It looks like you're using an Ad Blocker.
Please white-list or disable AboveTopSecret.com in your ad-blocking tool.
Thank you.
Some features of ATS will be disabled while you continue to use an ad-blocker.
Originally posted by sip
Hey Tom,
Regarding Echelon you gave a great example of its eavesdropping methods over phonelines. You know anything about it's abilties to snoop net connections? The amount of packets generated on the net every minute is enormous. If they do have their equipment in with ISP's it must be some heavy hardware as it would have to inspect each packet. Would it take into consideration secure connections such as SSL or SSH?
They must only snoop connections they know there's something going on. I mean switch on any packet capturing software (Wireshark, tcpdump) and check out the results. That is alot of info to go through.
Just some thoughts.
sip
Originally posted by Tom Bedlam
Originally posted by sip
Hey Tom,
Regarding Echelon you gave a great example of its eavesdropping methods over phonelines. You know anything about it's abilties to snoop net connections? The amount of packets generated on the net every minute is enormous. If they do have their equipment in with ISP's it must be some heavy hardware as it would have to inspect each packet. Would it take into consideration secure connections such as SSL or SSH?
They must only snoop connections they know there's something going on. I mean switch on any packet capturing software (Wireshark, tcpdump) and check out the results. That is alot of info to go through.
Just some thoughts.
sip
You know, I've seen a web site on another network that had captured some of my emails from time to time. Certainly not all of them but a scattering. I thought it was interesting. I'm not sure if it was being done because of where I was or what, they didn't seem to have any rhyme or reason based on content.
As far as all web traffic, that's a lot of traffic. And you'd have to be on the backbone because you really don't know how any connection is going to be routed.
I'm not sure it's the same project, personally.
I know the feebs get theirs through a CALEA connection to your ISP. If they want to monitor your emails, they get a warrant (yeah) and your ISP delivers them the goods to a copy account. As far as that goes, you can command a 4ESS to do basically the same thing on a phone call.
Originally posted by Morkoc96
Haha thats a great story, , i can picture that image of ben stiller in along came polly when he gets arrested by the fibbies for being a hitchhiker killer and has no idea what they are talking about and admits to it..even though you didnt admit to it..lol, the thought came to mind.
Originally posted by sip
Would you reckon there's an ongoing "filtering" of the web now for keywords? I'm assuming only emails and more than likely search engines are targeted (also forums such as this). It is hard to think that they would target all traffic. As you said they must be on a backbone, redirecting traffic is one thing, but sifting through it all is insane (but still possible).
sip
Originally posted by Tom Bedlam
Originally posted by sip
Would you reckon there's an ongoing "filtering" of the web now for keywords? I'm assuming only emails and more than likely search engines are targeted (also forums such as this). It is hard to think that they would target all traffic. As you said they must be on a backbone, redirecting traffic is one thing, but sifting through it all is insane (but still possible).
sip
There probably isn't much point looking at web page reads, that's a big percentage. You know pretty much what the page says. Emails, I could see, maybe file transfers.
You could get the load down by having the ISP's routers doing some basic upfront work for you, I'd guess. Doing deep packet inspection on every packet on the backbone would be tough, and on top of that you'd have to somehow coalesce the packets since they might not all go the same way during a session. Nasty. Of course, in practice that may be a lot more predictable than TCP/IP CAN be. Maybe these days the routers make sure all the packets in a session go the same route to ease the burden.
It would be a lot easier to just target individuals, I'd think.
We made a little packet duplicator thing a few years ago that clipped into a net drop and would either throw packets on the floor if they were from an IP blacklist, or would echo copies back to another place. You could get all the traffic or whatever IP list you wanted. It fit in little nooks and crannies and ran at wire speed. You could use something like that, I'd imagine, if you could gain access to your target's office and didn't want the ISP in on it.
Other than that I could see ways to do it but holy crap the hardware you'd need. On the other hand, they ARE the largest consumer of DSP boards and supercomputers.
The times I've gotten verbal warnings, they just spidered a forum and used a program to search the contents. The one time they really got ticked there was a four month delay between when I posted a bunch of stuff they didn't like and when the threads vanished and I got a free trip to the DC area. So it wasn't in anything like real time.
Originally posted by seifera003
So if ECHELON tracks keywords typed into a search engine, which I've heard it does, why haven't any of us had any issues?
I'm sure some of us who are heavy into researching, would've triggered a bunch of alarms by now.
I haven't had any visits from anybody, or cars trailing me (which I do occassionally check for). Has anybody else had anything weird like that happen to them?
Originally posted by sip
Hey Tom,
Regarding Echelon you gave a great example of its eavesdropping methods over phonelines. You know anything about it's abilties to snoop net connections? The amount of packets generated on the net every minute is enormous. If they do have their equipment in with ISP's it must be some heavy hardware as it would have to inspect each packet. Would it take into consideration secure connections such as SSL or SSH?
They must only snoop connections they know there's something going on. I mean switch on any packet capturing software (Wireshark, tcpdump) and check out the results. That is alot of info to go through.
Just some thoughts.
sip
Brill: The government's been in bed with the entire telecommunications industry since the forties. They've infected everything.
Brill: They get into your bank statements, computer files, email, listen to your phone calls... Every wire, every airwave. The more technology used, the easier it is for them to keep tabs on you.
Brill: It's a brave new world out there. At least it better be.
Originally posted by 2305989458802174
Just to further, and address this a bit. Equipment does not reside at individual ISP's, it exists at key points of packet travel.