Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

NSA boss tells lawmakers the gov't wants even more data, 'dozens' of attacks thwarted [2nd Amend]
Foreign Policy ^ | 6/12/2013 | John Reed

Posted on 06/13/2013 1:24:29 AM PDT by PieterCasparzen

click here to read article


Navigation: use the links below to view more comments.
first previous 1-2021-4041-53 next last
To: Cvengr

seven en francais is sept (pronounced set)

maybe Zetta is close enough


21 posted on 06/13/2013 6:13:51 AM PDT by xp38
[ Post Reply | Private Reply | To 7 | View Replies]

To: PieterCasparzen
The NSA, the Department of Homeland Security (DHS), and the FBI -- a trio Alexander described as the core of the U.S. Federal Cybersecurity Team (a term we haven't heard before) -- are developing an "information sharing environment that will create a cross-governmental shared situational awareness that is [extenable] to other partners such as state and local governments and our allies," according to Alexander's written opening statement

Is the IRS part of the 'team' - a team as interested in going after American citizens as protecting us from Islamists? Maybe the American people should vote on this - how much 'security' do we want vs how much freedom do we give up? Or better yet, let's consider peacefully dividing the country. One have liberal control freaks who can open their borders, hand out cash to real terrorist (a la John Kerry) and give up their privacy. The other half will take a few risks, close their borders and live free...

Dems need to consider this - their country can be run as paranoid as it comes... and we won't be there to object.

22 posted on 06/13/2013 6:33:57 AM PDT by GOPJ (Why donÂ’t Democrats waste their time trying to win the votes of gun owners? - Coulter)
[ Post Reply | Private Reply | To 1 | View Replies]

To: PieterCasparzen
The NSA, the Department of Homeland Security (DHS), and the FBI -- a trio Alexander described as the core of the U.S. Federal Cybersecurity Team (a term we haven't heard before) -- are developing an "information sharing environment that will create a cross-governmental shared situational awareness that is [extenable] to other partners such as state and local governments and our allies," according to Alexander's written opening statement

Is the IRS part of the 'team' - a team as interested in going after American citizens as protecting us from Islamists? Maybe the American people should vote on this - how much 'security' do we want vs how much freedom do we give up? Or better yet, let's consider peacefully dividing the country. One half liberal control freaks who can open their borders, hand out cash to real terrorist (a la John Kerry) and give up their privacy. The other half will take a few risks, close their borders and live free...

Dems need to consider this - their country can be run as paranoid as it comes... and we won't be there to object.

23 posted on 06/13/2013 6:35:23 AM PDT by GOPJ (Why donÂ’t Democrats waste their time trying to win the votes of gun owners? - Coulter)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Black Agnes
Don’t rely on any encryption. Even IF they can’t break it now, they’ll just store it and analyze it when they can.

Bad advise. Unless someone makes some kind of fundamental breakthrough in mathematics that would make factoring large numbers inconsequential, there is plenty of crypto available today that is strong enough that the feds would have no concievable ability to crack it in your lifetime, even given Moore's Law.

They are much more likely to hack your computer and steal your keys if they really want them than to worry about 'breaking' the message.

If we all habitually used encryption as a part of our daily communications, we could make it much more difficult for them to tell the difference between an email that is routine, and one that is 'interesting'.

There is no technical reason why good, strong crypto isn't built into all email clients. I suspect government pressure, more than anything else keeps it out.

24 posted on 06/13/2013 7:10:13 AM PDT by zeugma (Those of us who work for a living are outnumbered by those who vote for a living.)
[ Post Reply | Private Reply | To 17 | View Replies]

To: zeugma

When was the last time you saw federal LEOs on TV bemoaning the availability of civilian encryption?

10-12 years by my count.

It’s the dog that didn’t bark.

There are plenty of mathematical back doors.

Trust me on this.


25 posted on 06/13/2013 7:35:24 AM PDT by Black Agnes
[ Post Reply | Private Reply | To 24 | View Replies]

To: PieterCasparzen

I swear I had not seen this thread when I posted this:

http://www.freerepublic.com/focus/f-news/3030810/posts

Posted on Thursday, June 13, 2013 10:14:10 AM by Abundy

Over the last two weeks we have seen revelations regarding the NSA datamining and allegations that DHS has compiled a list of people it deems dangerous to the government.

Anyone want to bet against the NSA capturing and segregating in a separate database all NCIC instant check phone calls as part of the creation of the enemies list or simply for collation with the list if the government decides these dangerous people need a visit?

Think about the information in that phone call...

name, SSN, type of firearm

...all information handed to the government for safekeeping. The FBI and ATF don’t even need to violate the law since it’s the NSA that is doing so.


26 posted on 06/13/2013 7:39:18 AM PDT by Abundy
[ Post Reply | Private Reply | To 1 | View Replies]

To: Black Agnes
There are plenty of mathematical back doors.

Mathematical back doors? Do you mean to imply that there's some intrinsic flaw in ALL encryption algorithms?

Are you saying that brute force decryption is not even needed? For now, I'll rely on systems which require brute force. An encryption system with a "mathematical back door" is no encryption system at all...

27 posted on 06/13/2013 7:41:08 AM PDT by sargon (I don't like the sound of these here Boncentration Bamps!)
[ Post Reply | Private Reply | To 25 | View Replies]

To: sargon

The brute force encryption is the equivalent of trying to get in the front door. That’s locked, bolted and made out of steel. Meanwhile the clever cryptanalysts climb in that side window over there. The one that’s open a wee bit if we can just prise a little with this here crow bar.

Just remember. The last time you heard a federal LEO call encryption the ‘tool of terrorists’ and cry for its regulation or outlawing. 10-12 years by my memory.

The dog that didn’t bark.


28 posted on 06/13/2013 7:45:23 AM PDT by Black Agnes
[ Post Reply | Private Reply | To 27 | View Replies]

To: Black Agnes
I'm not aware of any general consensus in the computing community that there are "side doors" to things like PGP, etc. but I'd love to review any supplemental material you could point me towards.

What good is a front door if the side door will suffice? It's as if you're saying that there's no such thing as strong encryption, because there's ALWAYS a side door. As I said, I'd like to learn more about this claim.

29 posted on 06/13/2013 7:52:53 AM PDT by sargon (I don't like the sound of these here Boncentration Bamps!)
[ Post Reply | Private Reply | To 28 | View Replies]

To: sargon

Just ask yourself when was the last time you saw federal LEOs kvetching about the civilian encryption programs.

They were all over TV in the 90’s complaining about civilian access to ‘terror tools, including encryption’.

And then, all of a sudden, in the early 00’s all fell silent on that front.

Do you think, in light of all this data farming being done on 300M of us, they just gave up?

It’s the dog that didn’t bark.

It doesn’t matter if YOU can’t think of a mathematical means to break the encryption. Plenty of really smart mathematicians have been tasked with it for decades.

Remember in the old cowboy western movies when the Indians were getting ready to go on the warpath? They’d throw a big powwow and dance in a big circle to the sound of lots of drums. And while those drums were pounding the cowboys knew they were safe. Because they knew where the Indians were.

But when those drums grew quiet....

I haven’t heard those particular drums in 10 or 12 years. Have you?


30 posted on 06/13/2013 7:57:11 AM PDT by Black Agnes
[ Post Reply | Private Reply | To 29 | View Replies]

To: Black Agnes

I understand your comment about the all the hoo-ha calming down. But my recollection of the period is that it became settled that if somebody wanted to use strong encryption like PGP, then there’s not a lot that the government can do to stop them. I’m sure that corporate R&D departments, the military, and other such entities use it all the time. The fact that it hasn’t become widely used by private citizens doesn’t necessarily mean that it’s obviated.


31 posted on 06/13/2013 8:03:47 AM PDT by sargon (I don't like the sound of these here Boncentration Bamps!)
[ Post Reply | Private Reply | To 30 | View Replies]

To: sargon
On a related note, it's interesting to me that the government is saying "we're not snooping on your content" when of course such snooping is the ONLY way that they could ever know that you're using strong encryption in the first place.

I guess if the government goes after you for using strong encryption, it means that you've already run afoul of them on some other point...

32 posted on 06/13/2013 8:06:21 AM PDT by sargon (I don't like the sound of these here Boncentration Bamps!)
[ Post Reply | Private Reply | To 31 | View Replies]

To: sargon

Well, between civilian entities PGP is probably a good thing to use.

Just don’t assume the feds can’t break it. I wouldn’t swear it on the Bible but I’d bet a mint on it in Vegas.


33 posted on 06/13/2013 8:12:46 AM PDT by Black Agnes
[ Post Reply | Private Reply | To 31 | View Replies]

To: Black Agnes
sorry. that's not something that can be trusted. Can you demonstrate one? If not, it's just FUD. I think the reason you're not seeing FedGov going apeshit about encryption, is that people are so incredibly lousy with their computer security. Witness the huge number of compromised MS-Windows systems out there. (and the widespread use of MS-Windows in general for that matter) They don't need to break anything, if they can just hack in and get the keys they need, or watch you compose the email you are going to encrypt real-time.
34 posted on 06/13/2013 10:19:21 AM PDT by zeugma (Those of us who work for a living are outnumbered by those who vote for a living.)
[ Post Reply | Private Reply | To 25 | View Replies]

To: Black Agnes

True but you can literally flood them with enough chaff to choke on for years everything from knock knock jokes to Aunt Kate’s toxic tuna casserole recipe. The amount of computer power & time/money will make it prohibitive in time & expense to decrypt every damn thing.


35 posted on 06/13/2013 11:38:03 AM PDT by Nebr FAL owner
[ Post Reply | Private Reply | To 17 | View Replies]

To: Nebr FAL owner

Nope. Not even.

You’re thinking in terms of computational equipment you’ve seen.


36 posted on 06/13/2013 11:39:45 AM PDT by Black Agnes
[ Post Reply | Private Reply | To 35 | View Replies]

To: Black Agnes

The gentleman is asking for factual information yet you can provide none only rambling about old westerns/cowboy movies.

A great deal of the folks on the internet don’t even realize that there are encryption software that is available for use by non government folks.

As for the government flunkies not talking about digital encryption on the idiot box why let folks like the inner city gang banger get improved skills like figuring out secure communications like using cut outs & dead drops & encryption by pointing out that they can learn how to do these things.


37 posted on 06/13/2013 11:52:28 AM PDT by Nebr FAL owner
[ Post Reply | Private Reply | To 30 | View Replies]

To: Black Agnes

Are you claiming that there is no encryption that the NSA can’t break at near real time? If so how do you come to this conclusion what inside info if any do you have on this point?


38 posted on 06/13/2013 11:57:16 AM PDT by Nebr FAL owner
[ Post Reply | Private Reply | To 36 | View Replies]

To: Nebr FAL owner

As I’ve told other posters. Use encryption if you like. It will undoubtedly keep 3rd parties from reading your messages.


39 posted on 06/13/2013 12:04:17 PM PDT by Black Agnes
[ Post Reply | Private Reply | To 38 | View Replies]

To: Nebr FAL owner

The feds aren’t worried about the gang bangers regardless of what they do.

If everyone had started using encryption for nearly everything 15 years ago it might have been different.

But then, the agency in question has infinite dollars. And if they’re not picking your pocket for them they can just print their own.


40 posted on 06/13/2013 12:11:24 PM PDT by Black Agnes
[ Post Reply | Private Reply | To 37 | View Replies]


Navigation: use the links below to view more comments.
first previous 1-2021-4041-53 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson