42
   

Snowdon is a dummy

 
 
Frank Apisa
 
  1  
Tue 25 Feb, 2014 08:24 pm
@BillRM,
BillRM wrote:

Quote:
at's not very good squirming imo.


Completely pitiful in my opinion.


I doubt you will ever quote me...and actually argue against what I say. It is much easier to make up stuff...and then argue against the crap you make up.

That's what's pitiful...not me calling that to your attention, Bill.

BillRM
 
  2  
Wed 26 Feb, 2014 06:08 am
@Frank Apisa,
Quote:
I doubt you will ever quote me...and actually argue against what I say. It is much easier to make up stuff...and then argue against the crap you make up.


Sorry but you have been defending the position that is order to be "safe" or "safer" from terrorists we need to surrounded all privacy rights to the government and forget about the bill of rights. We also need to spy on the bulk of the human race in mass to achieved that safety.

You been doing so for tens of thousands of posts as a matter of fact and life in too short to mine those ten of thousands of posts over proving that you had taken the position you had indeed taken.

Oh, it is just fine with you to prosecute Snowden for exposing the criminal misdeeds of some in the US government and yet you are just fine with allowing such law and constitution breakers to keep their positions of power such as Clapper.


So go play some silly games on someone else.
Frank Apisa
 
  0  
Wed 26 Feb, 2014 06:34 am
@BillRM,
BillRM wrote:

Quote:
I doubt you will ever quote me...and actually argue against what I say. It is much easier to make up stuff...and then argue against the crap you make up.


Sorry but you have been defending the position that is order to be "safe" or "safer" from terrorists we need to surrounded all privacy rights to the government and forget about the bill of rights. We also need to spy on the bulk of the human race in mass to achieved that safety.


Like I said...you will not quote me...you will just make stuff up and pretend that is what I said.

That crap you made up above...is nothing like my position.

But you won't quote me because you want to argue against yourself...not me.

Quote:
You been doing so for tens of thousands of posts as a matter of fact and life in too short to mine those ten of thousands of posts over proving that you had taken the position you had indeed taken .


"Tens of thousands" is as absurd as your mischaracterizations, Bill. But that is what you do...make absurd statements.

Quote:
Oh, it is just fine with you to prosecute Snowden for exposing the criminal misdeeds of some in the US government and yet you are just fine with allowing such law and constitution breakers to keep their positions of power such as Clapper.


Quote anything I've ever said of Clapper.

Lemme help you with that:

That's about it.

Quote:

So go play some silly games on someone else.


"Silly games" is what you do, Bill. And not very well either.
0 Replies
 
BillRM
 
  2  
Thu 27 Feb, 2014 06:32 am
Quote:



http://www.independent.co.uk/life-style/gadgets-and-tech/boeing-announce-selfdestructing-black-phone-for-government-agencies-9156896.html

It’s not just citizens that are worried about being spied on by their governments – governments don’t much fancy being snooped on either.

To this end, American aerospace and defence contractor Boeing has announced that they will start offering a specialized ‘black phone’ to government agencies and security contractors.

The Boeing Black Smartphone will run on Google’s Android operating system but offer a range of additional features for the security-conscious, including (like any good spy hardware) the ability to self-destruct.

To start with the less titillating specs: the phone will have a dual-SIM capability to allow users to “switch between government and commercial networks”, access to multiple network to facilitate global use, and the operating system will be secured by Boeing’s patented “PureSecure” architecture.

If this all sounds a little bit vague then Boeing will be happy. In the paperwork they filed with the FCC the company noted that because of the phone’s target market the exact details are “trade secrets” and will be “permanently withheld from public inspection”.

It's a fairly normal looking phone - apart from that big red banner across the top.
The specification sheet revealed by Boeing gives some of the more prosaic details (the phone weighs 170g and will run on a 1.2GHz Cortex A9 processor, the same basic chip architecture found in the iPhone 4) but also notes that the device will offer “unparalleled modularity” allowing users to plug in “additional sensors or technology enhancements like satellite connectivity.”

However, it’s a few lines from the FCC filing that really provide the icing on the cake for the black phone, outlining that James Bond-worthy killer app: a self-destruct feature.

“The Boeing Black phone is manufactured as a sealed device both with epoxy around the casing and with screws, the heads of which are covered with tamper proof covering to identify attempted disassembly.

“Any attempt to break open the casing of the device would trigger functions that would delete the data and software contained within the device and make the device inoperable,” says the paperwork.

Explanations of exactly how this mechanism will work remain a mystery - that is, until Boeing starts selling the device (they told the Wall Street Journal that this was happening "soon") and a video of someone cracking one open pops up on YouTube. Some things will never stay secret.
0 Replies
 
Walter Hinteler
 
  3  
Thu 27 Feb, 2014 08:27 am
Quote:
Britain's surveillance agency GCHQ, with aid from the National Security Agency, intercepted and stored the webcam images of millions of internet users not suspected of wrongdoing, secret documents reveal.
[...]
http://i1334.photobucket.com/albums/w641/Walter_Hinteler/a_zps9cd63385.jpg
Optic Nerve, the documents provided by NSA whistleblower Edward Snowden show, began as a prototype in 2008 and was still active in 2012, according to an internal GCHQ wiki page accessed that year.
[... ... ...]
The NSA declined to respond to specific queries about its access to the Optic Nerve system, the presence of US citizens' data in such systems, or whether the NSA has similar bulk-collection programs.
... ... ...
Source
Walter Hinteler
 
  3  
Thu 27 Feb, 2014 08:35 am
@Walter Hinteler,
MPs summon security services watchdog over Snowden leaks
Quote:
Sir Mark Waller, intelligence services commissioner, has repeatedly refused to address home affairs select committee

A key security services watchdog, Sir Mark Waller, has been summoned to appear before MPs after he repeatedly refused to appear to answer their questions over the Edward Snowden leaks and other counter-terrorism issues.

Waller, who is the intelligence services commissioner, has refused to appear before the Commons home affairs select committee in a rare clash over the parliamentary accountability of Britain's intelligence agencies.

The summons was issued at midday on Thursday and is a rare move by a parliamentary committee which has the power to send for people and papers. The order to appear on 18 March was approved without a vote on the committee.
... ... ...
0 Replies
 
BillRM
 
  2  
Thu 27 Feb, 2014 08:36 am
@Walter Hinteler,
Quote:
Britain's surveillance agency GCHQ, with aid from the National Security Agency, intercepted and stored the webcam images of millions of internet users not suspected of wrongdoing, secret documents reveal.


There should be massive criminal trials but those trials have nothing to do with Snowden other then him giving evidences at them.

Unlike Frank I do not think that having a position in a government allow law breaking.
JTT
 
  1  
Thu 27 Feb, 2014 08:53 am
@BillRM,
Bill: Unlike Frank I do not think that having a position in a government allow law breaking.
-----

Well that's a bit of a stretch, Bill, but at least in this situation your heart and brain are in the right place.
0 Replies
 
Frank Apisa
 
  1  
Thu 27 Feb, 2014 01:10 pm
@BillRM,
BillRM wrote:

Quote:
Britain's surveillance agency GCHQ, with aid from the National Security Agency, intercepted and stored the webcam images of millions of internet users not suspected of wrongdoing, secret documents reveal.


There should be massive criminal trials but those trials have nothing to do with Snowden other then him giving evidences at them.

Unlike Frank I do not think that having a position in a government allow law breaking.



Another straw man, Bill. I have NEVER said anything that can remotely be construed that way.

There is a very thin line between building straw men...and being an out-and-out liar.

You are perilously close to that line.
0 Replies
 
BillRM
 
  4  
Thu 27 Feb, 2014 08:57 pm
Governments keeping Frank safe from naked terrorists at great cost.



Quote:


http://www.latimes.com/opinion/opinion-la/la-ol-yahoo-webcam-britain-spying-nsa-snowden-20140227,0,4634326.story#axzz2ua6pnmjz


Forget Big Brother. What we have to fear now is Peeping Tom. One of Britain’s intelligence services, with help from the U.S. National Security Agency, reportedly collected and stored millions of images from people’s Yahoo webcam chats.

The Guardian newspaper, continuing to mine the Edward Snowden mother lode of purloined NSA documents, broke the news Thursday about the British spy agency GCHQ’s “Optic Nerve” program. It reported:

“GCHQ files dating between 2008 and 2010 explicitly state that a surveillance program codenamed Optic Nerve collected still images of Yahoo webcam chats in bulk and saved them to agency databases, regardless of whether individual users were an intelligence target or not.

“In one six-month period in 2008 alone, the agency collected webcam imagery — including substantial quantities of sexually explicit communications — from more than 1.8 million Yahoo user accounts globally.”

Or, as President Obama might say: “Just keeping the world safe from naked, sex-crazed terrorists; nothing else to see here; move along.”

Or, as some working stiff at the GCHQ /NSA might say: “Hubba hubba, isn’t that my neighbor in 4B?”

Forget slippery slopes; we’re way over into the deep end of the spying (cess)pool now. After all, ordinary citizens who do this sort of thing find themselves touched by the long arm of the law.

As Zack Whittaker and Charlie Osborne wrote Thursday on ZDNet:

“Does Hunter Moore ring any bells?

“Moore has been branded by many ‘the most hated man on the Internet’ for running the revenge porn website IsAnyoneUp.com, where intimate images of former partners were posted without consent by those seeking revenge. Not only were images posted, but also names, locations and links to social media accounts were often included.

“While some images were submitted by users, Moore was later arrested and charged with the theft of images from hacked email accounts; and a 15-count federal indictment accused him of conspiracy, computer hacking, aggravated identity theft, and aiding and abetting.

“The punishment? Up to five years in federal prison.”

Is what’s sauce for the goose is sauce for the gander? Well, let’s just say I wouldn’t hold my breath waiting for federal prosecutors (or whatever they have in Britain) to take Obama or Prime Minister David Cameron out for a perp walk.

Maybe it’s just me, but this is getting creepy. Tracking phone calls and emails and the like is one thing; checking folks out in their birthday suits (or whatever) is just — for lack of a better word — obscene.

Of course, it’s not like we shouldn’t have seen this coming. Folks everywhere have taken breathtaking technological advances such as the Internet, computers, webcams, cellphones and the like and used them to do really stupid things. That picture of you and your bros at the frat party? Bad idea. The snaps from the ladies-only weekend in Vegas? Shouldn’t have gone there.

But people being stupid is one thing; governments being stupid is a whole other level.

Yes, I want to be safe from terrorists.

But right now, the naked truth is, I’m feeling a whole lot more threatened by government spooks.

0 Replies
 
BillRM
 
  4  
Thu 27 Feb, 2014 10:57 pm
Frank is right the government must spy on the world to stop the KKK from joining forces with the Jews to x-ray all of us. One wonder if those death rays KKK terrorists had good looking wives/girlfriends that the NSA could find some way of getting nude pictures of.


Quote:



http://www.opposingviews.com/i/religion/new-york-men-build-x-ray-weapon-intention-aiding-terrorists

New York Men Build X-Ray Weapon With Intention Of Aiding Terrorists

Share

Follow

By Lina Batarags, Thu, January 30, 2014
Two men in upstate New York have been accused of secretly developing a portable X-ray weapon intended to target opponents of Israel.

The men have been charged with conspiracy to provide support to terrorists.

Their intention in building the machine was to “surreptitiously deliver damaging and even lethal doses of radiation against” enemies of Israel. The two men, Glendon Scott Crawford and Eric J. Feight, had been appealing to Jewish organizations for funding.

Crawford, who claims to be a KKK member, had also sought funding from the KKK. Investigators reported that Crawford had specifically identified Muslims as his target, as well as other, more specific individuals and groups.

The case investigation began in April 2012. While Crawford appears to been the one advocating and seeking funding for the weapon, Feight “designed, built, and tested the remote control.”

Authorities said the device was inoperable and nobody was hurt. However, if the remote device had been used, it would have delivered damaging radiation rays to his target, the effects of which would slowly begin to appear over the course of several days.

The men are now facing up to 15 years in prison.

Sources: Huffington Post, http://thelibertarianrepublic.com

Photo Source: www.vosizneias.com

Get More: radiation | x-ray |
Frank Apisa
 
  1  
Fri 28 Feb, 2014 06:54 am
@BillRM,
You've fallen over the edge.

But...as long as you are making a fool of yourself...and making it abundantly clear to everyone that I am the focus of why you are doing so...

...I will continue to enjoy watching you do so.

In the meantime, I notice you have not produced any quotes that say any of the stuff you accuse me of saying.

Okay...continue!

Wink
BillRM
 
  2  
Fri 28 Feb, 2014 05:32 pm
Maybe NSA could earn enough funds to not need to tap the taxpayers wallets for the government massive spying programs.

One suggestion is to turn some of the massive computers power in Utah into the world largest bitcoin mining operation.

An of course the world largest cloud storage facility as who would not trust the word and the honor of the US government to keep their information safe and private as to question their honor is to wear a tin foil hat as Frank had so cutely stated.

Create amazing video games using all those government hackers driving out of business all other gaming firms and of course having the ability for the games to take over their customers computers.

Doing so would have the very targets of the spying paying for it and more without the need to used the taxing powers of the government.

0 Replies
 
JTT
 
  2  
Fri 28 Feb, 2014 08:36 pm
@Frank Apisa,
Frank, Bill has you wrapped up and hogtied. Since long ago.

If only he could figger how to stuff some road apples in your gaping maw.
0 Replies
 
BillRM
 
  2  
Fri 28 Feb, 2014 09:55 pm
Quote:


http://www.usatoday.com/story/tech/2014/02/27/nsa-resistant-products-obama-tech-companies-encryption-overseas/5290553/



NSA surveillance hurting tech firms' business
Jon Swartz, USA TODAY 1:41 a.m. EST February 28, 2014
Push for "NSA-resistant" products underscores skirmish between tech companies, government


Reports of NSA surveillance raised have concerns among tech customers overseas
Tech companies were frustrated that Obama ignored two recommendations by his surveillance panel
Is it possible to make any data NSA-proof?
SHARE
188
CONNECT
396
TWEET
7
COMMENT
EMAIL
MORE
SAN FRANCISCO — It used to be that tech titans such as Cisco Systems and IBM could bank on fertile markets in Asia and Europe in their quest for worldwide financial domination. Not so much anymore.

The National Security Agency, and revelations about its extensive surveillance operations — sometimes with the cooperation of tech firms — have undermined the ability of many U.S. companies to sell products in key foreign countries, creating a fissure with the U.S. government and prompting some to scramble to create "NSA-resistant" products. The fallout could cost the tech industry billions of dollars in potential contracts, which has executives seething at the White House.

"Suspicion of U.S. vendors is running at an all-time high," says Andrew Jaquith, chief technology officer at cloud-security firm SilverSky.

Cisco, IBM, Microsoft and Hewlett-Packard have reported declines in business in China since the NSA surveillance program was exposed. The Information Technology & Innovation Foundation estimates the NSA imbroglio will cost U.S. businesses $22 billion through 2016. Forrester Research pegs potential losses at $180 billion, which includes tech firms and managed service providers

The conflagration took on political tones this month when German Chancellor Angela Merkel — whose mobile phone was tapped by U.S. spy agencies — said she would press France President Francois Hollande to back a push for EU-based alternatives to the current U.S.-dominated Internet infrastructure.

"We'll talk with France about how we can maintain a high level of data protection," Merkel said in her weekly podcast in mid-February. "Above all, we'll talk with European providers that offer security for our citizens, so that one shouldn't have to send e-mails and other information across the Atlantic."

The situation is more combustible at home. Disclosures that the NSA routinely cracked encryption, or data-scrambling, technology has heightened the anxiety of industry leaders. But in their pursuit of NSA-proof products, they've alarmed some intelligence officials, who argue that without the ability to break encryption and create "back doors" to enter computer systems abroad, the USA would be disarming at a moment of heightened cyberconflict.

During a speech on NSA reforms on Jan. 17, President Obama angered tech leaders when he did not embrace two recommendations by a panel he appointed to review the surveillance that are of pressing concern to Silicon Valley and the business community. It had recommended the NSA "not in any way subvert, undermine, weaken or make vulnerable" commercial software, and that it move away from exploiting flaws in software to conduct cyberattacks or surveillance.

NSA-resistant products

Many tech companies feel they have no choice but to try to develop NSA-resistant products because customers from China to Germany threaten to boycott American hardware and cloud services they view as compromised.

It's already happening, with large corporate deals either lost or in danger of falling by the wayside.

The United Arab Emirates is threatening to scrap a $926 million intelligent-satellite deal with two French firms unless they remove U.S.-built components. The UAE fears the equipment would contain digital backdoors that compromise the security of data.

About 25% of 300 British and Canadian businesses surveyed by Canadian cloud firm Peer 1 Hosting said they intend to move their computer-hosting operations out of the U.S.

While Internet service providers question the practicalities of how e-mail between the U.S. and other countries would work in such an undefined new service suggested by Merkel, American tech companies caution secure regional networks would fragment the Internet.

With the exception of Microsoft — which says it will let overseas customers have personal data stored on servers outside the U.S. — tech companies such as Facebook and Google have opposed such private European clouds. Their fear: Regional data systems could Balkanize the Internet and undercut its efficiency.

Because they are not U.S. companies, "larger telecoms in Europe can rapidly take advantage of the situation," to the detriment of a Google, Yahoo and Dropbox, says Eric Cowperthwaite, vice president of advanced security and strategy at Core Security.

Silicon Valley's biggest players are loath to publicly discuss their efforts to counter government snooping, but several have taken significant steps.

Yahoo plans to have all its data encrypted by March to make it more difficult for unauthorized parties to decipher data. Google intensified its program to encrypt data passed between data centers — physical facilities scattered across the globe that house computer systems — and telecommunications and storage systems. It also employs network links between data centers that run at high speeds — typically on its own fiber-optic lines — that are harder to tap, according to a source familiar with the company's plans but not authorized to speak publicly about them. Facebook has added an encryption method that limits access to data even if a security key is breached.

Start-ups such as SGP Technologies, meanwhile, have created products such as BlackPhone, touted as one of the most secure smartphones ever. Others are looking into ways to more efficiently encrypt — or scramble — data that's stored on hard drives, network storage devices and clouds. But nothing is impenetrable, especially if faced with a court order or determined hackers, says Carson Sweet, CEO of CloudPassage, a 4-year-old cloud-security company.

"The only way to really make anything that is NSA proof is to not have it connect to the Internet," says Domingo Guerra, co-founder of Appthority, which helps organizations analyze iOS and Android apps for security risks. "There are several apps that are self-contained and don't need to send and receive data to online servers to operate."

Customers need to be aware that as much as they might worry about the NSA, the agency can always use its signals-intelligence capabilities and links with broadband carriers to understand who, when and how often parties communicate without knowing what the contents actually are, says SilverSky's Jaquith.

Analyzing that "metadata" remains the most powerful tool in the NSA arsenal — and it will continue to be so regardless of whatever "NSA-proof" gear vendors convince customers to buy, he says.

Safer in the USA?

In trying to avoid the prying ears and eyes of the NSA in America, companies may face a worse situation overseas.

"Where is the safest place to house your data? It may be the United States," says Trevor Timm, executive director of Freedom of the Press Foundation. "The natural reaction is to move outside the U.S. if you are trying to get away from the NSA. But mass surveillance happens with more frequency overseas, because the NSA thinks there are little to no legal protections for data overseas."

Indeed, the NSA secretly spied on the main communications links that connect Google and Yahoo data centers around the world, according to a report in The Washington Post last October.

Every country has its rationale for digital snooping, says Matthew Prince, CEO of CloudFlare, maker of a website security product. "In the U.S., it's terrorism; in Germany, it's hate crimes."

"Unless you are a nation-state, there aren't any nation-state proof products," says Greg Young, a network security analyst at market researcher Gartner. "Some operating systems and browsers we see having a lot of exploits used on them today got their start as small alternatives. ... But as they grew in popularity, they, too, entered the mainstream and became the targets of general attacks."

SHARE
188
CONNECT
396
TWEET
7
COMME
BillRM
 
  2  
Fri 28 Feb, 2014 10:02 pm
Quote:


http://arstechnica.com/tech-policy/2014/02/nsa-head-floats-idea-what-if-we-only-gathered-terrorist-communications/


NSA head floats idea: What if we only gathered terrorist communications?
Gen. Keith Alexander raises possibility of reining in NSA's metadata program.

by Cyrus Farivar - Feb 28 2014, 6:20pm EST
GOVERNMENT PRIVACY
39




The outgoing head of the National Security Agency, Gen. Keith Alexander, told a United States Senate committee on Thursday that he was open to government spooks narrowing the focus of the metadata that they gather.

The NSA’s chief’s brief comment (which came at 51’30” in the recorded session) was in response to a question from Sen. Carl Levin (D-MI), the chairman of the Senate Armed Services Committee, concerning how telephone metadata is gathered and stored.

At present, the NSA's dragnet metadata program routinely collects the to/from information, date, and time of all Verizon calls (and presumably calls from other carriers as well). It was the first secret scheme revealed as a result of the documents leaked by whistleblower Edward Snowden last summer. Since then, this intelligence gathering operation has been the subject of much debate in Washington, DC.

“Chairman, I think there are three options that you put on the table,” Alexander said. “You mentioned the government holding it, the ISPs holding it. I think there is yet another option where we look at what data you actually need and only get that data. Can we come up with a capability that just gets those that are predicated on a terrorist communication? I think you have those three options that I’ve put on the table. Those are three of the ones that I think need to be clearly discussed and the merits from both sides, they have pros and cons on the agility that you would have with the program.”

In a speech in January 2014, President Barack Obama ordered the NSA to give up its vast control of a controversial (and perhaps even ineffective) database of telephone metadata. The NSA and other intelligence agencies will now be required to get a court order to access the data. The president added that the attorney general would work with the Foreign Intelligence Surveillance Court to determine a new method for accessing the data before the metadata program comes up for reauthorization at the end of March.

Gen. Alexander has a notorious reputation in the intelligence community for pushing the “collect-it-all” tactic.

In a July 2013 profile of the general in the Washington Post, an anonymous intelligence official discussed how Alexander orchestrated the vast data collection of Iraqi telecommunications as a way to thwart terrorist attacks against US troops in Iraq.

“Rather than look for a single needle in the haystack, [Alexander’s] approach was, ‘Let’s collect the whole haystack,’ ” the anonymous source said. “Collect it all, tag it, store it. . . . And whatever it is you want, you go searching for it.”

Similarly, another anonymous official told Foreign Policy magazine in September 2013: "Alexander's strategy is the same as Google's: I need to get all of the data. If he becomes the repository for all that data, he thinks the resources and authorities will follow."
0 Replies
 
JTT
 
  1  
Fri 28 Feb, 2014 11:12 pm
@BillRM,
From this, Bill, it seems that not even Tor and the other things you have in the past memtioned help.
BillRM
 
  1  
Sat 1 Mar, 2014 03:52 am
@JTT,
Quote:
From this, Bill, it seems that not even Tor and the other things you have in the past memtioned help.


Layer of defenses are always helpful as it add great cost for them when it come to doing spying and tend to stop casual mass spying however if you are an individual target of important to the government then you are in a world of hurt.

But not even the US government have the resources to park a van for example full of highly train people and expense equipment outside more then a few hundreds homes.

I have no idea if the government can somehow break into a computer with a hard drive protected by Truecrypt for example but I am sure that it would be very costly for them to do so assuming they can.

So I am more then willing to have them seize a cheap netbook at the border and let them employ and waste those resources in trying to break my security.

Next the Apple OS problem that just came to light that allowed a man in the middle attacked on SSL connections is no good if you are also employing pgp encrypting on top of an SSL connection so once more layer your security.
JTT
 
  1  
Sat 1 Mar, 2014 05:31 am
@BillRM,
Thanks, Bill. That's important for frank Apisa to know. Smile
BillRM
 
  1  
Sat 1 Mar, 2014 01:59 pm
@JTT,
Poor Frank as now he know that the UK government have all his sexual video chats with IZZ and others...... Razz
 

Related Topics

Obama '08? - Discussion by sozobe
Let's get rid of the Electoral College - Discussion by Robert Gentel
McCain's VP: - Discussion by Cycloptichorn
Food Stamp Turkeys - Discussion by H2O MAN
The 2008 Democrat Convention - Discussion by Lash
McCain is blowing his election chances. - Discussion by McGentrix
TEA PARTY TO AMERICA: NOW WHAT?! - Discussion by farmerman
 
  1. Forums
  2. » Snowdon is a dummy
  3. » Page 324
Copyright © 2025 MadLab, LLC :: Terms of Service :: Privacy Policy :: Page generated in 2.4 seconds on 01/15/2025 at 10:02:06