General Databases Linux Outside the Cube Programming Web publishing Windows
Exchange Links About this site Links to us

|
Databases
InterBase,
MS-SQL,
mysql,
Oracle
|
Programming
C#,
C++,
Delphi,
Java,
JavaScript,
perl,
php,
Visual Basic,
VBScript
|
Linux
Apache,
Network,
Shell
|
Web Publishing
JavaScript,
perl CGI,
VBScript,
Web Hosting
|
Windows
Apache,
File Types,
Internet Explorer,
Network,
Printing,
Processes
|
Outside the Cube
Auto,
Computer Hardware,
Finances,
Dating Scams,
Household,
Male Dating Scammers,
Other Scams,
Travel
|
Featured Article
Does the NSA track your internet traffic?I found this first in the German 'Spiegel' magazine, then in English on http://blog.wired.com/27BStroke6/
I added some notes.
It's not surprising that an expert hired by EFF should produce an analysis that supports the group's case against AT&T. But last week's public court filing of a redacted statement by J. Scott Marcus is still worth reading for the obvious expertise of its author, and the cunning insights he draws from the AT&T spy documents.
An internet pioneer and former FCC advisor who held a Top Secret security clearance, Marcus applies a Sherlock Holmes level of reasoning to his dissection of the evidence in the case: 120-pages of AT&T manuals that EFF filed under seal, and whistleblower Mark Klein's observations inside the company's San Francisco switching center.
If you've been following Wired News' coverage of the EFF case, you won't find many new hard revelations in Marcus' analysis -- at least, not in the censored version made public. But he connects the dots to draw some interesting conclusions:
- The AT&T documents are authentic. That AT&T insists they remain under seal is evidence enough of this, but Marcus points out that the writing style is pure Bell System, with the "meticulous attention to detail that is typical of AT&T operations."
- There may be dozens of surveillance rooms in AT&T offices around the country. Among other things, Marcus finds that portions of the documents are written to cover a number of different equipment rack configurations, "consistent with a deployment to 15 to 20" secret rooms.
- The internet surveillance program covers domestic traffic, not just international traffic. Marcus notes that the AT&T spy rooms are "in far more locations than would be required to catch the majority of international traffic"; the configuration in the San Francisco office promiscuously sends all data into the secret room; and there's no reliable way an analysis could infer a user's physical location from their IP address. This, of course, directly contradicts President Bush's description of the "Terrorist Surveillance Program."
- The system is capable of looking at content, not just addresses. The configuration described in the Klein documents -- presumably the Narus software in particular -- "exists primarily to conduct sophisticated rule-based analysis of content", Marcus concludes.
My bullet points don't come close to conveying the painstaking reasoning he lays out to back each of his conclusions.
Perhaps the most interesting -- and, in retrospect, obvious -- point Marcus makes is that AT&T customers aren't the only ones apparently being tapped. "Transit" traffic originating with one ISP and destined for another is also being sniffed if it crosses AT&T's network. Ironically, because the taps are installed at the point at which that network connects to the rest of the world, the safest web surfers are AT&T subscribers visiting websites hosted on AT&T's network. Their traffic doesn't pass through the splitters.
With that in mind, here's the 27B Stroke 6 guide to detecting if your traffic is being funneled into the secret room on San Francisco's Folsom street.
Note: This room is physically only accessible to NSA (National Security Agency) staff.
If you're a Windows user, fire up an MS-DOS command prompt. Now type tracert followed by the domain name of the website, e-mail host, VoIP switch, or whatever destination you're interested in. Watch as the program spits out your route, line by line.
C:\> tracert nsa.gov
1 2 ms 2 ms 2 ms 12.110.110.204
[...]
7 11 ms 14 ms 10 ms as-0-0.bbr2.SanJose1.Level3.net [64.159.0.218]
8 13 12 19 ms ae-23-56.car3.SanJose1.Level3.net [4.68.123.173]
9 18 ms 16 ms 16 ms 192.205.33.17
10 88 ms 92 ms 91 ms tbr2-p012201.sffca.ip.att.net [12.123.13.186]
11 88 ms 90 ms 88 ms tbr1-cl2.sl9mo.ip.att.net [12.122.10.41]
12 89 ms 97 ms 89 ms tbr1-cl4.wswdc.ip.att.net [12.122.10.29]
13 89 ms 88 ms 88 ms ar2-a3120s6.wswdc.ip.att.net [12.123.8.65]
14 102 ms 93 ms 112 ms 12.127.209.214
15 94 ms 94 ms 93 ms 12.110.110.13
16 * * *
17 * * *
18 * *
In the above example, my traffic is jumping from Level 3 Communications to AT&T's network in San Francisco, presumably over the OC-48 circuit that AT&T tapped on February 20th, 2003, according to the Klein docs.
The magic string you're looking for is sffca.ip.att.net. If it's present immediately above or below a non-att.net entry, then -- by Klein's allegations -- your packets are being copied into room 641A, and from there, illegally, to the NSA.
Of course, if Marcus is correct and AT&T has installed these secret rooms all around the country, then any att.net entry in your route is a bad sign.
Note:
I found this article on Wired.com and performed the test on my machine, with the same result.
| Generated 0:01:59 on Dec 10, 2019 | Most recent comments
2019-12-09 23:27:30:
by [hidden]
in Other Scams
on The UK NATIONAL LOTTERY scam:
diazepam 5mg prices mgdiazepam.com
<a href=' https://mgdiazepam.c..t;diazepam 2mg</a>
info on diazepam from other users
[url= https://mgdiazepam.c..#]diazepam 10 mg[/url] ... read more
|
2019-12-08 22:11:44:
by [hidden]
in Dating Scams
on Dating scammer Nancy Milman from Accra, Ghana:
balder058.startdedicated. com - Dating Scams on Dating scammer Nancy Milman from Accra, Ghana - ANABLE NELSON 202 MADINA HIGH WAY . ACCRA - GHANA - ...
|
2019-12-08 18:48:53:
by [hidden]
in Male Dating Scammers
on Dating scammer Bobby Reinhard Müller:
He is acting in Portugal now, again, in Meetic Portugal.
With the profile text
PLEASE TAKE THE TIME TO READ THIS BEFORE CONTACTING ME May i quickly say i am American, from Californi ... read more
|
2019-12-08 04:58:28:
by anonymous
in Dating Scams
on Dating scammer Rhoda Naa from Accra, Ghana:
Eveljakpa
Telefonnummummer
|
2019-12-06 19:41:58:
by [hidden]
in Dating Scams
on Dating scammer Elena Mulina:
Russian women scam, girls black list, dating scammer ELENA MULINA ...
www.antiscamclub. com › scam_pages âscambrowse3
Russissian girls scammers black list dating fraud. 1, Dating . ... read more
|
2019-12-06 16:48:25:
by anonymous
in Dating Scams
on Dating scammer Osei Kwesi Accra Ghana kind_osei@hotmail.com from Accra, Ghana:
I found Ann Angel on Odnoklassniki, this profile
https://ok.ru/mess. 142366255
he>her fake name Alexandra Maria
|
2019-12-06 05:46:57:
by 2009helena@wp.pl
in Male Dating Scammers
on Dating scammer Allard Haggard:
Poznałam Morgana Lopeza na portalu ,,Sympatią,, oficer na Misji Pokojowej w Libii w mieście Bengazi, pochodzi z USA wysłał kilka zdjęć, a pozostałe jest ich mnóstwo, znalazłam w internecie. ... read more
|
2019-12-04 17:25:33:
by anonymous
in Dating Scams
on Gold digger Valeria Novitskaya from Ukraine:
Why do you need to find her.?. She will only meet you if you pay for everything plus a lot of dollar's.
She use to be on all the dating sites. Anastasia and Hot Russian Brides were her main ones b ... read more
|
2019-12-02 14:53:33:
by [hidden]
in Dating Scams
on Dating scammer Anastasiya Popova from Kirov, Russia:
Scammer Profile Anastasiya Popova | Anastasiya_993_5t0pf ...
https://www.huntscammers. com âscammer- 7926-scammer-anastastasiya-pop...
Scammer Profile Anastasiya Popova | Anastasiya_993_5t ... read more
|
|
2019-12-02 14:41:23:
by [hidden]
in Dating Scams
on Dating scammer UADREAMS.COM and UALADYS.COM:
Search Results -Web results
Scammer Natalia Lomakina Natasha - DatingScams.cc
https://datingscams. cc › scammer › profile
Nov 2, 2019 - Natalia Lomakina, , professional Local ... read more
|
|