![]()  | 
	
		
 NSA was domistic spying before 9/11 
		
		
		So how many people picked up on this little under reported tidbit? 
	http://digitaljournal.com/article/352455 www.bloomberg.com/apps/news?pid=newsarchive&sid=abIV0cO64zJE The NSA was already setting up and pressuring the telecoms in the US for access to their call centers months before 9/11. This shows that once again the govt is lying about this program. They used 9/11 as the excuse that they needed it, yet they were already setting it up well before 9/11. Meaning 9/11 or not, they intended to spy on Americans with out warrants. Bush/Cheney were already pushing the FISA court angle well before 9/11 to create a warrentless wiretap network for domestic spying. Gotta love how this has been completely ignored by the mainstream media.  | 
		
 Domestic.. Edit for the title.. 
	 | 
		
 No way they let them do attack so they can later control the world 
	 | 
		
 It's not a surprise really. Australia was already brewing potential data tap laws in the late 1990s. I bet other countries were too. 
	So when is GFY going to go SSL?  | 
		
 Quote: 
	
 I'd suspect that they long ago gained backdoor access to the worlds most used forum software, considering they have everyone else's.  | 
		
 i think the NSA was snooping when the telegraph was invented. everything about it is so secret its impossible to really analyze what it does. 
	 | 
		
 Quote: 
	
 Side note, I don't think we needed the NSA for the telegraph. It wasn't the most secure connection in the first place. LoL  | 
		
 Quote: 
	
 .:disgust:Oh crap:mad: .  | 
		
 thing is, when this story broke, it broke first in 2006.  There was a big back and forth on new york times, yada yada yada, and nada. 
	can someone explain to me what has changed?  | 
		
 Quote: 
	
  | 
		
 Quote: 
	
 good point, thank you  | 
		
 Quote: 
	
 and the simple fact is that the tele is focusing on snowden. not on the documents. now, you won't like this part, but snowden is giving the media the fodder to keep the story about him active. asylum, etc. the fact that he is actually trying to blackmail the usa with the documents he still has but not revealed, etc. release the fukcing documents snowden, don't use them as a bargaining chip to get to your chosen final country. if we want the media to stay focused on the documents and what they reveal, then snowden should release the fucking documents. :)  | 
		
 Quote: 
	
  | 
		
 Quote: 
	
  | 
		
 Quote: 
	
  | 
		
 Quote: 
	
 what is your view on the remaining documents snowden has? he is currently saying they are completely damaging to the usa so he will not release them as long as the usa does not get in the way of his seeking asylum. do you agree with how he is handling this or do you think he should release the docs? or perhaps another outcome? imo, he should release the documents. i don't agree with his offer to keep things hidden in return for his safe passage to venezuela/whereever.  | 
		
 Quote: 
	
 Do you think there should be at least one member of US government that vocally supports Snowden? Interesting how the dialogue is unilateral on the subject  | 
		
 Quote: 
	
 There's no way (as far as we know) that SSL can be broken, but that doesn't stop the NSA being able to intercept and store encrypted data for a future date when it CAN be read (either through some magical new method of codebreaking, or something less fancy like acquiring the SSL certificate for that host...) Quote: 
	
  | 
		
 Quote: 
	
 yes. specifically, someone in government should be trying to communicate with him directly and get him guaranteed safe passage back to usa, he/she can accompany snowden on that passage and ensure safety, etc. television support, etc. someone in government should also be supporting snowden on releasing the remaining documents.  | 
		
 Quote: 
	
 my understanding is the first major leakers tried to go to the press lol bet they were surprised :1orglaugh  | 
		
 if it keeps us safe, what does it matter? unless you have something to hide... 
	 | 
		
 Quote: 
	
  | 
		
 Quote: 
	
 Ever install a SSL Key? If you bought your SSL certificate from Verisign, Thawt, Komodo, or other public vendors there is a record of your encrypt/decrypt key on file. All they need is a subpoena -- if the SSL Cert issuer is in the US the "governmental agency" can get that key -- YOUR ENCRYPTION IS TRASHED.  | 
		
 Quote: 
	
 So far Snowden is nothing but talk. He claims the NSA does illegal things, but has yet to offer up any proof. The warrants are pretty easy to get - they seem to be rubber stamping them - but yet Snowden has yet to provide an exact example of wrong doing. The only person to break the law here is Snowden himself.  | 
		
 Quote: 
	
  | 
		
 Quote: 
	
  | 
		
 Quote: 
	
 i mentioned it earlier in the thread, snowden is using the remaining documents as a bargaining tool for his travel to where he is seeking asylum. and snowden has provided plenty of data revealing wrong-doing. not illegal, per se. wrong, very.  | 
		
 Quote: 
	
 Yet not a single one of them will risk their next election over it.  | 
		
 Quote: 
	
 id be way more concerned about my brand new mercedes 'catching fire'  | 
		
 i tell ya what, i would move to the area and vote for the congressperson or senator or candidate that had the balls to try and get snoden sorted out for the benefit of all of us. 
	which is, imo, release all the fucking docs, every ducking one, that's what manning did, he didn't hold shit back. that's what the other nsa dude did too, dump em all out. let's get this shit sorted out. obviously whatever plan snwoden had of enacting change is not happening, washington and media are both moving on. his *mission* has not produced any change, release the docs.  | 
		
 Quote: 
	
  | 
		
 Quote: 
	
  | 
		
 Quote: 
	
  | 
		
 Quote: 
	
  | 
		
 Quote: 
	
  | 
		
 Quote: 
	
  | 
		
 Quote: 
	
 There's something called (I think) forward security which uses a one-time encryption key for SSL, but it's not widely supported. I don't really understand how it works, since two hosts negotiating the random encryption key could be captured by a third party. Seems a little like yelling out your password across the room... but I'm not a cryptographer, so I presume there's some magic way it works. :)  | 
		
 Quote: 
	
 You obviously don't understand how PKI works. You send a CSR (Certificate Signing Request) to the CA (Certificate Authority). The CSR is basically your public key with some additional information. You always retain your private key on your server/local machine. The real threat is the the trust structure with the CAs. Every browser ships with a list of trusted CAs and some of them have been hacked or they are flat out owned by DHS or the government of China. A rogue/hacked CAs can sign keys for popular websites such as paypal/facebook/twitter and MITM (man-in-the-middle) the connections. Essentially they sit in the middle between you and the target site and pretend to be the endpoint. The only way to guard against that is to use certificate pinning. There is a good plugin for firefox called "certificate patrol", and chrome/chromium has pinning for popular websites already. I completely agree that you should run your own mail servers.  | 
		
 Quote: 
	
 https://en.wikipedia.org/wiki/Forward_secrecy In some instances it is impossible to mitigate the SSL BEAST attack while having forward secrecy enabled. ugh. For an example of well-implemented forward secrecy look at OTR and Tor.  | 
		
 The predecessor of the National Security Agency was the Armed Forces Security Agency (AFSA), created on May 20, 1949, so this shit has been going on for a long time 
	 | 
| All times are GMT -7. The time now is 04:30 AM. | 
	Powered by vBulletin® Version 3.8.8
Copyright ©2000 - 2025, vBulletin Solutions, Inc.
	
	©2000-, AI Media Network Inc123