Posted on 12/05/2012 12:15:36 PM PST by wesagain
Did you ever get the feeling you were being watched?
And watched by the government?
Theres very good reason to feel that way, says a whistleblower from the National Security Agency who says everyone in the U.S. is under virtual surveillance by federal authorities.
In an interview with RT, William Binney, a former mathematician and code breaker at the NSA, says the FBI records the emails of nearly all Americans, including members of Congress, and warns that the government can use this information against anyone.
The FBI has access to the data collected, which is basically the emails of virtually everybody in the country. And the FBI has access to it, Binney said.
All the congressional members are on the surveillance, too, no one is excluded. They are all included. So, yes, this can happen to anyone. If they become a target for whatever reason they are targeted by the government, the government can go in, or the FBI, or other agencies of the government, they can go into their database, pull all that data collected on them over the years, and we analyze it all. So, we have to actively analyze everything
(Excerpt) Read more at wnd.com ...
More news from the cap’n opbvious agency of little known facts. They should be spending their time with the real murderers of America, the WH.
Granted they probably are . However there is a limit to what they can do ie supercomputer time is very expensive & using it to decrypt Aunt Katie’s casserole recipe and Knock Knock jokes will really tie things up & waste their budget especially if you use more than 1 crypto system. to multi encrypt .
Your 'D-Wave' link is a link to this thread.
It used to be us, the American citizens.... but now it’s an organized crime syndicate operating out of D.C. .
Then by GOSH, BENGHAZI should be NO PROBLEM AT ALL to investigate. GET cracking.
I’ve come to the conclusion that there really are cameras everywhere just like on PERSON OF INTEREST. We put them there. They’re called cell phones. They’re “filming” and “listening” even when you think your phone is turned off.
Nothing to worry about, it’s just for advertising.../sarcasm
Yet, they still have no clue who released the Climate Gate files that proved a Global Conspiracy of the NWO Elites to deny energy to the worlds poor.
Your 'D-Wave' link is a link to this thread.
Whoops! I didn't follow the World Nut Daily link as I have wasted far too much time there. I presume that the D-wave link is there. Oh well...
Thanks.
Your link opens a blank page.
However:
“Integer factorization is believed to be computationally infeasible with an ordinary computer for large integers if they are the product of few prime numbers (e.g., products of two 300-digit primes).[10] By comparison, a quantum computer could efficiently solve this problem using Shor’s algorithm to find its factors. This ability would allow a quantum computer to decrypt many of the cryptographic systems in use today, in the sense that there would be a polynomial time (in the number of digits of the integer) algorithm for solving the problem. In particular, most of the popular public key ciphers are based on the difficulty of factoring integers (or the related discrete logarithm problem, which can also be solved by Shor’s algorithm), including forms of RSA. These are used to protect secure Web pages, encrypted email, and many other types of data. Breaking these would have significant ramifications for electronic privacy and security.
“However, other existing cryptographic algorithms do not appear to be broken by these algorithms.[11][12] Some public-key algorithms are based on problems other than the integer factorization and discrete logarithm problems to which Shor’s algorithm applies, like the McEliece cryptosystem based on a problem in coding theory.[11][13] Lattice-based cryptosystems are also not known to be broken by quantum computers, and finding a polynomial time algorithm for solving the dihedral hidden subgroup problem, which would break many lattice based cryptosystems, is a well-studied open problem.[14] It has been proven that applying Grover’s algorithm to break a symmetric (secret key) algorithm by brute force requires roughly 2n/2 invocations of the underlying cryptographic algorithm, compared with roughly 2n in the classical case,[15] meaning that symmetric key lengths are effectively halved: AES-256 would have the same security against an attack using Grover’s algorithm that AES-128 has against classical brute-force search (see Key size). Quantum cryptography could potentially fulfill some of the functions of public key cryptography.”
So using such a computer, you could cut in half the trillions of years required for a brute-force attack on 256-bit Rinjdael, Blowfish, or Twofish.
Using PGP probably gets you put on a heightened watch list.
When my late father retired from the Marine Corps as a communications chief, he went to work at the phone company, tapping lines so the government could listen in. That was in the 1960’s. It was not a new thing.
Baloney, they can’t even break RC4 if you code it properly.
I’m sure tests are run regularly to see what the gov can break.
Foreign groups could pass messages encoded using common algorithms. These would be messages that if the gov were able to read them they would have to tip their hand and act upon the content. If an algorithm was shown to be weak the info would slip out as it’s hard to keep such a secret.
Anyone who has given this a little thought comes to the obvious conclusion that this is how decrypt abilities must be tested.
I’m certain that NSA types must worry over this constantly and be fearful of acting on any decrypts they manage.
The big enchilada of crypto is finding a fast way to factor primes.... I doubt anyone has found such an algorithm.
lol You and me both, FRiend. Thank you for the link! I will make use of it.
Back then they used to deploy little battery operated receiver/recorders near a house to get a record of all phone numbers dialed. The old rotary dial phones made static pops as the numbers were dialed...all you had to do is slow down the playback and count the pops to get the numbers. This was mostly a PI thing since the gov could monitor at the phone company and avoid getting close to the target. Fidelity was not a concern so the tape moved very slowly past the recording head giving a long recording time.
You can learn a lot about someone if you know who they call on the phone.
True but what good is that watch list when 50 million people are on it?
Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.