Quote:
Originally Posted by MrBaldBastard
https://edition.cnn.com/2018/09/21/p...ies/index.html
Mmm it would seem other counties were involved, be a cunt if it was Australia given our laws here and our ability to tap into basically any satellite to monitor "communications", wonder what they do with two football fields of computer banks in the middle of the desert, super chess games maybe?
https://en.wikipedia.org/wiki/Pine_Gap
take good note of where it says "transmissions intended for communications satellites" microwave emissions, such as long-distance telephone calls.".. then google , project echelon
"In 1988, Margaret Newsham, a Lockheed employee under NSA contract, disclosed the ECHELON surveillance system to members of congress. Newsham told a member of the U.S. Congress that the telephone calls of Strom Thurmond, a Republican U.S. senator, were being collected by the NSA. Congressional investigators determined that " targeting of U.S. political figures would not occur by accident, but was designed into the system from the start."
|
All the old thinking and reference from things 20 or more years ago are all out the window after 911 and the patriot act and a mighty upgrade to capability.
The problem with the rules that are there and seem to add a good intent image to the services is that they can be easily by-passed on minor details.
Now go look-up the sting-ray 2's that were purchased for the major metro's for cellular ease dropping.
A program with seemingly good intent but without accountability for where the equipment is and who is using it for what purpose.
When New York got theirs, most of them were used to ease-drop on wall-street for self enrichment and later used for political purposes.
And there are 100's of metro's with them now.
They are all on touchy ground using them because they are a 'man-in-the-middle' attack system. Which means they have a transmitter not licensed by the FCC and have been given permission to use in 'life-or-death situations' as is always been the case with any transmitter.
You will not find a court case where they can show that they used it in gathering evidence because it is not legal. but use them they do.
But in a un-tracked device with this capability, this is not something that should be taken lightly by the public.
But they do not know it has been going on. There needs to be a strict reviewable log as to their where-abouts and usage.
This is why the big push-back on Apple's encryption. They could not break it with a sting-ray 2 or later revisions to it. They could not be man in the middle on a 4g apple encrypted network stream.
They were getting the encryption keys by forcing the phones down to 2g and back-up to 3g. I think apple was aware of it as I have been for 8 years.
The system is so simple that anyone with the knowledge can build them for under $1k at present. How safe do you feel now ?
Anything bad that can happen with good tech will happen because it can.
Pandora's box equated. Can you stop it or just somewhat protect yourself from it.
Nothing if you don't know about it in the first place.