Treasure Map: NSA, GCHQ Work On Real-Time "Google Earth" Internet Observation 267
wabrandsma) writes with the latest accusations about NSA spying activity in Germany.
According to top-secret documents from the NSA and the British agency GCHQ, the intelligence agencies are seeking to map the entire Internet.
Furthermore, every single end device that is connected to the Internet somewhere in the world — every smartphone, tablet and computer — is to be made visible. Such a map doesn't just reveal one treasure. There are millions of them. The breathtaking mission is described in a Treasure Map presentation from the documents of the former intelligence service employee Edward Snowden which SPIEGEL has seen. It instructs analysts to "map the entire Internet — Any device, anywhere, all the time." Treasure Map allows for the creation of an "interactive map of the global Internet" in "near real-time," the document notes. Employees of the so-called "FiveEyes" intelligence agencies from Great Britain, Canada, Australia and New Zealand, which cooperate closely with the American agency NSA, can install and use the program on their own computers. One can imagine it as a kind of Google Earth for global data traffic, a bird's eye view of the planet's digital arteries.
Furthermore, every single end device that is connected to the Internet somewhere in the world — every smartphone, tablet and computer — is to be made visible. Such a map doesn't just reveal one treasure. There are millions of them. The breathtaking mission is described in a Treasure Map presentation from the documents of the former intelligence service employee Edward Snowden which SPIEGEL has seen. It instructs analysts to "map the entire Internet — Any device, anywhere, all the time." Treasure Map allows for the creation of an "interactive map of the global Internet" in "near real-time," the document notes. Employees of the so-called "FiveEyes" intelligence agencies from Great Britain, Canada, Australia and New Zealand, which cooperate closely with the American agency NSA, can install and use the program on their own computers. One can imagine it as a kind of Google Earth for global data traffic, a bird's eye view of the planet's digital arteries.
it's over: the media (in the US) have moved on. (Score:5, Insightful)
The last 4 or 5 major disclosures from Snowden documents have gone unreported in the mainstream US press. Sure, you can find them on some more off the path sites, but the mainstream press has moved on. It's not as important as (from current CNN site): "Is this a spaceship or super mall?", or "5 ways to think yourself well!"
As far as the vast, vast majority of the public is concerned, it's over. Forgotten. Our cultural attention span was exhausted, and nothing happened. The chance of serious change now - like disbanding the organization and arresting those responsible for widespread constitutional violations - is now zero.
And they know it.
Re: (Score:1)
Re: (Score:2)
Re: (Score:2)
http://nmap.org/book/man-versi... [nmap.org]
Re:it's over: the media (in the US) have moved on. (Score:5, Informative)
The press can now understand that turning off a phone can be seen as getting ready to meet a contact.
Anyone in the same area at the same time who turns off their phone might be that contact. Kind of a short list
The press is more aware of been under constant surveillance.
Treasure Map just adds to the collect it all idea and that digital entry or exit points can be fully reconstructed or are always been tracked.
Thats a lot of expensive effort to put into signals intelligence considering what most skilled nations fully understood about global telephone and computer networks going back over decades.
Re:it's over: the media (in the US) have moved on. (Score:4, Interesting)
A gov or mil may wish to map out the path taken by a member of the press A person turns their phone off in the same area and then both phones are turned on again moving away from each other later?
Kind of easy to track the members of the press still covering gov and mil stories in person per city.
If one person left their phone battery in thats a live malware or telco activated mic in real time. Treasure Map would be fun for the office computer, home computer, any devices on the move.
Re: (Score:2)
Tinfoil-lined phone cases will be a growth industry. Ditto spoofing software, data poisoning software, etc, etc.
Re: (Score:1)
Just leave the damn thing at home.
Re:it's over: the media (in the US) have moved on. (Score:4, Insightful)
Or simply temporarily leaving them behind? I'd leave my phone on the desk in my office if I was going to meet a contact I didn't want associated with me...
Re: (Score:2)
Or simply temporarily leaving them behind? I'd leave my phone on the desk in my office if I was going to meet a contact I didn't want associated with me...
Sure, but when the RFID tags in your tires are noted going under an overpass and the tollbooth notes your EZPASS... all combined with your cell phone not being seen, you will stand out for immediate black helicopter inspection.
Don't forget about all of the cameras...
Re: (Score:2)
Your pithy, quotable wisdom notwithstanding, that's why you have a locking drawer in the desk :D
Re: (Score:1)
The chance of serious change now - like disbanding the organization and arresting those responsible for widespread constitutional violations - is now zero.
There was and still is a chance of serious change. There was and still is essentially no chance of NSA being disbanded and all its members being frog marched out in handcuffs. That is a silly fantasy based on a basic misunderstanding of the Constitution, statutory law, the courts, the political process, and plenty of other things.
Re: (Score:1)
You think it started with this? US media didn't even want to report on the issues with Obama, rather all they wanted to do was sing about his racial background without doing any digging. Media in the US has long since moved from "providing information and letting you make a choice" to "telling you their point of view, framed as news." This is why Journolist [wikipedia.org] existed.
As for cultural attention span being exhausted? Hah no. Rather the media is doing it's best to try and change the viewpoint on anything tha
Re: (Score:2)
Fits. The rest of the world is better, fortunately. The US is looking more and more like everybodies enemy.
Re: (Score:2)
Some of our governments look at what the USA is doing and salivate and of course the rest of the 5 eyes play right along.
Re: (Score:2)
Well, every good bureaucrat secretly dreams of being a fascist.
Re: it's over: the media (in the US) have moved on (Score:1)
Re: (Score:2)
We have known for a long time that the war won't be won by convincing governments to behave and hold those responsible accountable. We have to fix the internet by making it secure and mass surveillance too expensive or impractical. As long as engineers pay attention there is still hope.
What worries me is that Der Spiegel contacted the victims and they said they couldn't find any problems. Maybe GCHQ/NSA backed off, knowing they were likely to be discovered now. Maybe they just couldn't find the bugged hardw
Re: (Score:2)
Understanding your logic, The Spiegel must be republican-biased then. Interesting.
From looking for people to collecting it all (Score:2)
Wifi, VPN, implanted OS or hardware devices, pubic, private, down to MAC address as expected.
Sorting by Infected hosts or Tor router?
All part of collect it all
So they'll suffer from TMI (Score:5, Informative)
Too Much Information (TMI) can be as big a problem as too little information.
With all that information, you can get a false sense of security that you know enough and get bitten.
With all that information, you tend to focus on what you see and not what you don't - you develop tunnel vision.
With all that information, resources that could have been devoted elsewhere are taken up sorting out the trash and the false positives.
Blank spots stay blank. Example - Android phones have had NFC since Gingerbread, so if two operatives want to exchange data (photos of a target, NSA documents, etc), they can do it in person just by using Android Beam or Bump-to-Exchange, without saying a word to each other, just standing in line to pay for a newspaper.
Re: (Score:3)
The Internet of Things will be of help for this. We need hacks so that everything sends out random information. If they want information, let's drown them in a sea of it.
Re: (Score:1)
Your friend,
Verizon
Re: (Score:2)
Start now - install orbot onto your android phone, and make sure it's set to start at boot time. Even if you don't pipe any information down the proxy, at least there'll be yet another Tor log on going on that they have to watch.
Re: (Score:3)
Signals gathering expects the world to be using this generations ww2 ENIGMA like network over decades - tame telco crypto networks and internet will bring back lots of useful data as all other nations are not careful.
The interview with whistleblower William Binney: 'The NSA's main motives: power and money' (19.08.2014)
http://www.dw.de/binney-the-ns... [www.dw.de]
"Money. It takes a lot of money
Consider it done (Score:2)
Re: (Score:2)
TMI is only a problem is you do not know whom to target. If you want, say, to eliminate a political activist or a foreign corporation, targeting is easy and TMI does not apply. Or if, in the longer term, you want some not conservative enough person from becoming president or a supreme-court judge, all the information is easily accessible and these people can be stopped without the public even knowing. Sounds scary? This is a primary reason to establish a surveillance state: Retaining power and undermining t
Re: (Score:2)
Blank spots stay blank. Example - Android phones have had NFC since Gingerbread, so if two operatives want to exchange data (photos of a target, NSA documents, etc), they can do it in person just by using Android Beam or Bump-to-Exchange, without saying a word to each other, just standing in line to pay for a newspaper.
\ Or you can, you know, just swap a paper envelope full of printed documents. This solution to this problem has already be in use for centuries...
Re: (Score:2)
Except printers put in identifying information into their printed pages [eff.org].
Although AFAIK crayons and/or markers are not identifiable...
Re: (Score:3)
TMI isn't a thing if everything is digital. Machine learning classification techniques (go look up something as simple as maximum entropy) can do a great job of identifying classifications with high accuracy. What is being classified? Well, presumably whatever "they" think are threats to the nation, or at least to whoever has control of the system. One can analyze the behavior of targets deemed a threat and find common features shared between those targets. Even stuff a human would never, ever think to corr
No, they won't. (Score:2)
Have you heard the good news about Big Data? It's, like, the new thing.
Re: (Score:2)
That works until people refuse to back down over what others think they should be embarrassed about. Just as open source has benefits, so does "open life," one benefit being that you simply can't be coerced by threats to do something or "they" will reveal some "terrible secret."
Case in point: Last fall a developer at a public meeting attended by over 100 of my neighbours outed me as a transsexual when I spoke out against their plans. Totally illegal, and backfired on them when I forced them to take ou
Re: (Score:2)
Thank you. I certainly believe in free speech - but I also believe that nobody has the right to try to shut me up by outing me to over 100 of my neighbors. That was attacking the messenger instead of the message, and like all such attacks was intended to stifle free speech - in this case, a point-by-point analysis of how what they were doing was blatantly illegal (and the court sided with me and two of my neighbors who didn't cave in to the threats and pressure tactics).
It almost worked too. I was tot
Re: (Score:2)
If "words are nothing", as you posit, then free speech, which is composed of words, is also nothing. Ditto for the term "free speech".
Free speech does not exist in a vacuum. It is not a license to hurt others, at this impinges on others freedoms, as well as, in some cases, their personal safety. Should people not be held accountable when they lie for profit, in the name of "free speech?" They're free to lie, and free to be punished for it. See the difference?
Should people not be held accountable fo
they already do this to real-world (Score:1)
Holographic surveillance w/ satellites and radar being going on for some time. w/ full city, home, body, brain, object scans, so nothing is secret or hideable.
http://patft.uspto.gov/netacgi/nph-Parser?Sect1=PTO1&Sect2=HITOFF&d=PALL&p=1&u=%2Fnetahtml%2FPTO%2Fsrchnum.htm&r=1&f=G&l=50&s1=5859609.PN.&OS=PN/5859609&RS=PN/5859609 [uspto.gov]
http://patft.uspto.gov/netacgi/nph-Parser?Sect2=PTO1&Sect2=HITOFF&p=1&u=%2Fnetahtml%2FPTO%2Fsearch-bool.html&r=1&f=G&l=50 [uspto.gov]
Come for the info porn. . . (Score:1)
Technical Perspective (Score:2, Interesting)
how are they going to monitor every device? pings? imagine the traffic overhead for that?
will the NSA have to pay to be in the "fast-lane"?
what about Dynamic IP's ? how often will they monitor those changes?
Re: (Score:2)
Average phone companies can keep all details on all calls connected over many years.
Nations have the data split in real time, the ip, get help from the tame telcos and fully understand the internet crypto as used.
Collect everything surrounding all message, keywords and usage, save and sort. Find people been tracked connecting to new people, trace the hops and then add in all the new people to trace.
Re: (Score:2)
You have a second network that transfers the surveillance information. Expensive, but nothing it to good or too expensive to establish a global surveillance-state.
How is that even possible? (Score:2)
Re: (Score:2)
That's the thing. This initiative probably won't help track down hard core terrorists or most pedophiles, unless they're also complete idiots. But that 15-year-old that just grabbed a copy of Kung Fu Panda off the Pirate Bay is screwed for life.
Re: (Score:2)
That seems to be the intention behind this. They also drive cost of doing business up around the globe, making everybody poorer. If that is not evil, then I do not know what is.
Re: (Score:2)
Here's the other thing. This is either a fool's errand or bullshit/wild exaggeration. It's probably impossible and certainly impractical to make a complete map of the internet.
Shocker, a federal agency is executing its mandate (Score:1)
Re: (Score:2)
Not too well. It seems they have stopped zero terrorists so far. But if you think that their mandate is actually spying on ordinary people and economic espionage, then yes.
Re: (Score:2)
Actually, no one (outside the agency) knows what the NSA's mandate really is. Their charter was signed in secret by Truman and classified. The Senate Intelligence Committee had to beg and plead to eventually be allowed to see it.
Past all the NATed machines. hmm (Score:4, Insightful)
Re: (Score:2)
There has been quite a bit of research identifying machines behind NAT. Have a look in the literature. Of course, it only works for small installations. With large numbers of hosts behind NAT, you need to penetrate. For banks, insurance companies, large hospitals, governments, etc. I am sure the NSA has achieved that globally, as their security typically sucks.
Re: (Score:2)
What network data a business, university or household sends can be looked at in real time for keywords, voice prints or people been tracked.
Treasure Map provides a much better/deeper understanding of the local network than just ending at an
Tame software, tame hardware, junk weak crypto, the t
Re: (Score:2)
One good thing is there (Score:2)
Now, nobody can claim that they will not get attacked. There is this global, ethically-challenged attacker that does sabotage and industrial espionage and leaves targets vulnerable to other attackers as well because they are not perfect (far from it, they just have tons of money). So in the long run, this might do wonders for IT security in general, even if that revolution may come from countries not too friendly towards the US. Of course, the British run with the big bully, but everybody else is getting mo
Re: (Score:2)
I like your thinking.
Time for the voyage to hyperboria? (Score:1)
Nope, just submit an information request. (Score:2)
I think it has been shown that they lack the technical knowledge to do the kind of science fiction hacks the media all gets in a tizzy about. They have show time and time again, that they do not need any such hacks anyway, as they can simply force companies to comply with handing over information by law.
I mean why spend time developing the super widget to spy on everyone, when you can coerce any company they owns the applications, hardware, or infrastructure to do your bidding for you. Heck they will build
Re: (Score:2)
First, your MAC address is not transmitted past the first hop in the network so it never gets anywhere to be of any use to anyone.
Second, what is APK? Using abbreviations is great except when it is one you dreamed up yourself and no one else knows WTF you are talking about.
Re:This must work by MAC addresses... apk (Score:5, Funny)
He will respond to this and any following posts with "learn to read", "you're projecting", "I'm not APK, but he's my hero", re-post the same reply 7 times, etc., etc., etc. until the time_t's wrap around or he has the last post in every sub-thread.
Hey Kowalski, I thought I told you to fuck off and not come back!
Re: (Score:2)
Thanks for enlightening me. I thought from the post that APK was something meaningful.
Re:This must work by MAC addresses... apk (Score:4, Informative)
This is APK
http://www.thorschrock.com/200... [thorschrock.com]
A clueless, witless idiot that uses threats to try to get his way.
Tactless, incorrect (the fact he mentions MAC addresses of modems proves he doesn't know jack shit, when that only identifies a gateway device, not an actual user, much like an IP address,) clueless, bull-headed, autistic child without a fucking clue. This is why he has to post AC on Slashdot and why he is banned from Wikipedia.
Wikipedia (Score:2)
I'm not banned on wikipedia: I can edit there all I like ...
Yes! I remember that. How'd it go again?
Thank you for coming to the talk page to discuss this. Your additions have been removed (twenty times now) because they are not suitable... [wikipedia.org]
Re: (Score:3)
Re: (Score:3)
Second, what is APK? Using abbreviations is great except when it is one you dreamed up yourself and no one else knows WTF you are talking about.
Otherwise known as "The HOSTS file troll." (Google for "hosts file troll apk") Stuck in the '90s, attacks anyone who makes fun of his "solution" by using multiple anonymous accounts. Real name Alexander Kowalski. Demonstrates traits of narcissism, transphobia, etc. Post something negative about his obsolete "HOSTS file solution" and watch the resulting crap-flood.
Re: (Score:2)
I wrote:
Otherwise known as "The HOSTS file troll." (Google for "hosts file troll apk") Stuck in the '90s, attacks anyone who makes fun of his "solution" by using multiple anonymous accounts. Real name Alexander Kowalski. Demonstrates traits of narcissism, transphobia, etc. Post something negative about his obsolete "HOSTS file solution" and watch the resulting crap-flood.
You wrote ... the same old outdated crap as always ...
Thanks for proving my point. BTW, I wasn't the anon poster you replied to elsewhere. I have neither the time nor the interest to post anon. Unlike you, who has no choice except to post anonymously. BTW, you might want to read the results of googling "hosts file troll apk". You have quite the reputation of being a net-kook.
Re: (Score:2)
Neither one of those posts calling you a pedo is mine. I have no knowledge of that one way or another, and frankly, I don't care. That's between you and the cops.
But the editors have my permission to verify the IP addresses of the anon posts you claim are me, and to publish their conclusions, just as I offered the last time you falsely accused me of sock-puppetry.
Oh, and thanks for confirming your transphobia (transtesitcle? Come on ...). There's no secret that when I was outed on slashdot, I chang
Re: (Score:2)
Hi ho, hi ho, time to play whack-the-troll ...
Seriously, neither of those accounts has been active for more than 2 years - since I went pretty much blind. And I've never been one to mod myself up. No need to. Just like calling you a net-kook isn't libelous when at the time you were crap-flooding my posts because I had insulted your whole "hosts file is teh absolutely bestest thing evah", or did you forget that you're the one who started it all. I attacked the message. You, on the other hand, attacked
Re: (Score:1)
MAC address doesn't go onto the network, period. It's too bad a HOSTS file can't stop Flash, and Browser Helper Objects, and Persistent Cookies.
Re: (Score:2)
Probably using something like supercookies [wikipedia.org].
Re: (Score:3)
Go ahead and spoof your IP and MAC. See how well you can send and receive data online.
Hint: If you're receiving data back via IP protocols, your IP is visible/traceable.
Hint: If you're receiving data back on Ethernet networks, your MAC is visible/traceable.
The ISP you connect to has a log of what IP was assigned to what connection at what time, along with where their control of that connection terminates.
What you want to be doing is using connections that aren't associated with you in any way, and are no
Re: (Score:1)
"What you mention is WHY they have you register any modems you buy that aren't theirs into THEIR network (for tracking purposes)."
I haven't had to register the last two devices of mine. In fact, that's why I've got two full-speed connections for the price of one.
Re: (Score:1)
Uh, yea. Charter.
Magic trick? Get different services that require different boxes (cablecard/net, phone/net, super-speed net.) Then swap out boxes with your own (excepting phone/net modems.) Then cancel in a specific order, leaving only the internet up. All boxes have internet access. Dual 100mbit and a 60 mbit line, for the price of 60 mbit plus phone.
You're so useless it's funny. What're you gonna do, threaten to sue me for libel when your sorry ass has no leg to stand on being proven time and time again
This has gone way beyond "national security" (Score:1)
The guise of national security ...
If the "five eyes" limit their surveillance on the people of their respective five countries the 'national security" argument could still be applied
But what TFA is describing has gone way beyond their respective national border. Their aim is to extend their authoritarian control over THE ENTIRE WORLD and this is the one thing that the whole world must reject
Not since the dawn of time _any_ one entity has the control of the entire planet - As a comparison, even the largest empire ever was, the British Empire
Re: (Score:2)
Then they might have to give numbers and it might turn out that these people are by far not the threat they have been made out to be. Or rather that the problem is people abusing children, and not those downloading illegal pixels from the Internet. And then they might have to do something about it. Which they do not want, as that removes their straw-man. The US government depends on criminals of all sorts being active, to scare the population. So they can never do anything effective about crime, like, you k
Re: (Score:2)
The guise of national security.
So what purpose is it for? Governments come and go, executives come and go, ultimately one day the people making the decisions on these things will no longer control them and they know that so if it's some big massive conspiracy they are going to be victims of it too.
Re: (Score:2)
I'll mount an ass on my roof with a sign that says "Kiss This"
Re: (Score:3)
I don't see any freedoms being preserved here.
Sure, there are lots of nasty people like pedos online. And I support law enforcement in their reasonable efforts to remove them. But aside from soothing my conscience, whether some people are downloading kiddie porn or not doesn't affect me.
Re: (Score:1)
Do you see any freedom taken away because of surveillance?
We are used to hide and lie in order to escape punishment, and of course surveillance will make it a lot harder to successfully hide and lie, but surveillance by itself has nothing to do with freedom. Someone watching you masturbate with pictures of young boys naked will not prevent you from doing it.
What takes your freedom away is not surveillance, it's not even the police, it's the law. Surveillance and the police are just tools, they're not the s
Re:Why do you hate freedom? (Score:5, Informative)
The surveillance puts a damper on free speech, it's hard to freely communicate knowing the government can be listening in. This is especially true for dissenting political speech, whether you're part of the opposition party or more extreme the possibility that the government can be listening in dampens. The government is quite capable of screwing you if you come to its attention as a threat of any kind. Whether digging into your tax situation, spreading mis-information or setting you up for a criminal investigation.
Re: (Score:2)
This.
Plus I don't need some crooks (Congress, competitors with deep pockets) looking over my shoulder and front-running any of my venture capital deals.
You think Snowden was a unique case? Not by a long shot. The only difference between him and many other people scraping up NSA data is that he released it to the public instead of handing it to some buddies in exchange for Hookers 'n Blow.
Re: (Score:2)
So you're acknowledging that it is the coercion and threats thereof which are the chilling mechanism; not the surveillance per se.
Re: (Score:2)
Huh? They go hand in hand, without the surveillance wouldn't have to worry about the coercion and threats and why do the surveillance unless looking for dirt.
Re: (Score:1)
When people think of surveillance, it's always with the Orwellian model in mind. The problem with Orwell is that he had no idea something like the Internet would ever exist. He had no idea everyone would constantly have a camera on them, with the ability to immediately share everything with everyone. Because of that, his vision is now more or less obsolete.
So instead of the obsolete Orwellian model, imagine a world where surveillance is so common that even the government or anyone with power, even your bos
Re: (Score:2)
How can those person screw you?
They can screw you quite easily because they're the ones in control of the surveillance and the power. Do you really expect those in power to let us know that they've done anything unlawful?
Seems like a circular argument (Score:5, Insightful)
What takes your freedom away is not surveillance, it's not even the police, it's the law. Surveillance and the police are just tools, they're not the source of the problem. If you want to fight for your freedom, fight the source of the problem.
The law and the tools enforcing the law are parts of the same whole. Neither can co-exist without the other. A law which is not enforced is just a meaningless scribble. A policeman without the authority granted by the law is just a hired gun. Conducting surveillance without legal authority is being a peeping tom.
Fighting the tools is just as important as fighting the source. The tools are what enables the unjust laws. The Prohibition was ultimately ineffective because the masses decided to ignore the law.
Re: (Score:1)
A knife can be used to commit murder. Should we fight knives?
You are obviously wrong when you say surveillance can't exist without the law. Like knives are not used only to commit murder, surveillance is not used only to enforce the law. We all use some form of surveillance everyday to get and verify information and it has nothing to do with us wanting to enforce the law. Even my cat use surveillance everyday and I can assure you it doesn't care much about the law.
Also, I find quite strange that you seem to
Re: (Score:2)
You confuse an object with wide range of utility and a limited set of nefarious uses, a knife, with a system of technology and techniques with a limited range of utility and vast capability for misuse (mass surveillance). I suspect the annual proportion of illegitimate knife use to legitimate knife use is so low, it would look stupid to even write it out.
If we round up substantially, we get about 2000 knife murders per year in the US. http://www.economicpolicyjourn... [economicpo...ournal.com] There are roughly 300,000,000 people.
Re: (Score:2)
The State of Colorado seems to be profiting from weed rather successfully - something like $7 million a month in state income (tax, licence, etc)
Re: (Score:1)
If you want to fight for your freedom, fight the source of the problem.
How do you fight against the universe?
Re: (Score:2)
So you wouldn't mind if videos of your own kids * being raped were being passed around?
* Or, this being slashdot, your nieces/neighbour's kids or whatever.
Re: (Score:2)
So you wouldn't mind if videos of your own kids * being raped were being passed around?
What does tht have to do with mapping every device on the Internet?
First of all, kiddie porn isn't an NSA, GCHQ problem. That's for the FBI, local law enforcement and their foreign equivalents to pursue. NSA and GCHQ are primarily involved with monitoring their respective internal populations for the purpose of political control and suppressing dissent. Unfortunately they seem to be co-opting local law enforcement into supporting their mission rather than pursuing criminal activity, including kiddie porn.
Re: (Score:2)
Cackle (Score:2)
It's a quote any 'terrorist' could make. It's a quote that would make out anyone who made it a 'terrorist'. Could you be?
Re: (Score:2)
In the end, the "freedom to be free" will be all that remains, but if will not be a freedom you can actually use as that would make you a "terrorist". Have fun in the 4th Reich! As the US is a bit larger than Germany, this time it will take economic collapse to remove the fascism. Can take 100 years or more. Or they might succeed in building a 1000 Year Reich.
Lets begin at the top (Score:3)
Sure, let us begin by taking away the government's freedom to legislate such insanity. If the system is rigged and broken, break the system.
This quote from Thomas Jefferson seems apt :-
"God forbid we should ever be twenty years without such a rebellion. The people cannot be all, and always, well informed. The part which is wrong will be discontented, in proportion to the importance of the facts they misconceive. If they remain quiet under such misconceptions, it is lethargy, the forerunner of death to the public liberty. ...And what country can preserve its liberties, if its rulers are not warned from time to time, that this people preserve the spirit of resistance? Let them take arms. The remedy is to set them right as to the facts, pardon and pacify them. What signify a few lives lost in a century or two? The tree of liberty must be refreshed from time to time, with the blood of patriots and tyrants. It is its natural manure."
Re: (Score:2)
Thomas Jefferson was a dangerous fool, this country would do well to forget him.
Re: (Score:1)
I think we can really fuck with them. Chaff, deception traffic...
Let's get started on making more hay for their stacks, people! Hell. You'll run a client for SETI, why not run one to preserve your intelligent life, here on Earth!
Re: (Score:3)
But you have cookies, and browser fingerprints, and logons, and device ID / Application ID info...
Riding on a free uplink doesn't do jack.
Re: (Score:2)
I can "ghost" MAC on every OS known to man - practically. Most of those with a Berkeley-derived TCP stack are /dev/device lladdr xx:xx:xx:xx:xx:xx
sudo ifconfig
What we want here is not to just selfishly hide - but to pollute their collection with billions of plausible "false positive" pseudo computers and mobiles.
Re: (Score:2)
There are already a number of index cases where people had illegal pornography placed on their systems by hackers. Hence it is already a valid defense in some countries.
Re: (Score:2)
Fortunately, in short order nobody will say anything critical of the "authorities" anymore, and "order" will be restored to society. That the economy will also go down the drains is an unfortunate side-effect, but better have "order" (and "security"!) than, say, enough to eat. You have to set the priorities right!
Re: (Score:2)
At the present time, you are, of course, entirely correct!
Re: (Score:2)