This page has been archived and commenting is disabled.

Is The NSA Quartering “Digital” Troops Within Our Homes?

George Washington's picture




 

We have extensively documented that the U.S. government is trampling virtually every single Constitutional right set forth in the Bill of Rights.

One of the few rights which we thought the government still respects is the the 3rd Amendment, which prohibits the government forcing people to house troops:

No Soldier shall, in time of peace be quartered in any house, without the consent of the Owner, nor in time of war, but in a manner to be prescribed by law.

But security expert Jacob Appelbaum notes that the NSA may be digitally violating the 3rd Amendment.

By way of background, this week Appelbaum was the main force behind an expose in Spiegel – and gave a must-watch talk – on the NSA’s systemic offensive programs to commandeer computers and computer systems, phone connections and phone systems, and communications networks of all types.

Appelbaum shows that the NSA has literally taken over our computer and our phones, physically intercepting laptop shipments and installing bugware before themselves shipping the laptop on to the consumer, installing special hardware that overcomes all privacy attempts, including “air gaps” (i.e. keep a computer unplugged from the Internet). Appelbaum also notes that spyware can suck up a lot of system resources on a computer or smartphone.

And he says this is the digital equivalent of soldiers being stationed in our houses against our will:

The parallel might not be as far-fetched as it may seem at first …

The NSA itself says that it’s in the middle of a massive cyber war. As such, malware, physical spying devices and offensive internet workarounds are literally the main troops in the NSA’s offensive cyber army.

Quartering meant that Colonial Americans had:

  • No control over when the British troops came and went
  • No say in what resources they consumed
  • And no privacy even in their own castles

Similarly, mass NSA spying means that modern day Americans have:

  • No control over when military presence comes or goes from our computer and phones (NSA is part of the Department of Defense)
  • No say in what resources the spies suck up (remember, Applebaum says that spying can use a lot of resources and harm performance)
  • And no privacy even in the deepest inner sanctuary of our electronic home base

Colonial Americans lost the quiet use and enjoyment of their homes. Modern Americans are losing the quiet use and enjoyment of our digital homes because the NSA is stationing digital “troops” inside our computers and phones.

Just as the Colonists’ homes were no longer theirs … our computers and phones are no longer ours.

 

- advertisements -

Comment viewing options

Select your preferred way to display the comments and click "Save settings" to activate your changes.
Wed, 01/01/2014 - 21:16 | 4291896 redwater
redwater's picture

The implications are staggering. If they truly have root access to smartphones.

Every employee who has a smartphone is a potential zombie that can infect their company/institutions network.

Where the NSA can inject malware into your entire infrastructure (think stuxnet).

Some the greatest acts of corporate espionage in history. Truly criminal.

Imagine Porsche getting bugged so Obama can pass along some nice intel to his Detroit buddies. Or more inside juice for Soros to close a big deal. Or manipulating markets so JPM can corale silver.

 

Wed, 01/01/2014 - 21:13 | 4291895 redwater
redwater's picture

The implications are staggering. If they truly have root access to smartphones.

Every employee who has a smartphone is a potential zombie that can infect their company/institutions network.

Where the NSA can inject malware into your entire infrastructure (think stuxnet).

Some the greatest acts of corporate espionage in history. Truly criminal.

Imagine Porsche getting bugged so Obama can pass along some nice intel to his Detroit buddies. Or more inside juice for Soros to close a big deal. Or manipulating markets so JPM can corale silver.

 

Wed, 01/01/2014 - 21:13 | 4291894 redwater
redwater's picture

The implications are staggering. If they truly have root access to smartphones.

Every employee who has a smartphone is a potential zombie that can infect their company/institutions network.

Where the NSA can inject malware into your entire infrastructure (think stuxnet).

Some the greatest acts of corporate espionage in history. Truly criminal.

Imagine Porsche getting bugged so Obama can pass along some nice intel to his Detroit buddies. Or more inside juice for Soros to close a big deal. Or manipulating markets so JPM can corale silver.

 

Wed, 01/01/2014 - 21:13 | 4291893 redwater
redwater's picture

The implications are staggering. If they truly have root access to smartphones.

Every employee who has a smartphone is a potential zombie that can infect their company/institutions network.

Where the NSA can inject malware into your entire infrastructure (think stuxnet).

Some the greatest acts of corporate espionage in history. Truly criminal.

Imagine Porsche getting bugged so Obama can pass along some nice intel to his Detroit buddies. Or more inside juice for Soros to close a big deal. Or manipulating markets so JPM can corale silver.

 

Wed, 01/01/2014 - 21:13 | 4291892 redwater
redwater's picture

The implications are staggering. If they truly have root access to smartphones.

Every employee who has a smartphone is a potential zombie that can infect their company/institutions network.

Where the NSA can inject malware into your entire infrastructure (think stuxnet).

Some the greatest acts of corporate espionage in history. Truly criminal.

Imagine Porsche getting bugged so Obama can pass along some nice intel to his Detroit buddies. Or more inside juice for Soros to close a big deal. Or manipulating markets so JPM can corale silver.

 

Wed, 01/01/2014 - 21:13 | 4291891 redwater
redwater's picture

The implications are staggering. If they truly have root access to smartphones.

Every employee who has a smartphone is a potential zombie that can infect their company/institutions network.

Where the NSA can inject malware into your entire infrastructure (think stuxnet).

Some the greatest acts of corporate espionage in history. Truly criminal.

Imagine Porsche getting bugged so Obama can pass along some nice intel to his Detroit buddies. Or more inside juice for Soros to close a big deal. Or manipulating markets so JPM can corale silver.

 

Wed, 01/01/2014 - 21:13 | 4291890 redwater
redwater's picture

The implications are staggering. If they truly have root access to smartphones.

Every employee who has a smartphone is a potential zombie that can infect their company/institutions network.

Where the NSA can inject malware into your entire infrastructure (think stuxnet).

Some the greatest acts of corporate espionage in history. Truly criminal.

Imagine Porsche getting bugged so Obama can pass along some nice intel to his Detroit buddies. Or more inside juice for Soros to close a big deal. Or manipulating markets so JPM can corale silver.

 

Wed, 01/01/2014 - 21:15 | 4291889 redwater
redwater's picture

The implications are staggering. If they truly have root access to smartphones.

Every employee who has a smartphone is a potential zombie that can infect their company/institutions network.

Where the NSA can inject malware into your entire infrastructure (think stuxnet).

Some the greatest acts of corporate espionage in history. Truly criminal.

Imagine Porsche getting bugged so Obama can pass along some nice intel to his Detroit buddies. Or more inside juice for Soros to close a big deal. Or manipulating markets so JPM can corale silver.

 

Wed, 01/01/2014 - 21:15 | 4291888 redwater
redwater's picture

The implications are staggering. If they truly have root access to smartphones.

Every employee who has a smartphone is a potential zombie that can infect their company/institutions network.

Where the NSA can inject malware into your entire infrastructure (think stuxnet).

Some the greatest acts of corporate espionage in history. Truly criminal.

Imagine Porsche getting bugged so Obama can pass along some nice intel to his Detroit buddies. Or more inside juice for Soros to close a big deal. Or manipulating markets so JPM can corale silver.

 

Wed, 01/01/2014 - 21:13 | 4291887 redwater
redwater's picture

The implications are staggering. If they truly have root access to smartphones.

Every employee who has a smartphone is a potential zombie that can infect their company/institutions network.

Where the NSA can inject malware into your entire infrastructure (think stuxnet).

Some the greatest acts of corporate espionage in history. Truly criminal.

Imagine Porsche getting bugged so Obama can pass along some nice intel to his Detroit buddies. Or more inside juice for Soros to close a big deal. Or manipulating markets so JPM can corale silver.

 

Wed, 01/01/2014 - 21:15 | 4291886 redwater
redwater's picture

The implications are staggering. If they truly have root access to smartphones.

Every employee who has a smartphone is a potential zombie that can infect their company/institutions network.

Where the NSA can inject malware into your entire infrastructure (think stuxnet).

Some the greatest acts of corporate espionage in history. Truly criminal.

Imagine Porsche getting bugged so Obama can pass along some nice intel to his Detroit buddies. Or more inside juice for Soros to close a big deal. Or manipulating markets so JPM can corale silver.

 

Wed, 01/01/2014 - 21:15 | 4291885 redwater
redwater's picture

The implications are staggering. If they truly have root access to smartphones.

Every employee who has a smartphone is a potential zombie that can infect their company/institutions network.

Where the NSA can inject malware into your entire infrastructure (think stuxnet).

Some the greatest acts of corporate espionage in history. Truly criminal.

Imagine Porsche getting bugged so Obama can pass along some nice intel to his Detroit buddies. Or more inside juice for Soros to close a big deal. Or manipulating markets so JPM can corale silver.

 

Wed, 01/01/2014 - 21:15 | 4291884 redwater
redwater's picture

The implications are staggering. If they truly have root access to smartphones.

Every employee who has a smartphone is a potential zombie that can infect their company/institutions network.

Where the NSA can inject malware into your entire infrastructure (think stuxnet).

Some the greatest acts of corporate espionage in history. Truly criminal.

Imagine Porsche getting bugged so Obama can pass along some nice intel to his Detroit buddies. Or more inside juice for Soros to close a big deal. Or manipulating markets so JPM can corale silver.

 

Wed, 01/01/2014 - 21:15 | 4291883 redwater
redwater's picture

The implications are staggering. If they truly have root access to smartphones.

Every employee who has a smartphone is a potential zombie that can infect their company/institutions network.

Where the NSA can inject malware into your entire infrastructure (think stuxnet).

Some the greatest acts of corporate espionage in history. Truly criminal.

Imagine Porsche getting bugged so Obama can pass along some nice intel to his Detroit buddies. Or more inside juice for Soros to close a big deal. Or manipulating markets so JPM can corale silver.

 

Wed, 01/01/2014 - 21:13 | 4291882 redwater
redwater's picture

The implications are staggering. If they truly have root access to smartphones.

Every employee who has a smartphone is a potential zombie that can infect their company/institutions network.

Where the NSA can inject malware into your entire infrastructure (think stuxnet).

Some the greatest acts of corporate espionage in history. Truly criminal.

Imagine Porsche getting bugged so Obama can pass along some nice intel to his Detroit buddies. Or more inside juice for Soros to close a big deal. Or manipulating markets so JPM can corale silver.

 

Wed, 01/01/2014 - 21:13 | 4291881 redwater
redwater's picture

The implications are staggering. If they truly have root access to smartphones.

Every employee who has a smartphone is a potential zombie that can infect their company/institutions network.

Where the NSA can inject malware into your entire infrastructure (think stuxnet).

Some the greatest acts of corporate espionage in history. Truly criminal.

Imagine Porsche getting bugged so Obama can pass along some nice intel to his Detroit buddies. Or more inside juice for Soros to close a big deal. Or manipulating markets so JPM can corale silver.

 

Wed, 01/01/2014 - 21:15 | 4291880 redwater
redwater's picture

The implications are staggering. If they truly have root access to smartphones.

Every employee who has a smartphone is a potential zombie that can infect their company/institutions network.

Where the NSA can inject malware into your entire infrastructure (think stuxnet).

Some the greatest acts of corporate espionage in history. Truly criminal.

Imagine Porsche getting bugged so Obama can pass along some nice intel to his Detroit buddies. Or more inside juice for Soros to close a big deal. Or manipulating markets so JPM can corale silver.

 

Wed, 01/01/2014 - 21:15 | 4291879 redwater
redwater's picture

The implications are staggering. If they truly have root access to smartphones.

Every employee who has a smartphone is a potential zombie that can infect their company/institutions network.

Where the NSA can inject malware into your entire infrastructure (think stuxnet).

Some the greatest acts of corporate espionage in history. Truly criminal.

Imagine Porsche getting bugged so Obama can pass along some nice intel to his Detroit buddies. Or more inside juice for Soros to close a big deal. Or manipulating markets so JPM can corale silver.

 

Wed, 01/01/2014 - 21:13 | 4291878 redwater
redwater's picture

The implications are staggering. If they truly have root access to smartphones.

Every employee who has a smartphone is a potential zombie that can infect their company/institutions network.

Where the NSA can inject malware into your entire infrastructure (think stuxnet).

Some the greatest acts of corporate espionage in history. Truly criminal.

Imagine Porsche getting bugged so Obama can pass along some nice intel to his Detroit buddies. Or more inside juice for Soros to close a big deal. Or manipulating markets so JPM can corale silver.

 

Wed, 01/01/2014 - 21:15 | 4291877 redwater
redwater's picture

The implications are staggering. If they truly have root access to smartphones.

Every employee who has a smartphone is a potential zombie that can infect their company/institutions network.

Where the NSA can inject malware into your entire infrastructure (think stuxnet).

Some the greatest acts of corporate espionage in history. Truly criminal.

Imagine Porsche getting bugged so Obama can pass along some nice intel to his Detroit buddies. Or more inside juice for Soros to close a big deal. Or manipulating markets so JPM can corale silver.

 

Wed, 01/01/2014 - 21:15 | 4291876 redwater
redwater's picture

The implications are staggering. If they truly have root access to smartphones.

Every employee who has a smartphone is a potential zombie that can infect their company/institutions network.

Where the NSA can inject malware into your entire infrastructure (think stuxnet).

Some the greatest acts of corporate espionage in history. Truly criminal.

Imagine Porsche getting bugged so Obama can pass along some nice intel to his Detroit buddies. Or more inside juice for Soros to close a big deal. Or manipulating markets so JPM can corale silver.

 

Wed, 01/01/2014 - 21:15 | 4291875 redwater
redwater's picture

The implications are staggering. If they truly have root access to smartphones.

Every employee who has a smartphone is a potential zombie that can infect their company/institutions network.

Where the NSA can inject malware into your entire infrastructure (think stuxnet).

Some the greatest acts of corporate espionage in history. Truly criminal.

Imagine Porsche getting bugged so Obama can pass along some nice intel to his Detroit buddies. Or more inside juice for Soros to close a big deal. Or manipulating markets so JPM can corale silver.

 

Wed, 01/01/2014 - 21:15 | 4291874 redwater
redwater's picture

The implications are staggering. If they truly have root access to smartphones.

Every employee who has a smartphone is a potential zombie that can infect their company/institutions network.

Where the NSA can inject malware into your entire infrastructure (think stuxnet).

Some the greatest acts of corporate espionage in history. Truly criminal.

Imagine Porsche getting bugged so Obama can pass along some nice intel to his Detroit buddies. Or more inside juice for Soros to close a big deal. Or manipulating markets so JPM can corale silver.

 

Wed, 01/01/2014 - 21:12 | 4291873 redwater
redwater's picture

The implications are staggering. If they truly have root access to smartphones.

Every employee who has a smartphone is a potential zombie that can infect their company/institutions network.

Where the NSA can inject malware into your entire infrastructure (think stuxnet).

Some the greatest acts of corporate espionage in history. Truly criminal.

Imagine Porsche getting bugged so Obama can pass along some nice intel to his Detroit buddies. Or more inside juice for Soros to close a big deal. Or manipulating markets so JPM can corale silver.

 

Wed, 01/01/2014 - 21:12 | 4291872 redwater
redwater's picture

The implications are staggering. If they truly have root access to smartphones.

Every employee who has a smartphone is a potential zombie that can infect their company/institutions network.

Where the NSA can inject malware into your entire infrastructure (think stuxnet).

Some the greatest acts of corporate espionage in history. Truly criminal.

Imagine Porsche getting bugged so Obama can pass along some nice intel to his Detroit buddies. Or more inside juice for Soros to close a big deal. Or manipulating markets so JPM can corale silver.

 

Wed, 01/01/2014 - 21:12 | 4291871 redwater
redwater's picture

The implications are staggering. If they truly have root access to smartphones.

Every employee who has a smartphone is a potential zombie that can infect their company/institutions network.

Where the NSA can inject malware into your entire infrastructure (think stuxnet).

Some the greatest acts of corporate espionage in history. Truly criminal.

Imagine Porsche getting bugged so Obama can pass along some nice intel to his Detroit buddies. Or more inside juice for Soros to close a big deal. Or manipulating markets so JPM can corale silver.

 

Wed, 01/01/2014 - 21:15 | 4291870 redwater
redwater's picture

The implications are staggering. If they truly have root access to smartphones.

Every employee who has a smartphone is a potential zombie that can infect their company/institutions network.

Where the NSA can inject malware into your entire infrastructure (think stuxnet).

Some the greatest acts of corporate espionage in history. Truly criminal.

Imagine Porsche getting bugged so Obama can pass along some nice intel to his Detroit buddies. Or more inside juice for Soros to close a big deal. Or manipulating markets so JPM can corale silver.

 

Wed, 01/01/2014 - 21:15 | 4291869 redwater
redwater's picture

The implications are staggering. If they truly have root access to smartphones.

Every employee who has a smartphone is a potential zombie that can infect their company/institutions network.

Where the NSA can inject malware into your entire infrastructure (think stuxnet).

Some the greatest acts of corporate espionage in history. Truly criminal.

Imagine Porsche getting bugged so Obama can pass along some nice intel to his Detroit buddies. Or more inside juice for Soros to close a big deal. Or manipulating markets so JPM can corale silver.

 

Wed, 01/01/2014 - 21:15 | 4291868 redwater
redwater's picture

The implications are staggering. If they truly have root access to smartphones.

Every employee who has a smartphone is a potential zombie that can infect their company/institutions network.

Where the NSA can inject malware into your entire infrastructure (think stuxnet).

Some the greatest acts of corporate espionage in history. Truly criminal.

Imagine Porsche getting bugged so Obama can pass along some nice intel to his Detroit buddies. Or more inside juice for Soros to close a big deal. Or manipulating markets so JPM can corale silver.

 

Wed, 01/01/2014 - 21:12 | 4291867 redwater
redwater's picture

The implications are staggering. If they truly have root access to smartphones.

Every employee who has a smartphone is a potential zombie that can infect their company/institutions network.

Where the NSA can inject malware into your entire infrastructure (think stuxnet).

Some the greatest acts of corporate espionage in history. Truly criminal.

Imagine Porsche getting bugged so Obama can pass along some nice intel to his Detroit buddies. Or more inside juice for Soros to close a big deal. Or manipulating markets so JPM can corale silver.

 

Wed, 01/01/2014 - 21:12 | 4291866 redwater
redwater's picture

The implications are staggering. If they truly have root access to smartphones.

Every employee who has a smartphone is a potential zombie that can infect their company/institutions network.

Where the NSA can inject malware into your entire infrastructure (think stuxnet).

Some the greatest acts of corporate espionage in history. Truly criminal.

Imagine Porsche getting bugged so Obama can pass along some nice intel to his Detroit buddies. Or more inside juice for Soros to close a big deal. Or manipulating markets so JPM can corale silver.

 

Wed, 01/01/2014 - 21:12 | 4291865 redwater
redwater's picture

The implications are staggering. If they truly have root access to smartphones.

Every employee who has a smartphone is a potential zombie that can infect their company/institutions network.

Where the NSA can inject malware into your entire infrastructure (think stuxnet).

Some the greatest acts of corporate espionage in history. Truly criminal.

Imagine Porsche getting bugged so Obama can pass along some nice intel to his Detroit buddies. Or more inside juice for Soros to close a big deal. Or manipulating markets so JPM can corale silver.

 

Wed, 01/01/2014 - 23:05 | 4292362 scrappy
scrappy's picture

Can you repeat that?

Wed, 01/01/2014 - 21:12 | 4291864 kchrisc
kchrisc's picture

Thanks for the article and info, but one should not make complicated legal arguments about what these criminals are doing. They and the whole of the rest of the criminal US government are daily inviolate of the Constitution. Therefore they are criminals. Period.

If legal remedies were enough, the Constitution would be enough.

I do believe that the proverbial "Rubicon" has been crossed.

An American, not a US subject.

 

"...but then I still can't find the "executive order" or "central bank" sections of the Constitution. So what do I know?!"

Wed, 01/01/2014 - 20:26 | 4291747 One World Mafia
One World Mafia's picture

Quartering literally means to provide with lodging or shelter.  There is obviously no parallel to remote bugs and remote soldiers and obviously no justification in using the 3rd to explain away warantless searches.  I am disheartened that you would try to do so. People are not questioning the premise of GWs assertions.

NSA warantless mass spying is a 4th amdt violation.

 

Wed, 01/01/2014 - 20:38 | 4291811 kurt
kurt's picture

What's the difference between an asshole sitting in your living room and one with a microphone and camera, and the ability to copy and read everything you write?

Wed, 01/01/2014 - 20:52 | 4291831 One World Mafia
One World Mafia's picture

The difference is if the govt was limited to doing it the way it is written there would be neither in your living room unless there were troops moving around in your area who needed shelter. 

Wed, 01/01/2014 - 19:58 | 4291739 MethodMan
MethodMan's picture

The argument is well-reasoned. Worse, remote presence will happen and it makes sense for the millitary. What happens when an armed drone with controlled with real soldier is stationed in someone's house? Problem with that? OK, how about a "contractor" behind it? Arguably, none of these violate the 3rd.

The problem is, broad interpretations can be made wholly in the other direction, and used against the people. Read: commerce clause.

Much as I respect the founders for creating our constitution, there is no way these things could be forseen. Pretty soon, it will only protect a time-traveller going back to 1845, ie, nobody.

If anything, the constitution's language that technically and linguistically does not cover these modern situations is being used against us. Arms become "musket." Papers mean wood-pulp papers. Etc.

So, there a lot of naysayers, but a convention will eventually happen under Article V, and what comes out of it will likely swing the pendulum away from federalism.

Wed, 01/01/2014 - 19:50 | 4291721 Conax
Conax's picture

I put together my own desktops, it's easy as pie.  No microphones, cameras or wi-fi on them.  Been running the same OS (XP) forever.  $99 well spent 10 years ago.

They still go through the drives, I'm certain, but there's nothing for them to find on there.

One silver lining- The PTB's panties are showing- they seem to be afraid of the people.   

 

Wed, 01/01/2014 - 19:26 | 4291691 cynicalskeptic
cynicalskeptic's picture

Well... explains why my computer's running so slow lately......   

Wed, 01/01/2014 - 19:22 | 4291677 logicalman
logicalman's picture

An interesting snippet regarding nefarious spying practices.

One of the reasons the cracking of the Enigma code was top secret for 40 years was that at the end of WW2 the Brits grabbed loads of the machines and gave them to various governments all over the world, who believed they were secure, then proceeded to spy on them - Good old GCHQ!

Wed, 01/01/2014 - 19:09 | 4291667 Kina
Kina's picture

Carrier Pigeons and invisible ink. Smoke signals?

Or simply include a huge mass of garbage information in with your real information. The spies will end up with trillions of gigabyte of nonsense to filter for any real inofrmation.

Wed, 01/01/2014 - 19:20 | 4291673 logicalman
logicalman's picture

A properly prepared one-time pad in trained hands is theoretically uncrackable, unless one of the pads is intercepted.

 

Wed, 01/01/2014 - 19:09 | 4291657 Cognitive Dissonance
Cognitive Dissonance's picture

The NSA certainly didn't have a 'failure of imagination' when it came to spying on American citizens.

Wed, 01/01/2014 - 18:58 | 4291649 logicalman
logicalman's picture

I pretty much assume that if I'm not in my closet, on my own, with the lights off, someone may be watching.

 

Wed, 01/01/2014 - 19:15 | 4291668 Kina
Kina's picture

I tape over the cam on my laptops.

 

Funny that they are fixed and sitting in the top middle of your laptops. Not very useful of functional cam. But I guess good for seeing who you are.

Wed, 01/01/2014 - 21:49 | 4292175 lakecity55
lakecity55's picture

Find and remove the audio and video drivers for the stuff and dump them.

Later you can check back to see if somebody tried to re-load them.

Wed, 01/01/2014 - 21:00 | 4291842 el Gallinazo
el Gallinazo's picture

I would like a laptop with mechanical switches for the camera and mic.  Give the pricks a real challenge.

Wed, 01/01/2014 - 20:34 | 4291798 Papasmurf
Papasmurf's picture

disable the drivers

Wed, 01/01/2014 - 21:52 | 4292184 lakecity55
lakecity55's picture

You beat me to it.

Do NOT follow this link or you will be banned from the site!