News:

For my part, I've replaced optimism and believing the best of people by default with a grin and the absolute 100% certainty that if they cannot find a pig to fuck, they will buy some bacon and play oinking noises on YouTube.

Main Menu

Prism and Verizon surveillance discussion thread

Started by Junkenstein, June 06, 2013, 02:19:29 PM

Previous topic - Next topic

Odibex Grallspice

Quote from: Dirty Old Uncle Roger on December 22, 2013, 10:33:30 PM
HAW HAW!

Hey, Mister Bank Robber, please design my safe.
Way of the world, Roger, way of the world.

Cain


Cain

Correct me if I'm wrong, but don't two contradictory rulings mean this becomes a Supreme Court issue?

Cain

Quote from: Cain on December 19, 2013, 09:32:53 AM
Did anyone watch the 60 Minutes sloppy blowjob to the NSA?

I didn't, sadly, but it sounds amazing.  Fantastical conversations about pirates.  No discussion about metadata use in targeted assassinations.  Asking specifically about American wiretaps by the NSA to downplay the NSA's vast surveillance machine and the FBI's use of it.  And then there is the BIOS plot.

If you believe the NSA and 60 minutes, China had a secret plan to shut down the global economy.

To.

Shut.

Down.

The.

Global.

Economy.

QuoteThat was news to many security experts, who had never before heard of the "BIOS plot," even though "60 Minutes" asserted that "computer manufacturers" had worked with the NSA "to close this vulnerability." Such an undertaking would have been well known in the information-security community.

Plunkett gave only the barest outline of the supposed Communist scheme, not specifying when and how the plot was uncovered and foiled. CBS' confirmation of the plot's existence and provenance relied on unnamed "cybersecurity experts briefed on the operation" who "told us it was China."

Security experts aren't buying it.

And with good reason.  Would security experts really not notice an unscheduled, global BIOS security patch being rolled out?  Like hell they wouldnt.  And why would the NSA subsequently reveal such a "top secret" operation?

Because it's bullshit, of course.

So, guess who was actually hacking BIOS?

The NSA, of course.

QuoteThe ANT developers have a clear preference for planting their malicious code in so-called BIOS, software located on a computer's motherboard that is the first thing to load when a computer is turned on.

This has a number of valuable advantages: an infected PC or server appears to be functioning normally, so the infection remains invisible to virus protection and other security programs. And even if the hard drive of an infected computer has been completely erased and a new operating system is installed, the ANT malware can continue to function and ensures that new spyware can once again be loaded onto what is presumed to be a clean computer. The ANT developers call this "Persistence" and believe this approach has provided them with the possibility of permanent access.

If anyone has the capability to shut down the global economy via a BIOS attack, it's the NSA.  Whether or not they would actually ever act on that capability (though who knows?  China is still set to overtake US economic dominance, and there are certain quarters of the US National Security State who believe it is better to rule in hell).

Cain

And while I'm here, questions are being asked about Greenwald's new media venture with Pierre Omidyar:

QuoteSo there you go. A definitive answer, direct from Glenn Greenwald's new boss. "TechCrunch and anybody else who pubs stolen info should help catch the thief. Shldnt pub in the 1st place."

Mesozoic Mister Nigel

Quote from: Cain on December 29, 2013, 02:36:14 PM
Quote from: Cain on December 19, 2013, 09:32:53 AM
Did anyone watch the 60 Minutes sloppy blowjob to the NSA?

I didn't, sadly, but it sounds amazing.  Fantastical conversations about pirates.  No discussion about metadata use in targeted assassinations.  Asking specifically about American wiretaps by the NSA to downplay the NSA's vast surveillance machine and the FBI's use of it.  And then there is the BIOS plot.

If you believe the NSA and 60 minutes, China had a secret plan to shut down the global economy.

To.

Shut.

Down.

The.

Global.

Economy.

QuoteThat was news to many security experts, who had never before heard of the "BIOS plot," even though "60 Minutes" asserted that "computer manufacturers" had worked with the NSA "to close this vulnerability." Such an undertaking would have been well known in the information-security community.

Plunkett gave only the barest outline of the supposed Communist scheme, not specifying when and how the plot was uncovered and foiled. CBS' confirmation of the plot's existence and provenance relied on unnamed "cybersecurity experts briefed on the operation" who "told us it was China."

Security experts aren't buying it.

And with good reason.  Would security experts really not notice an unscheduled, global BIOS security patch being rolled out?  Like hell they wouldnt.  And why would the NSA subsequently reveal such a "top secret" operation?

Because it's bullshit, of course.

So, guess who was actually hacking BIOS?

The NSA, of course.

QuoteThe ANT developers have a clear preference for planting their malicious code in so-called BIOS, software located on a computer's motherboard that is the first thing to load when a computer is turned on.

This has a number of valuable advantages: an infected PC or server appears to be functioning normally, so the infection remains invisible to virus protection and other security programs. And even if the hard drive of an infected computer has been completely erased and a new operating system is installed, the ANT malware can continue to function and ensures that new spyware can once again be loaded onto what is presumed to be a clean computer. The ANT developers call this "Persistence" and believe this approach has provided them with the possibility of permanent access.

If anyone has the capability to shut down the global economy via a BIOS attack, it's the NSA.  Whether or not they would actually ever act on that capability (though who knows?  China is still set to overtake US economic dominance, and there are certain quarters of the US National Security State who believe it is better to rule in hell).

Honestly, I read this and I think, well fuck it. Just fuck it.

They've fucking won.
"I'm guessing it was January 2007, a meeting in Bethesda, we got a bag of bees and just started smashing them on the desk," Charles Wick said. "It was very complicated."


The Good Reverend Roger

Quote from: Nigel's Red Velveteen Skinmeat Snacks on December 29, 2013, 05:56:31 PM

Honestly, I read this and I think, well fuck it. Just fuck it.

They've fucking won.

Oh, I dunno...
" It's just that Depeche Mode were a bunch of optimistic loveburgers."
- TGRR, shaming himself forever, 7/8/2017

"Billy, when I say that ethics is our number one priority and safety is also our number one priority, you should take that to mean exactly what I said. Also quality. That's our number one priority as well. Don't look at me that way, you're in the corporate world now and this is how it works."
- TGRR, raising the bar at work.

Cain

Quote from: Cain on December 29, 2013, 02:40:09 PM
And while I'm here, questions are being asked about Greenwald's new media venture with Pierre Omidyar:

QuoteSo there you go. A definitive answer, direct from Glenn Greenwald's new boss. "TechCrunch and anybody else who pubs stolen info should help catch the thief. Shldnt pub in the 1st place."

Omidyar has confimed that this is his position:

QuoteThat changed last weekend when Pando investigations editor Paul Carr invited Omidyar to address remarks he made in 2009 about when editors should turn in non-violent leakers to the authorities.

Omidyar's response must have horrified any source considering leaking to NewCo: 

"nless I judge significant pub interest in those docs, I'd prob tell the cops. My jdgmt", he wrote, adding: "Every case is different, which is why you shouldn't make absolute statements."

I'd like to remind everyone, this is the man who is employing the only two people in the world with access to the Snowden documents.

Greenwald has also confirmed he is holding back documents, so he can put them in his upcoming book.

And out of over 55,000 documents, less than 300 pages have been published to date.

Salty

This is just random speculation on my part, but if I were in Snowden's position I would have loaded every single available oriface with thumbdrives.

Quote from: Cain on December 29, 2013, 07:48:01 PM
Quote from: Cain on December 29, 2013, 02:40:09 PM
And while I'm here, questions are being asked about Greenwald's new media venture with Pierre Omidyar:

QuoteSo there you go. A definitive answer, direct from Glenn Greenwald's new boss. "TechCrunch and anybody else who pubs stolen info should help catch the thief. Shldnt pub in the 1st place."

Omidyar has confimed that this is his position:

QuoteThat changed last weekend when Pando investigations editor Paul Carr invited Omidyar to address remarks he made in 2009 about when editors should turn in non-violent leakers to the authorities.

Omidyar's response must have horrified any source considering leaking to NewCo: 

"nless I judge significant pub interest in those docs, I'd prob tell the cops. My jdgmt", he wrote, adding: "Every case is different, which is why you shouldn't make absolute statements."

I'd like to remind everyone, this is the man who is employing the only two people in the world with access to the Snowden documents.

Greenwald has also confirmed he is holding back documents, so he can put them in his upcoming book.

And out of over 55,000 documents, less than 300 pages have been published to date.

Gotta make that money.

The world is a car and you're the crash test dummy.

Bu🤠ns



The Johnny

<<My image in some places, is of a monster of some kind who wants to pull a string and manipulate people. Nothing could be further from the truth. People are manipulated; I just want them to be manipulated more effectively.>>

-B.F. Skinner

Cain

Well, in using Gmail he was kinda asking for it.  Admittedly, there aren't any obvious good choices now SilentCircle and Lavabit are gone (not until Darkmail is working), but still, using a company that installs backdoors for the NSA and had its company hacked from top to bottom by Fort Meade's voyeurs probably wasn't a smart choice

http://nypost.com/2013/12/30/state-dept-whistleblower-has-email-hacked-deleted/

QuoteThe personal e-mail account of a State Department whis­tle­­blower was hacked, and four years worth of messages — some detailing alleged wrongdoing at the agency — were deleted, The Post has learned.

The computer attack targeted the Gmail account of Diplomatic Security Service criminal investigator Richard Higbie, his lawyer, Cary Schulman, confirmed.

"They took all of his e-mails and then they deleted them all," said Schulman. He said that he could not prove who was responsible for the hack job, but said the attack was "sophisticated" and called the targeting of Higbie "alarming."

"Obviously, somebody is not happy with something he's doing and wanted to get that information and also cause him an inability in the future to have ready access to that," Schulman said.

The e-mails included evidence about misconduct by top officials at the department, communications with other potential whistleblowers there, and correspondence with members of Congress who are investigating the allegations, Schulman said.

The Johnny


Lmao, not making a backup is also ridiculous.

Im sure if he asks Gmail nicely, they could restore the deleted information, i recall reading that all telecoms and information companies are required by law to keep all info for like 2-5 years.
<<My image in some places, is of a monster of some kind who wants to pull a string and manipulate people. Nothing could be further from the truth. People are manipulated; I just want them to be manipulated more effectively.>>

-B.F. Skinner

Bu🤠ns

Quote from: The Johnny on January 01, 2014, 01:40:37 AM

Lmao, not making a backup is also ridiculous.

Im sure if he asks Gmail nicely, they could restore the deleted information, i recall reading that all telecoms and information companies are required by law to keep all info for like 2-5 years.

It amazes me how many people don't backup their shit...then cry about it when they lose everything....well ... typically they blame the computers rather than poor perseverance.