Page 9 of 64 FirstFirst ... 78910111959 ... LastLast
Results 81 to 90 of 633

Thread: Emerging Surveillance State?

  1. #81
    Will it make a difference. I hope so. Occupy didn't change Washington but judging by the tactics they employed, it shook them up. I believe what you are seeing is a group that doesn't want a leader to rally behind. But an ideal. A muddy, growing, altruistic ideal. I believe the people are poised to accept the responsibility to lead themselves.

    A protest is a photo op. Victory doesn't come from immediate results, no sitting around can deliver that. The right picture can stir people and take down a thousand words of disinformation. In this case, "most Americans want to be spied on, for safety"
    If we knew what it was we were doing, it would not be called research, would it? Al Einstein

  2. #82
    Senior Member majicbar's Avatar
    Join Date
    Dec 2011
    Location
    Minneapolis. Minnesota
    Posts
    1,192
    Quote Originally Posted by calikid View Post
    Wasn't there a similar FBI program called "Carnivore" in the news a few years back?
    FBI must be glad to be out of the spotlight on this one.
    http://en.wikipedia.org/wiki/Carnivore_(software)

    Carnivore, later renamed DCS1000, was a system implemented by the Federal Bureau of Investigation that was designed to monitor email and electronic communications. It used a customizable packet sniffer that can monitor all of a target user's Internet traffic. Carnivore was implemented in October 1997. By 2005 it had been replaced with improved commercial software such as NarusInsight.[1]

    After prolonged negative coverage in the press, the FBI changed the name of its system from "Carnivore" to the more benign-sounding "DCS1000." DCS is reported to stand for "Digital Collection System"; the system has the same functions as before.

    .. [it] is a very specialized network analyzer or "sniffer" which runs as an application program on a normal personal computer under the Microsoft Windows operating system. It works by "sniffing" the proper portions of network packets and copying and storing only those packets which match a finely defined filter set programmed in conformity with the court order. This filter set can be extremely complex, and this provides the FBI with an ability to collect transmissions which comply with pen register court orders, trap & trace court orders, Title III interception orders, etc.... ...It is important to distinguish now what is meant by "sniffing." The problem of discriminating between users' messages on the Internet is a complex one. However, this is exactly what Carnivore does. It does NOT search through the contents of every message and collect those that contain certain key words like "bomb" or "drugs." It selects messages based on criteria expressly set out in the court order, for example, messages transmitted to or from a particular account or to or from a particular user.[7]

    COMMENT... It seems the program is still in use but it specifically complies with Article IV protections, but one has to ask if there is another program, or programs, within the FBI that we have not heard about?

  3. #83
    Additional NSA leaks:

    United States spying on allies.

    BRUSSELS/BERLIN, June 30 (Reuters) - The European Union has demanded that the United States explain a report in a German magazine that Washington is spying on the group, using unusually strong language to confront its closest trading partner over its alleged surveillance activities.

    Huffington Post to read more click here

    BERLIN, June 30 (Reuters) - The United States taps half a billion phone calls, emails and text messages in Germany in a typical month and has classed its biggest European ally as a target similar to China, according to secret U.S. documents quoted by a German newsmagazine.
    Sadly, these leaks simply prove what we already knew.

    The United States will step from the world stage by force or shame or people in the US fed-up or by another means.

  4. #84
    Seems Big Brother is here.
    The US army is blocking access to the Guardian website to preserve 'network hygiene'
    Wonder what term the Chinese government uses?

    http://m.guardian.co.uk/world/2013/j...website-access

    Apologies to anyone in a US base trying to read this article obviously you won't be able to.

  5. #85
    Lead Moderator calikid's Avatar
    Join Date
    Nov 2011
    Location
    Sunny California
    Posts
    10,228
    Blog Entries
    19
    Quote Originally Posted by CasperParks View Post
    Additional NSA leaks:

    United States spying on allies.



    Sadly, these leaks simply prove what we already knew.

    The United States will step from the world stage by force or shame or people in the US fed-up or by another means.
    No direct comments from TPtB. But there did seem to be implications that "bugs" may have been placed at the request of US allies. That is; Germans may have requested information from within their own country, & NSA supplied the service.

    There were 2 interesting comments published, don't recall the official's name.
    1) The US does in fact engage in espionage.
    2) Critics should look at what activities their own governments engage in (ie people in glass houses should not throw stones).
    The aim of an argument or discussion should not be victory, but
    progress. -- Joseph Joubert
    Attachment 1008

  6. #86
    Lead Moderator calikid's Avatar
    Join Date
    Nov 2011
    Location
    Sunny California
    Posts
    10,228
    Blog Entries
    19
    Quote Originally Posted by Longeyes View Post
    Seems Big Brother is here.
    The US army is blocking access to the Guardian website to preserve 'network hygiene'
    Wonder what term the Chinese government uses?

    http://m.guardian.co.uk/world/2013/j...website-access

    Apologies to anyone in a US base trying to read this article obviously you won't be able to.
    It is sad that the folks fighting for freedom lack the same freedom they are fighting for.
    Wonder who decides what is filtered on the military network/internet?
    Some general @ the pentagon? Can't be as automated as "Netcom" says, SOME decisions/protocols have to be adopted.
    The aim of an argument or discussion should not be victory, but
    progress. -- Joseph Joubert
    Attachment 1008

  7. #87
    Lead Moderator calikid's Avatar
    Join Date
    Nov 2011
    Location
    Sunny California
    Posts
    10,228
    Blog Entries
    19
    Updated June 29, 2013
    NSA slides explain the PRISM data-collection program

    Published: June 6, 2013, Updated June 29, 2013

    The top-secret PRISM program allows the U.S. intelligence community to gain access from nine Internet companies to a wide range of digital information, including e-mails and stored data, on foreign targets operating outside the United States. The program is court-approved but does not require individual warrants. Instead, it operates under a broader authorization from federal judges who oversee the use of the Foreign Intelligence Surveillance Act (FISA). Some documents describing the program were first released by The Washington Post on June 6. The newly released documents below give additional details about how the program operates, including the levels of review and supervisory control at the NSA and FBI. The documents also show how the program interacts with the Internet companies. These slides, annotated by The Post, represent a selection from the overall document, and certain portions are redacted. Story Continues/Slide show
    1 of several slides from the Washington Post article:


    The aim of an argument or discussion should not be victory, but
    progress. -- Joseph Joubert
    Attachment 1008

  8. #88
    No matter the good intentions, these agencies aren't responsible enough to have that kind of power. There's not enough oversight, failsafe, checks-n-balances to keep this from going very wrong in an unforeseeable future. Can anyone guarantee that 5, 10, 20 years down the line this data won't be used for widespread political oppression? Shades of that are already showing.

    What is the surveillance + data centers + quantum computing + rfid + drones + No Fly List + etc. is all converging toward? In the name of fighting off several thousand terrorists, this country will have given itself the instant suppressability of hundreds of millions of people.

    Let's say that after a future war, civil war, economic collapse, revolution, etc... an extremist populist party comes to power, be they radical marxists or right wing fundamentalists or whatever. Or maybe the Chinese and North Koreans invade like some Red Dawn scenario.

    Is there anything in place that absolutely prevents them from tapping into these NSA data centers, scanning for anyone who has ever been unsympathetic to their ideals (such as a record of this very post I'm writing now, and a guestbook comment I wrote ten years ago) then revoking citizenship, branding someone an enemy combatant, and sending out a drone strike? No. Might seem unlikely to happen this year, but you can't guarantee it won't be possible in a decade. Who in 1910 could have predicted what Germany would be like in 1940? In the name of fighting terrorism today, the seeds are being sown for the total destruction and enslavement of the country tomorrow. Temporary gains for long term losses = stupidity in the extreme. Tyrants don't take power, the are given power by enthusiastic supporters who don't know better. To me, the writing's been on the wall since 9/11.

  9. #89
    Is this a hidden program within any MS-OS? an .exe file?

    the Kingfish



    Quote Originally Posted by majicbar View Post
    http://en.wikipedia.org/wiki/Carnivore_(software)




    .. [it] is a very specialized network analyzer or "sniffer" which runs as an application program on a normal personal computer under the Microsoft Windows operating system. It works by "sniffing" the proper portions of network packets and copying and storing only those packets which match a finely defined filter set programmed in conformity with the court order. This filter set can be extremely complex, and this provides the FBI with an ability to collect transmissions which comply with pen register court orders, trap & trace court orders, Title III interception orders, etc.... ...It is important to distinguish now what is meant by "sniffing." The problem of discriminating between users' messages on the Internet is a complex one. However, this is exactly what Carnivore does. It does NOT search through the contents of every message and collect those that contain certain key words like "bomb" or "drugs." It selects messages based on criteria expressly set out in the court order, for example, messages transmitted to or from a particular account or to or from a particular user.[7]

    COMMENT... It seems the program is still in use but it specifically complies with Article IV protections, but one has to ask if there is another program, or programs, within the FBI that we have not heard about?

  10. #90
    calikid,

    The diagram brings depth to the level of surveillance that is ongoing.

    Thanks for posting it.
    Last edited by CasperParks; 07-01-2013 at 09:28 PM.

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •