- 46,801
- 99,977
Get ready to have your biometrics tracked 24/7 (Wired UK)DAVIS: Is there anything you could do in your position as Chairman of the Intelligence Committee to find answers about this, if it is in fact going on?
ROCKEFELLER: Don't you understand the way Intelligence works? Do you think that because I'm Chairman of the Intelligence Committee that I just say I want it, and they give it to me? They control it. All of it. ALL of it. ALL THE TIME. I only get - and my committee only gets - what they WANT to give me.
"I've been working in biometrics for 20 years, and it's reaching a tipping point where it's going to be impossible not to understand where people are and what they are doing. Everything will be monitored. It's part of the reason why when we put together the definition of biometrics it included biological and behavioural characteristics -- it can be anything."
Security industry pioneer RSA adopted not just one but two encryption tools developed by the U.S. National Security Agency, greatly increasing the spy agency's ability to eavesdrop on some Internet communications, according to a team of academic researchers.
Reuters reported in December that the NSA had paid RSA $10 million to make a now-discredited cryptography system the default in software used by a wide range of Internet and computer security programs. The system, called Dual Elliptic Curve, was a random number generator, but it had a deliberate flaw - or "back door" - that allowed the NSA to crack the encryption.
A group of professors from Johns Hopkins, the University of Wisconsin, the University of Illinois and elsewhere now say they have discovered that a second NSA tool exacerbated the RSA software's vulnerability.
The professors found that the tool, known as the "Extended Random" extension for secure websites, could help crack a version of RSA's Dual Elliptic Curve software tens of thousands of times faster, according to an advance copy of their research shared with Reuters.
While Extended Random was not widely adopted, the new research sheds light on how the NSA extended the reach of its surveillance under cover of advising companies on protection.
In Iraq, for example, the National Security Agency went from intercepting only about half of enemy signals and taking hours to process them to being able to collect, sort and make available every Iraqi email, text message and phone-location signal in real time, said John "Chris" Inglis, who recently retired as the NSA's top civilian.
What makes this morning's disclosure most remarkable is what happened with last week's Washington Post report on the MYSTIC program, which, said the Post, provides "comprehensive metadata access and content" for entire countries where it is used. The agency "has built a surveillance system capable of recording '100 percent' of a foreign country's telephone calls, enabling the agency to rewind and review conversations as long as a month after they take place," reported the Post.
NSA surveillance program reaches to retrieve, replay phone calls - The Washington PostThe program, noted the Post, has been in use in one country since 2011, and "planning documents two years later anticipated similar operations elsewhere." Specifically, the fiscal year 2013 intelligence budget identified "five more countries" in which the agency planned to implement the system.
Some of it was, sure. Some of it the capability didn't exist.I blame any and all presidents complicit in these kinds of activities. Unfortunately it has been going on since long before 9/11 in one form or another.
The Oakland County Sheriff's Office is one of about two dozen forces nationwide - and the only one in Michigan - with the $170,000 machine. So little is known about Hailstorm that even national experts will only speculate about its capabilities. The technology from Florida-based defense contractor Harris Corp. is believed to be an upgrade of Stingray, a suitcase-sized contraption that is installed in cars and used to trick nearby phones into connecting with it and providing data to police.
"We're not going to go back," Alexander said. "This is too good for mankind what we have created in these networks. We're going to move forward."
I don't disagree they didn't have the capability. That is why they literally broke into people's houses and ransacked them for information in the past.Some of it was, sure. Some of it the capability didn't exist.
I think it really undercuts the argument Snowden and Greenwald and everyone else had about releasing this stuff when they release stuff like the article fanaskin just linked, or the Huawei stuff. These are the things the agency was chartered to do, these are not encroachments on citizen's rights. And I am still waiting for someone to actually prove the RSA vulnerability. I don't doubt it, but it has been this long and no one has been able to leverage it yet outside of the NSA? Sounds suspect.
Citizens made to feel that they "are the subject of constant surveillance."