It looks like you're using an Ad Blocker.
Please white-list or disable AboveTopSecret.com in your ad-blocking tool.
Thank you.
Some features of ATS will be disabled while you continue to use an ad-blocker.
If it’s plugged into the internet there is a near 100% chance that the National Security Agency is monitoring it.
So how does the average American get off the control grid? According to well known anti-virus software founder John McAfee the answer is simple.
Decentralization.
Rather than connecting to the telecom sponsored (and government integrated) internet, we bypass it completely and connect directly to each other’s devices in a peer-to-peer environment using what is essentially a distributed network architecture.
He’s been working on the new device, dubbed D-Central, for several years but has recently sped up its development in light of revelations that the NSA is tapping the digital interactions and personal correspondence of virtually every American citizen. The new “NSA Killer” will, according to McAfee, make it difficult if not impossible for the NSA to tap into personal communications like they do today because the device would operate in what is known as a “dark web” and allow an individual to completely obscure their identity.
"People ask me, 'How did it feel to kill a man?' And I can honestly tell them I wouldn't know, because I never have," he says, gazing through piercing green eyes.
A universally unique identifier (UUID) is an identifier standard used in software construction, standardized by the Open Software Foundation (OSF) as part of the Distributed Computing Environment (DCE). The intent of UUIDs is to enable distributed systems to uniquely identify information without significant central coordination. In this context the word unique should be taken to mean "practically unique" rather than "guaranteed unique".
Wiki
Version 5 UUIDs use a scheme with SHA-1 hashing; otherwise it is the same idea as in version 3. RFC 4122 states that version 5 is preferred over version 3 name based UUIDs, as MD5's security has been compromised.
Sounds to me like a trick the GESTAPO used during the NAZI times. They advertized "Wireless radio sets" in shops. This way they found out who didn't like Hitler too much.
Not sure if the same in the states as here but the cell towers basically communicate between each other using tcp/ip as it makes doing 3g browsing so easy so just have a NSA device at each convergence point of several cell towers and job done for the listening and all they need to do is put it all together
seabag
I was thinking along these lines. Anything advertised as a way to circumvent government control seems like a government fishing expedition to me; they're trolling for terrorists (or potential domestic terrorists). Something tells me even if it's legit he won't get many (if any) investors and even fewer buyers.
I hear you. I disagree with the surveillance because it's a violation of privacy not because I have something juicy to hide. I'd bore the NSA to death if they were keeping tabs on me. That doesn't mean I like them doing it though.
Richard C. Brackney
ITU regrets to announce the death of Col. Richard ‘Dick’ C. Brackney (Ret.).
Dick was a well-known and respected authority on international cybersercurity and had contributed greatly to ITU’s work in the field over a period of more than ten years.
In August he sent a message to his colleagues: "Dear colleagues at MS and International Standards Community: I have enjoyed my work in the Standards community over the years. But, the time has come for it to end. I've learned over this summer that time is VERY precious and my time has ended. Thank you all for your support! ---Dick".
Dick had a wide and varied career including 35 years at the US National Security Agency. He served in combat during Desert Shield/Desert Storm and was the recipient of numerous service decorations including two National Defense Service Medals, and a Meritorious Service Medal.
He will be sadly missed by all including ITU staff, delegates of Study Groups 13 and 17 and the standards and cybersecurity communities at large.
A viewing/memorial service will take place on September 17th (Tuesday) at 7 p.m. EDT at the following location: Howell Funeral Home 10220 Guilford Road Jessup, Maryland 20794. In lieu of flowers, donations can be made in memory of Dick to the American Heart Association at honor.americanheart.org...
ITU-T Study Group 17 - Security
Work to build confidence and security in the use of information and communication technologies (ICTs) continues to intensify in a bid to facilitate more secure network infrastructure, services and applications. Over seventy standards (ITU-T Recommendations) focusing on security have been published.
ITU-T Study Group 17 (SG17) coordinates security-related work across all ITU-T Study Groups. Often working in cooperation with other standards development organizations (SDOs) and various ICT industry consortia, SG17 deals with a broad range of standardization issues.
To give a few examples, SG17 is currently working on cybersecurity; security management; security architectures and frameworks; countering spam; identity management; the protection of personally identifiable information; and the security of applications and services for the Internet of Things (IoT), smart grid, smartphones, web services, social networks, cloud computing, mobile financial systems, IPTV and telebiometrics.
One key reference for security standards in use today is Recommendation ITU-T X.509 for electronic authentication over public networks. ITU-T X.509, a cornerstone in designing applications relating to public key infrastructure (PKI), is used in a wide range of applications; from securing the connection between a browser and a server on the web, to providing digital signatures that enable e-commerce transactions to be conducted with the same confidence as in a traditional system. Without wide acceptance of the standard, the rise of e-business would have been impossible.
Cybersecurity remains high on SG17’s agenda. Additionally, SG17 is coordinating standardization work covering e-health, open identity trust framework, Near Field Communication (NFC) security, and Child Online Protection.