Please Scroll Down to See Forums Below
napsgear
genezapharmateuticals
domestic-supply
puritysourcelabs
UGL OZ
UGFREAK
napsgeargenezapharmateuticals domestic-supplypuritysourcelabsUGL OZUGFREAK

The Feds are all over the boards!

pitbullstl said:
And we have a winner........right on the money SK:D


And JA....I am not saying they will do it over gear related issues...but it has been done

java is decompilable, but that doesn't mean the encryption is decompilable also.....as i said earlier, if the encryption is a strong as they claim there would be VERY few people in this world if any that could crack it, and if they did it would take a team of engineers.....they would probably have an easier time trying to hack your password
 
Skepticore said:
sk*, just because source code is visible does not necessarily mean that the encryption is flawed. The source code for the most successful encryption app of all time, PGP, used to be published. It was available for anyone to look at. Now that they've sold out to a commercial endeavor, word has it that there is now a back door built in. Of course, the source code is now unavailable for the commericial product. But my point is, modern encryption work off mathematical algorithms that do not rely upon the source code being compiled. In other words, its strength lies in its mathematics, not its "code".


As for feds watching the board: why not assume they are? If it's possible, you'd be a fool to ignore this possibility. And ranting at the agents is a waste of time; they do their jobs just like the rest of us. I don't say, "Let's kill anyone who delivers Budweiser!" if I disagree with legalized alcohol sales; Budweiser delivery guys are just doing their dman jobs! I go to my local politicians and say, "Make this a dry county." (I drink, so this is just an example, but you get my point.) :D

If you don't like what they're doing, complain to the RIGHT source. Voting booths and lobbyists offices are good places to start...

EXACTLY what i was trying to say
 
Re: Need SERIOUS advice on registering with Elite Fitness via anonymous proxy

Bulldog_10 said:
Not really bro...I am in college...and I use a different computer pretty much every time i log on...


you may use a different computer bro, but ALL the computers in your campus domain are in a range of "private" Ip addresses, when what you do goes out to the internet it goes via a public IP address assigned to your campus which can then be tracked back to the firewalls at your school which can track the headers on the log packet back to the machine you were sitting on via the MAC address, they can then look at login logs on the domain controller and find out you were the one logged into that machine at the time it happened.......so you are not safe by doing that......
 
DRRman said:
the ISP's may hav a log of your connections and what you viewed/seen online, but they DO NOT keep all the packets on a server bro....im a MCSE and a system admin, the packets are encrypted and transferred over teh internet, then decrypted on the receivers computer.....ISP servers do not store data communication packets as it would take up millions of terabytes of data and would make the internet so slow it would be impossible to surf.......but you are right about them intercepting the packets while leaving your machine, but it would not be an easy effort to decrypt the encryption hushmail claims to be using.......if they are really using it that is.......it could be done im sure, but would take much time, money, and effort

True, but the NSA and FBI (2 versions) of carnivore are installed at almost any major ISP in USA.

United States - Total Informational Awaren
A project of the United States Department of Defense, Total Informational Awareness (TIA) is designed to gather personal data on a grand scale, including emails, phone calls, financial records, transportation habits, and medical information. Its proponents believe that by scanning and analyzing this massive pile of data, government agents will be able to predict and prevent crime. Many specifics concerning this plan have yet to be determined, including methods to protect the security of the warehoused information and other prevent unauthorized access. It is known, however, that the U.S. government is already funding projects to develop tools that could be used as part of this system, including software to predict an individual's behavior based on what that person does online. Reports indicate the state of Florida (with Federal support) is developing a system (called the MATRIX) that is broadly similar to TIA.

United States - Carnivore
This Internet surveillance program, which is currently being used by the United States government, is somewhat similar to ECHELON. Contrary to prior assertions, a subsequent government-commissioned review panel found that Carnivore is indeed capable of collecting all communications over the segment of the network being surveilled: "The results show that all TCP communications on the network segment being sniffed were captured by Carnivore." Moreover, the default configuration is to do just that: "When turning on TCP full mode collection and not selecting any port, the default is to collect traffic from all TCP ports." Carnivore is now being replaced by an even more powerful system, known as DCS 1000 or Enhanced Carnivore, which reportedly has higher capacity in order to deal with speedier broadband networks. The United States government also has issued a controversial field guidance memorandum regarding the installation and operation for this family of surveillance tools.

United States - Oasis & Fluent
United States intelligence officials have developed two programs which many experts believe may be used to enhance ECHELON's capabilities. One of these programs, Oasis, automatically creates machine-readable transcripts from television and audio broadcasts. Reports indicate that Oasis can also distinguish individual speakers and detect personal characteristics (such as gender) then denote these characteristics in the transcripts it creates. The other program, FLUENT, allows English-language keyword searches of non-English materials. This data mining tool not only finds pertinent documents, but also translates them, although the number of languages that can currently be translated is apparently limited (Russian, Chinese, Portuguese, Serbo-Croatian, Korean and Ukrainian). In addition, FLUENT displays the frequency with which a given word is used in a document and can handle alternate search term spellings.


Field Guidance on New Authorities (Redacted)
Enacted in the 2001 Anti-Terrorism Legislation


http://www.epic.org/privacy/terrorism/DOJ_guidance.pdf
 
Mr.X said:
True, but the NSA and FBI (2 versions) of carnivore are installed at almost any major ISP in USA.

United States - Total Informational Awaren
A project of the United States Department of Defense, Total Informational Awareness (TIA) is designed to gather personal data on a grand scale, including emails, phone calls, financial records, transportation habits, and medical information. Its proponents believe that by scanning and analyzing this massive pile of data, government agents will be able to predict and prevent crime. Many specifics concerning this plan have yet to be determined, including methods to protect the security of the warehoused information and other prevent unauthorized access. It is known, however, that the U.S. government is already funding projects to develop tools that could be used as part of this system, including software to predict an individual's behavior based on what that person does online. Reports indicate the state of Florida (with Federal support) is developing a system (called the MATRIX) that is broadly similar to TIA.

United States - Carnivore
This Internet surveillance program, which is currently being used by the United States government, is somewhat similar to ECHELON. Contrary to prior assertions, a subsequent government-commissioned review panel found that Carnivore is indeed capable of collecting all communications over the segment of the network being surveilled: "The results show that all TCP communications on the network segment being sniffed were captured by Carnivore." Moreover, the default configuration is to do just that: "When turning on TCP full mode collection and not selecting any port, the default is to collect traffic from all TCP ports." Carnivore is now being replaced by an even more powerful system, known as DCS 1000 or Enhanced Carnivore, which reportedly has higher capacity in order to deal with speedier broadband networks. The United States government also has issued a controversial field guidance memorandum regarding the installation and operation for this family of surveillance tools.

United States - Oasis & Fluent
United States intelligence officials have developed two programs which many experts believe may be used to enhance ECHELON's capabilities. One of these programs, Oasis, automatically creates machine-readable transcripts from television and audio broadcasts. Reports indicate that Oasis can also distinguish individual speakers and detect personal characteristics (such as gender) then denote these characteristics in the transcripts it creates. The other program, FLUENT, allows English-language keyword searches of non-English materials. This data mining tool not only finds pertinent documents, but also translates them, although the number of languages that can currently be translated is apparently limited (Russian, Chinese, Portuguese, Serbo-Croatian, Korean and Ukrainian). In addition, FLUENT displays the frequency with which a given word is used in a document and can handle alternate search term spellings.


Field Guidance on New Authorities (Redacted)
Enacted in the 2001 Anti-Terrorism Legislation


http://www.epic.org/privacy/terrorism/DOJ_guidance.pdf

true this is in place, but its a selective type process again....not ALL communication packets are "kept" at the ISP, they may be filtered, viewed by this program and selectively stored.......i find it extremely hard to believe this program is collecting "all" packets at all times....there is just no way the internet as a system could run as fast as it does

truth is, even carnivore isn't going to find the regular user buying juice online 5 times a year......you guys on here may be juicers and break the law occasionally, but we are in no way real criminals....we are not constantly looking for heroin, cocaine etc........now if you are a "BIG" dealer and or a dealer of hardcore rec drugs which they are cracking down on now, that is a different story. but most big rec drug dealers don't do their business over the internet anyways
 
DRRman said:
true this is in place, but its a selective type process again....not ALL communication packets are "kept" at the ISP, they may be filtered, viewed by this program and selectively stored.......i find it extremely hard to believe this program is collecting "all" packets at all times....there is just no way the internet as a system could run as fast as it does

DCS 1000 will have access to 100% of US communications going thru USA ISPs. All logged.

NSA is working with the FBI on that one.
 
Mr.X said:
DCS 1000 will have access to 100% of US communications going thru USA ISPs. All logged.

NSA is working with the FBI on that one.



damn....fucking government is a bitch for sure! oh well, i haven't read any info on the dcs1000, but i still don't see it possible to capture the all data packets through an entire ISP all day every day.....i mean every downloaded song, downloaded porn packet.....it would take millions of gigabytes even terabytes to capture all that in a day if they capture every packet with no way of being selective as to which ones they are after. and if they did capture every packet, there is no way they could store it very long, as the information can't just keep building and building....storage will run out real quick...........i think this software will basically monitor packets, look for "flags" that might pop up, then log and store data related to communications it finds "shady".........either way big brother is watching and if he wants ya he's going to get ya!!!
 
DRRman said:
damn....fucking government is a bitch for sure! oh well, i haven't read any info on the dcs1000, but i still don't see it possible to capture the all data packets through an entire ISP all day every day.....!

Anything is possible when you have enough money and power, which the US government does.

I once heard a saying by a now dead VP of Skunk works (Lockheed Martin's Advanced Development Programs): "We have technology 50 years ahead of what is presently known by the public...." If you can imagine what type of techonolgy is available to an overbloated goverment with almost unlimited taxpayer/borrowing resources, you can see why anything is possible for them.


B-2 stealth bomber made its debut in 1988, 6-8 years before PCs became mainstream, and 10 years before computers were known to perform enough lift control to stabilize the delta wing in flight. I think the B2 technology was around in the 60s, just not perfected until the early 80s. That's 25 years ago, imagine what type of technology your tax payer dollars and high gas prices are funding now? :coffee:

Btw...The F-117 stealth fighter first flew in 1981, so that's 25 years right there - but imagine when the technology was first on the table for development.
 
Mr.X said:
Anything is possible when you have enough money and power, which the US government does.

I once heard a saying by a now dead VP of Skunk works (Lockheed Martin's Advanced Development Programs): "We have technology 50 years ahead of what is presently known by the public...." If you can imagine what type of techonolgy is available to an overbloated goverment with almost unlimited taxpayer/borrowing resources, you can see why anything is possible for them.


B-2 stealth bomber made its debut in 1988, 6-8 years before PCs became mainstream, and 10 years before computers were known to perform enough lift control to stabilize the delta wing in flight. I think the B2 technology was around in the 60s, just not perfected until the early 80s. That's 25 years ago, imagine what type of technology your tax payer dollars and high gas prices are funding now? :coffee:

Btw...The F-117 stealth fighter first flew in 1981, so that's 25 years right there - but imagine when the technology was first on the table for development.

good points there X!!!
 
Top Bottom