|
Post by thunkerdrone on Jan 23, 2014 19:40:42 GMT -5
Can you imagine the fun the NSA get up to in identifying online 'pests' and agitators who insist upon calling attn: to certain things the NSA etc. want buried?
Just imagine the legions of virus designers, hackers/hard drive friers the NSA would have in their pay. Probably even extends to economic and tech espionage against dissident entrepreneurs and their enterprises. Hard drives mysteriously crashing at crucial moments. Operating systems crashing when you're just completing 3 hours work on an expose article or video etc etc etc. Business competitors always mysteriously just a step ahead of you with identical software to yours, doors mysteriously closing the moment you near closing the crucial deal. On and on and on it goes.
|
|
|
Post by 3bid on Jan 23, 2014 19:56:15 GMT -5
Can you imagine the fun the NSA get up to in identifying online 'pests' and agitators who insist upon calling attn: to certain things the NSA etc. want buried? Just imagine the legions of virus designers, hackers/hard drive friers the NSA would have in their pay. Probably even extends to economic and tech espionage against dissident entrepreneurs and their enterprises. Hard drives mysteriously crashing at crucial moments. Operating systems crashing when you're just completing 3 hours work on an expose article or video etc etc etc. Business competitors always mysteriously just a step ahead of you with identical software to yours, doors mysteriously closing the moment you near closing the crucial deal. On and on and on it goes. Just remember to keep renewing your trustworthy anti-virus or security suite. -3bid
|
|
Deleted
Deleted Member
Posts: 0
|
Post by Deleted on Jan 23, 2014 20:39:27 GMT -5
Can you imagine the fun the NSA get up to in identifying online 'pests' and agitators who insist upon calling attn: to certain things the NSA etc. want buried? Just imagine the legions of virus designers, hackers/hard drive friers the NSA would have in their pay. Probably even extends to economic and tech espionage against dissident entrepreneurs and their enterprises. Hard drives mysteriously crashing at crucial moments. Operating systems crashing when you're just completing 3 hours work on an expose article or video etc etc etc. Business competitors always mysteriously just a step ahead of you with identical software to yours, doors mysteriously closing the moment you near closing the crucial deal. On and on and on it goes. Just remember to keep renewing your trustworthy anti-virus or security suite. -3bid key word "trustworthy." I wonder how many anti-virus and anti-spyware companies have contracts with the NSA. Mike
|
|
|
Post by 3bid on Jan 23, 2014 21:06:59 GMT -5
Just remember to keep renewing your trustworthy anti-virus or security suite. -3bid key word "trustworthy." I wonder how many anti-virus and anti-spyware companies have contracts with the NSA. Mike I'm holding an RSA key fob in my hand right now. Like believing in a cherished lucky rabbit's foot. Privacy Activists Sour on RSAAfter report privacy company gave NSA backdoor accessBy Elizabeth Kuhr Jan. 21, 2014 Technology privacy advocates are withdrawing from RSA’s annual conference after a report claimed the popular security brand took $10 million to give the National Security Agency backdoor access to customers’ personal information. Angry and disheartened, 11 to date have dropped out of the usually well-attended cybersecurity symposium set for February. They’re staging their own kind of protest as they seek answers from RSA and its parent company, EMC Corp., about a Reuters report last month that RSA let the NSA sneak into its Bsafe privacy software, used by companies for security. “It seems to me that RSA essentially sold out,” said Jeffrey Carr, CEO of the cybersecurity firm Taia Global, who recently canceled his speech at the conference. “A lot of people profited.” Speakers have been dropping like flies from the conference’s lineup, which still boasts about 500 presenters, since the damaging accusation. Christopher Soghoian, a leading technologist and senior policy analyst at American Civil Liberties Union, has cancelled his lecture, too. He declared in a Jan. 7 Twitter post that he’s “given up waiting for RSA to fess up to the truth.” EMC Corp. did not respond to requests for comment from TIME, but the company did “categorically deny” the Reuters report on its website, saying it neither had a secret contract with the NSA nor knowingly allowed the spy agency access to customers’ information. “Our explicit goal has always been to strengthen commercial and government security,” the company, best known for its SecurID key FOB, said in a statement last month. At issue is software known as Bsafe, which uses an NSA encryption algorithm to generate random numbers to secure computer privacy. At least two-dozen companies have long used the NSA algorithm through RSA’s software, according to Carr. After a New York Times report based on on documents leaked by former NSA contractor Edward Snowden, a government agency recommended in September that companies stop using the algorithm because of security flaws. RSA then advised customers to switch to other encryption formulas created for the Bsafe software. But Reuters soon reported NSA had previously paid RSA to make the NSA’s insecure algorithm Bsafe’s default option, giving the spy agency backdoor access. “The companies have to change from the default Bsafe [algorithm],” Carr said. “I don’t recommend any of my other companies spend a penny on [RSA].” Carr is boycotting RSA products to push the company to either fess up or prove it did not knowingly provide the NSA with direct access to secure information. The flap has yet to impact the bottom line for EMC Corp., in part because RSA accounts for only a small portion of the company’s business. Evan Greer, the campaign manager of the nonprofit Internet freedom advocacy group Fight for the Future, said RSA set a dangerous precedent if the report is true. “RSA gave the NSA access to more than they should have,” Greer said, “but they gave anybody else who can exploit this backdoor access.” .......... forgottenlord 3 days ago
1) This is the argument for using PGP. Yes, it's RSA based but it is a privacy enthusiast who's actually been charged previously by the NSA for undermining their efforts and would undoubtedly not be using the NSA variation 2) It is strongly believed that the NSA is the #1 cause of insecurity in the civilian world. They are believed to be the ones who decided on 56 bit as industry standard (because there is no other logical explanation for why anyone wouldn't use a full 64 bit - at least in that era, today both are laughably bad) and they are believed to be the ones who made a certain wireless standard so pathetically bad that anyone could hack it in under an hour. Of course they made an insecure algorithm and of course they put a gun to RSA's head to make it the default. The NSA isn't about protecting information and never really has been, it's about looting information. Read more: RSA Conference Loses Speakers | TIME.com swampland.time.com/2014/01/21/privacy-activists-sour-on-rsa/#ixzz2rHFUyPNZ
|
|
Deleted
Deleted Member
Posts: 0
|
Post by Deleted on Jan 23, 2014 21:41:25 GMT -5
key word "trustworthy." I wonder how many anti-virus and anti-spyware companies have contracts with the NSA. Mike I'm holding an RSA key fob in my hand right now. Like believing in a cherished lucky rabbit's foot. Privacy Activists Sour on RSAAfter report privacy company gave NSA backdoor accessBy Elizabeth Kuhr Jan. 21, 2014 Technology privacy advocates are withdrawing from RSA’s annual conference after a report claimed the popular security brand took $10 million to give the National Security Agency backdoor access to customers’ personal information. Angry and disheartened, 11 to date have dropped out of the usually well-attended cybersecurity symposium set for February. They’re staging their own kind of protest as they seek answers from RSA and its parent company, EMC Corp., about a Reuters report last month that RSA let the NSA sneak into its Bsafe privacy software, used by companies for security. “It seems to me that RSA essentially sold out,” said Jeffrey Carr, CEO of the cybersecurity firm Taia Global, who recently canceled his speech at the conference. “A lot of people profited.” Speakers have been dropping like flies from the conference’s lineup, which still boasts about 500 presenters, since the damaging accusation. Christopher Soghoian, a leading technologist and senior policy analyst at American Civil Liberties Union, has cancelled his lecture, too. He declared in a Jan. 7 Twitter post that he’s “given up waiting for RSA to fess up to the truth.” EMC Corp. did not respond to requests for comment from TIME, but the company did “categorically deny” the Reuters report on its website, saying it neither had a secret contract with the NSA nor knowingly allowed the spy agency access to customers’ information. “Our explicit goal has always been to strengthen commercial and government security,” the company, best known for its SecurID key FOB, said in a statement last month. At issue is software known as Bsafe, which uses an NSA encryption algorithm to generate random numbers to secure computer privacy. At least two-dozen companies have long used the NSA algorithm through RSA’s software, according to Carr. After a New York Times report based on on documents leaked by former NSA contractor Edward Snowden, a government agency recommended in September that companies stop using the algorithm because of security flaws. RSA then advised customers to switch to other encryption formulas created for the Bsafe software. But Reuters soon reported NSA had previously paid RSA to make the NSA’s insecure algorithm Bsafe’s default option, giving the spy agency backdoor access. “The companies have to change from the default Bsafe [algorithm],” Carr said. “I don’t recommend any of my other companies spend a penny on [RSA].” Carr is boycotting RSA products to push the company to either fess up or prove it did not knowingly provide the NSA with direct access to secure information. The flap has yet to impact the bottom line for EMC Corp., in part because RSA accounts for only a small portion of the company’s business. Evan Greer, the campaign manager of the nonprofit Internet freedom advocacy group Fight for the Future, said RSA set a dangerous precedent if the report is true. “RSA gave the NSA access to more than they should have,” Greer said, “but they gave anybody else who can exploit this backdoor access.” .......... forgottenlord 3 days ago
1) This is the argument for using PGP. Yes, it's RSA based but it is a privacy enthusiast who's actually been charged previously by the NSA for undermining their efforts and would undoubtedly not be using the NSA variation 2) It is strongly believed that the NSA is the #1 cause of insecurity in the civilian world. They are believed to be the ones who decided on 56 bit as industry standard (because there is no other logical explanation for why anyone wouldn't use a full 64 bit - at least in that era, today both are laughably bad) and they are believed to be the ones who made a certain wireless standard so pathetically bad that anyone could hack it in under an hour. Of course they made an insecure algorithm and of course they put a gun to RSA's head to make it the default. The NSA isn't about protecting information and never really has been, it's about looting information. Read more: RSA Conference Loses Speakers | TIME.com swampland.time.com/2014/01/21/privacy-activists-sour-on-rsa/#ixzz2rHFUyPNZShocking! Err, not so... Mike
|
|
Deleted
Deleted Member
Posts: 0
|
Post by Deleted on Jan 24, 2014 8:07:20 GMT -5
Can you imagine the fun the NSA get up to in identifying online 'pests' and agitators who insist upon calling attn: to certain things the NSA etc. want buried? Just imagine the legions of virus designers, hackers/hard drive friers the NSA would have in their pay. Probably even extends to economic and tech espionage against dissident entrepreneurs and their enterprises. Hard drives mysteriously crashing at crucial moments. Operating systems crashing when you're just completing 3 hours work on an expose article or video etc etc etc. Business competitors always mysteriously just a step ahead of you with identical software to yours, doors mysteriously closing the moment you near closing the crucial deal. On and on and on it goes. Just remember to keep renewing your trustworthy anti-virus or security suite. -3bid There is no software or hard firewalls that can keep you safe. If someone wants in and has the money, they are in. Just do what I do. Have a computer that you do your business on that is NOT connected to the internet in ANY WAY. Have a second computer that you send/receive E-Mails on and if need be you can transport data from your secure computer to your online computer to be sent. That's all folks. Problem solved. D4E
|
|
|
Post by thunkerdrone on Jan 24, 2014 8:22:42 GMT -5
hehe, in this vein , you've got to wonder how much of the naked shorting is motivated by profit and how much of it is done with other motives. Lets all just go ahead and assume that the same people who control naked shorting also control the NSA, CIA , etc.
Its pretty well a given that the 'authorities' not only allow naked shorting (in conjunction with economic espionage hedge fund shorting/spying) but are most very likely to be the people who are naked shorting. Put it this way, if Warren Buffet and George HW Bush and David Rockefeller and George Soros and Eddie Lampert and all the rest of them were harmed by naked shorting or by the rapacious, criminal actions of the hedge funds in general, then naked shorting and billion dollar paydays for shorting hedge fund managers would not exist. Period. To be more specific, the people who are naked shorting are probably working from a database, or selectively abusing, of parties found to be hostile to their social and economic agenda. So here you have the best of both worlds. You not only get to strip, pillory and bankrupt your every foe, but you actually make money on it. So the NSA passes you a file on a guy who is doing pretty good business-wise, but oh....tut-tut , he's using his money to support conservative causes and opposes the depopulation agenda...can't have that.. .oh my....look at this, Barb.....the bastards been financing ......and he's going to make another pile more money if ......... OK, Derek, flag this one.
uh, hmmmmm ....look what that bi*ch he's married to has been saying here..... um, Derek , flag it and 14th floor it. NOW. ...... someone's about to have some money problems
|
|
Deleted
Deleted Member
Posts: 0
|
Post by Deleted on Jan 25, 2014 21:58:53 GMT -5
Just remember to keep renewing your trustworthy anti-virus or security suite. -3bid There is no software or hard firewalls that can keep you safe. If someone wants in and has the money, they are in. Just do what I do. Have a computer that you do your business on that is NOT connected to the internet in ANY WAY. Have a second computer that you send/receive E-Mails on and if need be you can transport data from your secure computer to your online computer to be sent. That's all folks. Problem solved. D4E Excellent recommendation. Mike
|
|
Deleted
Deleted Member
Posts: 0
|
Post by Deleted on Jan 25, 2014 22:03:13 GMT -5
There is no software or hard firewalls that can keep you safe. If someone wants in and has the money, they are in. Just do what I do. Have a computer that you do your business on that is NOT connected to the internet in ANY WAY. Have a second computer that you send/receive E-Mails on and if need be you can transport data from your secure computer to your online computer to be sent. That's all folks. Problem solved. D4E Apparently it's not quite that simple, unfortunately. NSA Devises Radio Pathway Into Computers To be fair, in my opinion doing what Diamondsr4ever did would be effective against the most common, average person cyber threats (local amateur hackers looking for a thrill or opportunity for ID Theft). It would help keep sensitive digital information (like personal pictures, financial information, government forms, emails, etc) out of the hands of most digital snoops...and assuming a reasonable degree of physical data security (like making your disconnected PC/Mac physically secure from burglary, kids in the house hooking it up to the internet to play the latest video games, etc), steps like these incrementally increase protection of your sensitive data. It would be important to note in this scenario however that any downloaded program or file (or even just a device like a thumb/USB drive, CD/DVD, etc) that would be transferred from the online computer to the offline computer has the potential to add viruses or other malicious code to your offline computer...the primary risk would be data loss or corruption, or installation of software that could send sensitive data across the internet in the event it was ever connected to the internet again (intentionally or otherwise). I believe that security is always an incremental objective, rather than a secure vs. insecure proposition. Understanding your threats and tailoring security countermeasures to those threats is the foundation to protection...for instance, updating your operating systems, firewalls, anti-virus, and apps (like patches for Flash, Java, etc) will block a significant number of threats to an internet connected computing device. Adding additional layers (like shutting off WiFi access to your mobile device when you're out and about, instead of just leaving it on 24/7) incrementally increases your security...giving apps the minimum permissions necessary is another layer. Of course, password security is paramount...passwords should be unique for every site you log into, shouldn't be easily guessed (in other words change your "password" password to something more random and complex like "X9e!pWN24@"), and should be changed frequently. You can get secure online password management software that can help you manage all of your passwords. Poor password management will render just about all other security layers useless. When considered in its totality, if a brand-new computing device taken from the original box is considered to be 50% secure against common threats, adding steps like those outlined above will increase the security of the device up to say 70-80%...and that may be fine for 70% of the population. For the other 30%, adding additional countermeasures (adding advertisement blocking on your browser, using a VPN tunnel, two-factor authentication, etc) may help increase your online security significantly (10-15%). At the end of the day, as Diamondsr4ever alluded to above, if someone (person or entity, like a government) wants something from you bad enough (and they have the resources/ability to do so) they will take extreme measures to get it. Achieving complete security is illusionary, as new threats emerge and existing threats evolve every day. To tie this back to CMKX, if the hit comes we all probably should look into adding more security layers. This would be most effective if done before your good fortune becomes public knowledge, and you'll be a more interesting target as a consequence. C-Dub Chuck, There is no need for an internet connection or external device. We have an electric grid is the U.S. Why, we can buy boxes for our homes to plug in our own networks that way. We only have methods of helping enhance speed. There is zero protection from access. Mike
|
|
Deleted
Deleted Member
Posts: 0
|
Post by Deleted on Jan 26, 2014 20:33:05 GMT -5
Popularity is of no consequence in this case. Neither the government or hackers need the additional hardware, which simply assemble code into packets. As for high profile targets, I don't know what that means.
Mike
|
|
|
Post by MannyFin on Jan 26, 2014 22:03:04 GMT -5
Popularity is of no consequence in this case. Neither the government or hackers need the additional hardware, which simply assemble code into packets. As for high profile targets, I don't know what that means. Mike IT MEANS STFU
|
|
Deleted
Deleted Member
Posts: 0
|
Post by Deleted on Jan 27, 2014 13:40:37 GMT -5
Popularity is of no consequence in this case. Neither the government or hackers need the additional hardware, which simply assemble code into packets. As for high profile targets, I don't know what that means. Mike When considering the hunter/hunted equation, perhaps one perspective may be that the popularity of protocols are of little consequence. Another perspective may be that the weaknesses identified with BPL, aka those making it "unpopular", may also render the technology unsuitable for snooping...or not. Again, having deep pockets makes a difference between someone who hopes to peruse your home video collection and someone who can dissect your hard drive to the bit level. In the context intended, a high profile target is someone who would be unusually attractive to hackers and/or snoops because of certain attributes, such as unusually high wealth for instance. How do you become a high profile target? 1) Have something of value; 2) Appear to be an unusually easy target, especially through social networking/internet choices after a hit; 3) Be stupid and advertise your newly found good fortune by buying lots of bling, expensive cars, and moving to the richest part of town. Ultimately it's not about what governments can or will do, and realistic few if any of us will ever attract the attention of top-level hackers/cyber criminals...it's understanding your most likely risks and developing effective countermeasures against those risks. We all know it's possible for an asteroid could hit the planet and wipe out all life...but most of us don't ponder how soon it could hit, where a hit would be most devastating, etc...we balance our checkbooks to avoid fees and embarrassment, we tie our shoes to make sure we don't trip, and we lock our front doors to keep potential intruders at bay. C-Dub Chuck, I was not aware of your expertise in information systems and technology as well as profiles that make people targets of government and hacker tactics. Can you expand on this a bit more? Mike
|
|
Deleted
Deleted Member
Posts: 0
|
Post by Deleted on Jan 28, 2014 6:22:55 GMT -5
I just play an expert on TV...but I did stay at a Holiday Inn Express last night... C-Dub IC Mike
|
|
Deleted
Deleted Member
Posts: 0
|
Post by Deleted on Jan 29, 2014 7:23:56 GMT -5
What do you folks think of the NSA using Angry Birds and Google Maps to keep track of peeps?
What are they using that we dont know about?
D4E
|
|
Deleted
Deleted Member
Posts: 0
|
Post by Deleted on Jan 29, 2014 12:55:44 GMT -5
What do you folks think of the NSA using Angry Birds and Google Maps to keep track of peeps? What are they using that we dont know about? D4E Big brother is watching. We used to joke "the RRRussian ExpRRRess Card. Don't leave home." Now, it may apply to the American Express Card. Mike
|
|