Snowden's Snow Job: the NSA's slow-leak plan to create an Orwellian Surveillance Planet | |
Anonymous Coward User ID: 42527287 07/10/2013 02:20 PM Report Abusive Post Report Copyright Violation | you hit that nail on the her head, there using quantum pc's, with processors that have laser interconnects rather then gold for for transporting the data back and fourth between the silicone wafers in the processors, now what they use to store all the data hmm. one could only imagine |
Prometheus.Locke (OP) User ID: 43155979 France 07/10/2013 02:40 PM Report Abusive Post Report Copyright Violation | As I have mentioned, interest and speculation into TEMPEST technology, and its evolution was once rampant amongst computer security afficionado's.. but knowledge of its existence appears to be slowly disappearing in a maelstrom of disinformation and psuedo-censorship. Here are some links discussing it: [link to en.wikipedia.org] [link to security.stackexchange.com] [link to www.xent.com] [link to cryptome.org] [link to www.nsa.gov] To dismiss this as an attack that can only be performed in near-vicinity and would result in only lossy-information gathering is to completely disregard the intelligence and force of will of organizations like the NSA. Be assured, work has been ongoing for decades on increasing the amount of space between listener and victim, and with the huge ECHELON infrastructure we see around us today, it's more than possible that there is no longer a space constriction on Earth. |
Prometheus.Locke (OP) User ID: 10545675 Sweden 07/11/2013 01:43 AM Report Abusive Post Report Copyright Violation | |
TheStreetProphet User ID: 1836585 07/11/2013 02:03 AM Report Abusive Post Report Copyright Violation | |
Prometheus.Locke (OP) User ID: 41356907 Russia 07/21/2013 06:19 PM Report Abusive Post Report Copyright Violation | In the wake of the PRISM leak, many have begun talking about additional measures that can be taken to increase privacy despite the near total surveillance that has recently been brought to light at the hands of America's National Security Agency and their counterparts in intelligence organizations throughout the world, operating under an arraignment that dates back to 1947, the UKUSA Agreement. This organization has been "fingered" as the operator of the ECHELON network, and it should be clear that programs like PRISM and Carnivore are nothing more than a portion the underlying machinery which allows for the uninhibited surveillance of nearly every form of human communication. For decades, the computer security industry has created encryption, anonymity increasing protocols, and security infrastructure to protect our data from would-be thieves, malicious hackers, and... also the NSA. Right? In 1976 the NSA made a number of contributions to a new encryption standard, DES. At the time, there was widespread speculation that a backdoor was put in to the standard, but 35 years later the NSA has given us new information. What we now know is that the NSA strengthened DES, making the algorithm stronger and, at the same time, reduced the key size from 64 bit to 56. This tells us some very important things about the NSA in 1976, and it should scare the hell out of you in 2013. First, the NSA had enough compute power to brute force DES (most likely at keys larger than 64 bit) in 1976, and was very comfortable with a 56 bit key size.) Second, given the increase in computing power between then and now, its is almost absurd to think that any encryption standard is really worth its salt when dealing with this eneorganization in 2013. Taken a step further, its more than likely that nearly anyone with enough money is able to defeat SSL etc.. The sad truth, the really well organized thieves and hackers are most likely just as able to defeat the anonymity and encryption standards of today as the NSA (albeit perhaps, with less ease.) Using services like hushmail, TOR, and PGP will do nothing to increase your privacy when you are dealing with the National Security Agency.. and in fact will most likely make you a target, whether or not you actually do anything wrong. Further reading: [link to gcn.com] [link to cryptome.sabotage.org] More on Snowden: [link to www.unduecoercion.com] [link to www.unduecoercion.com] |
Prometheus.Locke (OP) User ID: 1333437 Netherlands 08/09/2013 05:32 PM Report Abusive Post Report Copyright Violation | "... This is an attack on more than just privacy, the very fabric of our legal system is being attacked by prosecutors and law enforcement. Before this is all said and done it will be clear that these organizations have been actively evading due process of law for decades. ..." [link to www.unduecoercion.com] Obama continues his lies, and the NSA's illegal activities will now .. be better hidden than before. "... It's almost humorous to me that the Administration is still talking about FISA as if it's the problem--it's been disclosed through multiple "official" sources already that the FISA court is nowhere to be found in the NSA surveillance "loop." The ability to know everything is Pandora's Box; we will not be shutting it without smashing the NSA into a thousand pieces. What this rhetoric means is that the "official line" on this has not and will not be changing. The old lies will be replaced with new ones, and the American people will not have the truth... for their own benefit.. right? ..." |
katsung47 User ID: 32315283 United States 08/09/2013 05:40 PM Report Abusive Post Report Copyright Violation | 778. Edward Snowden is a false flag (7/5/2013) My conclusion based on the following facts. 1. Time line. It’s the development of the recent events, all related to the core plot- elimination of Kat Sung. (1) The final stage of Boston bombing. It is marked by the killing of Toadshev in late May and the retirement announcement of the Boston FBI Chief in early June. (2) On 6/7, an unusual private meeting between Obama and Xi (Chinese President) was arranged suddenly in California. Payment of the secret deal apparantly was an issue. (3) On 6/14, “Former US National Security Agency (NSA) contractor Edward Snowden revealed to Hong Kong’s English-language newspaper, the South China Morning Post, on Wednesday that Washington has hacked into hundreds of civilian targets in Hong Kong and mainland China.” [link to www.wsws.org] 2. Obviously, Snowden’s revelation is the result of that private summit. It is part of payment of a secret deal between the secret police of US and China. US recently “has repeatedly accused Beijing of perpetrating cyber-warfare, while China has continuously denied the accusations. The latest round in this blame game saw the US Defense Science Board publish a report saying that nearly 40 Pentagon weapons programs and almost 30 other defense technologies were compromised by Chinese hackers, some allegedly tied to the military or government. ( [link to rt.com] It’s not a coincidence that Snowden chose Hong Kong as the place for his revelation. That’s a payment to China. His revelation largely releases the pressure on China. 3. It is a payment to Chinese secret police for their collaboration in Boston bombing. In which they confirmed one of the death was a Chinese student. They also joined a carjacking set up to trap Tsarnaev brothers. (mysterious Danny). Also for a big operation to create a bird flu which estimated 6.5 billion in cost. (see “774. China and bird flu (6/5/2013)”) 4. No information important has Snowden leaked to public because his job is just to release the “cyber spying” pressure from China. What he said is to prove US does same thing that China does. Government spying on people and foreign countries. That’s common sense. Americans know echelon, Patriot Act since 911. Civil rights has been damaged already. So what for Prism. 5. News said Snowden is helped by Wikeleaks in his travel plan and finance. It proves true what I alleged two years ago that Assange was a false flag. The master played behind them is the same organization. (see “655. Bin Laden and Julian Assange, False flag and living plant (12/7/2010)”) |
Prometheus.Locke (OP) User ID: 44615239 Germany 08/09/2013 05:55 PM Report Abusive Post Report Copyright Violation | Interesting. I assume you are a Chinese National? Our true enemy, as far as I can see, does a good job of convincing the majority of gang stalking victims that their own government is responsible. It's somewhat humorous, seeing that the tactics used are homogeneous, and the attack is being performed world wide--this tells us one of two things: 1) there is a single government coordinating the attack globally, or 2) the attack is being performed by a non-governmental organization. I have some writing about gang stalking being used as a "frame job" back in the days of the "red scare" (1959) here: Thread: The Two Witnesses: Has anyone considered the possibility that they have already come and gone? Back then, several high profile US persons were convinced there was a secret infiltration of KGB in America: throughout the CIA and (interestingly) the education complex. Both victims, John Forbes Nash Jr. and James Jesus Angleton were convinced that this organization not only existed, but wielded power much greater than would have been possible, in hindsight, since they would not have lost the war. |
Anonymous Coward User ID: 2924495 United States 08/09/2013 05:55 PM Report Abusive Post Report Copyright Violation | Even if that doesn't happen, when the dollar collapses, they wont be able to pay all those NSA and CIA flunkies. |
Prometheus.Locke (OP) User ID: 44594940 Germany 08/09/2013 06:00 PM Report Abusive Post Report Copyright Violation | At some point, 5 million people will probably march on the NSA and they won"t be able to kill or arrest all 5 million people, and the Prism palace will end up being be a sordid trash heap. Quoting: Anonymous Coward 2924495 Even if that doesn't happen, when the dollar collapses, they wont be able to pay all those NSA and CIA flunkies. Have you thought that maybe the dollar has not collapsed yet.. for a reason? I'm fairly certain "someone" has been manipulating the global financial markets since well before 2008--though it became retardedly obvious at that time. Ideas like "too big to fail" and "flight to quality" were created simply to steal wealth from the population (of the world) and consolidate it in the hands of ... a small group of private investors. We have basically witnessed the grandest bank robbery in history--the face of the planet has been sold to Satan. [link to www.unduecoercion.com] |
Anonymous Coward User ID: 36793098 Canada 08/09/2013 07:39 PM Report Abusive Post Report Copyright Violation | this hardware based backdoor has been on intel (not AMD) chipsets for quite some time. i really wish i remember what it was called to link up the article. went into pretty extensive detail on just what all was being implicated. |