It looks like you're using an Ad Blocker.
Please white-list or disable AboveTopSecret.com in your ad-blocking tool.
Thank you.
Some features of ATS will be disabled while you continue to use an ad-blocker.
US National Security Advisor to Bring Message to Moscow
NEUCHATEL (Switzerland), April 12 (RIA Novosti) - US National Security Advisor Tom Donilon will come to Moscow on Monday and bring a message from President Barack Obama, Foreign Minister Sergei Lavrov said on Friday. It will be a wide-ranging message on the prospects of bilateral US-Russian relations, he said, citing US officials. The Kremlin press service said earlier in the day Russian President Vladimir Putin might join the scheduled talks between Donovan and Russian Security Council chief Nikolai Patrushev at some point, but he will not have a separate meeting with the US official. Donilon, who is also due to meet with presidential Foreign Policy Aide Sergei Ushakov, will discuss preparations for a meeting between Obama and Putin. Kremlin spokesman Dmitry Peskov said in early February US President Barack Obama is unlikely to visit Russia until September, when he is due to attend the G20 leaders' summit in St. Petersburg.
Originally posted by bgold1212
Can someone explain how a company such as Google can be tapped into by the NSA and willingly expose all the data? Take Gmail for instance, each account features a password with encrypted emails. Does this override the encryptions?
Originally posted by Gazrok
Only a very, very, very small percentage of communications are flagged for perusal by actual humans, usually only after running through various software programs looking for keywords, patterns, and other factors. They simply don't have the manpower or time required to actually go through it all any other way, and even then, it is highly doubtful everything is run through the programs even for first filtering. It's just too much data....
Just what did you think they were monitoring when they talk about "chatter"?
OK, but should I be worried? I’m no terrorist and not even criminal. I have nothing to hide. Will this really affect me?
Yes and no.
The immediate impact on your life is probably zero. These intelligence systems sift through and store huge amounts of data and it is impossible to read every single message. They use automatic filters that trigger on certain secret keywords, and flag these messages for closer examination. A message to or from you may trigger a filter once in a while, but its harmless nature will be apparent in the manual examination. There are of course a lot of private secrets that shouldn’t leak to others, but they are of no interest to authorities. The risk that such secrets leak through PRISM is close to zero. Most ordinary people fly under the radar of these systems and will not really notice them at all. What’s more scary is the stored data. We have no clue about how it will be used in the future and who will have access to it. To cite Snowden: “Even if you are not doing anything wrong, you are being watched and recorded. … You don’t have to have done anything wrong. You just have to eventually fall under suspicion from somebody. Even by a wrong call. And then they can use this system to go back in time and scrutinize every decision you ever made. Every friend you ever discussed something with and attack you on that basis to sort of derive suspicion from an innocent life and paint anyone in the context f a wrongdoer.”
So you should be very worried on a principal level. Have you ever thrown away something, just to later realize how much you would have needed it? This is what’s happening to privacy today. Many claim that they have nothing to hide and that the loss of privacy is a fair price for security. There are however two fundamental problems with that reasoning. Very few have any idea about what price we really pay, i.e. what impact the loss of privacy may have on our future lives. And nobody knows what security we get in return, if we get any at all.
The price. Today we live in a world where Internet still isn’t fully integrated in our lives. The development is fast but the net is still often seen as an alternative to handling your business in the traditional way. Any privacy issue will naturally be magnified by the day Internet is our mainstream way to communicate with other people and businesses. The intelligence systems of today are also fully capable of collecting data for any purpose, even if the official reason for building them is the fight against crime and terrorism. Today we are building more and more capable systems that tap into something that is becoming the backbone in our society. And all this with a blatant lack of openness and very rudimentary control of the purpose and use of these systems. I call this a recipe for disaster. Future misuse is inevitable, unless we change direction.
Originally posted by JBA2848
reply to post by CIAGypsy
The government created a lot of laws to prosecute terrorist after 9/11. Except they never brought any here to prosecute. They took them to Gitmo with no charges. So who did they create the laws for? Now think again about Prism. And ask your self should I be worried?edit on 11-6-2013 by JBA2848 because: (no reason given)
Originally posted by purplemer
Originally posted by bgold1212
Can someone explain how a company such as Google can be tapped into by the NSA and willingly expose all the data? Take Gmail for instance, each account features a password with encrypted emails. Does this override the encryptions?
Fully capable of bypassing the password to gmail accounts...
Microsoft's operating systems require all cryptography suites that work with its operating systems to have a digital signature. Since only Microsoft-approved cryptography suites can be installed or used as a component of Windows it is possible to keep export copies of this operating system (and products with Windows installed) in compliance with the Export Administration Regulations (EAR), which are enforced by the US Department of Commerce Bureau of Industry and Security (BIS). It was already known that Microsoft used two keys, a primary and a spare, either of which can create valid signatures. Microsoft had failed to remove the debugging symbols in ADVAPI.DLL, a security and encryption driver, when it released Service Pack 5 for Windows NT 4.0 and Andrew Fernandes, chief scientist with Cryptonym of Morrisville, North Carolina found the primary key stored in the variable _KEY and the second key was labeled _NSAKEY.[1] Fernandes published his discovery, touching off a flurry of speculation and conspiracy theories; such as the second key, owned by the United States National Security Agency (the NSA), could allow the intelligence agency to subvert any Windows user's security.[citation needed] During a presentation at the Computers, Freedom and Privacy 2000 (CFP2000) conference, Duncan Campbell, Senior Research Fellow at the Electronic Privacy Information Center (EPIC), mentioned the _NSAKEY controversy as an example of an outstanding issue related to security and surveillance.[citation needed] In addition Dr. Nicko van Someren found a third key in Windows 2000 which he doubted had a legitimate purpose, and declared that "It looks more fishy".[2]
Originally posted by JBA2848
reply to post by ButterCookie
People still don't know George Zimmerman was tied into all this BS also. He worked for a company that spies for the US government. Digital Risk LLC. And his boss traveled to the White House for a meeting and the next day the media threw all the questions at him about the case because they knew about that meeting and who he was but did not tell the American people.
www.abovetopsecret.com...
edit on 12-6-2013 by JBA2848 because: (no reason given)
Originally posted by JBA2848
reply to post by Anonbeleiver77
They don't have your password they have the master passwords. Such as NSA.Key in Microsoft. And it is put in during the patent process. Just like when encryption software goes for a patent it must hand over the information to the government and they tell them what must be added for government access.
en.wikipedia.org...
Microsoft's operating systems require all cryptography suites that work with its operating systems to have a digital signature. Since only Microsoft-approved cryptography suites can be installed or used as a component of Windows it is possible to keep export copies of this operating system (and products with Windows installed) in compliance with the Export Administration Regulations (EAR), which are enforced by the US Department of Commerce Bureau of Industry and Security (BIS). It was already known that Microsoft used two keys, a primary and a spare, either of which can create valid signatures. Microsoft had failed to remove the debugging symbols in ADVAPI.DLL, a security and encryption driver, when it released Service Pack 5 for Windows NT 4.0 and Andrew Fernandes, chief scientist with Cryptonym of Morrisville, North Carolina found the primary key stored in the variable _KEY and the second key was labeled _NSAKEY.[1] Fernandes published his discovery, touching off a flurry of speculation and conspiracy theories; such as the second key, owned by the United States National Security Agency (the NSA), could allow the intelligence agency to subvert any Windows user's security.[citation needed] During a presentation at the Computers, Freedom and Privacy 2000 (CFP2000) conference, Duncan Campbell, Senior Research Fellow at the Electronic Privacy Information Center (EPIC), mentioned the _NSAKEY controversy as an example of an outstanding issue related to security and surveillance.[citation needed] In addition Dr. Nicko van Someren found a third key in Windows 2000 which he doubted had a legitimate purpose, and declared that "It looks more fishy".[2]
The NSA signs into any software as the software maker and has complete access. A second key is made just for them to use.edit on 12-6-2013 by JBA2848 because: (no reason given)