Search found 5 matches

by VMI77
Tue Dec 11, 2012 12:41 pm
Forum: Gun and/or Self-Defense Related Political Issues
Topic: Be careful with those emails
Replies: 25
Views: 3446

Re: Be careful with those emails

jimlongley wrote:
VMI77 wrote:I don't know about the keyboard stuff, but years ago a Dutch engineer demonstrated that he could read CRT screens remotely via radio harmonics. I haven't read anything since about it, and don't know if it works with LED screens.
Yeah, one CRT isolated in a lab environment surrounded by a Faraday cage. Mix in several and a couple of digital TVs and good luck.
The demonstration wasn't in a lab environment. He read screens from a van parked in the street. Looking for some links on this --called Van Eck phreaking-- I found there is also another technique that uses reflected light. Signal discrimination for Van Eck viewing would be an issue but I think a single device can be pulled out of the EM fog with a directional antenna. Apparently, it does work of LCD screens. I think a Faraday cage would block the Van Eck method but most people don't have Faraday cages around their computers.

Van Eck viewing of flat-panel display: http://www.lightbluetouchpaper.org/2006 ... ebit-2006/

Van Eck viewing of electronic voting machines: https://www.techdirt.com/articles/20091 ... 7048.shtml

Van Eck viewing description: https://www.techdirt.com/articles/20091 ... 7048.shtml

Van Eck view of laptops: http://hardware.slashdot.org/story/07/0 ... ck-methods

Optical remote eavesdropping: http://www.cl.cam.ac.uk/research/securi ... ptical.pdf
by VMI77
Mon Dec 10, 2012 12:43 pm
Forum: Gun and/or Self-Defense Related Political Issues
Topic: Be careful with those emails
Replies: 25
Views: 3446

Re: Be careful with those emails

I don't know about the keyboard stuff, but years ago a Dutch engineer demonstrated that he could read CRT screens remotely via radio harmonics. I haven't read anything since about it, and don't know if it works with LED screens.
by VMI77
Wed Dec 05, 2012 4:04 pm
Forum: Gun and/or Self-Defense Related Political Issues
Topic: Be careful with those emails
Replies: 25
Views: 3446

Re: Be careful with those emails

jimlongley wrote:Do I believe "they" are trying to do it? Yes, most absolutely. But do I believe they are succeeding, not anywhere nearly to the extent that movies and TV shows would have us believe. And as I have said, the amount of digital data out there is just monstrously huge, and post processing that in all of its various formats is not a logistical problem I would like to even attempt, and I have troubleshot IBM SNA networks using a protocol analyzer that did not decode SNA.
I'm not addressing real-time monitoring....I think that is fairly limited and specifically targeted. Also, I don't believe some of the capabilities displayed in movies and on TV exist yet --for instance, the ability to gather images from surveillance cameras all over the world and track targets in real time, or for that matter, just to instantaneously get individual video feeds feeds from surveillance cameras all over the world. But even free browser add ons have some amazing search capabilities today....for instance, searching the web for identical images --e.g. "who stole my photos" and the like. I've used them to find original images people are trying to pass off on their own. I don't know how comprehensive they are but they're pretty fast. I think search algorithms have become very fast and sophisticated. I see evidence of it in software available to me for free, so I can't help but think the NSA has software that is way better.
by VMI77
Wed Dec 05, 2012 3:29 pm
Forum: Gun and/or Self-Defense Related Political Issues
Topic: Be careful with those emails
Replies: 25
Views: 3446

Re: Be careful with those emails

Dragonfighter wrote:
VMI77 wrote:
jimlongley wrote:<SNIP>
I think the key in your remarks is "a bunch of years ago." A bunch of years ago system modeling in my industry could take hours; now what took hours is done in a few seconds. What took about 30 minutes five years ago takes about 30 seconds now. And we just have PCs, not supercomputers. He's been out of the NSA for over 10 years and there have been major advances in computing ability during that time. And in the context he's talking about search time is not a critical factor. He's not talking about real-time monitoring but looking back through stored data for either legitimate criminal or illegitimate and nefarious politically motivated investigations. In either case it doesn't really matter if it takes an hour, a day, a week, or a month to pull from the database.

Also, this article doesn't address it, but the original court testimony he referred to also included testimony from an AT&T technician about the interface alluded to in the article. They're not just collecting emails, they're collecting everything...URL's visited, streaming audio and video (not the URL, the actual stream), online chats, online phone conversations, purchase data.....everything.
For years, and I mean yeeeaars, phone traffic has been monitored to flag certain "keywords". All an agency has to do is set a combination of keywords they are looking for and the system will filter millions of emails in a matter of a few hours. So here is the scenario: You are looking for fundamentalist gun owners and you set your filter this particular day to "weapons, 2a, constitutional, (any number of makers' brand names), etc. So you get a few million emails either sent, forwarded or replied to that discuss the 2A in conjunction with weapons and bingo, a list of possible dissidents. The "agency" now simply reconfigures for each group of "inconvenient citizens". They have the data, all they need to do is sift it. And since they are allowed to gather the data without due process, then what prevents some Chicago mobster turned attorney general from sorting out and then setting about the squelching of anyone in their way. The only possible solution is to have that data base eradicated and cause for data collection very narrowly tailored to actual threat profiles.
It's worse than that....since with stored data they have the advantage of hindsight they can do things like pick a brand new target and diagram his entire social network; pick out messages or data made in one social context and read them into the current social context; and they can ferret out material for blackmail as was done with Petraeus and Allen. They don't need to filter anything in real time --which at least limits searches to whatever is under consideration at the time of the search-- and when they think of new search terms or connections they can keep going back to the database and pulling out new "enemies." And they can construct all kinds of lists from this data...not just identify "dissidents." For instance, how many people here post messages on their latest gun purchase, what they shot at the range last week, or tell friends and relatives about a new gun, or about any of their guns, bulk ammo buys, accessories like scopes and magazines, etc. I'd bet with ten years worth of email data they can determine pretty accurately what every person on this board owns in the way of guns, whether they have "full" capacity magazines, night vision equipment, and bulk quantities of ammo.
by VMI77
Wed Dec 05, 2012 11:18 am
Forum: Gun and/or Self-Defense Related Political Issues
Topic: Be careful with those emails
Replies: 25
Views: 3446

Re: Be careful with those emails

jimlongley wrote:Even if they are, that is a mind boggling amount of data that they already, according to his testimony, don't have time to go through. By the time they get the ability to sort through it with any level of efficiency we will all be beyond caring.

A bunch of years ago I was the engineer of a network control center. The center monitored the condition (not the content) of a large (195 nodes) T1 network for the State of NY. We were required, per contract, to record and monitor ALL alarms and events on the network, and investigate each an every one, as well as keeping a database of those events, a raw record of those events, and a separate database of the trouble tickets generated and solutions. The amount of data gathered rapidly became so unmanageable that it was considered a joke to threaten someone on the staff with having to go look for a specific incident in the raw record. On top of that we kept a backup copy at a "geographically diverse location."

As the head engineer, I was charged with the responsibility for ensuring that all of the data was stored and accessible, and I hired a database "expert" to program the access to the raw data as well as sorting and storing it in a useable manner. It quickly became obvious that the state of the art was not up to the task, and the programmer was even behind that. (At one point, shortly before he was moved to another job we noticed that the trouble ticket database was taking huge amounts of time to load, and it turned out that what he had done to handle completed trouble tickets was set a "delete flag" on those tickets, so that when you searched for open tickets they got ignored, but every time you accessed the database ALL of it got loaded. One day my lead computer operator, who was not a programmer herself but had some programming ability, decided to see if she could improve the speed by "packing" the database, and the command she issued deleted all of the data with delete flags set. That was when it was decided that our programmer would be better off in a different job and that it was a good thing to have a separate copy of the database off site. Forgot to mention, one salient thing on his resume was his experience with NSA.

We got a new programmer who understood the troubleshooting process and trouble tickets and things got a little better.

All of this with the State of New York looking over our shoulders and nitpicking.

I eventually quit the job and went back to something more comfortable.

I don't think NSA has the ability, now or in the near future, to process that data, and the amount will continue to grow as they sit on it, so I don't much care what they are keeping of mine.
I think the key in your remarks is "a bunch of years ago." A bunch of years ago system modeling in my industry could take hours; now what took hours is done in a few seconds. What took about 30 minutes five years ago takes about 30 seconds now. And we just have PCs, not supercomputers. He's been out of the NSA for over 10 years and there have been major advances in computing ability during that time. And in the context he's talking about search time is not a critical factor. He's not talking about real-time monitoring but looking back through stored data for either legitimate criminal or illegitimate and nefarious politically motivated investigations. In either case it doesn't really matter if it takes an hour, a day, a week, or a month to pull from the database.

Also, this article doesn't address it, but the original court testimony he referred to also included testimony from an AT&T technician about the interface alluded to in the article. They're not just collecting emails, they're collecting everything...URL's visited, streaming audio and video (not the URL, the actual stream), online chats, online phone conversations, purchase data.....everything.

Return to “Be careful with those emails”