[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <CAH8yC8muOP_hsaqmJgT7yjpePjQoLQ9G4EOoCGvujw6zE1Tgfw@mail.gmail.com>
Date: Thu, 1 Aug 2013 16:48:53 -0400
From: Jeffrey Walton <noloader@...il.com>
To: Gary Baribault <gary@...ibault.net>
Cc: full-disclosure@...ts.grok.org.uk
Subject: Re: XKeyscore sees 'nearly EVERYTHING you do
online
On Thu, Aug 1, 2013 at 2:56 PM, Gary Baribault <gary@...ibault.net> wrote:
> Optically tapping ALL of the submarine cable going into and out of the U.S.
> would still not give them ALL of the claimed data. They have to be tapping
> all of the major traffic exchange sites in the U.S. to get this kind of
> data.
The US does that.
In 'The Spy Factory' (http://video.pbs.org/video/1051968443/) from
2009, the producers interviewed the AT&T technicians who worked at the
COs where the taps occur. They also interviewed a US Army analyst who
listen in on the calls.
Since the video, there's been a number of documents circulating about
the practice. See, for example,
http://en.wikipedia.org/wiki/Stellar_Wind_(code_name).
Jeff
> On 08/01/2013 11:31 AM, XF wrote:
>> Did you understood how they collect data ? This is not clear for me...ISP
>> backdoor ? Optical tap on sub marine wire ?
>>
>> Le 1 août 2013 à 16:26, Georgi Guninski <guninski@...inski.com> a écrit :
>>
>>> it will be interesting to me what will remain of the nsa
>>> when the chinese comrades stop giving fresh money to the usa.
>>>
>>> Detroit news are not very pink.
>>>
>>> On Thu, Aug 01, 2013 at 11:20:27PM +1200, Hugh Davenport wrote:
>>>> meanwhile, in new zealand, prime minister suggests that we aren't
>>>> the slaves for nsa...
>>>>
>>>> On 2013-08-01 19:23, Georgi Guninski wrote:
>>>>> XKeyscore sees 'nearly EVERYTHING you do online
>>>>>
>>>>>
>>>>> http://www.theregister.co.uk/2013/07/31/prism_put_in_the_shade_by_leak_about_even_more_powerful_snoop_tool/
>>>>> New NSA tool exposed: XKeyscore sees 'nearly EVERYTHING you do online'
>>>>>
>>>>> From the presentation:
>>>>> * Show me all the exploitable machines in country X
>>>>>
>>>>> * How do I find a cell of terrorust that has no
>>>>> connection to known strong-selectors
>>>>> **Anomalous events
>>>>> ***Someone who is using encryption
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists