SI
SI
discoversearch

We've detected that you're using an ad content blocking browser plug-in or feature. Ads provide a critical source of revenue to the continued operation of Silicon Investor.  We ask that you disable ad blocking while on Silicon Investor in the best interests of our community.  If you are not using an ad blocker but are still receiving this message, make sure your browser's tracking protection is set to the 'standard' level.
Strategies & Market Trends : 2026 TeoTwawKi ... 2032 Darkest Interregnum -- Ignore unavailable to you. Want to Upgrade?


To: Haim R. Branisteanu who wrote (101564)6/25/2013 6:10:10 AM
From: Haim R. Branisteanu  Respond to of 220294
 
... and more at this Bloomberg link

bloomberg.com

U.S. Surveillance Is Not Aimed at Terrorists
By Leonid Bershidsky Jun 23, 2013 6:00 PM ET

"The study found that just 0.2 percent of the Internet could be searched. The rest remained inscrutable and has probably grown since. In 2010, Google Inc. said it had indexed just 0.004 percent of the information on the Internet. Websites aimed at attracting traffic do their best to get noticed, paying to tailor their content to the real or perceived requirements of search engines such as Google. Terrorists have no such ambitions. They prefer to lurk in the dark recesses of the Undernet.

“People who radicalise under the influence of jihadist websites often go through a number of stages,” the Dutch report said. “Their virtual activities increasingly shift to the invisible Web, their security awareness increases and their activities become more conspiratorial.”

Radicals who initially stand out on the “surface” Web quickly meet people, online or offline, who drag them deeper into the Web underground. “For many, finally finding the jihadist core forums feels like a warm bath after their virtual wanderings,” the report said. "
.................................................................

Communication on the core forums is often encrypted. In 2012, a French court found nuclear physicist Adlene Hicheur guilty of, among other things, conspiring to commit an act of terror for distributing and using software called Asrar al-Mujahideen, or Mujahideen Secrets. The program employed various cutting-edge encryption methods, including variable stealth ciphers and RSA 2,048-bit keys.

The NSA’s Prism, according to a classified PowerPoint presentation published by the Guardian, provides access to the systems of Microsoft Corp. (and therefore Skype), Facebook Inc., Google, Apple Inc. and other U.S. Internet giants. Either these companies have provided “master keys” to decrypt their traffic

....................................................................................
Traditional Means - Even complete access to these servers brings U.S. authorities no closer to the core forums. These must be infiltrated by more traditional intelligence means, such as using agents posing as jihadists or by informants within terrorist organizations.


this is about what I wrote in my previous post - collecting information and intelligence about those with intend to hurt us should be done the old way.



To: Haim R. Branisteanu who wrote (101564)6/25/2013 2:57:37 PM
From: Maurice Winn  Respond to of 220294
 
The USA is remarkably flexible about the laws that they feel compelled to enforce:
The government has a legitimate interest in pursuing Snowden. His leaks were a crime that has to be prosecuted.

Obama meanwhile said that the United States was following all appropriate legal channels and "working with various other countries to make sure that the rule of law is observed."
foxnews.com



Is it illegal to lie to Congress as Clapper did? Is unreasonable search and seizure part of the USA's constitution? Presumably Obama will be doing all in his power to enforce the law regarding Clapper and the rest. Oh? He isn't? What a puzzle. So it's only laws which suit him politically which should be enforced.

The USA can easily say "We have decided that a presidential pardon is in order for Edward". Or, they can simply not bother with enforcing the laws which they imagine [apparently falsely] that Edward has broken. Just as they don't enforce untold billions of other suspected breaches of the law.

Lewis "Scooter" Libby for example,http://en.wikipedia.org/wiki/List_of_people_pardoned_or_granted_clemency_by_the_President_of_the_United_States If Obama could pardon him, it is obviously no problem to do the same for an actual decent person instead of a criminal [Scooter] whose disclosure was deliberate for personal political gain along with "Dick" Cheney. Dick the criminal calling Edward a bad guy is hilarious.

Mqurice



To: Haim R. Branisteanu who wrote (101564)6/25/2013 7:02:06 PM
From: TobagoJack  Respond to of 220294
 
bloomberg.com must be hacked and henceforth put on security watch list per enemy-within protocol



To: Haim R. Branisteanu who wrote (101564)6/25/2013 7:05:56 PM
From: Box-By-The-Riviera™  Respond to of 220294
 
sure.

and bloomberg was hacking its own accounts to see who was trading what, so they could generate news flow.

right.

and the majority owner is out there running the largest city in the united states all the way down to the size of a soda and where, if there's anywhere, people who freely choose to engage in 2000 years of tabbacco can.

fuck that and fuck bloomberg and fuck the mayor of new york.