This page has been archived and commenting is disabled.
The Internet Is Now Weaponized, And You Are The Target
By now, thanks to Edward Snowden, it is common knowledge and not just conspiracy theory, that every bit of information sent out into the wired or wireless ether is scanned, probed, intercepted and ultimately recorded by the NSA and subsequently all such information is and can be used against any US citizen without a court of law (because the president's pet secret NISA "court" is anything but). Sadly, in a country in which courtesy of peak social networking, exhibitionism has become an art form, the vast majority of Americans not only could not care less about Snowden's sacrificial revelations, but in fact are delighted the at least someone, somewhere cares about that photo of last night's dinner. However, it turns out that far from being a passive listener and recorder, the NSA is quite an active participant in using the internet. The weaponized internet.
Because as Wired reports, "The internet backbone — the infrastructure of networks upon which internet traffic travels — went from being a passive infrastructure for communication to an active weapon for attacks." And the primary benefactor: the NSA - General Keith Alexander massive secret army - which has now been unleashed against enemies foreign, but mostly domestic.
Enter the QUANTUM program....
According to revelations about the QUANTUM program, the NSA can “shoot” (their words) an exploit at any target it desires as his or her traffic passes across the backbone. It appears that the NSA and GCHQ were the first to turn the internet backbone into a weapon; absent Snowdens of their own, other countries may do the same and then say, “It wasn’t us. And even if it was, you started it.”
If the NSA can hack Petrobras, the Russians can justify attacking Exxon/Mobil. If GCHQ can hack Belgacom to enable covert wiretaps, France can do the same to AT&T. If the Canadians target the Brazilian Ministry of Mines and Energy, the Chinese can target the U.S. Department of the Interior. We now live in a world where, if we are lucky, our attackers may be every country our traffic passes through except our own.
Which means the rest of us — and especially any company or individual whose operations are economically or politically significant — are now targets. All cleartext traffic is not just information being sent from sender to receiver, but is a possible attack vector.
... which is basically packet injection:
The QUANTUM codename is deliciously apt for a technique known as “packet injection,” which spoofs or forges packets to intercept them. The NSA’s wiretaps don’t even need to be silent; they just need to send a message that arrives at the target first. It works by examining requests and injecting a forged reply that appears to come from the real recipient so the victim acts on it.
The technology itself is actually pretty basic. And the same techniques that work on on a Wi-Fi network can work on a backbone wiretap. I personally coded up a packet-injector from scratch in a matter of hours five years ago, and it’s long been a staple of DefCon pranks.
Traditionally, packet injections has been used mostly for censorship purposes:
The most infamous use of packet injection prior to the Snowden leaks was censorship, where both internet service providers (ISPs) and the Great Firewall of China injected TCP reset packets (RST) to block undesired traffic. When a computer receives one of these injected RST packets, it closes the connection, believing that all communication is complete.
Although public disclosure forced ISPs to stop this behavior, China continues to censor with injected resets. It also injects the Domain Name System (DNS) — the system all computers use to turn names such as “www.facebook.com” into IP addresses — by inserting a fake reply whenever it sees a forbidden name. (It’s a process that has caused collateral damage by censoring non-Chinese internet traffic).
And user identification, especially in making Tor obsolete. That's right: all users of Tor believing they hide behind the veil of anonymity - you aren't.
User cookies, those inserted by both advertising networks and services, also serve as great identifiers for NSA targeting. Yet a web browser only reveals these cookies when communicating with such sites. A solution lies in the NSA’s QUANTUMCOOKIE attack, which they’ve utilized to de-anonymize Tor users.
A packet injector can reveal these cookies by replying to an unnoticed web fetch (such as a small image) with a HTTP 302 redirect pointing to the target site (such as Hotmail). The browser now thinks “hey, should really go visit Hotmail and ask it for this image”. In connecting to Hotmail, it reveals all non-secure cookies to the wiretap. This both identifies the user to the wiretap, and also allows the wiretap to use these cookies.
So for any webmail service that doesn’t require HTTPS encryption, QUANTUMCOOKIE also allows the wiretap to log in as the target and read the target’s mail. QUANTUMCOOKIE could also tag users, as the same redirection that extracts a cookie could also set or modify a cookie, enabling the NSA to actively track users of interest as they move across the network — although there is no indication yet that the NSA utilizes this technique.
But all of the above are largely passive interception and surveillance strategies. Where it gets interesting is when the NSA's mission is...
User Attack
The NSA has a collection of FOXACID servers, designed to exploit visitors. Conceptually similar to Metasploit’s WebServer browser autopwn mode, these FOXACID servers probe any visiting browser for weaknesses to exploit.
All it takes is a single request from a victim passing a wiretap for exploitation to occur. Once the QUANTUM wiretap identifies the victim, it simply packet injects a 302 redirect to a FOXACID server. Now the victim’s browser starts talking to the FOXACID server, which quickly takes over the victim’s computer. The NSA calls this QUANTUMINSERT.
The NSA and GCHQ used this technique not only to target Tor users who read Inspire (reported to be an Al-Qaeda propaganda magazine in the English language) but also to gain a foothold within the Belgium telecommunication firm Belgacom, as a prelude to wiretapping Belgium phones.
One particular trick involved identifying the LinkedIn or Slashdot account of an intended target. Then when the QUANTUM system observed individuals visiting LinkedIn or Slashdot, it would examine the HTML returned to identify the user before shooting an exploit at the victim. Any page that identifies the users over HTTP would work equally well, as long as the NSA is willing to write a parser to extract user information from the contents of the page.
Other possible QUANTUM use cases include the following. These are speculative, as we have no evidence that the NSA, GCHQ, or others are utilizing these opportunities. Yet to security experts they are obvious extensions of the logic above.
HTTP cache poisoning. Web browsers often cache critical scripts, such as the ubiquitous Google Analytics script ‘ga.js’. The packet injector can see a request for one of these scripts and instead respond with a malicious version, which will now run on numerous web pages. Since such scripts rarely change, the victim will continue to use the attacker’s script until either the server changes the original script or the browser clears its cache.
Zero-Exploit Exploitation. The FinFly “remote monitoring” hacking tool sold to governments includes exploit-free exploitation, where it modifies software downloads and updates to contain a copy of the FinFisher Spyware. Although Gamma International’s tool operates as a full man-in-the-middle, packet injection can reproduce the effect. The injector simply waits for the victim to attempt a file download, and replies with a 302 redirect to a new server. This new server fetches the original file, modifies it, and passes it on to the victim. When the victim runs the executable, they are now exploited — without the need for any actual exploits.
Mobile Phone Applications. Numerous Android and iOS applications fetch data through simple HTTP. In particular, the “Vulna” Android advertisement library was an easy target, simply waiting for a request from the library and responding with an attack that can effectively completely control the victim’s phone. Although Google removed applications using this particular library, other advertisement libraries and applications can present similar vulnerabilities.
DNS-Derived Man-in-the-Middle. Some attacks, such as intercepting HTTPS traffic with a forged certificate, require a full man in the middle rather than a simple eavesdropper. Since every communication starts with a DNS request, and it is only a rare DNS resolver that cryptographically validates the reply with DNSSEC, a packet injector can simply see the DNS request and inject its own reply. This represents a capability upgrade, turning a man-on-the-side into a man-in-the-middle.
One possible use is to intercept HTTPS connections if the attacker has a certificate that the victim will accept, by simply redirecting the victim to the attacker’s server. Now the attacker’s server can complete the HTTPS connection. Another potential use involves intercepting and modifying email. The attacker simply packet-injects replies for the MX (Mailserver) entries corresponding to the target’s email. Now the target’s email will first pass through the attacker’s email server. This server could do more than just read the target’s incoming mail, it could also modify it to contain exploits.
Amplifying Reach. Large countries don’t need to worry about seeing an individual victim: odds are that a victim’s traffic will pass one wiretap in a short period of time. But smaller countries that wish to utilize the QUANTUMINSERT technique need to force victims traffic past their wiretaps. It’s simply a matter of buying the traffic: Simply ensure that local companies (such as the national airline) both advertise heavily and utilize in-country servers for hosting their ads. Then when a desired target views the advertisement, use packet injection to redirect them to the exploit server; just observe which IP a potential victim arrived from before deciding whether to attack. It’s like a watering hole attack where the attacker doesn’t need to corrupt the watering hole.
Can anything be done to prevent the NSA's internet army from running over a world that spends the bulk of its time in its reaches? Not much:
The only self defense from all of the above is universal encryption. Universal encryption is difficult and expensive, but unfortunately necessary. Encryption doesn’t just keep our traffic safe from eavesdroppers, it protects us from attack. DNSSEC validation protects DNS from tampering, while SSL armors both email and web traffic.
There are many engineering and logistic difficulties involved in encrypting all traffic on the internet, but its one we must overcome if we are to defend ourselves from the entities that have weaponized the backbone.
Alas, in the battle against the NSA, the biggest enemy is not the authoritarian state's Super Big Brother, but apathy itself. It is that war that is by far the most important one, and which America has already lost.
- 44173 reads
- Printer-friendly version
- Send to friend
- advertisements -


Faraday bag problem solved with cellphones. If it can't transmit, you know the rest. From a power requirement standpoint, distance and the FCC is your friend in a car when it comes to transmit and receive. Everything else becomes easy to spot from there on in if you know what to look for.
There is nothing new under the sun just new technology in a different system with the same underlying problems. The solutions remain the same.
agreed on the SSL/HTTPS.. makes you wonder....
Well at least the NSA crashed IBM, CISCO and other tech giant's sales and moved any serious threats against the NWO banking regime outside of their scrutiny.
Long live the Boondoggle.
Got told by people smarter than me not to trust Tor a while ago.
Another bitcoin dip vector coming up.
It's over.
Introducing Accountability to Anonymity Networks
http://arxiv-web3.library.cornell.edu/abs/1311.3151
Over.
Earth begins a 15 day pass through "ISON's" debris field approximately Dec 20-21st.
If they haven't powered down the grid with a false flag in advance, it's likely to happen then.
People need to rethink life without electronics for the foreseeable future and start forming small survival groups in preparation.
If nothing happens, the worst will be that the NSA knew you were prepared.
Steam donkey your Tesla coils!
Standing In That Line ?
Old school/ Dreams
LOL
TIME TO PICK OFF THESE FUCKERS!!!
Okay, so like, who wants to go first..?
Second. Snowden went first.
It's gonna be a case by case basis. There can be no "going after them"...individuals will have to understand the depths to which our criminal government(s) have sunk, and what it means - that is, what the implications are - of them coming for you (if they ever do). Whether it is a SWAT visit or men in suits, it will have originated from the same source, prompted by the same policies, and ultimately will result in the same outcome...ruining your life.
Understanding that, act accordingly.
Very interesting article. Thanks ZH
Soon we will be encripting everything, even pictures of last nights dinner
Ok - so when does the ZH website start to finally support HTTPS?
Most everything Tyler plugs is open/direct or :HTTPS
If you can't get it dirrect, someone will help you, with a link.
But ZH itself (and thus comments) isn't https accessible. I'd happily drop a full bitcoin onto Tyler as a donation if it'd speed up https support.
Seek, you're so kind.
SSL is only $70 a year or so. IIt's a matter of wanting to secure the site, not a matter of money.
You are being watched. The government has a secret system, a machine that spies on you every
hour of every day. I know because I built it. I designed the Machine to detect acts of terror
but it sees everything. Violent crimes involving ordinary people. People like you. Crimes the
government considered "irrelevant." They wouldn't act so I decided I would. But I needed a
partner. Someone with the skills to intervene. Hunted by the authorities, we work in secret.
You'll never find us. But victim or perpetrator, if your number is up, we'll find you.
You have a note pad and a Tivo or other time shifting device. I can see you.
Hi, Tyler,
A little something extra to add to the markets confusion.
With regard to the speculation aired in the statement …“It appears that the NSA and GCHQ were the first to turn the internet backbone into a weapon;” ….. be advised that it is not possible that both agencies, unless they out themselves as being in reality just the one agency stealthily working covertly and clandestinely in the guise of two wholly separate national agencies, are able to make the claim to be first.
And even should those two seemingly different national mirror organisations, the NSA and GCHQ, be secretly and in all probability and likelihood acting as one and in all manner of different state actor roles impacting on events with leading intelligence/reactionary movement of resources,…. and that would require quite a rare and not insignificant amount of raw joint source intelligence, methinks, which y’all might agree would be just too unbelievable for many/any folk to accept would exist within the ranks and executive of such agencies .... can the claim still be entirely wrong and misleading.
However, that is probably something which you would expect the likes of a GCHQ or NSA to say about such things as QUANTUM and C42 Quantum Communication Control Systems …. AI@ITsWork, in order to allow them to progress swiftly further forward and onward and deeper and darker into the light of their programs.
Whether or not they can admit and submit that the following be one of their project operations, is something which one would surely only need to ask of them to find out. And if it be not one of theirs, then obviously be it someone else’s, and if it be in a similar field of Work, REST and Play that they might be engaged in and exploring, then would/could it be valuable support and drivering competition and/or even disruptive creative opposition. It would certainly be ….. well, definitely a challenging enigma it would be catastrophically foolish to ignore?
“The Virtual AI Operating System ……… with the Internet and ITs Global Information Grids Networking as the VAIOSystem Software Store Source, Providing Novel Innovative Virgin Source Code as Special Lead Content in Website Domains/Freely Accessible CyberSpace Environments …. and ITs HyperRadioProActive Drivers being IT and Media as the HardWired Hardware Deliverers of Future World Views. ….. which is surely a Kin to Panoramas and Vistas and Bigger Picture Shows in the Great Advanced IntelAIgents Game ….. only Better and in Betas, Testing and Tempting Systems to FailSafe in their Configuration and Design.”
They can't build a functioning website, but they can hack extremely well.
Well, at least if the grid goes down due to either resource constraints, solar storm, natural or other disasters, this will all be a moot point afterwards. But be careful how you are trying to position yourself for the unexpected events that no one could see coming in the meantime.
Good for you NSA. I traded for another gun today and I traded for it with silver. No background checks, no nothing, no paper and there was no paper on the seller either. So what are you going to do about that NSA?
Hey Beavis NSA, do you have some hot college intern chicks that can, like, suck my cock?
It's fairly safe to assume you're being monitored with "burnt" desert.
Zero Hedge is a breeding ground idiriocracy
Talent Art or Talent?
Bitchez/
+1 for "Bitchez" Yen. Haven't seen that for a while. Fuck Yellen.:-)
Not much can be done? I disagree. Start putting NSA personnel in REAL prisons and this shit will stop "toot sweet."
You want to stop this. Start putting the faces of the people who work for the NSA CIA and any bad law enforcement officers every where. We the people need to now the enemy. Boycott their families and any business they own. Keep your politics local that is where they are beating you.
//I believe freedom resides deep into each one of us. We should try some introspection.
.
The battle is actually who or what is going to move the masses.
Do not bet on it that masses will be outraged by "logical" things such as self-securization, debasement of currency, militarization of the internet, FEMA camps, wars etc. They actually do not care too much although government popularity will not rise.
What will the masses go postal are their irrational fears. Some imaginary examples could be:
- government decides to license every gun
- Independence Day will be abolished as being too expensive
- Protection of Turkey Act: sorry, no turkeys during Thanksgiving anymore and food retail outlets will be checked by armed guards.
- All movie cartoon characters will now have to be 20/30/30/10/10: white/black/asian/mexican/physically challenged. Because it is fair.
Have a look at "The Century of Self": mind blowing BBC documentary: http://vimeo.com/61857758
15/40/5/30/10
(secret: 14.5 of white is juice representing their multi-continent kingdoms)
Over.
"Have a look at "The Century of Self": mind blowing BBC documentary: http://vimeo.com/61857758"
Good link.
Your "imaginary examples" are ridiculous! It would be like suggesting that the State would require schools to indoctrinate our children, without our knowledge and/or contrary to our consent, on matters relating to the structure and composition of a family, and our objections would run afoul or hate-crime laws.
I would reccomend Althusser's readings. The Cultural, Ideological State's Apparatus (SIA).
He developed the concept to denote institutions such as education, the churches, family, media, trade unions, and law, which were formally outside State control but which served to transmit the values of the State to interpellate those individuals affected by them, and to maintain order in a society, above all to reproduce capitalist relations of production. In contemporary capitalist societies education has replaced the Church as the principal ideological State apparatus. Mass education in order to make everybody fixing into the System, making most of us to be "Another brick in the Wall" (No wonder Pink Floyd's song has become a "classic").
Add to that (which doesn't need much research to be proved) the fact that the State is controlled by Corporations and here you have this System ruled by a bunch of oligarchs who insanely run the World.
Lesser stuff you need, freerer you are.
The only thing people can do and it is fundamental to protecting privacy against those who have power in any form, governments, intelligence agencies, list is endless.
The OS must be your own it cannot be anothers like Microsoft, Apple, Linux etc. How do you inject data and packets into an OS that is an unknown and may not use these concepts? LOCKED OUT you don't.
You negate the update packages that can leave you more vunerable not necessarily less.
This point is a must and if you cannot do this then you will always be vunerable.
LIKE SHOOTING DUCKS AT THE FAIR!
You inject them into the browser. Don't care what the OS is, as long as the browser has java and flash and whatnot. You can always run lynx on an old linux console from the 90s, but there is a whole lot of the web that you just can't browse with that.
You can do packet injection from home, this weekend; Nemesis
Have fun!!
Don't forget Scapy/
http://www.secdev.org/projects/scapy/
with 3D traces.
Over.
People with more than half a brain have always assumed that ANYTHING you post can eventually ne traced to you, and any email can be intercepted.
Moral: Don't say anything you would not care to repeat in a court of law or see on TV. "Rabies-mouth" just won't cut it anymore.
Moral: If one neglects the noisy but otherwise harmless carnival barkers, the real threats to TPTB will simply be driven deeper and resort to old-fashioned communication and networking.
Moral: Mind your Ps & Qs. Loose lips sink ships. Proceed on Principles, rather than emotion, since the former are harder to beat than the former.
Tip: If you are truly serious about your privacy, you MUST have two computers. One that is NEVER connected to the Matrix, and the one that is connected serves as a dummy terminal with nothing on it. Use a USB thumb-drive to port data between the two.
Mossad infected my thumbdrive with the soon to be known Rabbi Krinsky virus and he sucked my quarantined system dry like only a bris-bot could do.
Over.
The board was set long ago, the opening and middle game are past, and we're moving fast and furious in a complicated end game.
Unplug from the net and run your computer, if you really need one, locally using solar cells and/or a windmill for power.
maybe it's time to go offline completely and go back to the past-- circa 1980. it's not like we were living in caves back then.
Informationally speaking, yes...we were kinda living in caves...
This is all how it needs to be.
How it HAD to be.
good thing the NSA didn't code healthcare.gov ...
Dear Mr. Taxpayer,
We have enrolled you in the affordable care act exchange. No action is required by you, as we have determined your income and expenditures and have set your monthly premium at $1,000.00 per month. To further assist you, we have set up a direct deposit from your bank account to make premium payments. We take the security of your private information very seriously, so for your protection, we have assigned 2048-bit encrypted identification and password to prevent changes to your bank account. Similar protections have been provided for you regarding your online direct deposit.
Sincerely,
NSA
p.s. "clear recent history" doesn't really clear it ... you are disgusting.
fear the man with tiny hands bitchez!
packet injection is an old tool...
If you notice the problem is the end users not taking proper security precautions as far as these exploits are concerned. That also includes MITM type attacks. Firefox has plugins to deal with all those webbrowser and redirect attacks. Noscript is a good plugin to deal with the majority of the exploits they taking advantage of. Then there is a plugin like noredirect or firebug or tools like redirect detective. Everyone likes to not talk about flash cookies for some reason aka LSO there is a plugin for that called better privacy. Add ad blockers into the mix. Basically the more you shut off the less can be exploited, it is quite simple actually.
Run lean and mean and run unattribed.
There is nothing new under the sun just new tools and technology solving the same base problems.
Up
Crane the lot of them. Administration for no spine nor honesty, Banksters for stealing from the public and dishonesty, Regulators for lack of spine, dishonesty, and failing to lock up a single banker since 2008, and MSM for dishonesty and treachery - sleeping with the enemy, Maria?
All of the above brought to you via http://www.zerohedge.com.
Exactly.
Double agents, skilled in the art of deception. A honeypot designed by israeli's to capture and sell their nuggets to the highest bidding alphabet agency.
"HVEs make use of a diverse online environment that is dynamic, evolving, and selfsustaining. This online extremist environment is likely to play a critical role in the foreseeable future in radicalizing and mobilizing HVEs towards violence. Despite the removal of important terrorist leaders during the last several years, the online environment continues to reinforce an extremist identity, supplies grievances, and provide HVEs the means to connect with terrorist groups overseas."
Over.
BitCoin
High:$477.00000
Last price:$467.99998
. All of them—the price listed by online exchanges, the number of new ... The change has occurred as enriched bitcoin miners have ... The ASICs in these computers are specifically hardwired to compute the Bitcoin SHA-256 hash. ... now fail to mine enough bitcoins to pay for the electricity running them.
***
THE MINING OF A BITCOIN, NOW EXCEEDS ITS COST IN ELECTRICITY,...
Funny that its never mentioned?
Ok, for gold the price will always be +/- the cost of taking it from the ground, but the cost of a 'bitcoin' in NO fucking way should be based on its 'cost to mine', cuz it ain't mined, its pulled out of a computer's arse, the fact is its a failed algorithm, and only those with quantum computer's can mine,... funny that only the NSA has quantum computers, funny indeedy
One has to wonder what causes those who believe they are "in charge", "responsible" or even "using" this world ... to feel they need to monitor and control every bit of human experience/thought. My first thought is "fear" ... but fear of what???
Then I think that maybe they are monitoring everything and trying to control everything and maybe they are not. However, it would be fear that makes them want us to believe they are trying to monitor and control everything, even if they are not. They want us to believe that we are being constantly watched, even if they have nowhere the capacity to act on everything they are watching ... unless they do it en masse and not individually.
They can probably store the sum of all human public knowledge and a fair amount of private knowledge and certainly have created many hardened and secret temporal data centers out in the open and deep underground ... maybe elsewhere. Why? So that they can rebuild later... as those who did after the last cataclysm did ... secreting away knowledge for themselves and depriving the rest of the world of it?!?
What do THEY fear ... and why?
Goofy thoughts, eh? But the real important questions generally involve the word "why"? We can only free ourselves from fear internally. It does not come from outside. And freeing ourselves from fear is how we really become free, regardless of what is happening to us within the world we experience.
I was having the same conversation with myself recently.
Why?
A government that can't manage to create a simple web-site to sign up for the ACA, yet somehow is capable of knowing everything I do on the net, just doesn't "compute".
I used to work for the government, I know that the hardest workers are the clerks, the "paper pushers", all the rest get to be glorified on TV shows. Well guess what, that is all a fantasy portrayal, it doesn't work like that, it's not real, I know how inept they really are, and they don't scare me.
Of course it computes. The Obamacare website doesn't work because it was never suppose to work. It costs the taxpayers $500 million "to develop" the software. A site developer CEO said recently that he would have been happy to take the contract for an even million and guarantee that it would work perfectly at the rollout. So Michelle's friend could have subcontracted the work to someone competent, pocketed the $500MM, paid out $1MM and walked away with $499MM in net profit, and delivered a perfect website. The question is not why couldn't they deliver a site that works, but rather why have they chosen not to? Then you have to start peeling off layers of the onion.
What exactly is the gubmint 'efficient at', ... nothing comes to my mind.
Even the IRS requires you to 'report on yourself',
The simple fact is there is nothing to fear, ... except being in their GAYDAR.
Problem best advice is dress like a cop, live like a cop, ... and being a boring asshole like a cop.
But just like the annual fear in the press during APRIL every year when their are fear story's FED by the IRS to scare people into filing, ...much of the fear's on ZH are 100% bullshit, just to keep morons ( +97% of america in line ).
I think long ago in 1963 Malcolm X said it best "NEVER give whitey credit for conspiracy,... he ain't smart enough"
You just have to look at the FBI, or TSA, or fuck at social security or the post-office, ... to know the USA is fucked,
Look at fucking snowden, drop-out, no real school, gi-rine fallout, and gets job for security at a school, then goes to cia, then nsa, and he's given top security passwords, aka 'system manager', ...
Yep, the USA collects lots of shit, ... that's easy to tap, but analysis is largely driven towards listening to 'potty talk', besides real criminals know to take out the battery's of their phone, or not use a computer, ... shit all this stuff is only for stupid people, and all the technology sold to the government 90% doesn't work, or COMMUNICATE with another, ..
Look at recent killing of Miriam Carey in DC a few months ago, 1,000's of cops on training, and they couldn't communicate, and the message they did get was a terrorist was shooting the place up, turned out it was cop's shooting the place up,
Nope the GUBMINT is a 100% FRAUD and incompetent, and you simply have to keep low enough on the GAY-DAR to make yourself invisible,..
Advice for when going through the airport, leave shit (FECES) in all your under-wear and clothes, nothing will stop a cop quicker than shit on his hands, and there is no law against bad hygiene,... Want to hide from a cop? Go hide in a nasty dirty, wet place that has no donuts or hot coffee.
the internet was planned for and designed to be used as a weapon in this manner from the very beginning before it was even rolled out to the public.
Just like home PC's with Windows o/s on them were always designed with back doors wide open for the right/wrong kinda people to be able to exploit and hack.
Like one of my mentors said one time many years ago. Windows is not an o/s that is vulnerable to viruses...the Windows o/s IS the virus because it was designed that way from the very beginning to be so wide open.
"Windows o/s on them were always designed with back doors wide open"
I always thought, around 1998ish when the DOJ had them by the balls, http://en.wikipedia.org/wiki/United_States_v._Microsoft_Corp.
The DOJ was pushing the string for NSA's need to co-opt the OS. Keep your billions vs lose your billions and be vilified. What's an ivy league boy to do?
If you agree we'll send in the 60 minutes crew to clean up your image.
Over.
Agreed. The bullying would only stop if they got what they wanted. Now we know precisely what they wanted.
https://wikileaks.org/freesnowden
" and it’s long been a staple of DefCon pranks."
heh heh
hee hee.
HOO HOO HA HA HA HA!
Good times.
You are the targets! This is particulary true with respect to the financial "nervous system" or the payments and settlements network. Several scenarios suggest that the ultimate target in fifth domain warfare is not "the bank" but rather the individual. There are a ratther long list of vulnerabilities to this critical system, upon which the whole modern financial systems depends - including deritavties. See more at: http://www.brokenmirrors.ca/?p=203 and at http://www.brokenmirrors.ca/?p=252 or listn to the podcast at: http://www.brokenmirrors.ca/?p=261
hedgeless horseman, I like your silverware.
Well just add this to the file NSA, FU NSA. FU with the little #10 at the top right. Actually make it a #64.
Yea, a 64 might be more appropriate.
Beware of the Smart Grid.
CIA Director calls Smart grid "Stupid" due to Security problemshttp://www.youtube.com/watch?v=MAid1bS8t9U
Hmmm. Law enforcement confiscates a computer - not only to look for incriminating evidence, but to remove evidence of government weaponization (cookies, extra packets, etc.) so evidence of illegal gov't tampering can't be used as a defense in court!
Mind bender.
Calling this shit 'weapons', is no fucking different than running the BTC sw and calling that 'mining',
The problem is the ORWELLIAN use of words is complete fucking bullshit.
A weapon kills people, and nobody is fucking harmed by viruses, gub or private, and nobody get their hands dirty from 'mining' btc's, they only waste resources,
So much of the zero-hedge posts are just the same boring fucking 'news' you might find on any 'conspiracy' website, ... hardly shit here anymore about the 'real economy'.