Skip to comments.NSA agent: "Everyone under virtual surveillance!"
Posted on 12/05/2012 12:15:36 PM PST by wesagain
Did you ever get the feeling you were being watched?
And watched by the government?
Theres very good reason to feel that way, says a whistleblower from the National Security Agency who says everyone in the U.S. is under virtual surveillance by federal authorities.
In an interview with RT, William Binney, a former mathematician and code breaker at the NSA, says the FBI records the emails of nearly all Americans, including members of Congress, and warns that the government can use this information against anyone.
The FBI has access to the data collected, which is basically the emails of virtually everybody in the country. And the FBI has access to it, Binney said.
All the congressional members are on the surveillance, too, no one is excluded. They are all included. So, yes, this can happen to anyone. If they become a target for whatever reason they are targeted by the government, the government can go in, or the FBI, or other agencies of the government, they can go into their database, pull all that data collected on them over the years, and we analyze it all. So, we have to actively analyze everything
(Excerpt) Read more at wnd.com ...
At least you'll be fairly safe from brute force decryption attempts.
Here's the all important question:
WHO THE HELL IS THE GOVERNMENT?
Of course they monitor everything! Anyone who believes otherwise must watch “Polyanna” reruns constantly.
Acres and acres and acres of computing power and storage, dozens of satellites, scads and scads of downlinking and surveillance antennas. Thousands and thousands of analysts, programmers, cryptographers and functionaries.
You didn’t think they were still working against the Russians, did you?
Even my 78 year old father knows that everything we write is being recorded. Every conversation is potentially listened to, and he's no nut.
I’ll give you the unclassified, on-the-web and easily verifiable answer through google or Bing -whatever.
“There is no commercial encryption that the government allows to propagate on the web that the government cannot ‘break’ if it wants to.”
The Bilderbergs and the globalists.
Gee here is an idea send real letters and quit thinking everything you do needs to be on a marquee for all to see.
I send maybe 100 texts a month (to my kids) and send maybe 10 personal emails a month. No facecrapper. I pay bills by mail.
I don’t think so. Strong encryption, with strong keys, does work and is mathmatically verifiable.
If you don’t think every word posted on Free Republic isn’t in a DHS file with your name on it, you’re kidding yourself.
A lot of my material is copyrighted. I’m just sayin..
Everyone is under surveillance. Reminds me of the current TV show Person of Interest. If you liked the show 24 you’ll probably like POI.
The underlying premise is everyone is being watched and recorded and the heroes try to right some wrong future events. Mind candy. But fun.
Yeah I demanded PGP public keys from our business partners to protect client and customer data from hackers if shipments were lost. At least make reasonable efforts so it’s just not wide open for say a, Julian Assange spy or some other dork who might find or steal a lost FedEx or UPS package.
The gov’t has always demanded access for off-shore encryption software. I always figured domestic wasn’t too far behind, since you know copies of it always make it offshore through the black market.
“When government fears the people, we have democracy. When the people fear government, we have tyranny”. The fiscal cliff is merely a symptom of our real problem.
This is the politics of fear at work. Have a supposedly loose cannon rogue agent “release” it into the wild. Now everyone’s looking over their shoulder. They do this very thing in North Korea to let everyone know they’re being watched.
That works pretty good for some stuff. Some places still demand credit or debit cards (car rental, hotels).
I think cash will eventually be outlawed by all nations when the following comes.
11 And I beheld another beast coming up out of the earth; and he had two horns like a lamb, and he spake as a dragon.
12 And he exerciseth all the power of the first beast before him, and causeth the earth and them which dwell therein to worship the first beast, whose deadly wound was healed.
13 And he doeth great wonders, so that he maketh fire come down from heaven on the earth in the sight of men,
14 And deceiveth them that dwell on the earth by the means of those miracles which he had power to do in the sight of the beast; saying to them that dwell on the earth, that they should make an image to the beast, which had the wound by a sword, and did live.
15 And he had power to give life unto the image of the beast, that the image of the beast should both speak, and cause that as many as would not worship the image of the beast should be killed.
16 And he causeth all, both small and great, rich and poor, free and bond, to receive a mark in their right hand, or in their foreheads:
17 And that no man might buy or sell, save he that had the mark, or the name of the beast, or the number of his name.
18 Here is wisdom. Let him that hath understanding count the number of the beast: for it is the number of a man; and his number is Six hundred threescore and six.
But they can’t find Rachel form Credit Card Services. She violates the no call lists thousands of times a day and they don’t even seem to be looking for her.
The only thing we have going for us is the total incompetence of government.
Strong encryption, with strong keys, does work and is mathmatically verifiable.
You might want to take a look at D-Wave before wrapping yourself in certainty.
I figure that if they are publicly claiming 128 bits of quantum computer that NSA is playing with a prototype of 512. Just my opinion though.
Free course management software for homeschoolers and educators. Beta testers wanted, Free.
I realize that data storage is getting cheaper by the day but the amount of data storage space that would be required to store every email message sent by even 50 % of the people in the US in a single year would be incredible.
I just have a hard time believing that it would be possible for the NSA to have that kind of data storage capacity. It doesnt even make sense that they would want to do such a thing. I realize that paranoia is their business but in only makes sense to narrow the focus to persons of realistic interest to national security.
More news from the cap’n opbvious agency of little known facts. They should be spending their time with the real murderers of America, the WH.
Granted they probably are . However there is a limit to what they can do ie supercomputer time is very expensive & using it to decrypt Aunt Katie’s casserole recipe and Knock Knock jokes will really tie things up & waste their budget especially if you use more than 1 crypto system. to multi encrypt .
Your 'D-Wave' link is a link to this thread.
It used to be us, the American citizens.... but now it’s an organized crime syndicate operating out of D.C. .
Then by GOSH, BENGHAZI should be NO PROBLEM AT ALL to investigate. GET cracking.
I’ve come to the conclusion that there really are cameras everywhere just like on PERSON OF INTEREST. We put them there. They’re called cell phones. They’re “filming” and “listening” even when you think your phone is turned off.
Nothing to worry about, it’s just for advertising.../sarcasm
Yet, they still have no clue who released the Climate Gate files that proved a Global Conspiracy of the NWO Elites to deny energy to the worlds poor.
Your 'D-Wave' link is a link to this thread.
Whoops! I didn't follow the World Nut Daily link as I have wasted far too much time there. I presume that the D-wave link is there. Oh well...
Your link opens a blank page.
“Integer factorization is believed to be computationally infeasible with an ordinary computer for large integers if they are the product of few prime numbers (e.g., products of two 300-digit primes). By comparison, a quantum computer could efficiently solve this problem using Shor’s algorithm to find its factors. This ability would allow a quantum computer to decrypt many of the cryptographic systems in use today, in the sense that there would be a polynomial time (in the number of digits of the integer) algorithm for solving the problem. In particular, most of the popular public key ciphers are based on the difficulty of factoring integers (or the related discrete logarithm problem, which can also be solved by Shor’s algorithm), including forms of RSA. These are used to protect secure Web pages, encrypted email, and many other types of data. Breaking these would have significant ramifications for electronic privacy and security.
“However, other existing cryptographic algorithms do not appear to be broken by these algorithms. Some public-key algorithms are based on problems other than the integer factorization and discrete logarithm problems to which Shor’s algorithm applies, like the McEliece cryptosystem based on a problem in coding theory. Lattice-based cryptosystems are also not known to be broken by quantum computers, and finding a polynomial time algorithm for solving the dihedral hidden subgroup problem, which would break many lattice based cryptosystems, is a well-studied open problem. It has been proven that applying Grover’s algorithm to break a symmetric (secret key) algorithm by brute force requires roughly 2n/2 invocations of the underlying cryptographic algorithm, compared with roughly 2n in the classical case, meaning that symmetric key lengths are effectively halved: AES-256 would have the same security against an attack using Grover’s algorithm that AES-128 has against classical brute-force search (see Key size). Quantum cryptography could potentially fulfill some of the functions of public key cryptography.”
So using such a computer, you could cut in half the trillions of years required for a brute-force attack on 256-bit Rinjdael, Blowfish, or Twofish.
Using PGP probably gets you put on a heightened watch list.
When my late father retired from the Marine Corps as a communications chief, he went to work at the phone company, tapping lines so the government could listen in. That was in the 1960’s. It was not a new thing.
Baloney, they can’t even break RC4 if you code it properly.
I’m sure tests are run regularly to see what the gov can break.
Foreign groups could pass messages encoded using common algorithms. These would be messages that if the gov were able to read them they would have to tip their hand and act upon the content. If an algorithm was shown to be weak the info would slip out as it’s hard to keep such a secret.
Anyone who has given this a little thought comes to the obvious conclusion that this is how decrypt abilities must be tested.
I’m certain that NSA types must worry over this constantly and be fearful of acting on any decrypts they manage.
The big enchilada of crypto is finding a fast way to factor primes.... I doubt anyone has found such an algorithm.
lol You and me both, FRiend. Thank you for the link! I will make use of it.
Back then they used to deploy little battery operated receiver/recorders near a house to get a record of all phone numbers dialed. The old rotary dial phones made static pops as the numbers were dialed...all you had to do is slow down the playback and count the pops to get the numbers. This was mostly a PI thing since the gov could monitor at the phone company and avoid getting close to the target. Fidelity was not a concern so the tape moved very slowly past the recording head giving a long recording time.
You can learn a lot about someone if you know who they call on the phone.
True but what good is that watch list when 50 million people are on it?
E-mail is text, text compresses really nice, a little bit of petabyte storage (which I personally know of 2 governmentally related non-spooky organizations that regularly ADD petabytes to their storage capacity) goes a long way.
The real question isn’t can they gather all the data, because they can, all the data at some point goes through at least one government computer anyway (remember who built the backbone for this thing). The question is what can they do with it. The hard part is searching the data, even really good keyword data gets hard to sort through when you’ve got that much junk. In general figure most of it gets used the other way around, if they decide they want to get you personally they’ve got the data they need, but until they’re already looking at you personally the likelihood of them finding dirt on you is pretty slim.
I send and receive a lot of big photo files and or graphic files.
They are compressible but not so much.
I really, honestly, totally do not care. God is bigger than this godless government and much bigger than allah, the god of those who have subverted this government.
The Secret Sharer Is Thomas Drake an enemy of the state May 23, 2011
Even in an age in which computerized feats are commonplace, the N.S.A.s capabilities are breathtaking. The agency reportedly has the capacity to intercept and download, every six hours, electronic communications equivalent to the contents of the Library of Congress. Three times the size of the C.I.A., and with a third of the U.S.s entire intelligence budget, the N.S.A. has a five-thousand-acre campus at Fort Meade protected by iris scanners and facial-recognition devices. The electric bill there is said to surpass seventy million dollars a year.
In the late nineties, Binney estimated that there were some two and a half billion phones in the world and one and a half billion I.P. addresses. Approximately twenty terabytes of unique information passed around the world every minute. Binney started assembling a system that could trap and map all of it. I wanted to graph the world, Binney said. People said, You cant do thisthe possibilities are infinite. But he argued that at any given point in time the number of atoms in the universe is big, but its finite.
As Binney imagined it, ThinThread would correlate data from financial transactions, travel records, Web searches, G.P.S. equipment, and any other attributes that an analyst might find useful in pinpointing the bad guys. By 2000, Binney, using fibre optics, had set up a computer network that could chart relationships among people in real time. It also turned the N.S.A.s data-collection paradigm upside down. Instead of vacuuming up information around the world and then sending it all back to headquarters for analysis, ThinThread processed information as it was collecteddiscarding useless information on the spot and avoiding the overload problem that plagued centralized systems. Binney says, The beauty of it is that it was open-ended, so it could keep expanding.
Pilot tests of ThinThread proved almost too successful, according to a former intelligence expert who analyzed it. It was nearly perfect, the official says. But it processed such a large amount of data that it picked up more Americans than the other systems. Though ThinThread was intended to intercept foreign communications, it continued documenting signals when a trail crossed into the U.S. This was a big problem: federal law forbade the monitoring of domestic communications without a court warrant. And a warrant couldnt be issued without probable cause and a known suspect. In order to comply with the law, Binney installed privacy controls and added an anonymizing feature, so that all American communications would be encrypted until a warrant was issued. The system would indicate when a pattern looked suspicious enough to justify a warrant.
This is probably not much more upbeat than your take on this BUT 666 was the number of talons of silver Solomon taxed the Jews after people after he ‘went rouge’ on God.
This represented a HUGE increase in taxes.
So an alternate interpretation would be the “Antichrist will raise taxes on his people to make it a huge burden on them”.
That’s you. 99% of the e-mail is text, and small amounts of text at that, most compression can shrink pure text by as much as 40%. All the e-mails a person sends in a week can be stored in a couple of KB, that’s a 10 to the third measurement, PB storage is a 10 to the 15 measurement. 5 years ago Teradata launched Teradata 12, 50 PB of compressed data. That’s a purchasable tool. And it’s 5 years old, they’re up to Teradata 14 now.
All of our data is storable within commercially available systems. Let’s not even get into secret stuff the government is often claimed to have access to.
When you see these things come to pass, look up and know that your salvation is at hand.
So if the goivernment already has this all encompassing snooping capability, why would they want to implement laws that increase government intrusion and control? Increasing government intrusion and control would discourage the use of e-mails and the internet (especially among people of potential interest to the government), thus reducing the amount of information that could be gathered.
Carnivore and Echelon and others have been around a while...