This page has been archived and commenting is disabled.

The NSA Has Inserted Its Code Into Android OS, Or Three Quarters Of All Smartphones

Tyler Durden's picture





 

Over a decade ago, it was discovered that the NSA embedded backdoor access into Windows 95, and likely into virtually all other subsequent internet connected, desktop-based operating systems. However, with the passage of time, more and more people went "mobile", and as a result the NSA had to adapt. And adapt they have: as Bloomberg reports, "The NSA is quietly writing code for Google’s Android OS."

Is it ironic that the same "don't be evil" Google which went to such great lengths in the aftermath of the Snowden scandal to wash its hands of snooping on its customers and even filed a request with the secretive FISA court asking permission to disclose more information about the government’s data requests, is embedding NSA code into its mobile operating system, which according to IDC runs on three-quarters of all smartphones shipped in the first quarter? Yes, yes it is.

Google spokeswoman Gina Scigliano confirms that the company has already inserted some of the NSA’s programming in Android OS. "All Android code and contributors are publicly available for review at source.android.com." Scigliano says, declining to comment further.

From Bloomberg:

Through its open-source Android project, Google has agreed to incorporate code, first developed by the agency in 2011, into future versions of its mobile operating system, which according to market researcher IDC runs on three-quarters of the smartphones shipped globally in the first quarter. NSA officials say their code, known as Security Enhancements for Android, isolates apps to prevent hackers and marketers from gaining access to personal or corporate data stored on a device. Eventually all new phones, tablets, televisions, cars, and other devices that rely on Android will include NSA code, agency spokeswoman Vanee’ Vines said in an e-mailed statement. NSA researcher Stephen Smalley, who works on the program, says, “Our goal is to raise the bar in the security of commodity mobile devices.”

See, there's no need to worry: the reason the NSA is generously providing the source code for every Google-based smartphone is for your own security. Oh but it's open-sourced, so someone else will intercept any and all attempts at malice. We forgot.

The story continues:

In a 2011 presentation obtained by Bloomberg Businessweek, Smalley listed among the benefits of the program that it’s “normally invisible to users.” The program’s top goal, according to that presentation: “Improve our understanding of Android security.”

Well one wouldn't want their bug to be visible to users now, would one...

Vines wouldn’t say whether the agency’s work on Android and other software is part of or helps with Prism. “The source code is publicly available for anyone to use, and that includes the ability to review the code line by line,” she said in her statement. Most of the NSA’s suggested additions to the operating system can already be found buried in Google’s latest release—on newer devices including Sony’s Xperia Z, HTC’s One, and Samsung Electronics’ Galaxy S4. Although the features are not turned on by default, according to agency documentation, future versions will be. In May the Pentagon approved the use of smartphones and tablets that run Samsung’s mobile enterprise software, Knox, which also includes NSA programming, the company wrote in a June white paper. Sony, HTC, and Samsung declined to comment.

Apple appears to be immune from this unprecedented breach of customer loyalty, if only for now, although open-sourced Linux may not be as lucky:

“Apple (AAPL) does not accept source code from any government agencies for any of our operating systems or other products,” says Kristin Huguet, a spokeswoman for the company. It’s not known if any other proprietary operating systems are using NSA code. SE for Android is an offshoot of a long-running NSA project called Security-Enhanced Linux. That code was integrated a decade ago into the main version of the open-source operating system, the server platform of choice for Internet leaders including Google, Facebook (FB), and Yahoo! (YHOO). Jeff Zemlin, the executive director of the Linux Foundation, says the NSA didn’t add any obvious means of eavesdropping. “This code was peer-reviewed by a lot of people,” he says.

But that's not all:

The NSA developed a separate Android project because Google’s mobile OS required markedly different programming, according to Smalley’s 2011 presentation. Brian Honan, an information technology consultant in Dublin, says his clients in European governments and multinational corporations are worried about how vulnerable their data are when dealing with U.S. companies. The information security world had been preoccupied with Chinese hacking until recently, Honan says. “With Prism, the same accusations can be laid against the U.S. government.”

In short: the (big brother supervised) fun never stops in Stasi 2.0 world. Just buy your 100 P/E stocks, eat your burgers, watch your Dancing With The Stars, pay your taxes, and engage in as much internet contact with other internet-addicted organisms as possible and all shall be well.

Oh, and from this...

To this (courtesy of @paradism_)

 


- advertisements -

Comment viewing options

Select your preferred way to display the comments and click "Save settings" to activate your changes.
Tue, 07/09/2013 - 20:37 | Link to Comment CPL
CPL's picture

Wipe the rom and roll your own.

 

http://www.tabletroms.com/

 

Some good stuff in there.  Couple wickedly extend battery life.

Sat, 01/25/2014 - 05:37 | Link to Comment shawnmike
shawnmike's picture

The NSA developed a separate Android project because Google’s mobile OS required markedly different programming, according to Smalley’s 2011 presentation. Brian Honan, an information technology consultant in Dublin, says his clients in European sydney leather jackets governments and multinational corporations are worried about how vulnerable their data are when dealing with U.S. companies. The information security world had been preoccupied with Chinese hacking until recently, Honan says. “With Prism, the same accusations can be laid against the U.S. government.

Tue, 07/09/2013 - 20:44 | Link to Comment wintermute
wintermute's picture

"Security-Enhanced"

21st Century Orwellian double-speak for "Enhanced Spyware" which is used on the sheeple.

Tue, 07/09/2013 - 21:03 | Link to Comment Pladizow
Pladizow's picture

Can you hear me now?

A rhetorical question that Verizon originally asked the NSA!

Tue, 07/09/2013 - 21:09 | Link to Comment Raymond K Hessel
Raymond K Hessel's picture

The original IP tech was designed to be used over the AM radio frequency.  Anyone know if this is true?

Tue, 07/09/2013 - 21:13 | Link to Comment philipat
philipat's picture

Paraphrased quote Obozo: "You can talk about Big Brother and all. If there are concerns about privacy then that's a debate we should have"

Um....When?

"But if you don't trust your Government, The Courts and the Congress, then we are going to have some problems"

Roger that. And stop calling me Shirley.

Tue, 07/09/2013 - 21:18 | Link to Comment IndicaTive
IndicaTive's picture

Stop being so paranoid. Google lets you go "incognito mode." Safe AND anonymous. Right?

Tue, 07/09/2013 - 21:21 | Link to Comment Ban KKiller
Ban KKiller's picture

"Fingerprint File" Roling Stones...It's only Rock 'n' Roll. They knew!

 

Tue, 07/09/2013 - 21:25 | Link to Comment The Thunder Child
The Thunder Child's picture

I understand the Amish a little bit more everyday....

Tue, 07/09/2013 - 21:28 | Link to Comment Zer0head
Zer0head's picture

if it saves just one life or protects us from insider threat behavior

it is all worth it

Tue, 07/09/2013 - 21:32 | Link to Comment akak
akak's picture

Banning all air and automobile travel would save far more than one life, so it is necessary and logical to do so, yes?

Tue, 07/09/2013 - 21:37 | Link to Comment Zer0head
Zer0head's picture

that appears to be the logic used by the majority of Americans of course that majority would have a difficult time understanding said logic

Just giv'em thar TeeVee to watch sports on and a bowl full of doritos and all is right with the world

Tue, 07/09/2013 - 21:51 | Link to Comment King_of_simpletons
King_of_simpletons's picture

SELinux, SE Android has got nothing to do with snooping and exposing ones privacy.  NSA developed SELinux initially in conjunction with open-source community and is now only in an advisory role to companies like www.tresys.com & Red Hat that develop policies on a full time basis.

SELinux, as I know it in its current form, is only used for securing individual systems from vulnerabilities post penetration attack.

Tue, 07/09/2013 - 22:10 | Link to Comment TeamDepends
TeamDepends's picture

Code is code for phallus.

Tue, 07/09/2013 - 23:55 | Link to Comment Think for yourself
Think for yourself's picture

Hacker wisdom, not so "tin-foil" anymore:
Can't trust the OS unless if you coded it
Can't trust the code unless if you compiled it
Can't trust the executable unless if you coded the compiler
Can't trust the compiler unless if you wrote the architecture
Can't trust the architecture unless if you fabbed the chip

How far down the rabbit hole do you want to go? I know very little about serious crypto, but enough to understand this. And if I do, I don't to know what the NSA can do. At this point, I just use vanilla google os, assume I'm treading enemy territory and that for some reason they're letting me tread it out of the "kindness of their own heart"... there's no other way about it.

Wed, 07/10/2013 - 00:18 | Link to Comment Skateboarder
Skateboarder's picture

You can build a computer entirely out of NAND/NOR gates, NOT gates, and D Flip-Flops. Of course, it will be the size of a car.

Wed, 07/10/2013 - 00:57 | Link to Comment FEDbuster
FEDbuster's picture

or you could just pull the plug (see Amish reference above).

Wed, 07/10/2013 - 01:26 | Link to Comment flacon
flacon's picture

"which according to IDC runs on three-quarters of all smartphones shipped in the first quarter?"

So that's why AAPL stock is down. 

Wed, 07/10/2013 - 02:16 | Link to Comment limit_less
limit_less's picture

flacon - Because they are not co-operating?

Wed, 07/10/2013 - 07:12 | Link to Comment GetZeeGold
GetZeeGold's picture

 

 

 

I don't have a smart phone....cause I'm smart.

 

All my cell phone can do is take phone calls....that and it's got a calculator.....but I never use that.

 

Wed, 07/10/2013 - 08:47 | Link to Comment TerminalDebt
TerminalDebt's picture

If it saves one overpaid underworked government job it's all worth it

Wed, 07/10/2013 - 02:50 | Link to Comment swiss chick
swiss chick's picture

+1

For some reason I can't up arrow you...

Wed, 07/10/2013 - 03:12 | Link to Comment lewy14
lewy14's picture

slightly realistic option for the dedicated:

- use an FPGA - plenty big enough. Get an eval board with plenty of flash, or a USB connector for a flash drive. And an Ethernet port. No need to fab a chip, or a board for that matter.

- use an open source, synthesizable CPU core from OpenCores. There are GCC ports for it. Bonus (if you know what you're doing): randomize the instruction set encoding some. It only affects a few header files.

- cross-compile yourself some little network stack - ssh, true crypt, proxy server, email server, ftp, etc - from open source.

The resulting machine will be pretty weak (32 bit, will run a few hundred MHZ tops; a few GB of flash) but sufficient to run a little net stack.

Build it into a tiny enclosure, plug into a router where you can hide it (you can probably rig it to be powered from the ethernet connection - don't bother with WiFi) and you will have something that will be quite a challenge to hack. It would be big enough to host some primitive BBS software for a few dozen people to collaborate.

I was seriously thinking of doing this as a hobby project a few years ago; I figured it was just stupid and nobody would care... now it seems like it might be interesting...

Wed, 07/10/2013 - 08:14 | Link to Comment kralizec
kralizec's picture

For the Tech-impaired...whats all that mean?

Oh, forget it.  I can either choose to keep my smartphone and torment the listeners...or just smash it to bits.

Wed, 07/10/2013 - 11:59 | Link to Comment akak
akak's picture

Or, you can do what the sanest among us have always done, and continue to do: live without a fucking cell phone.

Somehow, life did manage to go on before the advent of cell phones, and I feel absolutely no hole in my life for never having had one --- quite the opposite in fact.

Wed, 07/10/2013 - 11:05 | Link to Comment aerojet
aerojet's picture

You can maybe stop at the OS--the hardware isn't going to do something you don't tell it to do.  Then again, there could be microcode embedded in there to snoop, but it wouldn't necessarily work if you put a new, unrecognized OS on top of it.  All network hardware is designed with snooping in mind now--it's been know for at least a decade or more that Cisco switches and all telecom equipment has to be bug-able by law.

Tue, 07/09/2013 - 23:46 | Link to Comment Suisse
Suisse's picture

SELinux is generally disabled as it interferes with tons of stuff. I almost never leave it on as it's a nightmare to allow applications to function with it on.

Wed, 07/10/2013 - 03:56 | Link to Comment malikai
malikai's picture

Correct. SE is not a threat, but it is a good counter-threat for post-breach control. This article either stems from a clear lack of understanding towards what SE is or it is an attempt to divert anger to places where it can be easily discredited.

Pay attention TD.

Wed, 07/10/2013 - 12:03 | Link to Comment Max_Power
Max_Power's picture

Agreed.  I do love ZH but, every once in a while the paranoia spins out of control.

It is, in fact, open source.  Anybody can look at the code that NSA wrote to verify its innocence or insidiousness.  That it's meant to be transparent to users does not mean that they're hiding something.  In the computer world, this means it's an improvement that does not impact the user/usability of the end product.  

Just because the NSA has done bad things does not mean that everything they do is bad.  It's a bit McCarthyist to believe that EVERYTHING the NSA does is evil.

Wed, 07/10/2013 - 15:35 | Link to Comment freet0pian
freet0pian's picture

Like "Think for yourself" pointed out it's not that simple, so you might want to refrain posting on matters you don't understand.

Are the drivers open source? Are google apps that come with it open source? Can you compile the OS for Galaxy S1-4 etc. yourself?

There is plenty of space the NSA back doors can be hiding. You can even introduce some hard to detect coding "flaw" in plain view in the truly open source portion of the system that makes the phone susceptible for attacks.

So let's recap the dark waters of code NSA might be lurking in:

1. Drivers

2. Google's own closed apps

3. OEM changes to the OS

4. OEM apps

5. Other closed bloatware

6. The cross compiler

7. CPU or other chip microcode (not that likely)

8. Ethernet, Wifi, cellular or other peripheral flash, rom or eeprom

9. The guy or company compiling the OS or apps for you

10. A hard to detect flaw in the open source code

 

Me thinks the boat got some holes.

Tue, 07/09/2013 - 23:03 | Link to Comment Ranger4564
Ranger4564's picture

You might think you're being sarcastic, but part of the feudal structure is restricted travel... there is a reason roadways were private and you had to pay toll. Some people, colloquially referred to as slaves, were prohibited from travel. So the logic flows, but you haven't yet accepted the depths of this cesspool.

I wrote about 3 years ago, that the roads will be transferred to the banks as collateral confiscated when the states cannot pay their debts. In Greece, the banks intended to confiscate shipping, train, and mass transit, to cripple movement. It's not even a stretch to imagine that the bankers will one day restrict mobility... DHS is ready.

Wed, 07/10/2013 - 11:06 | Link to Comment aerojet
aerojet's picture

Restricing travel would be the hill DHS dies on.

Tue, 07/09/2013 - 21:29 | Link to Comment macholatte
macholatte's picture

 

I believe it has already been well documented that EVERYTHING affiliated with Google is bugged by Google as well as anything they can get their hands on (see Google Earth street view spying and data mining).  The NSA, and others, have learned quite a lot from Google.  All of it done under the pretext of "market samples for advertising" and "providing the user with an enhanced experience" and other such crap.

Has any government official in any jurisdiction in any country, city, state or province ever tried to pass a law that privacy is inherent and that one should have to "opt-in" instead of having to "opt-out"?

 

"A few agents of the thought Police moved always among them, spreading false rumours and marking down and eliminating the few individuals who were judged capable of becoming dangerous..."  

-- Orwell 1984

Tue, 07/09/2013 - 22:37 | Link to Comment FreedomGuy
FreedomGuy's picture

Yes, yes, but it is all good for us. You give up an insigificant amount of freedom and the NSA will only use all your private information for your good to protect you from those invisible bad guys out there.

Now, if you happen to run against your local incumbent your sexting and private photos will magically and accidentally appear during the campaign. You will definitely get an apology and a promise to "fully investigate" the matter at some nebulous time in the future.

Wed, 07/10/2013 - 00:05 | Link to Comment whotookmyalias
whotookmyalias's picture

(You guys kill me, it is next to impossible to get anything on the front page of comments)

 

It appears that this may not be a new issue:

http://www.wired.com/politics/security/commentary/securitymatters/2006/05/70886

OK, tin foil hat back on for now.

/sarc

Wed, 07/10/2013 - 02:49 | Link to Comment matrix2012
matrix2012's picture

 

European Politicians Are Realizing – Blackmail is the Game

A revelation is dawning that the excuse of the NSA looking for terrorists but taking absolutely everything, is at last causing a light to go off. European politicians realize that they are targets and the name of the game is to blackmail anyone that the NSA simply does not like.

They realize that the New York Attorney General Eliot Spitzer was targeted when he tried to go after the Wall Street Investment Bankers everyone today calls the UNTOUCHABLES. After he got rid of Hank Greenberg at AIG for Wall Street not realizing he was doing them a service, when he turned on them that was his serious mistake. They suddenly discovered checks to a hooker and his hotel in Washington was bugged when he met with her. Since then, no one has dared to investigate Wall Street.

"This is not about terrurizts. This is about monitoring society and blackmailing politicians to do as the unelected bureaucracy demands."

Behind the Curtain politicians are targets NOT TERRURIZTS and the agenda is to blackmail them to direct the political changes the UNELECTED bureaucracy demands. This is the real object of collecting absolutely everything.
* * * * * See also "US Spying on EU – A Big Charade?" The documents, seen by the Observer, show that – in addition to the UK – Denmark, the Netherlands, France, Germany, Spain, and Italy have all had formal agreements to provide communications data to the US. They state that the EU countries have had “second and third-party status” under decades-old signal intelligence (Sigint) agreements that compel them to hand over data which, in later years, experts believe, has come to include mobile phone and internet data.
Under the international intelligence agreements, nations are categorised by the US according to their trust level. The US is defined as ‘first party’ while the Anglo-Saxon sphere: UK, Canada, Australia and New Zealand enjoy ‘second party’ trusted relationships. Countries such as Germany and France have ‘third party’, or less trusted, relationships.

 

 

How to identify a limited hangout op ? By Dr. Webster Griffin Tarpley
The operations of agencies aiming at the manipulation of public opinion generally involve a combination of cynical deception with the pathetic gullibility of the targeted populations.

 

 

Additional info and analysis about 'Elvis' recent highlighted shows are also available at Gordon Duff's collection of articles at Veterans Today.

 

Wed, 07/10/2013 - 11:13 | Link to Comment aerojet
aerojet's picture

The problem with the whole "looking for terrorists" theme is that there aren't enough terrorists out there.  If you consider that a database error rate runs 5-15% best case, and if the percentage of the poplulation that is a terrorist is a micro-fraction of 1%, say, 0.0001%, you kind of see the problem here--it is impossible to detect a terrorist from random noise.  No amount of sophisticated technology and behavior recognition is going to help.  The best you can do is maybe do a longitudinal study of specific individuals.  Our government doesn't do that, however.  They are trying to mass surveil while baiting suspects with entrapment schemes.  It's all a crock of shit.

Tue, 07/09/2013 - 23:08 | Link to Comment Dick Buttkiss
Dick Buttkiss's picture

 

So let's delve a little deeper into Orwell's thought via the so-called "book within the book" —http://en.wikipedia.org/wiki/The_Theory_and_Practice_of_Oligarchical_Col...— wherein he lays out the "controlled insanity" by which The Party exercises absolute dominion over everyone, quite literally in thought, word, and deed:

With the development of television, and the technical advance which made it possible to receive and transmit simultaneously on the same instrument, private life came to an end. Every citizen, or at least every citizen important enough to be worth watching, could be kept for twenty-four hours a day under the eyes of the police and in the sound of official propaganda, with all other channels of communication closed. The possibility of enforcing not only complete obedience to the will of the State, but complete uniformity of opinion on all subjects, now existed for the first time. 

. . .

[The Party] systematically undermines the solidarity of the family, and it calls its leader by a name which is a direct appeal to the sentiment of family loyalty. Even the names of the four Ministries by which we are governed exhibit a sort of impudence in their deliberate reversal of the facts. The Ministry of Peace concerns itself with war, the Ministry of Truth with lies, the Ministry of Love with torture and the Ministry of Plenty with starvation. These contradictions are not accidental, nor do they result from ordinary hypocrisy; they are deliberate exercises in doublethink. For it is only by reconciling contradictions that power can be retained indefinitely. In no other way could the ancient cycle be broken. If human equality is to be for ever averted — if the High, as we have called them, are to keep their places permanently — then the prevailing mental condition must be controlled insanity.

 . . .

On the other hand [the individual's] actions are not regulated by law or by any clearly formulated code of behaviour. In Oceania there is no law. Thoughts and actions which, when detected, mean certain death are not formally forbidden, and the endless purges, arrests, tortures, imprisonments, and vaporizations are not inflicted as punishment for crimes which have actually been committed, but are merely the wiping-out of persons who might perhaps commit a crime at some time in the future.

. . .

War is now a purely internal affair. In the past, the ruling groups of all countries, although they might recognize their common interest and therefore limit the destructiveness of war, did fight against one another, and the victor always plundered the vanquished. In our own day they are not fighting against one another at all. The war is waged by each ruling group against its own subjects, and the object of the war is not to make or prevent conquests of territory, but to keep the structure of society intact. The very word 'war', therefore, has become misleading. It would probably be accurate to say that by becoming continuous war has ceased to exist. The peculiar pressure that it exerted on human beings between the Neolithic Age and the early twentieth century has disappeared and been replaced by something quite different. The effect would be much the same if the three super-states [the equivalent of the U.S., China, and Russia, as well as their satellites], instead of fighting one another, should agree to live in perpetual peace, each inviolate within its own boundaries. For in that case each would still be a self-contained universe, freed for ever from the sobering influence of external danger. A peace that was truly permanent would be the same as a permanent war. This — although the vast majority of Party members understand it only in a shallower sense — is the inner meaning of the Party slogan: War is Peace.

The fiendish irony, of course, is that by "everyone," Orwell does in fact mean everyone. All are under the domination of Big Brother, and thus everyone is at war with everyone else, such that Hobbes' thesis that Leviathan is necesary to preclude a "war of all against all" is precisely what Leviathan descends into.

Thus is the U.S. Surveillance State merely fulfilling Orwell's prophecy, as it daily plunges the world deeper into the ordered chaos of abject sociopathy. 

 

Tue, 07/09/2013 - 23:53 | Link to Comment macholatte
macholatte's picture

The genius of Orwell (Eric Arthur Blair (25 June 1903 – 21 January 1950),  known by his pen name George Orwell)

was that he pretty much had it figured out long before TV. But so did the Founding Fathers long before Orwell and Sun Su long before them, as well as many others. So what does that tell you.... human nature does not change. The behaviour of dictators & tyrants is the same since the beginning of time to Caesar to Mao to Barry. The behaviour of the sheeple is also well documented.

Wed, 07/10/2013 - 02:03 | Link to Comment prains
prains's picture

and every so often a cleansing tonic starts the whole process over again

Wed, 07/10/2013 - 11:16 | Link to Comment aerojet
aerojet's picture

Most discussions of 1984 come to the conclusion that Orwell was writing about his time--he experienced all of it during WWII.  It was not that genius, in other words.

Tue, 07/09/2013 - 23:56 | Link to Comment BLOTTO
BLOTTO's picture

01001110 01101111 01110100 01101000 01101001 01101110 01100111 00100000 01001110 01100101 01110111 00100000 01010101 01101110 01100100 01100101 01110010 00100000 01110100 01101000 01100101 00100000 01010011 01110101 01101110 00001101 00001010 01001000 01101001 01110011 01110100 01101111 01110010 01111001 00100000 01101001 01110011 00100000 01110010 01100101 01110000 01100101 01100001 01110100 01101001 01101110 01100111 00100000 01101001 01110100 01110011 01100101 01101100 01100110

Wed, 07/10/2013 - 04:53 | Link to Comment Bearwagon
Bearwagon's picture

01000001 01101100 01101100 00100000 01111001 01101111 01110101 01110010 00100000 01100010 01101001 01101110 01100001 01110010 01101001 01100101 01110011 00100000 01100001 01110010 01100101 00100000 01100010 01100101 01101100 01101111 01101110 01100111 00100000 01110100 01101111 00100000 01110101 01110011 00100001

Wed, 07/10/2013 - 09:36 | Link to Comment clones2
clones2's picture

01001001 00100000 01110100 01101111 01110100 01100001 01101100 01101100 01111001 00100000 01101000 01100001 01100100 00100000 01110100 01101111 00100000 01100111 01101111 01101111 01100111 01101100 01100101 00100000 01110100 01101000 01101001 01110011

Tue, 07/09/2013 - 23:57 | Link to Comment BLOTTO
BLOTTO's picture

01100100 01101111 01110101 01100010 01101100 01100101 00100000 01110000 01101111 01110011 01110100

Wed, 07/10/2013 - 00:04 | Link to Comment HardAssets
HardAssets's picture

Thanks for the link. Its great to have all the pages in The Book in one place. 1984 is the work of a genius.

Thankfully, in addition to my third party erasable Kindle edition, - - -I have several copies in good, old fashioned paper.

Wed, 07/10/2013 - 04:56 | Link to Comment Bearwagon
Wed, 07/10/2013 - 00:20 | Link to Comment Kiwi Pete
Kiwi Pete's picture

Is that why they called it the Patriot Act? Big brother must think you're stupid.

Wed, 07/10/2013 - 05:01 | Link to Comment matrix2012
matrix2012's picture

George Orwell - Complete works, Biography, Quotes, Essays

http://www.george-orwell.org/
Tue, 07/09/2013 - 21:45 | Link to Comment cynicalskeptic
cynicalskeptic's picture

'Stop being so paranoid. Google lets you go "incognito mode." Safe AND anonymous. Right?'

 

I thought 'incognito' was a signal to start recording ALL activity so they'd have easier access to all the stuff needed to blackmail you..... and you thought your obsession with big-boobed dwarfs and farm animals was a secret.......

by the way - that 'live chat/private show' you had with shortnsexxxxy38g is STILL near the top of the NSA's 'all time favorites' list

Tue, 07/09/2013 - 22:05 | Link to Comment Go Tribe
Go Tribe's picture

You mean the mutherfucking nigga president who just told public employees to spy on each other and report unusual behavior?

Wed, 07/10/2013 - 02:45 | Link to Comment prains
prains's picture

you'll need to cut eye holes in the bag first, you know help let some of the hot air out

Wed, 07/10/2013 - 08:46 | Link to Comment GeezerGeek
GeezerGeek's picture

I know of this government employee with a bogus birth certificate, questionable Social Security number, etc....is this important?

Tue, 07/09/2013 - 23:13 | Link to Comment Thorny Xi
Thorny Xi's picture

The NSA has had beam splitters are all peering points since 2005.  Look up beam splitter if you do not know what this is.  They get everything.  The end.

Wed, 07/10/2013 - 07:58 | Link to Comment Umh
Umh's picture

They are more likely to be unaware of what a "peering point" is.

Tue, 07/09/2013 - 21:14 | Link to Comment max2205
max2205's picture

Great. Mine is slowing dooooown. And it keeps asking me if I like Barry..

Wtf

Tue, 07/09/2013 - 21:14 | Link to Comment francis_sawyer
francis_sawyer's picture

I'm just glad I never switched from my shoe phone that has the "cone of silence" feature...

Tue, 07/09/2013 - 21:37 | Link to Comment NidStyles
NidStyles's picture

That's pretty Smart... ;-)

Wed, 07/10/2013 - 07:04 | Link to Comment Peter Pan
Peter Pan's picture

And the rest should get smart.

Wed, 07/10/2013 - 07:53 | Link to Comment mach777
mach777's picture

They monitor everything!

 

99% of all users:

  • You're logged onto gmail, yahoo, amazon, etc? They know who you are everywhere.
  • You're logged off but keep other cookies in your browser. They know who you are by cross-matching cookies.
  • Those directed ads are a sign that sites know of your identity and are tracking you,

You're running an icognito browser:

  • They track you through your IP which is basically like your internet phone number.
  • Incognito mode shows youve got something to hide, maybe that is even more suspectible to tracking.

You're running a safe incognito browser:

  • They can track you anyway if(as) the OS intercepts the information between itself and the browser before it is sent out.

You've taken safety measures with the OS and:

  1. using "safe" proxy servers as gateways for your internet traffic to hide your IP.
  2. hacked the TCP/IP stack to hide any traces of your original IP / address in the packets sent out
  3. running a self compiled "safe browser"
  4. your hardware is safe, and you're using something like TOR (is that safe?):

They still got you through patterns of sites you visit often, at what times you visit them, and by text recognition matching of what you write and how fast you write it against previous data.

Remember: if you haven't been using the internet safely from when you first started using it, they have a huge backlog of behavioural information that defines who you are.

Your demographic, your patterns of writing, patterns of interest, patterns of reading (what you skim, what you read), what you bought, what you returned, when you piss and when you shit.

They can predict what you're going to do before you do it.

That is not science fiction, its real. Its just crunching of numbers if you have the information.

If there is a full moon, and rains in Australia, and GLD is down more than 3% YOU're 68% likely to google midget porn.

Mach
Wed, 07/10/2013 - 08:56 | Link to Comment GeezerGeek
GeezerGeek's picture

You mentioned "when you piss and when you shit."

That's been common knowledge ever since the South Park episode regarding the Toilet Safety Administration. http://www.southparkstudios.com/clips/410441/toilet-safety-administration

Tue, 07/09/2013 - 22:08 | Link to Comment Oldballplayer
Oldballplayer's picture

That is the fifth safest phone out there.....

Tue, 07/09/2013 - 21:16 | Link to Comment Vagabond
Vagabond's picture

If it is truly open source you people need to calm the fuck down.  It's what we can't see that you need to worry about.

Tue, 07/09/2013 - 21:23 | Link to Comment The Thunder Child
The Thunder Child's picture

There is definitely some more wicked shit hardwired and outside the OS that we don't know about....but if this is enough to cause people to start dropping smartphones that is enough for me.

Tue, 07/09/2013 - 22:17 | Link to Comment dryam
dryam's picture

I guess I'm going to have start typing in code.

NSA........
....................../´¯/)
....................,/¯../
.................../..../
............./´¯/'...'/´¯¯`·¸
........../'/.../..../......./¨¯\
........('(...´...´.... ¯~/'...')
.........\.................'...../
..........''...\.......... _.·´
............\..............(
..............\.............\...

Wed, 07/10/2013 - 00:29 | Link to Comment ceilidh_trail
ceilidh_trail's picture

^what he did- to mr eric of google fame. (see below)

Tue, 07/09/2013 - 22:35 | Link to Comment AlaricBalth
AlaricBalth's picture

I see nothing wrong with the coding on my Android.
You all are just paranoid.
See for yourself.

<?xml version="1.0" encoding="utf-8"?>
android:src="@drawable/icon_ca" /><?xml version="1.0" encoding=act"utf-8"?> NSA< activate microphone="@spying/main_ltr"/>we arelistening:-)
activatecamera=android-http?:XMLversion-[weseeyou]

Tue, 07/09/2013 - 23:09 | Link to Comment Ranger4564
Ranger4564's picture

Hahaha.

That's one thing I like about this site / most people... there's always some form of humor. 

Wed, 07/10/2013 - 03:36 | Link to Comment matrix2012
matrix2012's picture

"There is definitely some more wicked shit hardwired and outside the OS that we don't know about..."

---

and here comes into play the various powerful smartphones with all kinds of tracking capabilities incl. the facial recognition, various location services, and many other "knowing you" features... not to mention all the kinds of social networking facades...

Wed, 07/10/2013 - 04:58 | Link to Comment Bringin It
Bringin It's picture

Pick up the sylus and give them a sample of your handwriting!

Tue, 07/09/2013 - 21:25 | Link to Comment francis_sawyer
francis_sawyer's picture

Yeah, like... They admitted to being involved in an MK Ultra program, but they stopped all that shit years ago... Nothing to worry about anymore... Gotta go ~ Britney Spears & Lady Gaga are doing an interview on TV...

Tue, 07/09/2013 - 22:06 | Link to Comment SgtShaftoe
SgtShaftoe's picture

RFC 1149 - ip over avian carrier I.e. carrier pigeon. Look it up.

Tue, 07/09/2013 - 22:56 | Link to Comment G-R-U-N-T
G-R-U-N-T's picture

Good lord, our government is soooo out of control. Next up, confiscation of your cash and assets!

Government against the people, which is the usual historic outcome!

 

Tue, 07/09/2013 - 23:23 | Link to Comment Anusocracy
Anusocracy's picture

Government is always against the people and for itself. That's the only way it survives.

 

"Whether the mask is labelled Fascism, Democracy, or Dictatorship of the Proletariat, our great adversary remains the Apparatus—the bureaucracy, the police, the military. Not the one facing us across the frontier or the battlelines, which is not so much our enemy as our brother's enemy, but the one that calls itself our protector and makes us its slaves. No matter what the circumstances, the worst betrayal will always be to subordinate ourselves to this Apparatus, and to trample underfoot, in its service, all human values in ourselves and in others." 
— Simone Weil, Politics, Spring 1945

Wed, 07/10/2013 - 00:50 | Link to Comment G-R-U-N-T
G-R-U-N-T's picture

Nice Anusocracy and touche...

 

'Each type of government enacts laws that are in its own interest, a democracy democratic laws, a tyranny tyrannical ones and so on; and in enacting these laws they make it quite plain that what is ‘right’ for their subjects is what is in the interest of themselves, the rulers, and if anyone deviates from this he is punished as a lawbreaker and ‘wrongdoer.’  That is what I mean when I say that ‘right’ is the same thing in all states, namely the interest of the established government; and government is the strongest element in each state, and so if we argue correctly we see that ‘right’ is always the same, the interest of the stronger party….'

-THRASYMACHUS

Sat, 07/13/2013 - 13:41 | Link to Comment Anusocracy
Anusocracy's picture

Thanks, great quote.

Government reflects the morality of the governors, not the governed, and attempts to limit entry to the like-minded.

Wed, 07/10/2013 - 01:56 | Link to Comment Son of Loki
Son of Loki's picture

"Snoop-phone" may be a better name.

Wed, 07/10/2013 - 08:30 | Link to Comment Groundhog Day
Groundhog Day's picture

"vger"

Wed, 07/10/2013 - 09:11 | Link to Comment TeMpTeK
TeMpTeK's picture

You pay for the bandwidth , they tax u for it then use your own bandwidth to violate your privacy .... We should celebrate independence day every day of the week just for shits and giggles.. And while we're at it we should give Egypt our constitution cuz we sure as hell aren't using it..

Tue, 07/09/2013 - 20:46 | Link to Comment Buckaroo Banzai
Buckaroo Banzai's picture

Google blows cock.

"If you have something that you don't want anyone to know, maybe you shouldn't be doing it in the first place. If you really need that kind of privacy, the reality is that search engines -- including Google -- do retain this information for some time and it's important, for example, that we are all subject in the United States to the Patriot Act and it is possible that all that information could be made available to the authorities."
-- Eric Schmidt, CEO, Google

Tue, 07/09/2013 - 20:49 | Link to Comment buzzsaw99
buzzsaw99's picture

8.88 million results for the search phrase "midget tranny porn". The man can't be all bad.

Wed, 07/10/2013 - 00:31 | Link to Comment Hengist
Hengist's picture

4.76 million for "nsa midget tranny porn"

Tue, 07/09/2013 - 20:49 | Link to Comment Jumbotron
Jumbotron's picture

FUCK YOU NSA

Can You Hear Me Now ??

Tue, 07/09/2013 - 20:51 | Link to Comment Jumbotron
Jumbotron's picture

You know it's the endgame on Prison Planet when every one is admitting..."Yeah...We're Bugging You....SO THE FUCK WHAT" ?

I've said it once...I'll say it again....

"The Matrix was a documentary".

Tue, 07/09/2013 - 22:17 | Link to Comment ghengis86
ghengis86's picture

At least Apple doesn't let the NSA in....

Bwahahahaha!!!!!

Oh, I slay myself sometimes....

Tue, 07/09/2013 - 23:39 | Link to Comment Anusocracy
Anusocracy's picture

Ever wonder how an ant colony develops? Through culling the disobedient and rewarding the obedient?

 

Wed, 07/10/2013 - 00:35 | Link to Comment object_orient
object_orient's picture

I may be a worker drone, but I'm doing a really half assed job.

Wed, 07/10/2013 - 09:15 | Link to Comment post turtle saver
post turtle saver's picture

they pretend to pay us, we pretend to work

Tue, 07/09/2013 - 23:15 | Link to Comment Ranger4564
Ranger4564's picture

... rap rap rap ... Hey You, open up, we know you're in there.

Even the weather channel / online stores know where my current IP is located, to be able to provide me with localized benefits, like boot steps on my throat, while I'm hiding in my parent's cellar. 

Why don't we all shutoff the PC's and meet at the local bars, or better idea, the lodal gun rallies. You can find me easily, just look for the guy on the floor with the boot on his throat.

Tue, 07/09/2013 - 20:56 | Link to Comment tuttisaluti
tuttisaluti's picture

Just use Duckduckgo as search engine...

Tue, 07/09/2013 - 21:41 | Link to Comment Race Car Driver
Race Car Driver's picture

 

Noob - ALL of your data is being collected, cataloged and permanently stored by numerous agencies.

ALL OF YOUR DATA - from your electric use, your phone, your purchases, banking records, medical records, school records, transportation (GPS), tax info, property info ... etc. Just about everything you do. What search engine you use makes no difference.

Tue, 07/09/2013 - 23:18 | Link to Comment Ranger4564
Ranger4564's picture

You cannot do a single thin online that is not using Google analytics, isn't using a host of other utilities and aggragators. You cannot hide simply by Ducking.

By the way, don't bother with Firefox / Internet Private Browsing either. The clause that pops up is brilliant. Firefox won't remember a thing you did... but the agencies that are spying on everyone will definitely know. So basically, the only person that won't know what I'm doing, is me.

There is not one web browser today that I know of that has not been infiltrated. But even worse, there is not one OS that I know of that has not been infiltrated. We are living in hell. Wake up, HELL.

Wed, 07/10/2013 - 12:58 | Link to Comment mkhs
mkhs's picture

So Ghostery does not block google analytics?

Tue, 07/09/2013 - 20:59 | Link to Comment Overfed
Overfed's picture

Ixquick, bitchez.

Tue, 07/09/2013 - 21:01 | Link to Comment monoloco
monoloco's picture

I wonder if he'll still be singing that tune after The Carlyle Group collects confidential corporate information from Google and uses it to manipulate their stock price, or maybe Erics been personally compromised and blackmailed into being an NSA shill.

Tue, 07/09/2013 - 21:54 | Link to Comment i-dog
i-dog's picture

"Maybe"!?! He's been a regular Bilderberg attendee for the last 7 years!

Tue, 07/09/2013 - 21:14 | Link to Comment Bearish News
Bearish News's picture

"we are all subject in the United States to the Patriot Act and it is possible that all that information could be made available to the authorities."

The first part of his statement is reprehensible, but he's saying that these are the laws. It's been known that Patriot Act has been used for mostly non-terrorism related crimes.

http://www.washingtonpost.com/blogs/blogpost/post/patriot-act-used-to-fight-more-drug-dealers-than-terrorists/2011/09/07/gIQAcmEBAK_blog.html

Yet we continue to elect muppets who support, extend, and expand it. Google's hand seems to be forced by Fed thugs. With gag orders, unrelated FTC & other prosecutions, gov has a big arsenal against private cos.

Is Google making moral compromises to protect itself? Yes. Are other companies making more? Yes.

Tue, 07/09/2013 - 22:54 | Link to Comment NaN
NaN's picture

It was only a matter of time before the Patriot Act was used for other than its intended purpose. 

For instance, on Feb. 14, 2008, Eliot Spitzer, governor of New York, wrote a flaming editorial in Washington Post about predatory lending: 

http://www.washingtonpost.com/wp-dyn/content/article/2008/02/13/AR2008021302783.html

The piece is very critical of the Bush administration and it's defense of banks making deceptive loans without regard to ability to pay. 

One month later, Spitzer resigned on March 17, 2008 after an embarrassing payment to an escort service was dug up via the Patriot Act.

Very chilly.

 

Thu, 07/11/2013 - 02:33 | Link to Comment FreedomGuy
FreedomGuy's picture

Well, as a typical government hypocrite who actually prosecutes people for the same thing, I am happy he got nailed. It's like the cop who nails you for speeding but speeds all the time himself...and they all do.

So, I may not like the reason but I would be happy if they would eat each other alive. To say Spitzer's hooker affairs were not important is to say Spitzer is actually a good guy for taking on Wall Street. I say he was a turd,. as well and now he is running for office again.

Tue, 07/09/2013 - 21:49 | Link to Comment cynicalskeptic
cynicalskeptic's picture

"If you have something that you don't want anyone to know, maybe you shouldn't be doing it in the first place."

 

this from a company whose top 10 searches all involve 'porn' or 'sex'

http://www.youtube.com/watch?v=T-TA57L0kuc

Wed, 07/10/2013 - 05:07 | Link to Comment Bringin It
Bringin It's picture

The whole point of the argument is that I should curtail my liberty to avoid hassles with the state.

So in the Eric "google" Schmidt perfect world - we should, for example all forget about exhibiting any kind of support for a Ron Paul-type politician less we wind up in an IRS audit for our troubles.

Thanks, I'd rather have my privacy back.

Tue, 07/09/2013 - 22:39 | Link to Comment FreedomGuy
FreedomGuy's picture

My phone service contract is up soon. I have decide to forgo all Google and Android products. I will probably go I-phone but I figure the NSA is into everything, anyway. We have arrived at Big Brother and my only recourse is to boycot anyone who willingly cooperates with the State.

Tue, 07/09/2013 - 23:25 | Link to Comment Zadok
Zadok's picture

Good luck living on the moon!

Wed, 07/10/2013 - 00:30 | Link to Comment snr-moment
snr-moment's picture

Oh, I forgot.

 

I didn't really exist in the 90's

Wed, 07/10/2013 - 06:37 | Link to Comment malikai
malikai's picture

Consider that we passed through the 90s to get here.

Tue, 07/09/2013 - 22:49 | Link to Comment Strut
Strut's picture

I expect better from you Tylers... This story is nothing but fear mongering and pandering, ala FOX and CNN.

Don’t get me wrong, I despise the NSA and any company that would cave to them, but this story is nothing but bullshit. Android is 100% open source, with every single line of code available for scrutiny by anyone. I assure you every security expert worldwide, public and private, that's worth their salt has perused this code base, particularly the SE portion.

Governments (in general) have made some of the most significant advancements to the computer age. If the NSA was to do anything within its "original" mandate, I'd expect it to come from cyber security, and it's fruits to be integrated into public open-source software.

Come back when you have facts of a breach, not hyperbole.

 

Tue, 07/09/2013 - 23:02 | Link to Comment Grosvenor Pkwy
Grosvenor Pkwy's picture

I would not put SELinux at the top of the list of security problems to worry about.

 

If people want to do something effective about managing their own computer security, they should start by using the ODF (Open Document Format) standards rather than the proprietary and secret Microsoft formats for office documents. For most people, their valuable data is contained in office documents such as word processing, spreadsheets, and presentation slides. To save and maintain this info in secret MS formats which cannot be accessed or read by any other programs than MS Office is more dangerous than any of the problems alluded in this discussion.

Tue, 07/09/2013 - 23:12 | Link to Comment Strut
Strut's picture

Sorry bud, but Office documents leverage a fairly standard XML document format and can be read and written by any software designed to do so. The file formats are publicly documented.

http://msdn.microsoft.com/en-us/library/cc313105%28v=office.12%29.aspx

Office documents are the least of your worries. I'd do some more research on your personal security priorities.

Tue, 07/09/2013 - 23:19 | Link to Comment technicalanarchy
technicalanarchy's picture

There really is no way out is there?

Wed, 07/10/2013 - 00:15 | Link to Comment Strut
Strut's picture

That depends... Are you down a rabbit hole? Did you take the red or blue pill?

Wed, 07/10/2013 - 00:35 | Link to Comment Skateboarder
Skateboarder's picture

You can have all the source code in the world. But if a blob is being compiled in and you don't know what's in there instruction by instruction, control is out of your hands.

And I bet there's a shitload of blobs in Android.

Wed, 07/10/2013 - 01:00 | Link to Comment Strut
Strut's picture

True, this is possible. However, every company making android devices gets a copy of the source and builds in their "Value added software" and compiles for their hardware. I can't think of a single Android device made in the US. So you're saying that China, Hong Kong, S Korea, Japan, and India all build their phones, tablets, and PC s without verfying the code base is safe from US "spy"ware?

P.S - Why would the NSA need a backdoor to any device when they already can snoop every communication coming to/from it? 

Wed, 07/10/2013 - 05:12 | Link to Comment Bringin It
Bringin It's picture

Strut - P.S - Why would the NSA need a backdoor to any device when they already can snoop every communication coming to/from it?

That's easy - there's info, potential annotation available via the device that's not normally part of internet traffic.  GPS coords, the microphone and camera for example.

Wed, 07/10/2013 - 00:32 | Link to Comment snr-moment
snr-moment's picture

There is ALWAYS a way out.

Just don't use their crap.  You just have to replace it every 2 years anyway.

Wed, 07/10/2013 - 00:57 | Link to Comment YHC-FTSE
YHC-FTSE's picture

Yes, this article is fucking stupid. Was it sponsored by Apple? You know, the twats who make make the phones that can have their camera function remotely disabled by the police. (Patented last year), whose shitty os code is a closely guarded secret.

But it does have a point. Go look at the permissions in the app settings of most of the native android apps, and you will find that chrome, maps, google+, as well as most of the downloaded apps have complete control of everything on your device unless you put it in developer mode and fiddle with it. In fact, the only app that I found that didn't need permission to everything on my device was the RT app. 

 

 

Tue, 07/09/2013 - 23:17 | Link to Comment El Hosel
El Hosel's picture

....Eric is all lubed up and ready for a run at politics.

Wed, 07/10/2013 - 07:21 | Link to Comment TWSceptic
TWSceptic's picture

 

Google blows cock.

 

"If you have something that you don't want anyone to know, maybe you shouldn't be doing it in the first place. If you really need that kind of privacy, the reality is that search engines -- including Google -- do retain this information for some time and it's important, for example, that we are all subject in the United States to the Patriot Act and it is possible that all that information could be made available to the authorities."

-- Eric Schmidt, CEO, Google


Deserves a quote. Looks like he's a government shill, Google's motto "don't be evil" now obviously thrown out the window for good. That is if they even understand the meaning of the word.

Tue, 07/09/2013 - 21:03 | Link to Comment cougar_w
cougar_w's picture

"Wipe the rom and roll your own."

That right there will get you a room at Gitmo :)

Tue, 07/09/2013 - 22:36 | Link to Comment Uncle Remus
Uncle Remus's picture

A chat room?

Wed, 07/10/2013 - 00:03 | Link to Comment Urban Roman
Urban Roman's picture

No, they'll limit you to a usenet account. 

Tue, 07/09/2013 - 20:38 | Link to Comment SHEEPFUKKER
SHEEPFUKKER's picture

1-800-GETFUCKED

Tue, 07/09/2013 - 20:52 | Link to Comment Ban KKiller
Ban KKiller's picture

That is it....no more cell phone for my chickens. They can communicate the old fashioned way...clucking. Clucking get fucked...

Tue, 07/09/2013 - 20:38 | Link to Comment knicks3005
knicks3005's picture

Cool. I have nothing but nice things to say to you NSA. 

Tue, 07/09/2013 - 21:05 | Link to Comment CPL
CPL's picture

First thing to do when you get a piece of malware.  Torch the building and equipment.  All part of a full service IT division.  Swindle and burn deployment method.

 

http://dailycaller.com/2013/07/09/federal-agency-smashes-computers-to-de...

http://www.wired.co.uk/news/archive/2013-07/09/us-agency-overreacts-virus

A federal agency, fearing that its computer systems were widely affected by a computer virus in 2011, spent $2.7 million cutting off its email from the outside world and physically destroying computers, keyboards and computer mice to remedy the problem.

Tue, 07/09/2013 - 21:41 | Link to Comment Lost Word
Lost Word's picture

Reminds me of the Mel Gibson movie "Conspiracy Theory" (1997).

Wed, 07/10/2013 - 00:51 | Link to Comment Kiwi Pete
Kiwi Pete's picture

lol. The only consolation is that NSA workers are .gov employees too. Probably wear cardigans, socks under their sandals and brown shoes when it rains. Given the debacle over the 'Hunt for Red Snowden' can you believe otherwise?

Tue, 07/09/2013 - 20:39 | Link to Comment Yes We Can. But...
Yes We Can. But Lets Not.'s picture

Operation Fuck The Citizenry.

Tue, 07/09/2013 - 20:55 | Link to Comment Cdad
Cdad's picture

Ummm...my reaction to this, now that Google is "on an easy glide path to $1,000 per share" is.....ummmm....sell those shares, baby.  I said it about the IRS story, and I'll say it here.  This NSA thing is no small story.  And millions of Americans do not fall into the McBurger eatin', dancin' with the stars kind of folk...and they will be quite perturbed by this.  

Way to go Google!  Nice creative destruction.

I think we are going to discover that the ubiquitous smart phone is about to be a lot less ubiquitous.  After all, how many folks actually NEED one?

Tue, 07/09/2013 - 23:27 | Link to Comment Ranger4564
Ranger4564's picture

Girls like handwritten love letters scented with the sweat of a strong man anyway. Fuck the calls / texts / emails... snail mail from now on. Oh wait... they read the mail too. OK, no more communication except the intimate kind...

Fuck all that. No one should stop talking, in fact, everyone should be talking, but sadly, too many cowards who didn't do anything wrong.

Wed, 07/10/2013 - 09:15 | Link to Comment GeezerGeek
GeezerGeek's picture

Written communications should be done in cursive. The one thing I got out of the Zimmerman trial is that the younger generation can't read it, and that probably goes for the NSA as well. Especially true if one learns to write like a doctor writes a prescription.

Tue, 07/09/2013 - 20:40 | Link to Comment tmosley
tmosley's picture

Cancelling my smartphone contract tomorrow, switching to a dumbphone.

Great Satan indeed.

Tue, 07/09/2013 - 20:44 | Link to Comment One And Only
One And Only's picture

I'm going back to carrier pigeon and invisible ink.

Tue, 07/09/2013 - 20:59 | Link to Comment erg
erg's picture

Smoke signals for me...if the EPA doesn't find me.

Tue, 07/09/2013 - 21:02 | Link to Comment XitSam
XitSam's picture

Drawing on a cave wall with a piece of charcoal for me.

Tue, 07/09/2013 - 21:06 | Link to Comment Freddie
Freddie's picture

They got drones for those smoke signals, carrier pidgeons and cave art.

Tue, 07/09/2013 - 21:20 | Link to Comment francis_sawyer
francis_sawyer's picture

I was going to use navy signal flags... but my boat sunk...

Tue, 07/09/2013 - 22:54 | Link to Comment erg
erg's picture

"You sunk my battleship!" *channels Jasper Beardly* A running bingo joke I think amongst the octs.

Wed, 07/10/2013 - 06:57 | Link to Comment PT
PT's picture

It's all good.  If they listen in on my gf's chatter then they'll be driven insane by the constant, non-stop bland natter.  Serve 'em right.  Want to send a secret message?  First dress it up in innocent language and then get the local gossip to tell her gossipy friends.  If she's been on the net for more than a few months, they won't be listening.  If they are, they'll wish they weren't...

Next steps:
all serious communication leaves the phone /web
only gossip and tedious nonsense remains
serious spies go balmy wasting time listening to such crap
gossips are hired to listen to other gossips - they're the only ones with the necessary stamina, plus they'll work for EBT cards ...

Wed, 07/10/2013 - 09:17 | Link to Comment GeezerGeek
GeezerGeek's picture

We should encourage all idle young ladies with access to a smartphone to use it as much as possible, confining themselves to topics like Justin Beiber, Kim Klasslessdashian, and so on. Baffle them with BS.

Tue, 07/09/2013 - 21:10 | Link to Comment One And Only
One And Only's picture

Yeaaaaaa.....

You'll be caught by the drones in no time. Not only caught but also fined for emitting carbon in a way the government finds counterproductive to it's global warming initiatives. This ultimately results in constant IRS audits.

freedumb in 'murica

Tue, 07/09/2013 - 20:44 | Link to Comment HeavyShadow
HeavyShadow's picture

Yeah I bought a reconditioned Nokia 5140 from Hong Kong on eBay...had one before...i use it as a party phone...but, looks like it is gonna get the nod permanently when this contract is up in a few weeks...

Tue, 07/09/2013 - 20:54 | Link to Comment Papasmurf
Papasmurf's picture

Tin cans and waxed thread have limited range.  Anything else goes through the big pipe regardless of the phone attached.

Tue, 07/09/2013 - 21:47 | Link to Comment seek
seek's picture

I used to use a dumbphone and a netbook, then switched to an android smartphone. After monitoring the android's network traffic, I went back to a dumbphone. One that I routinely either forget at home or forget to reinsert the battery.

NSA has provided good code before. So I wouldn't necessarily be worried about the open-source contributions other than they might have intentional exploitable bugs (there are plenty of unintentional exploitable bugs, so it's a wash.) The far greater concern is when you get a Droid, A Galaxy, or whatever, you're not getting the standard package of open-source code, you're getting a big binary blob. In that blob is plenty of shit you don't want.

In that is probably (ha, certainty) both spy code from the phone vendor, the phone service provider and possibly the NSA.

At this point in time I'd consider any communication that takes place through any network that hasn't been verifiably secured via encryption to be compromised, and I'm not too sure about a lot of the encryption stuff; it was just recently revealed that one of the random number generators for a more recent standard was supplied with the NSA with NSA-supplied constants that implied they could de-randomize (and thus break) the encryption with just a handful of bytes.

Trust no one.

Wed, 07/10/2013 - 05:19 | Link to Comment Bringin It
Bringin It's picture

I bought a tablet because I thought would enjoy the ergonomics of reading while swinging in my hammock. 

After a day of looking at all the similar releases for each app, asking for all access, the front and back cameras, GPS, etc,

I gave it to my daughter to use at school.

Tue, 07/09/2013 - 21:54 | Link to Comment reTARD
reTARD's picture

Which FEMA camp do you expect to end up in?

-Sent from my iPhone

Tue, 07/09/2013 - 22:38 | Link to Comment Uncle Remus
Uncle Remus's picture

Hand signals.

Tue, 07/09/2013 - 23:30 | Link to Comment Ranger4564
Ranger4564's picture

They are listening to your calls, smart or dumb, and I am fairly certain that every electronic device has some sort of tracking ability... at least with cell tower triangulation.

Tue, 07/09/2013 - 20:41 | Link to Comment El Hosel
El Hosel's picture

How do they process all that noise? I bet it gets pretty expensive weeding out all the "good people"!.... Oh, and the "Honorables".

Good thing "weeding" is now legal in some states.

Do NOT follow this link or you will be banned from the site!