It looks like you're using an Ad Blocker.
Please white-list or disable AboveTopSecret.com in your ad-blocking tool.
Thank you.
Some features of ATS will be disabled while you continue to use an ad-blocker.
Originally posted by ganjoa
reply to post by IAMTAT
To answer your question - no, they don't have to use secret spy satellites for this - they've got back channels into all the commercial satellites as well as the major downlink receivers like COMSAT.
ganjoa
Thats is PURE MULARKEY! takes them weeks.. pfft
who are you trying to fool? That "encryption" is so pathetically easily "cracked" by the Govt.
I was a Telecom Specialist and suffered thru massive amounts of schooling. And held a TS.
And do you think your government isn't monitoring signals/communications of all sorts? They probably have their own version as they generally do not like western tool suites(license too expensive) or design/functionality generally. Moreoever they do have enough software professionals to design their own at much cheapter cost from scatch though learn as you go and enhance as needed. How do you think they keep tab on India's neighbors in all four directions? (China, Pakistan, Bangladesh/Burma/Nepal, Sri Lanka) and all the terrorist/strategic threats ?
Originally posted by GargIndiaWe believe tools like Prism are avoidable shortcuts that do more harm than good.
May 2011 marked the visit of US Secretary of Homeland Security Janet
Napolitano to initiate the US-India Homeland Security Dialogue. Home
Minister P. Chidambaram represented the Indian side and the Dialogue.
348 Jindal Journal of International Affairs / Vol. 1
paved the way for a landmark agreement on cyber-security, in times of its
increasing relevance in fighting the war against terror, and CII protection.17
The corresponding computer emergency response teams from both
the countries, US-CERT and CERT-In, would be the primary point of
contacts in this bilateral knowledge-sharing exercise. Secretary Napolitano
proposed
“…to choke off the life line of some of these terrorist organizations,
to open a dialogue that includes cyber security which is necessary to
protect the networks that are critical infrastructure”.
Not only does it symbolise the start of a new era in fostering a global
cyber-security regime but may also prove monumental in dismantling
international cyber-crime syndicates which also harbour terrorists, drug
smugglers, human traffickers and espionage rings.
Originally posted by WaterBottle
Then why even bother getting a warrant....
Originally posted by SonOfTheLawOfOne
Originally posted by WaterBottle
Then why even bother getting a warrant....
You must have missed the explanation for the warrant...
The NSA can't decrypt all of the secure / SSL traffic that they have. They can see the bits that are unencrypted. They inspect that traffic for "signs" of behavior that should be flagged. However, if all of your email is sent over SSL, it could take them days, weeks even months to decrypt all of your email. Same with chats or instant messages. The warrants are because they are not allowed to have the super duper secret encryption key that Google, or Facebook, or whoever uses, to encrypt their traffic, so they issue the warrant to bypass that problem and just get the decrypted data from the company.
I hope that makes sense.
~Namaste
most systems use a combination of public-key and symmetric key encryption. When two computers initiate a secure session, one computer creates a symmetric key and sends it to the other computer using public-key encryption. The symmetric key is discarded once the conversation completes, so tell us again how the message is decrypted?
Originally posted by Mike.Ockizard
reply to post by HanzHenry
Even Snowden says that strong encryption is still your best defense. Now this may exclude weaker versions of SSL but those versions are used less and less.
BTW a TS clearance is like the easist to get. The secrets you talk about arent exposed to anyone at that level (if they existed at all)
Not saying that the Govt cant decrypt, just that they dont have the ability to decrypt everything that goes across the wire. I fully expect that if they filter you out, taking the tme and computing power to un-encrypt your data becomes more efficient.edit on 17-6-2013 by Mike.Ockizard because: (no reason given)
Then ask how many individual communications were ingested to achieve that, and ask yourself if it was worth it. Bathtub falls and police officers kill more Americans than terrorism, yet we've been asked to sacrifice our most sacred rights for fear of falling victim to it.”
3) If you don't believe that they siphon off all of the traffic, you don't understand the details of the OP.
Considering that, according to Cisco, the total world Internet traffic for 2012 was 1.1 exabytes per day is physically impossible, let alone practical, for the NSA to capture and retain even a fraction of the world's Internet traffic on a daily basis.
According to another top official also involved with the program, the NSA made an enormous breakthrough several years ago in its ability to cryptanalyze, or break, unfathomably complex encryption systems employed by not only governments around the world but also many average computer users in the US. The upshot, according to this official: “Everybody’s a target; everybody with communication is a target.”
That, he notes, is where the value of Bluffdale, and its mountains of long-stored data, will come in. What can’t be broken today may be broken tomorrow.
Originally posted by SonOfTheLawOfOne
He is partially correct. Any traffic that is not explicitly encrypted is fair game and can be inspected or listened in on in a real-time fashion. So they do not need warrants for that. But let's say the only non-secure data you send over the Internet is text messages from your phone? (not encrypted) They can listen to those, and if one of those messages has the right words in it, it will get "flagged". Next, they start focusing on all of your Internet traffic and find that you are doing all email and everything else with SSL encrypted traffic. They can't just decrypt it, but sometimes they can, it depends on the level of encryption. But in most cases, it will take them too long, so they just get the warrant and ask the company that you're using for your email to decrypt it for them and provide them the unencrypted data.
~Namaste