermin.
couchmaster

climber
Dec 8, 2014 - 09:38am PT
That stuff is already illegal Reilly, and I personally know that the Army has a significant couple of groups in play that work against that kind of thing. In either case, no private group of thugs could ever (hopefully) amass the kind of power that the government could have and in fact does have over you as an honest citizen.

The list of governments that have taken control and then raped their own people is huge. Met a Cambodian killing fields survivor the other day......When it's bad, it's real bad.

Furthermore, Senator Wydens website has this germaine thought:
"Cyber vulnerabilities weaken cybersecurity. Once a backdoor is built in a security system, the security of the system is inherently compromised. For example, in 2005 it was revealed that an unknown entity had exploited a “lawful intercept” capability built into Greek cellphone systems and had used it to listen to users’ phone calls, including those of dozens of senior government officials."


On the Wyden web site:
Ron Wyden ✔ @RonWyden


Retweet to stand with me and tell the government no mandating backdoors into Americans’ technology. #EndThisDragnet http://1.usa.gov/1vm5qRZ
Reilly

Mountain climber
The Other Monrovia- CA
Dec 8, 2014 - 09:51am PT
Couch, it may be illegal but I see little evidence of anything being done
to bring those scum to justice. I guess it is too far above most cops' pay grade.
But we digress so we should just forget about something that is much more
likely to affect us.
couchmaster

climber
Dec 8, 2014 - 11:09am PT


You're a good dude Reilly, you think nothing is being done, I'm telling you that there is. The Army stuff is secret, but you can get regular news on other efforts.

"Within the U.S., there’s relatively little information on the prevalence of law enforcement hacking. The FBI only rarely discloses its use in criminal cases. Chris Soghoian, principal technologist with the American Civil Liberties Union’s Project on Speech, Privacy and Technology, who has closely tracked the FBI’s use of malware, says that agents use vague language when getting judges’ permission to hack devices. “This is a really, really, invasive tool,” Soghoian says. “If the courts don’t know what they’re authorizing, they’re not a good check on its use. If we as a society want malware to be used by the state, we ought to have a public debate.”"

or http://www.enigmasoftware.com/fbi-busts-fake-antivirus-rings-operation-trident-tribunal/

or http://www.batblue.com/european-police-and-the-us-fbi-coordinate-arrests-of-trojan-users-2/

Ergo on topic:
"FBI Shutdown of Virus Demanded New Anti-Hacker Tactics
By Del Quentin Wilber and Chris Strohm Jun 10, 2014 9:01 PM PT


Dismantling one of the world's most insidious computer viruses required complex and fast-paced tactics that will be the blueprint for U.S. law enforcement's future cyberbattles.

By the time authorities claimed victory over Gameover Zeus last week, they had reverse-engineered how the virus communicated, seized command-and-control servers overseas and engaged in cyber battle with the hackers to keep them from re-establishing contact with their fast evaporating network.

“This was the most sophisticated hacking disruption we have attempted to date,” said Leslie Caldwell, the assistant attorney general in charge of the U.S. Justice Department’s criminal division. “It was a hand-to-hand combat type of situation.”

The takedown of Gameover Zeus illustrates how U.S. law enforcement is adapting to the threat of increasingly sophisticated cyber crime. Slapping handcuffs on a hacker and seizing his or her computers is no longer enough. In this case, the virus -- which the FBI said had been used to siphon more than $100 million from U.S. consumers and businesses over three years -- was designed to survive such disruptions.

FBI officials said confronting such a network would have been difficult, if not impossible, a few years ago because the bureau didn’t have the technical expertise or the manpower to address it.
Shifting Approach

The operation was successful, in part, FBI officials said, because the bureau has shifted the way it approaches global cyber crime by boosting the number of agents trained in cyber security, deploying them more widely and by working more closely with experts in private industry.

Computer crimes cut “across every responsibility the FBI has,” Director James Comey testified last month before Congress. “The challenge we face with cyber is that it blows away normal concepts of time and space and venue, and requires us to shrink the world just the way the bad guys have.”

Stopping the hacker behind Gameover Zeus wasn’t enough. While federal prosecutors in May charged a 30-year-old Russian programmer named Evgeniy Bogachev in the case, they still had to kill the virus.
Global Coordination

FBI agents in Pittsburgh, Omaha and Washington spearheaded the investigation. The bureau was joined by law enforcement officials in Canada, Britain, Ukraine, the Netherlands and Luxembourg in the final assaults on nefarious servers.

Consultants at private companies including CrowdStrike Inc., Dell Corp.’s SecureWorks, Microsoft Corp. (MSFT), McAfee Inc., and Symantec Corp. (SYMC) were joined by specialists from Carnegie Mellon University and Georgia Tech, who provided key technical assistance.

It was “the largest fusion of law enforcement and industry partner cooperation ever undertaken in support of an FBI cyber operation,” Robert Anderson Jr., an executive assistant director at the bureau, said.

A variant of a virus first detected in 2007 that operated in a fairly standard fashion by infecting a computer and then communicating with a server controlled by hackers, Gameover Zeus operated like a hydra. According to federal authorities, it was controlled by a tightly knit group based primarily in Russia and Ukraine.
Infected Computers

Once a computer was infected, often after its user clicked on a malicious link or e-mail attachment, it became a “bot” and started communicating with other infected computers as part of a “botnet.” While communicating with each other, the bots also passed along stolen banking information to servers that relayed that data to the hackers.

The hackers committed their cyber burglary by exploiting the security hole bored by Gameover Zeus. When they determined the time was right, the hackers transfered funds from compromised bank accounts -- frequently in excess of $1 million -- through third parties known as “money mules.”

The virus was particularly insidious because it was designed to survive attacks. If authorities separately captured a bunch of bots, relay servers or even the hacker’s main computers, the rest of the system could keep operating until communication was re-established.
Financial Accounts

The FBI estimated that Gameover Zeus eventually infected as many as 1 million computers, about 250,000 in the U.S., and had access to financial accounts that held about $2 billion.

While Gameover Zeus mostly targeted computers operated by businesses, it was delivering a malware instrument called Cryptolocker that hit individuals, too. The virus encrypted a computer’s files and then demanded a fee, sometimes as much as $700, to release the documents, pictures or other personal information it was holding for ransom.

The operation to defeat it had to be carried out faster than the hackers could react. In court papers, the FBI said the hackers were capable of taking “simple, rapid steps to blunt or defeat the Government’s planned disruption.”

The first part of the operation took place in secret -- in government and private computer labs -- as engineers figured out ways to stop the bots from communicating with each other and then finding a way to block its failsafe mode.
Reverse Engineering

“We reverse engineered the malware,” said Adam Meyers, vice president of intelligence for CrowdStrike, a cyber security firm based in Laguna Niguel, California. “We found a way to prevent the adversary from putting in new commands to that network. Instead of talking to the hackers, they were talking to us.”

After additional testing ensured the technical phase would work, the consultants and U.S. law enforcement officials were ready to start seizing computers and servers in the network.

The first were command and control servers in the Ukrainian cities of Kiev and Donetsk on May 7. Although U.S. agents wanted to hit those servers closer to the start of the main operation on May 29, they decided they didn’t have a choice because the turmoil in Ukraine meant access couldn’t be guaranteed, according to two senior U.S. law enforcement officials who asked for anonymity because they were not permitted to talk about active investigations.

The FBI and consultants next examined the seized computers and learned more about how Gameover Zeus operated, and they tweaked their technical techniques to disrupt the network, the officials said.
Court Orders

Within days, Justice Department prosecutors and federal agents were on the phone with representatives of major Internet service providers and domain registries, alerting them to a pending court order that would require them to block infected computers from communicating with the hackers in Russia.

On May 19, federal prosecutors filed charges against Bogachev. Nine days after that, prosecutors obtained a court order in the U.S. permitting the government to redirect malware communications from the infected computers to its own servers. The order also allowed the government to gather information on what computers had been infected and to pass that information along to companies that could alert the victims.

To ensure Bogachev couldn’t take steps to save his network, the operation was carried out in secret.

Starting on Friday, May 30, law enforcement officials began what they described as fast-paced weekend of coordinated seizures of computers around the globe. They hit servers in Canada, France, Germany, Luxembourg, Ukraine and the U.K. As they took down the servers, the hackers caught on to what was transpiring and unsuccessfully tried to reclaim their bots through new servers and other methods, which the FBI and cyber experts blocked on the fly.

The weekend-long cyber duel freed more than 300,000 computers from the botnet, said Justice Department officials, who added they were working with Russian authorities to arrest and extradite Bogachev. They conceded that he and other hackers could still start over. Even so, the officials said, authorities had delivered a financial blow to the hackers’ enterprise -- severing them from $2 billion just waiting to be stolen. "


And of recent similar interest: http://www.extremetech.com/extreme/193821-dark-market-massacre-fbi-shuts-down-silk-road-2-0-and-400-other-tor-websites


couchmaster

climber
Dec 23, 2014 - 08:20pm PT
3 weeks after that post I see this nugget and this is what I'm alluding too Reilly. I had no idea that the military budget on this was so large however.

"Little has been discussed in public about U.S. Cyber Command’s specific capabilities since, though budget documents detail a growing commitment to this form of warfare. The Pentagon’s cyberwarfare budget has grown from $3.9 billion in 2013 to $4.7 billion in 2014 and an estimated $5.1 billion in 2015."

Just because you don't read a thing on the front page every day does not mean the thing is not true. 4 billion dollars is an extensive effort, and that doesn't detail what other agencies other than United States Cyber Command (USCYBERCOM) are committed to. (ie, FBI, NSA, The Defense Information Systems Agency allied with large US corporations, etc etc


http://www.defense.gov/home/features/2013/0713_cyberdomain/


regards
nah000

climber
no/w/here
Topic Author's Reply - Dec 23, 2014 - 09:57pm PT
serious question nwo2:

why do you write as if darker futures are inevitable... as if the powers that currently are and the intentions you surmise them to have, are unstoppable?

ie. it seems to me that individuals have more information, more power, more freedom than at any point in history and the primary two things that stop collective change from occurring are an inability to figure out what we are individually and collectively aiming towards [and away from] combined with a lack of awareness of how much power we as individuals and therefore as collectives actually have...

i get that we are in a time of incredible change and that as with all radical changes there are pitfalls to be avoided...

i just don't get pessimism that verges on fatalism...

seems to me that as with every other point in history the only way to guarantee a f*#ked outcome, is to assume that the f*#ked outcome is inevitable.

in this case we're at a point where we have more tools [both individually and collectively] that enable autonomy than at any point in history...

only way we retreat back deeper into the cave is if those who see some of the darker potentials [and i agree these definitely exist] view those potentials as inevitable.

the lack of action by the "sheep" is rarely the deciding factor.

an ability by those who know what they are working towards [and away from] to honestly assess their own individuated power and a will to take intrinsically consistent action [with that assessment] is and always has been the crux. [imesho]

peace.
nah000

climber
no/w/here
Topic Author's Reply - Dec 24, 2014 - 12:01am PT
nwo2:

what does the quote: Yes, many people will die when a New World Order is established, but it will be a much better world for those who survive. mean to me?

for the sake of argument i'm going to assume that that quote happened exactly as you've stated and your interpretation is 100% correct [and kissinger and a 13ish or so ruling families have a giant plan to bring about human genocide].

in that case and therefore for the sake of a point of argument, it would mean only the following two things to me:

1. there are people who are working towards futures that i don't want to put my energy towards.
2. those actively working towards said future are but individual wo/men who in their totality are small in number.

from those two meanings i would conclude the following:

1. their intended future is but one possible future.
2. they have no power to bring about that future without mass acquiescence.
3. i'm not going to waste any of my energy focusing on a negative that may or may not happen when i could focus on bringing about the future that i want to see happen. because ultimately assuming something is inevitable is just another form of acquiescence.



kissinger is exactly as you are: a living breathing human with incredible potential power that will one day die and be effectively forgotten.

why focus on his influence [or the 13 families or bildeberg or whoever supposedly has all the power] if it keeps you from manifesting your own influence in the world?

ie. who the f*#k cares about what all of the sick/psycopathic/evil individuals in the world intend... they have always existed and i'm sure they will always exist...

what i want to know is what is the future that you envision... the future that you're willing to live and die for?

and what are you doing to manifest that future?

focusing on an evil that may or may not happen is like being a deer caught in the headlights.

only reason the deer gets hit, is because it doesn't jump the f*#k out of the way...

in this case, the metaphor may simply be equated to a wasted life focused on things one has no power to change, when it's possible that one could have taken a single action that might have become the two from which came the three from which came the ten thousand...
Gnome Ofthe Diabase

climber
Out Of Bed
Dec 24, 2014 - 01:26am PT
papa bush (not capitalized) was big on saying your monicker!?
New world order. . .
He was not saying that it was coming, in the '80s. He was saying this was the brave new world.We were all going to be the test subjects for our children and we were.
After September eleventh as with after the Riechgstag Fire, the powers or the elite ...passed laws that were all encompassing and slid down the slope.
we are! phckd!



 1st visit to this thread I will have to go and puruse. . .??


after a quick scan I would add a lot about the Trilateralist theory, it's over view of what amounts to a theory of world domination.
It is Kind of think it was nieve to think that the government and all sorts of it's tentacles are pure in any way.








MERRY CHRISTMAS
TomCochrane

Trad climber
Santa Cruz Mountains and Monterey Bay
Dec 27, 2014 - 11:03pm PT
In an age when computers and the Internet rule communications, it could be that old-fashioned radios are the true tools of the New World Order. That's because if you want to collaborate with other governments to oppress the masses, it's best not to leave a digitized trail -- you never know when an Edward Snowden might unravel your conspiracy. So instead, you'd send indecipherable details of your fiendish plots via numbers stations.

Since World War II, so-called numbers stations have been transmitting coded messages via shortwave radio antennas. These transmissions are eerie and weird to casual listeners, nonsensical and puzzling to cryptographers ... and to the right set of ears, may contain information that changes the course of history.

But let's not get ahead of ourselves. At their most basic, numbers stations are simply shortwave radio transmitters, generally operating between 3,000 and 30,000 kilohertz. They're located in many, many countries, but no one knows just how numerous they are. They often transmit strings of numbers or numbers intoned by a computerized-sounding voice. Others send broadcasts via Morse code or they just emit various types of noise.

Some stations have been airing their signals for decades, and hit their peaks during the Cold War. Many have gone quiet since the Berlin Wall fell. Untold others continue filling the airwaves -- yet for what purpose, few know. And those that do know? They aren't talking.

You could try backtracking through a paper trail to see who operates numbers stations. But unlike most transmitters, they aren't licensed to broadcast, so you won't find any record of them in government documents.

They are essentially pirate stations (meaning they operate unlicensed and illegally) but no government agency shuts them down. That's because the government most likely operates them. Of course, no organization or government officially accepts responsibility for numbers stations. They are strictly off the record.

A lot of journalists have tried to untangle the mystery of numbers stations. They've found enough information that we can safely guess the purpose of these transmitters: espionage.

Keep reading and you'll see why old-school numbers stations might be the greatest spy tool ever, even in the age of the Internet and satellite phones.

http://people.howstuffworks.com/numbers-stations.htm
Splater

climber
Grey Matter
Dec 29, 2014 - 03:50pm PT
The NSA's Ongoing Efforts to Hide Its Lawbreaking
http://www.theatlantic.com/politics/archive/2014/12/the-nsas-ongoing-effort-to-hide-its-lawbreaking/384079/
dave729

Trad climber
Western America
Jan 1, 2015 - 09:26pm PT
Self Destructing solid state drives. Now available for your notebook.

http://securedrives.co.uk/catalog/view/theme/default/image/pdf/English-SDSRDD-TechSheet.pdf

This is not data over-writing but actual NAND flash chip shattering explosives triggered under all conceivable scenarios.

If stolen
You send a text from anywhere in the world and bang.
Shield the drive from the cell phone network to long and bang.
Unplug the SATA cable and bang.
Low battery in the notebook.. bang.
Try to open the SSD's armor steel enclosure.. bang
Finger tap a code onto your app enabled smart phone (while in your pocket) sends the destruct code..bang. Same with the Token if in range of several yards..finger tap a code.. bang!

128GB 2.5" drive
$1,596.18 USD

http://securedrives.co.uk/index.php?route=product/product&path=88&product_id=55

dave729

Trad climber
Western America
Jan 12, 2015 - 11:18am PT
Government claims sole right to spy on us. Private sector spying will be crushed.

This marks the first-ever criminal conviction concerning the advertisement and sale of a mobile device spyware app.

Justice News: Govt grabs source code for mobile spyware app. Writer forced
to confess in court. Jailed and fined.

StealthGenie App can turn on smartphone mic, listen to all your phone
calls, read texts, copy pictures.
Govt demanded and now has the source code.
http://www.justice.gov/opa/pr/man-pleads-guilty-selling-stealthgenie-spyware-app-and-ordered-pay-500000-fine


How to tell if Stealthgenie is installed on your cell phone.

http://blog.flexispy.com/remove-stealthgenie-iphone-android/
http://www.spyphonereview.com/five-ways-to-know-if-stealthgenie-is-on-your-android-phone/
http://acisni.com/is-there-spy-software-on-my-cell-phone-how-to-detect-being-monitored/
http://spyzrus.net/how-to-remove-spy-software-from-your-cell-phone/
Lorenzo

Trad climber
Oregon
Jan 12, 2015 - 12:10pm PT
Great.

Now that I've clicked one of those links I have probably installed spyware.....
kunlun_shan

Mountain climber
SF, CA
Jan 13, 2015 - 09:14pm PT
:-)

http://threatpost.com/how-a-10-usb-charger-can-record-your-keystrokes-over-the-air/110367
healyje

Trad climber
Portland, Oregon
Jan 13, 2015 - 09:56pm PT
Pretty much comes down to would you rather not know the scope of NSA's activities. I'd say he's done us a service.
kunlun_shan

Mountain climber
SF, CA
Jan 13, 2015 - 10:21pm PT
I completely agree, healyje.

Below is a link to a transcript of a James Bamford interview with Snowden, for a documentary to be released later this year.

Snowden criticizes the NSA for not working to help fix security flaws, and instead saving these exploits to break into systems. Meanwhile, everyone else is using the exploits, and the US has the most to lose.

Edward Snowden on Cyber Warfare

http://www.pbs.org/wgbh/nova/next/military/snowden-transcript/

[Click to View YouTube Video]
k-man

Gym climber
SCruz
Jan 27, 2015 - 04:15pm PT
On whistleblowing:

http://www.commondreams.org/news/2015/01/27/guilty-verdict-cia-agent-called-new-low-war-whistleblowers


Yeah, have Snowden come and "face the music." What a bunch of bastards.
Messages 1361 - 1380 of total 1468 in this topic << First  |  < Previous  |  Show All  |  Next >  |  Last >>
Return to Forum List
 
Our Guidebooks
spacerCheck 'em out!
SuperTopo Guidebooks

guidebook icon
Try a free sample topo!

 
SuperTopo on the Web

Recent Route Beta