It looks like you're using an Ad Blocker.
Please white-list or disable AboveTopSecret.com in your ad-blocking tool.
Thank you.
Some features of ATS will be disabled while you continue to use an ad-blocker.
Originally posted by jimmyx
...all code is basically about the "on/off gates"...anything that is written, can be read. mind-numbing tedious line code search replaced by algorithms. there are "codeheads" out there that live and breathe this stuff. encryption is seconds new and minutes old.....my cliché list
Originally posted by Variable
reply to post by SonOfTheLawOfOne
Where are you getting that they need a warrant to get at encrypted traffic only? They need a warrant to make the snooping legal so it's actionable in a court. But i think i understand what your saying, (it really depends on the type of traffic though) if the FBI wants to read your emails then they can simply go to your Mail host and get whatever they have on the server and ongoing emails copied, Facebook, Google for your searches and traffic patterns, Verisign for cell records.
But it sounded like your saying they (US Intelligence) are sniffing and storing all your data and THEN, if the unencrypted data flags something, they go back and get a warrant and then can read all your old encrypted packets. That is a whole different ball game and i don't think that's what happens. Not in my experience.
Also, read what Snowden said, he never talked about Prism like your talking about. He was talking about collecting data from Endpoints i.e. Cell phone, email, application providers. Where your data is stored. He never talked about mass culling of data from tier one providers. If he did i didn't see that.
What your talking about is when it was released that the US was snooping on pipes that are on the perimeter of the US data grid after 911 and I'm sure that is going on. Those are not just Internet traffic, they are also phone calls....
This whole thing is very complicated. If you don't understand the technology its easy to fool ignorant people. It is NOTfair to say that the US Government is looking at all Mr and Mrs Joe Blows US citizens packets and looking for key words. That is not true. Nothing points to that.
V
edit on 6/17/2013 by Variable because: typos
Originally posted by LastStarfighter
reply to post by SonOfTheLawOfOne
Most fascinating. Thanks for supplying this easy to understand information. I have a question however. Do you know how the NSA was allowed to install their secret "rooms" where a portion of the data is syphoned into. Why did, google, for example, allow NSA to attach a box to their system and agree to keep quiet about it?
Originally posted by Mike.Ockizard
reply to post by SonOfTheLawOfOne
This is incorrect:
Instead, they try to look for the key identifiers in the traffic, narrow it down to a specific place, such as an email that was sent through Google, and then get a warrant with "probable cause" to request that Google provide them with every piece of data that they want on that individual since Google owns the private encryption key used, which is what they actually need the warrant for. Only Google can decrypt their secure traffic.
most systems use a combination of public-key and symmetric key encryption. When two computers initiate a secure session, one computer creates a symmetric key and sends it to the other computer using public-key encryption. The symmetric key is discarded once the conversation completes, so tell us again how the message is decrypted?
Originally posted by SonOfTheLawOfOne
Originally posted by AllIsOne
Originally posted by Variable
reply to post by AllIsOne
NSA/CSS capabilities are not current. They are at least 20 years ahead of what we have.
This does not appear to be so. Quantum computing isnt for real yet. If it ever does become the real deal, the world changes. .....
Really, ...
www.forbes.com...
And this is the stuff they publish ...
Yes, really.
In some optimization problems, the D-Wave handily beat the test PC—finding solutions up to 3,600 times faster. But unless the problem is specially tailored to fit the quantum computer, it has to be translated. The D-Wave performed on par with the classical computer when working on problems in need of translation.
There is still doubts that the system actually makes use of true quantum effects. It's been hotly disputed even though it is gaining more support. It will still be quite some time before it's efficient enough to deal with strong encryption, but it will happen.
Source
'd be interested in hearing where you think my technical points were misleading, I might be able to clarify or correct if I didn't convey them properly, it definitely isn't from a lack of knowledge or understanding; sometimes it's just difficult to explain it in a non-technical way.
Instead of grabbing everything that passes, the ITA watches for anomalies in traffic and aggregates packets into two kinds of "vectors" for each session: a human-readable transcript of all the packets in a particular connection, and an aggregation of all the application data that was sent in that session.
“Typically with a 10 gigabit Ethernet interface, we would see a throughput rate of up to 12 gigabits per second with everything turned on. So out of the possible 20 gigabits, we see about 12. If we turn off tag pairs that we’re not interested in, we can make it more efficient."
Considering that, according to Cisco, the total world Internet traffic for 2012 was 1.1 exabytes per day is physically impossible, let alone practical, for the NSA to capture and retain even a fraction of the world's Internet traffic on a daily basis.
Originally posted by FyreByrd
Originally posted by SonOfTheLawOfOne
He is partially correct. Any traffic that is not explicitly encrypted is fair game and can be inspected or listened in on in a real-time fashion. So they do not need warrants for that. But let's say the only non-secure data you send over the Internet is text messages from your phone? (not encrypted) They can listen to those, and if one of those messages has the right words in it, it will get "flagged". Next, they start focusing on all of your Internet traffic and find that you are doing all email and everything else with SSL encrypted traffic. They can't just decrypt it, but sometimes they can, it depends on the level of encryption. But in most cases, it will take them too long, so they just get the warrant and ask the company that you're using for your email to decrypt it for them and provide them the unencrypted data.
~Namaste
About the encryption, bear with me - not even close to my field: I seem to recall - in the 90s sometime - a huge flap over PGP or Pretty Good Protection or some such. The flap was that the encryption was so good the government couldn't break it and was, well, pissed because they didn't have a Master Code so to speak. My memory is that the case with encrytion schemes up to that point had provided the government with such a Master Key. Does this ring any bells.
I get the 'no access' to propietary servers - just a split of data stream. Check. But they still are in possession of the entire data stream - not only the government but private contractors with allegence to their company not the constitution - I digress.....
Originally posted by ugie1028
Originally posted by WaterBottle
Then why even bother getting a warrant....
because when you issue a warrant for a wire-tap and it goes public, they can say legal procedures were being followed leaving people who don't know how big this is to feel all warm and fuzzy inside. (safe) which in turn doesnt raise a lot of questions and their secret programs remain secret.
They could easily wire-tap without a warrant and when they find info on someone they can always bring it to a judge and make it official... then claim the data they found was obtained legally. leaves a lot of loopholes and the secrecy behind it definitely leaves windows open for corruption and misuse of this tech.
Originally posted by Eonnn
Good thread.
It's not just invasion of privacy but a form of control, which if left unchecked will lead to greater levels of control and manipulation.
Originally posted by TritonTaranis
But can you or anybody else give a single good reason why they would do all this on somebody suspected of being innocent?
The point still stands, why would they wast time money & resources spying on people for no good reason, but nobody has explained this madness to make any sense for there speculations, and nobody has a better alternative & solution to these programs, i think its a none brainier that these programs are here to stay unless we end up back in the dark ages