It looks like you're using an Ad Blocker.
Please white-list or disable AboveTopSecret.com in your ad-blocking tool.
Thank you.
Some features of ATS will be disabled while you continue to use an ad-blocker.
originally posted by: ~Lucidity
Soooo...all this being said...how would y'all feel if all this bogging down and thwarting of the NSA prevented their hearing the real terrorist chatter? So be it?
originally posted by: ~Lucidity
Or is the point that any terrorist worth a damn would just thwart it too so why bother?
originally posted by: ~Lucidity
a reply to: crazyewok
Problem is real terrorists can be savvier than we are and piggyback on our stuff. It's a dilemma.
originally posted by: FurvusRexCaeliThey aren't going to use these resources unless they think there's a take to be had. (But they can put together a good model of you from unencrypted metadata.)
2. Since they can model your online behavior through your metadata, obscure as much of that as possible. Use Tor and throwaway email accounts.
Don't reuse user names.
3. NSA stores encrypted traffic for future exploitation. Storage is not very expensive, but it's not unlimited, either.
Everyone suggesting downloading plaintext donkey porn and making those poor analysts and Ft. Meade watch it all day is wrong. You should download encrypted donkey porn (assuming it's legal in your jurisdiction), as much of it as you can, to fill up that datacenter in Utah. The more donkey porn NSA warehouses, the shorter the retention period for the non-pornographic traffic they acquire.
My computer runs a popular Linux distribution, the home partition is encrypted with LUKS...
originally posted by: Hefficide
a reply to: Bedlam
The operating system of choice used by the Feds is Linux, though they also operate Windows machines ( Oddly enough they seem to prefer Vista ). I wrote a thread a couple of years back citing that they even retconned the International Space Station to run Ubuntu.
Having said that, open source is open source - and I do feel safer using something I ( and many others ) can see the source code for than using a proprietary O/S.
originally posted by: JimTSpock
There is far too much internet traffic for the NSA or anyone else to monitor it by person. They don't have the manpower or person power to do it. Apparently internet traffic is filtered through super computers looking for so called key phrases. Which to me seems very stupid as anyone could easily use a code like "my new engine will be ready next week" and the moron NSA or CIA would have no idea WTF.
originally posted by: ScientificRailgun
a reply to: crazyewok
I always figured REAL terrorists most likely communicate in MMORPGs (Massively MultiPlayer Online Role-Playing Games. Think World of Warcraft or Everquest).