Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

NSA agent: "Everyone under virtual surveillance!"
WorldNetDaily ^ | December 5, 2012 | staff writer

Posted on 12/05/2012 12:15:36 PM PST by wesagain

Did you ever get the feeling you were being watched?

And watched by the government?

There’s very good reason to feel that way, says a whistleblower from the National Security Agency who says everyone in the U.S. is under virtual surveillance by federal authorities.

In an interview with RT, William Binney, a former mathematician and code breaker at the NSA, says the FBI records the emails of nearly all Americans, including members of Congress, and warns that the government can use this information against anyone.

“The FBI has access to the data collected, which is basically the emails of virtually everybody in the country. And the FBI has access to it,” Binney said.

“All the congressional members are on the surveillance, too, no one is excluded. They are all included. So, yes, this can happen to anyone. If they become a target for whatever reason – they are targeted by the government, the government can go in, or the FBI, or other agencies of the government, they can go into their database, pull all that data collected on them over the years, and we analyze it all. So, we have to actively analyze everything

(Excerpt) Read more at wnd.com ...


TOPICS: Constitution/Conservatism; Crime/Corruption; Government; Politics/Elections
KEYWORDS: 666
Navigation: use the links below to view more comments.
first previous 1-2021-4041-6061 next last
To: wesagain

More news from the cap’n opbvious agency of little known facts. They should be spending their time with the real murderers of America, the WH.


21 posted on 12/05/2012 12:50:20 PM PST by Karliner ( Jeremiah 29:11, Romans 8:28, Romans 8:38"...this is the end of the beginning."WC)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Mycroft Holmes

Granted they probably are . However there is a limit to what they can do ie supercomputer time is very expensive & using it to decrypt Aunt Katie’s casserole recipe and Knock Knock jokes will really tie things up & waste their budget especially if you use more than 1 crypto system. to multi encrypt .


22 posted on 12/05/2012 12:55:14 PM PST by Nebr FAL owner
[ Post Reply | Private Reply | To 19 | View Replies]

To: Mycroft Holmes
You might want to take a look at D-Wave before wrapping yourself in certainty.

Your 'D-Wave' link is a link to this thread.

23 posted on 12/05/2012 12:58:43 PM PST by TigersEye (Who is John Galt?)
[ Post Reply | Private Reply | To 19 | View Replies]

To: wesagain

It used to be us, the American citizens.... but now it’s an organized crime syndicate operating out of D.C. .


24 posted on 12/05/2012 12:59:25 PM PST by Gator113 (**WHO in the hell gave the damn order to NOT rescue our men in Benghazi?**)
[ Post Reply | Private Reply | To 3 | View Replies]

To: wesagain

Then by GOSH, BENGHAZI should be NO PROBLEM AT ALL to investigate. GET cracking.


25 posted on 12/05/2012 12:59:32 PM PST by annieokie
[ Post Reply | Private Reply | To 1 | View Replies]

To: Hang'emAll

I’ve come to the conclusion that there really are cameras everywhere just like on PERSON OF INTEREST. We put them there. They’re called cell phones. They’re “filming” and “listening” even when you think your phone is turned off.


26 posted on 12/05/2012 12:59:38 PM PST by Terry Mross (I haven't watched the news since the election. Someone ping me if anything big happens.)
[ Post Reply | Private Reply | To 11 | View Replies]

To: wesagain

Nothing to worry about, it’s just for advertising.../sarcasm


27 posted on 12/05/2012 1:01:17 PM PST by Enough is ENOUGH (This is a whole different world we live in now. We'd better wise up.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: wesagain

Yet, they still have no clue who released the Climate Gate files that proved a Global Conspiracy of the NWO Elites to deny energy to the worlds poor.


28 posted on 12/05/2012 1:02:42 PM PST by justa-hairyape
[ Post Reply | Private Reply | To 1 | View Replies]

To: TigersEye
Your 'D-Wave' link is a link to this thread.

Whoops! I didn't follow the World Nut Daily link as I have wasted far too much time there. I presume that the D-wave link is there. Oh well...

29 posted on 12/05/2012 1:03:17 PM PST by Mycroft Holmes (<= Mash name for HTML Xampp PHP C JavaScript primer. Programming for everyone.)
[ Post Reply | Private Reply | To 23 | View Replies]

To: Pontiac
I just have a hard time believing that it would be possible for the NSA to have that kind of data storage capacity.

It is amazing but here it is.

30 posted on 12/05/2012 1:03:46 PM PST by TigersEye (Who is John Galt?)
[ Post Reply | Private Reply | To 20 | View Replies]

To: Mycroft Holmes

Thanks.


31 posted on 12/05/2012 1:05:21 PM PST by TigersEye (Who is John Galt?)
[ Post Reply | Private Reply | To 29 | View Replies]

To: TigersEye
Here is a real D-wave link. I am getting decrepit.
32 posted on 12/05/2012 1:06:54 PM PST by Mycroft Holmes (<= Mash name for HTML Xampp PHP C JavaScript primer. Programming for everyone.)
[ Post Reply | Private Reply | To 23 | View Replies]

To: Mycroft Holmes

Your link opens a blank page.

However:

“Integer factorization is believed to be computationally infeasible with an ordinary computer for large integers if they are the product of few prime numbers (e.g., products of two 300-digit primes).[10] By comparison, a quantum computer could efficiently solve this problem using Shor’s algorithm to find its factors. This ability would allow a quantum computer to decrypt many of the cryptographic systems in use today, in the sense that there would be a polynomial time (in the number of digits of the integer) algorithm for solving the problem. In particular, most of the popular public key ciphers are based on the difficulty of factoring integers (or the related discrete logarithm problem, which can also be solved by Shor’s algorithm), including forms of RSA. These are used to protect secure Web pages, encrypted email, and many other types of data. Breaking these would have significant ramifications for electronic privacy and security.

“However, other existing cryptographic algorithms do not appear to be broken by these algorithms.[11][12] Some public-key algorithms are based on problems other than the integer factorization and discrete logarithm problems to which Shor’s algorithm applies, like the McEliece cryptosystem based on a problem in coding theory.[11][13] Lattice-based cryptosystems are also not known to be broken by quantum computers, and finding a polynomial time algorithm for solving the dihedral hidden subgroup problem, which would break many lattice based cryptosystems, is a well-studied open problem.[14] It has been proven that applying Grover’s algorithm to break a symmetric (secret key) algorithm by brute force requires roughly 2n/2 invocations of the underlying cryptographic algorithm, compared with roughly 2n in the classical case,[15] meaning that symmetric key lengths are effectively halved: AES-256 would have the same security against an attack using Grover’s algorithm that AES-128 has against classical brute-force search (see Key size). Quantum cryptography could potentially fulfill some of the functions of public key cryptography.”

So using such a computer, you could cut in half the trillions of years required for a brute-force attack on 256-bit Rinjdael, Blowfish, or Twofish.


33 posted on 12/05/2012 1:07:22 PM PST by proxy_user
[ Post Reply | Private Reply | To 19 | View Replies]

To: Bloody Sam Roberts

Using PGP probably gets you put on a heightened watch list.


34 posted on 12/05/2012 1:09:12 PM PST by FreedomPoster (Islam delenda est)
[ Post Reply | Private Reply | To 2 | View Replies]

To: SpaceBar

When my late father retired from the Marine Corps as a communications chief, he went to work at the phone company, tapping lines so the government could listen in. That was in the 1960’s. It was not a new thing.


35 posted on 12/05/2012 1:11:16 PM PST by 2ndDivisionVet (I'll raise $2million for Sarah Palin's presidential run. What'll you do?)
[ Post Reply | Private Reply | To 15 | View Replies]

To: wesagain
Would it be impolite to tell them this just in case they are here right now? Oh better this could be Obee's song...

http://www.youtube.com/watch?v=cQpwXzl-Q9Q

36 posted on 12/05/2012 1:11:55 PM PST by taildragger (( Tighten the 5 point harness and brace for Impact Freepers, ya know it's coming..... ))
[ Post Reply | Private Reply | To 1 | View Replies]

To: Gaffer

Baloney, they can’t even break RC4 if you code it properly.

I’m sure tests are run regularly to see what the gov can break.

Foreign groups could pass messages encoded using common algorithms. These would be messages that if the gov were able to read them they would have to tip their hand and act upon the content. If an algorithm was shown to be weak the info would slip out as it’s hard to keep such a secret.

Anyone who has given this a little thought comes to the obvious conclusion that this is how decrypt abilities must be tested.

I’m certain that NSA types must worry over this constantly and be fearful of acting on any decrypts they manage.

The big enchilada of crypto is finding a fast way to factor primes.... I doubt anyone has found such an algorithm.


37 posted on 12/05/2012 1:14:22 PM PST by Bobalu (It is not obama we are fighting, it is the media.)
[ Post Reply | Private Reply | To 6 | View Replies]

To: Mycroft Holmes
I am getting decrepit.

lol You and me both, FRiend. Thank you for the link! I will make use of it.

38 posted on 12/05/2012 1:16:51 PM PST by TigersEye (Who is John Galt?)
[ Post Reply | Private Reply | To 32 | View Replies]

To: 2ndDivisionVet

Back then they used to deploy little battery operated receiver/recorders near a house to get a record of all phone numbers dialed. The old rotary dial phones made static pops as the numbers were dialed...all you had to do is slow down the playback and count the pops to get the numbers. This was mostly a PI thing since the gov could monitor at the phone company and avoid getting close to the target. Fidelity was not a concern so the tape moved very slowly past the recording head giving a long recording time.

You can learn a lot about someone if you know who they call on the phone.


39 posted on 12/05/2012 1:23:20 PM PST by Bobalu (It is not obama we are fighting, it is the media.)
[ Post Reply | Private Reply | To 35 | View Replies]

To: FreedomPoster
Using PGP probably gets you put on a heightened watch list.

True but what good is that watch list when 50 million people are on it?

40 posted on 12/05/2012 1:24:38 PM PST by TigersEye (Who is John Galt?)
[ Post Reply | Private Reply | To 34 | View Replies]


Navigation: use the links below to view more comments.
first previous 1-2021-4041-6061 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson