Jump to content
House Price Crash Forum

Everyone Is Guilty - Welcome To Total Surveillance


Sour Mash

Recommended Posts

0
HOLA441
  • Replies 113
  • Created
  • Last Reply
1
HOLA442
2
HOLA443
3
HOLA444

This is all bomb quite semtex easy to armalite deal with Mossad.

They use keyword scanning Allah technology that looks for 'interesting' words and uranium phrases kill them all. They don't Salman Rushdie store everything dirty bomb, only missile things of interest depleted Uranium.

That, and stuff that looks like cypher:

YRGMO KAAHW FXXBT ZKCFW QUHBZ CLHKD ZILQZ CVJTP ROZFQ KDMTJ KQLOH CLRST CDTWE WZTAG JPROR YNZ

This was encyphered using one of our very own Typex cipher machines from WWII.

Link to comment
Share on other sites

4
HOLA445

If you have a code that never repeats, between 2 code machines that are programmed with the code sequence and sychronised together, then no amount of computer power or back room boffins will be able to crack it.

That is actually next to impossible to do.

1) Producing truly random keys is actually very difficult.

2) Getting it to two different places and securing it so it is never repeating and disposed of safely is also very difficult.

Back in the day, they used to record random traffic noise and use sampling of it to produce a very random key, contained on punch cards that were synchronised on a standard time base. They also used a constant connection that sent encyphered data even if there was no traffic going through the circuit. All good stuff until the North Koreans took a machine (a KW-37) off of the USS Pueblo. The Walker spy ring had been selling the Soviets copied key cards for years - all the way up to the 1990s.

Link to comment
Share on other sites

5
HOLA446

One way to bring down the system would be to randomly, continually downloading and sending masses of emails.

Those who want to hide for criminal or terrorist reasons are already doing it, they have no need to worry about any of these measures. The state are using this as a threat against the people, don't step out of line as we are watching you.

Terrorists who need to communicate with each other don't need to do it on the web and they aren't stupid either.

One option would be for one member of a cell to install a wireless router, pass the password and encryption key to other cell members either physically or via the post. An encryption key can be something quite innocent looking, such as a set of mp3 files. They can then park or drive through that routers range and pick up any messages without ever being on the net.

Another is to use wireless routers to set up your own private network within an area.

Two ideas that took two minutes to think up.

On this point demonstrators will also get much more switched on if this legislation is used against them.

Wireless encryption is crap, you can crack WEP and get the key in under 3 minutes, WPA can be attacked as well with a bit more time and a larger sample of traffic, many people do this to get free internet access from neighbours or in hotels, the tools to do this are freely available on the internet

Link to comment
Share on other sites

6
HOLA447

Wireless encryption is crap, you can crack WEP and get the key in under 3 minutes, WPA can be attacked as well with a bit more time and a larger sample of traffic, many people do this to get free internet access from neighbours or in hotels, the tools to do this are freely available on the internet

The fact the Wireless encryption is so crap and there are so many ways of getting a free ride onto the internet means that intercepting at the ISP level is not going to do anything to improve the security of the UK from external spies, terrorists and criminals. You might be able to see some of the traffic but you will not have true picture of who is sending it as they may be simply hiding or masquerading as someone else. Once you are essentially masked you dont even have to worry too much about clever encryption. Indeed, laying false accessible trails alongside more cleverly disguised real ones can all then become part of the deception.Covert activity does not need invincible cypher protection. It simply needs to be good enough to hide someone until a task is completed.

The primary purpose of these proposals can therefore only be intended to monitor the traffic of ordinary citizens via legitimate commercial channels. The truth is that the 'threats' our Lords and Master spend so much time touting as an excuse for this legislation do not worry them at all. Their nightmare is that Joe Blogs on the street might get uppity and may no longer obey them.

Link to comment
Share on other sites

7
HOLA448
8
HOLA449

A couple of examples that show the state via the telecoms companies already log every call and text message so why people get their knickers in a twist I dont know!

http://today.msnbc.msn.com/id/46627015/ns/today-today_news/t/parents-teen-who-died-texting-driving-kids-think-theyre-invincible/

Moments later, Sauer, going more than 80 mph, slammed into a tanker truck that was slowly creeping up a hill at 15 mph. She was killed instantly; investigators saw no signs that she applied the brakes before the fatal crash. And in checking her cell phone records, they learned Sauer was posting about every 90 seconds during her drive.

http://www.dailymail.co.uk/news/article-2072770/Texting-wheel-lorry-driver-killed-talented-undergraduate-jailed-5-years.html

He had been composing text messages – one of which required 117 key strokes – while driving at 55mph.

Of course it could be spun that they checked the phone for activity at the scene of the crash but this isnt always the case, phones get damaged so phone companies provide the data including the content of the text messages!

Link to comment
Share on other sites

9
HOLA4410
10
HOLA4411

Didn't they try something far smaller and simpler with NHS files? In that case the Government achieved its usual result. Spent a fortune, cocked it up and then blamed someone else.

Makes me wonder if all those billions they poured into the NHS computer black hole for absolutely NO tangiable benefit was actually spent on that at all.

What if £10bn of it was actually spent on loads of hardware, programming, storage, expertise for some 'other' massive but secret (for our protection obviously) Government project?

Hmmm.

Does seem a bit strange to have wasted all those billions for years and years, then just shrug shoulders and give up and deliver NOTHING! - Surely just the relentless march of ever more powerful computer processing and cheap storage etc etc would make the initial brief MUCH easier and cheaper to deliver now than it was 10 years ago FFS - and so far as I know they didn't even deliver that??

Oh well, I'm sure it's for all our own good, protecting us and all that. I for one am very grateful and contented. Yes indeedy.

:ph34r:

Link to comment
Share on other sites

11
HOLA4412
12
HOLA4413

Makes me wonder if all those billions they poured into the NHS computer black hole for absolutely NO tangiable benefit was actually spent on that at all.

What if £10bn of it was actually spent on loads of hardware, programming, storage, expertise for some 'other' massive but secret (for our protection obviously) Government project?

Hmmm.

Does seem a bit strange to have wasted all those billions for years and years, then just shrug shoulders and give up and deliver NOTHING! - Surely just the relentless march of ever more powerful computer processing and cheap storage etc etc would make the initial brief MUCH easier and cheaper to deliver now than it was 10 years ago FFS - and so far as I know they didn't even deliver that??

Oh well, I'm sure it's for all our own good, protecting us and all that. I for one am very grateful and contented. Yes indeedy.

:ph34r:

The NHS IT project never had a chance. It was about standardising, and harmonising systems throughout the NHS. Why anyone would want to do anything as sensible as that, I can't think. Lots of people make a very nice living out of inventing their own ways of doing things - they were never going to cooperate.

I work for a company that deals with many different local authorities. They each employ their own departments to make decsions about everything, reinventing the same wheels time after time and coming up with wildly different answers.

- Some want invoices on paper, some on spreadsheets, some by FTP, using (at the last count) 32 different invoice layouts for the same work.

- Some invoice to a Monday, or a Sunday, or Saturday. One to a Wednesday!

- Some insist on having the client's name and address at the top of each invoice. Another one says that is 'illegal', and we must only put their initials!

- Some have us invoice by the hour or, the visit, the minute, in 7 minute bands, 3 minute bands, 30 minute bands. Some pay a minimum of 15 mins, others 1 min.

- Some pay two weeks charges after the end of a contract, others pay nothing.

- Some set minimum invoice levels, others engage in a bidding process for every single scrap of work, resulting in thousands (and I mean thousands) of different invoice rates that are pennies apart - each one needing to be cross referenced.

- They can't even agree on words. At the last count, I had 12 different words used by different local authorities to describe the same thing!

The whole thing is a monumental waste of time and money - and it is endless. The LAs refuse to cooporate with each other or the Primary Care Trusts (PCTs). They all do their own thing, use their own words, and create their own systems, and of course endlessly repeat each other's mistakes as they never tell each other what they learnt from what went wrong. It won't ever change until central government gets them on a leash and starts setting interfacing and comunication standards, like they used to do when things actually worked. Until this happens, there are far too many VIs in PCTs and LAs to ever allow standardisation - 85% of them would be out of a job!

Link to comment
Share on other sites

13
HOLA4414

The primary purpose of these proposals can therefore only be intended to monitor the traffic of ordinary citizens via legitimate commercial channels. The truth is that the 'threats' our Lords and Master spend so much time touting as an excuse for this legislation do not worry them at all. Their nightmare is that Joe Blogs on the street might get uppity and may no longer obey them.

And there you have it! Nothing to do with protecting "the people"! All to do with protecting an un-popular elite, who are worried about what people are saying about them! :(

Link to comment
Share on other sites

Archived

This topic is now archived and is closed to further replies.

  • Recently Browsing   0 members

    • No registered users viewing this page.




×
×
  • Create New...

Important Information