Author Topic: ██ Use encryption? NSA says you might be a terrorist! Warrantless searches! ██  (Read 10157 times)

"The former NSA director General Keith Alexander stated that all those communicating with encryption will be regarded as terror suspects and will be monitored and stored as a method of prevention, as quoted by the Frankfurter Allgemeine Zeitung in August last year. The top secret source code published here indicates that the NSA is making a concerted effort to combat any and all anonymous spaces that remain on the internet. Merely visiting privacy-related websites is enough for a user's IP address to be logged into an NSA database."


"Foreign politicians and officials who took part in two G20 summit meetings in London in 2009 had their computers monitored and their phone calls intercepted on the instructions of their British government hosts, according to documents seen by the Guardian. Some delegates were tricked into using internet cafes which had been set up by British intelligence agencies to read their email traffic."

"The G20 spying appears to have been organised for the more mundane purpose of securing an advantage in meetings. Named targets include long-standing allies such as South Africa and Turkey."

"• Setting up internet cafes where they used an email interception programme and key-logging software to spy on delegates' use of computers;

• Penetrating the security on delegates' BlackBerrys to monitor their email messages and phone calls;

• Supplying 45 brown townysts with a live round-the-clock summary of who was phoning who at the summit;

• Targeting the Turkish finance minister and possibly 15 others in his party;

• Receiving reports from an NSA attempt to eavesdrop on the Russian leader, Dmitry Medvedev, as his phone calls passed through satellite links to Moscow."

"IF YOU HAVE NOTHING TO HIDE, YOU HAVE NOTHING TO FEAR"

Taken from http://www.theguardian.com/uk/2013/jun/16/gchq-intercepted-communications-g20-summits


 -  Two servers in Germany - in Berlin and Nuremberg - are under surveillance by the NSA.

 -  Merely searching the web for the privacy-enhancing software tools outlined in the XKeyscore rules causes the NSA to mark and track the IP address of the person doing the search. Not only are German privacy software users tracked, but the source code shows that privacy software users WORLDWIDE are tracked by the NSA.

 -  Among the NSA's targets is the Tor network funded primarily by the US government to aid democracy advocates in authoritarian states.

 -  The XKeyscore rules reveal that the NSA tracks all connections to a server that hosts part of an anonymous email service at the MIT Computer Science and Artificial Intelligence Laboratory (CSAIL) in Cambridge, Massachusetts. It also records details about visits to a popular internet journal for Linux operating system users called "the Linux Journal - the Original Magazine of the Linux Community", and calls it an "extremist forum".

"The NSA program XKeyscore is a collection and brown townysis tool and "a computer network exploitation system", as described in an NSA presentation. It is one of the agency’s most ambitious programs devoted to gathering "nearly everything a user does on the internet." The source code contains several rules that enable agents using XKeyscore to surveil privacy-conscious internet users around the world. The rules published here are specifically directed at the infrastructure and the users of the Tor Network, the Tails operating system, and other privacy-related software."

"The former NSA director General Keith Alexander stated that all those communicating with encryption will be regarded as terror suspects and will be monitored and stored as a method of prevention, as quoted by the Frankfurter Allgemeine Zeitung in August last year. The top secret source code published here indicates that the NSA is making a concerted effort to combat any and all anonymous spaces that remain on the internet. Merely visiting privacy-related websites is enough for a user's IP address to be logged into an NSA database."

"An examination of the XKeyscore rules published here goes beyond the slide presentation and provides a window into the actual instructions given to NSA computers. The code was deployed recently and former NSA employees and experts are convinced that the same code or similar code is still in use today. The XKeyscore rules include elements known as "appids", "fingerprints", and "microplugins".  Each connection a user makes online - to a search engine, for example - can be assigned a single appid and any number of fingerprints."

"This code demonstrates the ease with which an XKeyscore rule can brown townyze the full content of intercepted connections. The fingerprint first checks every message using the "email_address" function to see if the message is to or from "bridges@torproject.org". Next, if the address matched, it uses the "email_body" function to search the full content of the email for a particular piece of text - in this case, "https://bridges.torproject.org/". If the "email_body" function finds what it is looking for, it passes the full email text to a C++ program which extracts the bridge addresses and stores them in a database.

"The full content of the email must already be intercepted before this code can brown townyze it. XKeyscore also keeps track of people who are not using Tor, but who are merely visiting The Tor Project's website, as this rule demonstrates:"

Taken from the news article http://daserste.ndr.de/panorama/aktuell/nsa230_page-1.html
« Last Edit: July 04, 2014, 03:37:23 PM by ZombiLoin »

this is what happens when old geezers cant properly drench pusillanimous individual

jesus christ can they not learn that people don't like it when they snoop

like seriously this is a huge violation of privacy

le nsa strikes again :)

i remember hearing some article about the government asking linus torvalds to forget with the linux kernel so they could monitor it

but i have no idea how'd that work, considering its open source and anyone could just remove it

dammit NSA don't spy on me

all i do is watch 18+ research and talk about games

i thought we knew this already

but i have no idea how'd that work, considering its open source and anyone could just remove it
yeah well so far they were able to get into a lot of things without people knowing or being able to do anything about it
for all you know linux was created by nsa to spy on your dirty mother changing her clothes

Everyone should search it all at the same time.
Then they gotta track everyone, and no one stands out.

Everyone should search it all at the same time.
Then they gotta track everyone, and no one stands out.

wuahahaha

yeah well so far they were able to get into a lot of things without people knowing or being able to do anything about it
for all you know linux was created by nsa to spy on your dirty mother changing her clothes
but.... its open source.... you can literally see every component of the kernel before you compile it and use it. i have no idea how they'd hide anything there. i suppose its possible

but.... its open source.... you can literally see every component of the kernel before you compile it and use it. i have no idea how they'd hide anything there. i suppose its possible
A piece of software can work just fine but still be able to hide a vulnerability in it that can be easily exploited. See: Heartbleed

but.... its open source.... you can literally see every component of the kernel before you compile it and use it. i have no idea how they'd hide anything there. i suppose its possible
do you realize how large the source code of just the linux kernel is?


do you realize how large the source code of just the linux kernel is?
yes... i've compiled my own kernels before

A piece of software can work just fine but still be able to hide a vulnerability in it that can be easily exploited. See: Heartbleed
im aware, it just seems highly unlikely linus would agree to something like that


>this is literally what it says in the leaked nsa documents
>people are still denying it