This page has been archived and commenting is disabled.
Is The NSA Quartering “Digital” Troops Within Our Homes?
We have extensively documented that the U.S. government is trampling virtually every single Constitutional right set forth in the Bill of Rights.
One of the few rights which we thought the government still respects is the the 3rd Amendment, which prohibits the government forcing people to house troops:
No Soldier shall, in time of peace be quartered in any house, without the consent of the Owner, nor in time of war, but in a manner to be prescribed by law.
But security expert Jacob Appelbaum notes that the NSA may be digitally violating the 3rd Amendment.
By way of background, this week Appelbaum was the main force behind an expose in Spiegel – and gave a must-watch talk – on the NSA’s systemic offensive programs to commandeer computers and computer systems, phone connections and phone systems, and communications networks of all types.
Appelbaum shows that the NSA has literally taken over our computer and our phones, physically intercepting laptop shipments and installing bugware before themselves shipping the laptop on to the consumer, installing special hardware that overcomes all privacy attempts, including “air gaps” (i.e. keep a computer unplugged from the Internet). Appelbaum also notes that spyware can suck up a lot of system resources on a computer or smartphone.
And he says this is the digital equivalent of soldiers being stationed in our houses against our will:
The parallel might not be as far-fetched as it may seem at first …
The NSA itself says that it’s in the middle of a massive cyber war. As such, malware, physical spying devices and offensive internet workarounds are literally the main troops in the NSA’s offensive cyber army.
Quartering meant that Colonial Americans had:
- No control over when the British troops came and went
- No say in what resources they consumed
- And no privacy even in their own castles
Similarly, mass NSA spying means that modern day Americans have:
- No control over when military presence comes or goes from our computer and phones (NSA is part of the Department of Defense)
- No say in what resources the spies suck up (remember, Applebaum says that spying can use a lot of resources and harm performance)
- And no privacy even in the deepest inner sanctuary of our electronic home base
Colonial Americans lost the quiet use and enjoyment of their homes. Modern Americans are losing the quiet use and enjoyment of our digital homes because the NSA is stationing digital “troops” inside our computers and phones.
Just as the Colonists’ homes were no longer theirs … our computers and phones are no longer ours.
- advertisements -


The implications are staggering. If they truly have root access to smartphones.
Every employee who has a smartphone is a potential zombie that can infect their company/institutions network.
Where the NSA can inject malware into your entire infrastructure (think stuxnet).
Some the greatest acts of corporate espionage in history. Truly criminal.
Imagine Porsche getting bugged so Obama can pass along some nice intel to his Detroit buddies. Or more inside juice for Soros to close a big deal. Or manipulating markets so JPM can corale silver.
The implications are staggering. If they truly have root access to smartphones.
Every employee who has a smartphone is a potential zombie that can infect their company/institutions network.
Where the NSA can inject malware into your entire infrastructure (think stuxnet).
Some the greatest acts of corporate espionage in history. Truly criminal.
Imagine Porsche getting bugged so Obama can pass along some nice intel to his Detroit buddies. Or more inside juice for Soros to close a big deal. Or manipulating markets so JPM can corale silver.
The implications are staggering. If they truly have root access to smartphones.
Every employee who has a smartphone is a potential zombie that can infect their company/institutions network.
Where the NSA can inject malware into your entire infrastructure (think stuxnet).
Some the greatest acts of corporate espionage in history. Truly criminal.
Imagine Porsche getting bugged so Obama can pass along some nice intel to his Detroit buddies. Or more inside juice for Soros to close a big deal. Or manipulating markets so JPM can corale silver.
The implications are staggering. If they truly have root access to smartphones.
Every employee who has a smartphone is a potential zombie that can infect their company/institutions network.
Where the NSA can inject malware into your entire infrastructure (think stuxnet).
Some the greatest acts of corporate espionage in history. Truly criminal.
Imagine Porsche getting bugged so Obama can pass along some nice intel to his Detroit buddies. Or more inside juice for Soros to close a big deal. Or manipulating markets so JPM can corale silver.
The implications are staggering. If they truly have root access to smartphones.
Every employee who has a smartphone is a potential zombie that can infect their company/institutions network.
Where the NSA can inject malware into your entire infrastructure (think stuxnet).
Some the greatest acts of corporate espionage in history. Truly criminal.
Imagine Porsche getting bugged so Obama can pass along some nice intel to his Detroit buddies. Or more inside juice for Soros to close a big deal. Or manipulating markets so JPM can corale silver.
The implications are staggering. If they truly have root access to smartphones.
Every employee who has a smartphone is a potential zombie that can infect their company/institutions network.
Where the NSA can inject malware into your entire infrastructure (think stuxnet).
Some the greatest acts of corporate espionage in history. Truly criminal.
Imagine Porsche getting bugged so Obama can pass along some nice intel to his Detroit buddies. Or more inside juice for Soros to close a big deal. Or manipulating markets so JPM can corale silver.
The implications are staggering. If they truly have root access to smartphones.
Every employee who has a smartphone is a potential zombie that can infect their company/institutions network.
Where the NSA can inject malware into your entire infrastructure (think stuxnet).
Some the greatest acts of corporate espionage in history. Truly criminal.
Imagine Porsche getting bugged so Obama can pass along some nice intel to his Detroit buddies. Or more inside juice for Soros to close a big deal. Or manipulating markets so JPM can corale silver.
The implications are staggering. If they truly have root access to smartphones.
Every employee who has a smartphone is a potential zombie that can infect their company/institutions network.
Where the NSA can inject malware into your entire infrastructure (think stuxnet).
Some the greatest acts of corporate espionage in history. Truly criminal.
Imagine Porsche getting bugged so Obama can pass along some nice intel to his Detroit buddies. Or more inside juice for Soros to close a big deal. Or manipulating markets so JPM can corale silver.
The implications are staggering. If they truly have root access to smartphones.
Every employee who has a smartphone is a potential zombie that can infect their company/institutions network.
Where the NSA can inject malware into your entire infrastructure (think stuxnet).
Some the greatest acts of corporate espionage in history. Truly criminal.
Imagine Porsche getting bugged so Obama can pass along some nice intel to his Detroit buddies. Or more inside juice for Soros to close a big deal. Or manipulating markets so JPM can corale silver.
The implications are staggering. If they truly have root access to smartphones.
Every employee who has a smartphone is a potential zombie that can infect their company/institutions network.
Where the NSA can inject malware into your entire infrastructure (think stuxnet).
Some the greatest acts of corporate espionage in history. Truly criminal.
Imagine Porsche getting bugged so Obama can pass along some nice intel to his Detroit buddies. Or more inside juice for Soros to close a big deal. Or manipulating markets so JPM can corale silver.
The implications are staggering. If they truly have root access to smartphones.
Every employee who has a smartphone is a potential zombie that can infect their company/institutions network.
Where the NSA can inject malware into your entire infrastructure (think stuxnet).
Some the greatest acts of corporate espionage in history. Truly criminal.
Imagine Porsche getting bugged so Obama can pass along some nice intel to his Detroit buddies. Or more inside juice for Soros to close a big deal. Or manipulating markets so JPM can corale silver.
The implications are staggering. If they truly have root access to smartphones.
Every employee who has a smartphone is a potential zombie that can infect their company/institutions network.
Where the NSA can inject malware into your entire infrastructure (think stuxnet).
Some the greatest acts of corporate espionage in history. Truly criminal.
Imagine Porsche getting bugged so Obama can pass along some nice intel to his Detroit buddies. Or more inside juice for Soros to close a big deal. Or manipulating markets so JPM can corale silver.
The implications are staggering. If they truly have root access to smartphones.
Every employee who has a smartphone is a potential zombie that can infect their company/institutions network.
Where the NSA can inject malware into your entire infrastructure (think stuxnet).
Some the greatest acts of corporate espionage in history. Truly criminal.
Imagine Porsche getting bugged so Obama can pass along some nice intel to his Detroit buddies. Or more inside juice for Soros to close a big deal. Or manipulating markets so JPM can corale silver.
The implications are staggering. If they truly have root access to smartphones.
Every employee who has a smartphone is a potential zombie that can infect their company/institutions network.
Where the NSA can inject malware into your entire infrastructure (think stuxnet).
Some the greatest acts of corporate espionage in history. Truly criminal.
Imagine Porsche getting bugged so Obama can pass along some nice intel to his Detroit buddies. Or more inside juice for Soros to close a big deal. Or manipulating markets so JPM can corale silver.
The implications are staggering. If they truly have root access to smartphones.
Every employee who has a smartphone is a potential zombie that can infect their company/institutions network.
Where the NSA can inject malware into your entire infrastructure (think stuxnet).
Some the greatest acts of corporate espionage in history. Truly criminal.
Imagine Porsche getting bugged so Obama can pass along some nice intel to his Detroit buddies. Or more inside juice for Soros to close a big deal. Or manipulating markets so JPM can corale silver.
The implications are staggering. If they truly have root access to smartphones.
Every employee who has a smartphone is a potential zombie that can infect their company/institutions network.
Where the NSA can inject malware into your entire infrastructure (think stuxnet).
Some the greatest acts of corporate espionage in history. Truly criminal.
Imagine Porsche getting bugged so Obama can pass along some nice intel to his Detroit buddies. Or more inside juice for Soros to close a big deal. Or manipulating markets so JPM can corale silver.
The implications are staggering. If they truly have root access to smartphones.
Every employee who has a smartphone is a potential zombie that can infect their company/institutions network.
Where the NSA can inject malware into your entire infrastructure (think stuxnet).
Some the greatest acts of corporate espionage in history. Truly criminal.
Imagine Porsche getting bugged so Obama can pass along some nice intel to his Detroit buddies. Or more inside juice for Soros to close a big deal. Or manipulating markets so JPM can corale silver.
The implications are staggering. If they truly have root access to smartphones.
Every employee who has a smartphone is a potential zombie that can infect their company/institutions network.
Where the NSA can inject malware into your entire infrastructure (think stuxnet).
Some the greatest acts of corporate espionage in history. Truly criminal.
Imagine Porsche getting bugged so Obama can pass along some nice intel to his Detroit buddies. Or more inside juice for Soros to close a big deal. Or manipulating markets so JPM can corale silver.
The implications are staggering. If they truly have root access to smartphones.
Every employee who has a smartphone is a potential zombie that can infect their company/institutions network.
Where the NSA can inject malware into your entire infrastructure (think stuxnet).
Some the greatest acts of corporate espionage in history. Truly criminal.
Imagine Porsche getting bugged so Obama can pass along some nice intel to his Detroit buddies. Or more inside juice for Soros to close a big deal. Or manipulating markets so JPM can corale silver.
The implications are staggering. If they truly have root access to smartphones.
Every employee who has a smartphone is a potential zombie that can infect their company/institutions network.
Where the NSA can inject malware into your entire infrastructure (think stuxnet).
Some the greatest acts of corporate espionage in history. Truly criminal.
Imagine Porsche getting bugged so Obama can pass along some nice intel to his Detroit buddies. Or more inside juice for Soros to close a big deal. Or manipulating markets so JPM can corale silver.
The implications are staggering. If they truly have root access to smartphones.
Every employee who has a smartphone is a potential zombie that can infect their company/institutions network.
Where the NSA can inject malware into your entire infrastructure (think stuxnet).
Some the greatest acts of corporate espionage in history. Truly criminal.
Imagine Porsche getting bugged so Obama can pass along some nice intel to his Detroit buddies. Or more inside juice for Soros to close a big deal. Or manipulating markets so JPM can corale silver.
The implications are staggering. If they truly have root access to smartphones.
Every employee who has a smartphone is a potential zombie that can infect their company/institutions network.
Where the NSA can inject malware into your entire infrastructure (think stuxnet).
Some the greatest acts of corporate espionage in history. Truly criminal.
Imagine Porsche getting bugged so Obama can pass along some nice intel to his Detroit buddies. Or more inside juice for Soros to close a big deal. Or manipulating markets so JPM can corale silver.
The implications are staggering. If they truly have root access to smartphones.
Every employee who has a smartphone is a potential zombie that can infect their company/institutions network.
Where the NSA can inject malware into your entire infrastructure (think stuxnet).
Some the greatest acts of corporate espionage in history. Truly criminal.
Imagine Porsche getting bugged so Obama can pass along some nice intel to his Detroit buddies. Or more inside juice for Soros to close a big deal. Or manipulating markets so JPM can corale silver.
The implications are staggering. If they truly have root access to smartphones.
Every employee who has a smartphone is a potential zombie that can infect their company/institutions network.
Where the NSA can inject malware into your entire infrastructure (think stuxnet).
Some the greatest acts of corporate espionage in history. Truly criminal.
Imagine Porsche getting bugged so Obama can pass along some nice intel to his Detroit buddies. Or more inside juice for Soros to close a big deal. Or manipulating markets so JPM can corale silver.
The implications are staggering. If they truly have root access to smartphones.
Every employee who has a smartphone is a potential zombie that can infect their company/institutions network.
Where the NSA can inject malware into your entire infrastructure (think stuxnet).
Some the greatest acts of corporate espionage in history. Truly criminal.
Imagine Porsche getting bugged so Obama can pass along some nice intel to his Detroit buddies. Or more inside juice for Soros to close a big deal. Or manipulating markets so JPM can corale silver.
The implications are staggering. If they truly have root access to smartphones.
Every employee who has a smartphone is a potential zombie that can infect their company/institutions network.
Where the NSA can inject malware into your entire infrastructure (think stuxnet).
Some the greatest acts of corporate espionage in history. Truly criminal.
Imagine Porsche getting bugged so Obama can pass along some nice intel to his Detroit buddies. Or more inside juice for Soros to close a big deal. Or manipulating markets so JPM can corale silver.
The implications are staggering. If they truly have root access to smartphones.
Every employee who has a smartphone is a potential zombie that can infect their company/institutions network.
Where the NSA can inject malware into your entire infrastructure (think stuxnet).
Some the greatest acts of corporate espionage in history. Truly criminal.
Imagine Porsche getting bugged so Obama can pass along some nice intel to his Detroit buddies. Or more inside juice for Soros to close a big deal. Or manipulating markets so JPM can corale silver.
The implications are staggering. If they truly have root access to smartphones.
Every employee who has a smartphone is a potential zombie that can infect their company/institutions network.
Where the NSA can inject malware into your entire infrastructure (think stuxnet).
Some the greatest acts of corporate espionage in history. Truly criminal.
Imagine Porsche getting bugged so Obama can pass along some nice intel to his Detroit buddies. Or more inside juice for Soros to close a big deal. Or manipulating markets so JPM can corale silver.
The implications are staggering. If they truly have root access to smartphones.
Every employee who has a smartphone is a potential zombie that can infect their company/institutions network.
Where the NSA can inject malware into your entire infrastructure (think stuxnet).
Some the greatest acts of corporate espionage in history. Truly criminal.
Imagine Porsche getting bugged so Obama can pass along some nice intel to his Detroit buddies. Or more inside juice for Soros to close a big deal. Or manipulating markets so JPM can corale silver.
The implications are staggering. If they truly have root access to smartphones.
Every employee who has a smartphone is a potential zombie that can infect their company/institutions network.
Where the NSA can inject malware into your entire infrastructure (think stuxnet).
Some the greatest acts of corporate espionage in history. Truly criminal.
Imagine Porsche getting bugged so Obama can pass along some nice intel to his Detroit buddies. Or more inside juice for Soros to close a big deal. Or manipulating markets so JPM can corale silver.
The implications are staggering. If they truly have root access to smartphones.
Every employee who has a smartphone is a potential zombie that can infect their company/institutions network.
Where the NSA can inject malware into your entire infrastructure (think stuxnet).
Some the greatest acts of corporate espionage in history. Truly criminal.
Imagine Porsche getting bugged so Obama can pass along some nice intel to his Detroit buddies. Or more inside juice for Soros to close a big deal. Or manipulating markets so JPM can corale silver.
The implications are staggering. If they truly have root access to smartphones.
Every employee who has a smartphone is a potential zombie that can infect their company/institutions network.
Where the NSA can inject malware into your entire infrastructure (think stuxnet).
Some the greatest acts of corporate espionage in history. Truly criminal.
Imagine Porsche getting bugged so Obama can pass along some nice intel to his Detroit buddies. Or more inside juice for Soros to close a big deal. Or manipulating markets so JPM can corale silver.
Can you repeat that?
Thanks for the article and info, but one should not make complicated legal arguments about what these criminals are doing. They and the whole of the rest of the criminal US government are daily inviolate of the Constitution. Therefore they are criminals. Period.
If legal remedies were enough, the Constitution would be enough.
I do believe that the proverbial "Rubicon" has been crossed.
An American, not a US subject.
"...but then I still can't find the "executive order" or "central bank" sections of the Constitution. So what do I know?!"
Quartering literally means to provide with lodging or shelter. There is obviously no parallel to remote bugs and remote soldiers and obviously no justification in using the 3rd to explain away warantless searches. I am disheartened that you would try to do so. People are not questioning the premise of GWs assertions.
NSA warantless mass spying is a 4th amdt violation.
What's the difference between an asshole sitting in your living room and one with a microphone and camera, and the ability to copy and read everything you write?
The difference is if the govt was limited to doing it the way it is written there would be neither in your living room unless there were troops moving around in your area who needed shelter.
The argument is well-reasoned. Worse, remote presence will happen and it makes sense for the millitary. What happens when an armed drone with controlled with real soldier is stationed in someone's house? Problem with that? OK, how about a "contractor" behind it? Arguably, none of these violate the 3rd.
The problem is, broad interpretations can be made wholly in the other direction, and used against the people. Read: commerce clause.
Much as I respect the founders for creating our constitution, there is no way these things could be forseen. Pretty soon, it will only protect a time-traveller going back to 1845, ie, nobody.
If anything, the constitution's language that technically and linguistically does not cover these modern situations is being used against us. Arms become "musket." Papers mean wood-pulp papers. Etc.
So, there a lot of naysayers, but a convention will eventually happen under Article V, and what comes out of it will likely swing the pendulum away from federalism.
I put together my own desktops, it's easy as pie. No microphones, cameras or wi-fi on them. Been running the same OS (XP) forever. $99 well spent 10 years ago.
They still go through the drives, I'm certain, but there's nothing for them to find on there.
One silver lining- The PTB's panties are showing- they seem to be afraid of the people.
Well... explains why my computer's running so slow lately......
An interesting snippet regarding nefarious spying practices.
One of the reasons the cracking of the Enigma code was top secret for 40 years was that at the end of WW2 the Brits grabbed loads of the machines and gave them to various governments all over the world, who believed they were secure, then proceeded to spy on them - Good old GCHQ!
Carrier Pigeons and invisible ink. Smoke signals?
Or simply include a huge mass of garbage information in with your real information. The spies will end up with trillions of gigabyte of nonsense to filter for any real inofrmation.
A properly prepared one-time pad in trained hands is theoretically uncrackable, unless one of the pads is intercepted.
The NSA certainly didn't have a 'failure of imagination' when it came to spying on American citizens.
I pretty much assume that if I'm not in my closet, on my own, with the lights off, someone may be watching.
I tape over the cam on my laptops.
Funny that they are fixed and sitting in the top middle of your laptops. Not very useful of functional cam. But I guess good for seeing who you are.
Find and remove the audio and video drivers for the stuff and dump them.
Later you can check back to see if somebody tried to re-load them.
I would like a laptop with mechanical switches for the camera and mic. Give the pricks a real challenge.
disable the drivers
You beat me to it.