Posted on 06/07/2013 6:24:53 AM PDT by blam
THE TRUTH ABOUT NSA SPYING: They Still Have Your Internet Data And Tech Giants Know It
Michael Kelley
Jun. 7, 2013, 9:00 AM
The Washington Post has backtracked on its claim that nine major tech firms 'participate knowingly' in the National Security Agency's domestic surveillance program, Jon Russell of The Next Web reports.
But that doesn't mean that the dragnet snooping didn't happen, or that the tech heavyweights didn't know about it.
On Thursday The Post and The Guardian reported on leaked NSA powerpoint slides that detail an eavesdropping program dubbed PRISM based on "legally-compelled collection" of extracting reams of data from Microsoft, Yahoo, Google, Facebook, PalTalk, YouTube, Skype, AOL and Apple with the "assistance of communications providers in the US."
The Post article now suggests the firms were unaware of PRISM after Apple, Facebook, Microsoft and Google denied involvement, and Director of National Intelligence James Clapper declassified information about the program to address "inaccuracies."
From Russell:
... the papers new stance is a huge admission. For one thing, it adds to the growing claim that the agency instead accessed the information indirectly. In such a case, the most likely method would be via ISPs or mobile operators, but that remains unconfirmed.
Actually, according to investigative reporting and whistleblower testimony, it's pretty clear that the NSA has bugged every major ISP and mobile provider.
(Excerpt) Read more at businessinsider.com ...
Now the question is did Axelrod have access to this data on which he built that “super election system” he bragged about and the DNC woman marveled over?
It would make sense for the dems to get a leg up by using their own computer geeks to mine the information if they could get their hands on the raw data.
Just wondering
—— Now the question is did Axelrod have access to this data on which he built that super election system he bragged about and the DNC woman marveled over? ——
Assume so unless proven otherwise.
In the congressional hearing yesterday, Holder wouldn’t answer a question regarding evesdropping on members of congress.
I will also believe that this accounts for Roberts’ reversal on Commiecare.
Good question ! Send it to Breitbart, maybe one of their investigators can find the answer!
Two things.
A source who knew Phil Zimmerman very well claimed to have been in the room with Phil when he was leaned on by the feds and threatened. That guy is dead now, and incidentally, I was the last person who talked to him - he wanted the location of the author of s-tools. That was in the evening. He was dead in the morning. Harold Highland.
B. To keep a reliable PGP, use either the 2.62I with keys crowdverified or the gpg. The verisign shit is worthless.
I had a creepier exchange with Verizon back in the very early ‘00’s. I didn’t have a computer or a modem at home. Home was for relaxation. I read books and did crafting and cooking. Relaxing stuff.
Had a visitor from back home for 3 or 4 days who brought their laptop with modem. Used that for the duration of their visit to check their email and what not.
About 2 days after they’d left I got a phone call from Verizon customer service wanting to know if I was interested in their data plan to use with my new computer.
...!...
creepy.
-— God help us. Only He can. ——
I can see from your tagline that you know the other component of a good earthly backup program —a gun.
The Communist Who Shall Not Be Named must really be steamed about the failure of his confiscation effort.
But he’ll be back.
HEY government snoopers! Are you reading this? You are fascists, stalinists, and the KGB. Go to hell!
Not just FISA judges. Local magistrates -—SCOTUS have done some peculiar things in the last few years.
Blackmail? Payola? Chicago corruption ?
http://en.wikipedia.org/wiki/Comprehensive_National_Cybersecurity_Initiative
http://en.wikipedia.org/wiki/Utah_Data_Center
http://en.wikipedia.org/wiki/Stellar_Wind_%28code_name%29
http://en.wikipedia.org/wiki/Trailblazer_Project
People are forgetting that this government has identified Tea Partiers, gun control advocates and other conservatives as “terrorists”. When we read that the phone spying efforts were aimed at rooting out terrorists and their networks, I do not think that the government thinks that “terrorist” means what we think it means. I think that they wanted to monitor US calling patterns to identify conservatives and their allies.
I do not believe strong encryption is crackable.
The world’s best have tried and failed - the algorithms are pretty bulletproof.
I think what they have found is that the people they are interested in are too dumb to properly secure their communications.
They don’t use ‘front door’ cracking techniques. Trust me on this.
Usage of encryption undoubtedly flags you for closer inspection.
The problem with your theory is that the best encryption code is open-source. In fact, I have the C code for BlwoFish on my computer. I have inspected it carefully, and there are no back doors.
Now if I were to compile this code into a library, and then write a chat client that uses that library, I would have an unbreakable means of communication. The only problem would be key distribution.
I wasn’t speaking of a code based back door.
There are plenty of mathematical ones.
Lol. AQ has done two special public key implementations.
The USDHS has backdoors to both.
Is there someway we can make this collection effort backfire?
Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.