Edward Snowden (1 Viewer)

  • Thread starter pete
  • Start date
  • Replies 94
  • Views 13K
  • Watchers 3
To view this content we will need your consent to set third party cookies.
For more detailed information, see our cookies page.
 
To view this content we will need your consent to set third party cookies.
For more detailed information, see our cookies page.
 
WELCOME TO BIZARRO WORLD


I explained to the man from Whitehall about the nature of international collaborations and the way in which, these days, media organisations could take advantage of the most permissive legal environments. Bluntly, we did not have to do our reporting from London. Already most of the NSA stories were being reported and edited out of New York. And had it occurred to him that Greenwald lived in Brazil?
"The man was unmoved. And so one of the more bizarre moments in the Guardian's long history occurred – with two GCHQ security experts overseeing the destruction of hard drives in the Guardian's basement just to make sure there was nothing in the mangled bits of metal which could possibly be of any interest to passing Chinese agents. 'We can call off the black helicopters,' joked one as we swept up the remains of a MacBook Pro.
http://www.npr.org/blogs/thetwo-way/2013/08/19/213605067/guardian-editor-u-k-govt-destroyed-hard-drives-with-nsa-leaks
 
well that's that.

Game over, man. Game over.

The NSA's codeword for its decryption program, Bullrun, is taken from a major battle of the American civil war. Its British counterpart, Edgehill, is named after the first major engagement of the English civil war, more than 200 years earlier.

A classification guide for NSA employees and contractors on Bullrun outlines in broad terms its goals.

"Project Bullrun deals with NSA's abilities to defeat the encryption used in specific network communication technologies. Bullrun involves multiple sources, all of which are extremely sensitive." The document reveals that the agency has capabilities against widely used online protocols, such as HTTPS, voice-over-IP and Secure Sockets Layer (SSL), used to protect online shopping and banking.

The document also shows that the NSA's Commercial Solutions Center, ostensibly the body through which technology companies can have their security products assessed and presented to prospective government buyers, has another, more clandestine role.

It is used by the NSA to "to leverage sensitive, co-operative relationships with specific industry partners" to insert vulnerabilities into security products. Operatives were warned that this information must be kept top secret "at a minimum".

http://www.theguardian.com/world/2013/sep/05/nsa-gchq-encryption-codes-security
 
what's funny is there was a slideshow circulating on the tweet machine last night, supposedly from some US sheriff's office forensics training course, talking about backdoors in encryption software

To view this content we will need your consent to set third party cookies.
For more detailed information, see our cookies page.
 
More on the Lavabit case:

In an interesting work-around, Levison complied the next day by turning over the private SSL keys as an 11 page printout in 4-point type. The government, not unreasonably, called the printout “illegible.”

“To make use of these keys, the FBI would have to manually input all 2,560 characters, and one incorrect keystroke in this laborious process would render the FBI collection system incapable of collecting decrypted data,” prosecutors wrote.

The court ordered Levison to provide a more useful electronic copy. By August 5, Lavabit was still resisting the order, and the judge ordered that Levison would be fined $5,000 a day beginning August 6 until he handed over electronic copies of the keys.

On August 8, Levison shuttered Lavabit, making any attempt at surveillance moot. He posted an oblique message saying he’d been left with little choice in the matter.

“I have been forced to make a difficult decision: to become complicit in crimes against the American people or walk away from nearly 10 years of hard work by shutting down Lavabit,” Levison wrote at the time. “After significant soul searching, I have decided to suspend operations.”

Levison and his lawyer are both bound by a gag order preventing them from discussing the details of the case, or identifying who the government’s target is. The case is now under appeal.

http://www.wired.com/threatlevel/2013/10/lavabit_unsealed/
 
To view this content we will need your consent to set third party cookies.
For more detailed information, see our cookies page.
 
check out the $20,000 airgap-jumping USB cable
 

Attachments

  • nsa-tao-ant[1].pdf
    643.4 KB · Views: 13
So 5 years ago they could hack a PC by cracking its WiFi network. From 8 miles away.

nsa-ant-nightstand.jpg


At this point I imagine the Person Of Interest writers are all sitting in a room, screaming OH COME ON at each other.
 

Users who are viewing this thread

Activity
So far there's no one here
Old Thread: Hello . There have been no replies in this thread for 365 days.
Content in this thread may no longer be relevant.
Perhaps it would be better to start a new thread instead.

21 Day Calendar

Lau (Unplugged)
The Sugar Club
8 Leeson Street Lower, Saint Kevin's, Dublin 2, D02 ET97, Ireland

Support thumped.com

Support thumped.com and upgrade your account

Upgrade your account now to disable all ads...

Upgrade now

Latest threads

Latest Activity

Loading…
Back
Top