Skip to comments.FBI pressures Internet providers to install surveillance software
Posted on 08/03/2013 10:40:40 AM PDT by Jim Robinson
CNET has learned the FBI has developed custom "port reader" software to intercept Internet metadata in real time. And, in some cases, it wants to force Internet providers to use the software.
The U.S. government is quietly pressuring telecommunications providers to install eavesdropping technology deep inside companies' internal networks to facilitate surveillance efforts.
FBI officials have been sparring with carriers, a process that has on occasion included threats of contempt of court, in a bid to deploy government-provided software capable of intercepting and analyzing entire communications streams. The FBI's legal position during these discussions is that the software's real-time interception of metadata is authorized under the Patriot Act.
Attempts by the FBI to install what it internally refers to as "port reader" software, which have not been previously disclosed, were described to CNET in interviews over the last few weeks. One former government official said the software used to be known internally as the "harvesting program."
Carriers are "extra-cautious" and are resisting installation of the FBI's port reader software, an industry participant in the discussions said, in part because of the privacy and security risks of unknown surveillance technology operating on an sensitive internal network.
It's "an interception device by definition," said the industry participant, who spoke on condition of anonymity because court proceedings are sealed. "If magistrates knew more, they would approve less." It's unclear whether any carriers have installed port readers, and at least one is actively opposing the installation.
In a statement from a spokesman, the FBI said it has the legal authority to use alternate methods to collect Internet metadata, including source and destination IP addresses: "In circumstances where a provider is unable to comply with a court order utilizing its own technical solution(s), law enforcement may offer to provide technical assistance...
(Excerpt) Read more at news.cnet.com ...
We need to coordinate an attack with keywords that will make them go batsh!t.
A few million people on any given day just bombarding them with false look ups. Make the system worthless.
F U B O !! F U NSA!!
Debt to America
Death to America
The commands of the prophet may be performed alike, by fraud, or by force. JQA
Indonesian Go Home
Silly 4th Amendment. Those Founders were such lovable rubes.
TOR is fine as far as it goes, but it relies on existing networks, protocols, and infrastructure. What jimjohn is saying is that a completely separate communication network is needed. One that can’t (easily) be compromised or monitored.
in a bid to deploy government-provided software capable of intercepting and analyzing entire communications streams. The FBI's legal position during these discussions is that the software's real-time interception of metadata is authorized under the Patriot Act.
Coercion and a gun to the head of ISPs is illegal and itself a violation of the RICO Act which arguably supersedes the illegality of the Patriot Act.
Who knew 9/11 would lead to literally undressing our liberties and rights in the name of "security" AND celebrating the "Religion of Peace"?
But...I thought that wuz
Meshnet is a starting point but requires independent long distance connections between local networks.
wonder what it would take either
a) create a 20 meter ham network or
b) get out own satellite launched into orbit?
We need some of that good ‘ol American out of the box thinking.
The following can be done in any of several ways including with pencil and paper.
“impossible to crack if used correctly.”
Yes, it is terrorism by definition.
Good stuff. I remember that one-time pad stuff from back in the day. undetectable for normal ops. one can throw in another layer of tac-ops codes for well, tac ops.
Next is to introduce this into the culture for now and future generations. Meaning, the kids. Perhaps people should start in their own families; making it a game to play with the kids to get them use to it(better than having them waist their brains away on tweeting.
We’ll may be long-gone when time comes where they have to use it, but this is the kind of low-level technology that we should not forget in the digital age. For as we now know, the digital world is now a double-edged sword.
For your Tech Ping list.
1984 was never meant to be an instruction manual.
In a speech before the House of Commons, 18 June 1940, following the collapse of France, many thought Britain would soon follow. This is what Winston Churchill had to say.
What General Weygand called the Battle of France is over. I expect that the battle of Britain is about to begin. Upon this battle depends the survival of Christian civilization. Upon it depends our own British life, and the long continuity of our institutions and our Empire. The whole fury and might of the enemy must very soon be turned on us. Hitler knows that he will have to break us in this island or lose the war. If we can stand up to him, all Europe may be free and the life of the world may move forward into broad, sunlit uplands. But if we fail, then the whole world, including the United States, including all that we have known and cared for, will sink into the abyss of a new Dark Age made more sinister, and perhaps more protracted, by the lights of perverted science. Let us therefore brace ourselves to our duties, and so bear ourselves that if the British Empire and its Commonwealth last for a thousand years, men will still say, This was their Finest Hour.
Just replace Hitler with Obama and you have the exact same scenario playing out here now. The only missing is the gunfire.
Thanks for the ping.
time to go back to the old dialup BBS platforms
Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.