Shades, there will be abuses of this kind of surveillance.
The dead informants families probably don't accept it so easily like you do.
I saw a movie once called lord of the rings - having the ring was too tempting - it had to go away no? That much power concentrated too much was just too much temptation - for anyone - even a nice guy like you.
Everybody has different feelings about it. I respect that, and haven't offered any opinion about whether it's good or bad.
The ring wasn't bad - it was just an object of great power eh? Its the people controlling it that went bad.
Neither did the saboteurs.
True - so you can't tell me any "technology" to keep myself stealthy and hidden - I should just accept the evil german types have my life for an open book to be sold to the highest paying drug dealer? I had to go into witness protection - so this may mean more to me than you.
It's an ongoing thing; every move has a countermove.
What is the countermove - what "technology" helps me stop narusinsight tracking my life? Can none of the tech experts here help me? Can you point me to hardware/software that will prevent narusinsight from tracking me or stopping me from sharing the memes I want or using the services and protocols I want? They analyze and store my packet streams - how do I stop them from doing that? Say I am in China and my baby is getting murdered by drug dealers who I turned in - how do I keep myself anonymous? They are bribing the spooks to sell my data and history proves I am in danger - help me protect myself.
I'm wondering how they monitor encrypted and scrambled stuff - in real time.
See they have these big computers that do big calculations.
This article was written in 2004 - the NSA encryption was broken by some silly geeks working out of moms basement. Imagine what dedicated mafia types or evil spooks with corporate budgets are doing.
72.14.203.104
Probably the most famous example of distributed computing is the Search for Extraterrestrial Intelligence (SETI) project. SETI is a scientific effort to determine if there is intelligent life outside Earth, primarily by using the Arecibo Observatory radio telescope in Puerto Rico to detect artificial radio signals coming from other stars. However, the telescope was collecting more data (about 35 gigabytes per day) than SETI could process by using its own systems. They could not afford a multimillion dollar supercomputer and processing on the systems they could afford would take decades. It is a problem that anyone suffering from information overload can sympathize with: Too much information, not enough resources to process it.
Breaking encryption is another use for distributed computing. It was a distributed computing project that originally cracked the National Security Agency's 56-bit digital encryption standard (DES) in 30 days. On the next try, it was done in 30 hours. On the last attempt it only took 3 hours, which is impressive if you consider that 56-bit DES was once considered secure enough for most Internet transactions. Part of the speed increase has been attributed to faster processors, but an equal measure of the improvement was due to better management of distributed computing resources.
I'm guessing they can't:
Your guess would be wrong. schneier.com
the processing demands would be huge.
The processing demands would be - amazing the computing power over the globe. How do the stock markets work - the processing demands on a tick by tick basis are huge no? hundreds of millions of people all over the globe clicking buy/sell at the same time - fascinating.
They'd probably have to store it and analyze.
The storage requirements would be huge too - they can't do that either can they?
But maybe they can. Who knows?
I know - they can. That is not the question - the question is can the best meaning people become evil with so much power involved and have no openness or oversight - my history book says be careful. You seem to be telling me to accept that - just the way it is - why think like that?
pcworld.com
Another Form of Encryption Goes Down for the Count Standard that is key to virtually all secure online communications is broken.
Andrew Brandt, PC World Thursday, February 17, 2005 News that a nine-year-old encryption method--one that underlies the protection of virtually all secure online communications--appears to have been cracked by a team of three Chinese researchers has spurred encryption experts around the world to issue a call to action.
gcnewsgazette.com
Identity theft: Much worse than we thought
WASHINGTON, D.C. - A survey recently released by the Justice Department's Bureau of Justice Statistics says that 3.6 million households, or about 3 percent of all households in the United States, had been the victim of at least one type of identity theft during a six month period in 2004.
This is in stark contrast with the Federal Trade Commission's Consumer Fraud and Identity Theft Complaint Data which documented only 246,847 reported complaints for the entire 12-month span of the same year.
“The new data proves that identity theft is not only one of the fastest growing crimes in America, it is also one of the most underreported and misunderstood ones,” said Al Lenhardt, president and CEO of the National Crime Prevention Counci
Democracy is two wolves and a lamb voting on what to have for lunch.
Liberty is a well-armed lamb contesting the vote.
-Benjamin Franklin
Please tell me the TECHNOLOGY I can use to defend myself - this is the best tech guys on SI right here right? |