Outside the Cube (31)
Computer Hardware (4)
Dating Scams (6320)
Male Dating Scammers (52982)
Microsoft Scammers (211933)
Other Scams (423887)
Spammer Businesses (847779)
Web publishing (134)
About this site
Links to us
General :: Outside the Cube
Here you find other interesting categories and articles, that are not software engineering / IT related.
This list is sorted by recent document popularity (not total page views).
New documents will first appear at the bottom.
Recommended links on this topic:
- Swedish Snus - Smokeless Tobacco Snus - Swedish-snus.info Snus. The encyclopedia about snus - swedish snus - the unique swedish smokeless tobacco snus. This is the place where you get more information on Swedish snus, snus history, snus brands, snus articles and much more.
- Dating and Marriage Agency Roksolana pretty ukrainian brides,single lady from ukraine,dating and marriage services,gifts and flowers delivery,email correspondence,phone call conference,fiancee visa,personal tours,entertainment
Generated 16:01:42 on May 23, 2019
Does the NSA track your internet traffic?
I found this first in the German 'Spiegel' magazine, then in English on http://blog.wired.com/27BStroke6/
I added some notes.
It's not surprising that an expert hired by EFF should produce an analysis that supports the group's case against AT&T. But last week's public court filing of a redacted statement by J. Scott Marcus is still worth reading for the obvious expertise of its author, and the cunning insights he draws from the AT&T spy documents.
An internet pioneer and former FCC advisor who held a Top Secret security clearance, Marcus applies a Sherlock Holmes level of reasoning to his dissection of the evidence in the case: 120-pages of AT&T manuals that EFF filed under seal, and whistleblower Mark Klein's observations inside the company's San Francisco switching center.
If you've been following Wired News' coverage of the EFF case, you won't find many new hard revelations in Marcus' analysis -- at least, not in the censored version made public. But he connects the dots to draw some interesting conclusions:
- The AT&T documents are authentic. That AT&T insists they remain under seal is evidence enough of this, but Marcus points out that the writing style is pure Bell System, with the "meticulous attention to detail that is typical of AT&T operations."
- There may be dozens of surveillance rooms in AT&T offices around the country. Among other things, Marcus finds that portions of the documents are written to cover a number of different equipment rack configurations, "consistent with a deployment to 15 to 20" secret rooms.
- The internet surveillance program covers domestic traffic, not just international traffic. Marcus notes that the AT&T spy rooms are "in far more locations than would be required to catch the majority of international traffic"; the configuration in the San Francisco office promiscuously sends all data into the secret room; and there's no reliable way an analysis could infer a user's physical location from their IP address. This, of course, directly contradicts President Bush's description of the "Terrorist Surveillance Program."
- The system is capable of looking at content, not just addresses. The configuration described in the Klein documents -- presumably the Narus software in particular -- "exists primarily to conduct sophisticated rule-based analysis of content", Marcus concludes.
My bullet points don't come close to conveying the painstaking reasoning he lays out to back each of his conclusions.
Perhaps the most interesting -- and, in retrospect, obvious -- point Marcus makes is that AT&T customers aren't the only ones apparently being tapped. "Transit" traffic originating with one ISP and destined for another is also being sniffed if it crosses AT&T's network. Ironically, because the taps are installed at the point at which that network connects to the rest of the world, the safest web surfers are AT&T subscribers visiting websites hosted on AT&T's network. Their traffic doesn't pass through the splitters.
With that in mind, here's the 27B Stroke 6 guide to detecting if your traffic is being funneled into the secret room on San Francisco's Folsom street.
Note: This room is physically only accessible to NSA (National Security Agency) staff.
If you're a Windows user, fire up an MS-DOS command prompt. Now type tracert followed by the domain name of the website, e-mail host, VoIP switch, or whatever destination you're interested in. Watch as the program spits out your route, line by line.
C:\> tracert nsa.gov
1 2 ms 2 ms 2 ms 126.96.36.199
7 11 ms 14 ms 10 ms as-0-0.bbr2.SanJose1.Level3.net [188.8.131.52]
8 13 12 19 ms ae-23-56.car3.SanJose1.Level3.net [184.108.40.206]
9 18 ms 16 ms 16 ms 220.127.116.11
10 88 ms 92 ms 91 ms tbr2-p012201.sffca.ip.att.net [18.104.22.168]
11 88 ms 90 ms 88 ms tbr1-cl2.sl9mo.ip.att.net [22.214.171.124]
12 89 ms 97 ms 89 ms tbr1-cl4.wswdc.ip.att.net [126.96.36.199]
13 89 ms 88 ms 88 ms ar2-a3120s6.wswdc.ip.att.net [188.8.131.52]
14 102 ms 93 ms 112 ms 184.108.40.206
15 94 ms 94 ms 93 ms 220.127.116.11
16 * * *
17 * * *
18 * *
In the above example, my traffic is jumping from Level 3 Communications to AT&T's network in San Francisco, presumably over the OC-48 circuit that AT&T tapped on February 20th, 2003, according to the Klein docs.
The magic string you're looking for is sffca.ip.att.net. If it's present immediately above or below a non-att.net entry, then -- by Klein's allegations -- your packets are being copied into room 641A, and from there, illegally, to the NSA.
Of course, if Marcus is correct and AT&T has installed these secret rooms all around the country, then any att.net entry in your route is a bad sign.
I found this article on Wired.com and performed the test on my machine, with the same result.
|Most recent comments
in Male Dating Scammers
on Dating scammer Sergeant Dylan Daniel:
Hola.. ahora ese sujeto se hace pasar por el nombre de Mark Raymond from tengan cuidado usa los mismos fotos y que envía un paquete y que uno tiene que pagar el desembolso..es un estafador.. Saludos ... read more
in Dating Scams
on Primer for first time visitors (Dating Scams):
does anyone have information if she is a scam?
in Dating Scams
on Dating scam artist Sindy Becky Green in Ashley, Ohio (Lagos, Nigeria):
in Dating Scams
on Dating scammer Sandra Da_Rocha from Accra/Ghana:
check this [url= https://best-vibrati..ldos[/url] ,[url= https://best-vibrati...html]butt plug with tail[/url]
in Other Scams
on The UK NATIONAL LOTTERY scam:
?היי יש לי לקוחות חדשים בשבילך יכל לעניין אותך
on Submit data from more than one form on one page?:
· Учреждений разных видов деятельности
* За все время победители закупок за все года
· Кто заказывал тен ... read more
on Well-respected bank offering Payday loans:
We are authorized Financial consulting firm that work directly with
A rated banks eg Lloyds Bank,Barclays Bank,HSBC bank etc
We provide BG, SBLC,and lots more for clients all over the wor ... read more
in Dating Scams
on Is this Russian girl scamming me? How to recognize scammers:
Scamers located in NY.Flushing, Apex pl and 63th ave !!!!! 4 illegal Aliens, in the backyard !!!!!
on Connecting a Motorola V phone with your PC - USB Data Cable problems:
Hey, my name is Tony and I was just looking your website delphifaq.com over and thought I would message you on your contact form and offer some help. You have a great website but it doesn't seem to ha ... read more
in Dating Scams
on Dating scammer Tatyana (photos: Raven Riley):
Anna (see above photos) has been scamming me calling herself Aleksandra.
Ill be searching for the first one that scammed me...... I was dumb enough to send her money, but cut
off contact ... read more