FBI — Manhattan U.S. Attorney Charges Seven Individuals for Engineering Sophisticated Internet Fraud Scheme That Infected Millions of Computers Worldwide and Manipulated Internet Advertising Business

From: Ed Michaels <ejmic..._at_gmail.com>
Date: Wed, 9 Nov 2011 20:40:37 +0000

>From - Sat Mar 02 00:57:20 2024
X-Received: by 10.42.161.195 with SMTP id u3mr1494468icx.5.1379652940406;
        Thu, 19 Sep 2013 21:55:40 -0700 (PDT)
X-BeenThere: tscm-l2006_at_googlegroups.com
Received: by 10.50.22.99 with SMTP id c3ls105716igf.7.canary; Thu, 19 Sep 2013
 21:55:33 -0700 (PDT)
X-Received: by 10.42.164.2 with SMTP id e2mr2906145icy.30.1379652933874;
        Thu, 19 Sep 2013 21:55:33 -0700 (PDT)
Received: by 10.50.73.1 with SMTP id h1msigv;
        Sun, 15 Sep 2013 10:48:21 -0700 (PDT)
X-Received: by 10.66.65.109 with SMTP id w13mr4389588pas.21.1379267301454;
        Sun, 15 Sep 2013 10:48:21 -0700 (PDT)
Return-Path: <deepak_..._at_yahoo.co.in>
Received: from nm34-vm6.bullet.mail.sg3.yahoo.com (nm34-vm6.bullet.mail.sg3.yahoo.com. [106.10.151.245])
        by gmr-mx.google.com with ESMTPS id dk16si890787pac.0.1969.12.31.16.00.00
        (version=TLSv1 cipher=RC4-SHA bits=128/128);
        Sun, 15 Sep 2013 10:48:21 -0700 (PDT)
Received-SPF: neutral (google.com: 106.10.151.245 is neither permitted nor denied by best guess record for domain of deepak_..._at_yahoo.co.in) client-ip=106.10.151.245;
Authentication-Results: gmr-mx.google.com;
       spf=neutral (google.com: 106.10.151.245 is neither permitted nor denied by best guess record for domain of deepak_..._at_yahoo.co.in) smtp.mail=deepak_..._at_yahoo.co.in;
       dkim=pass head..._at_yahoo.co.in
Received: from [106.10.166.125] by nm34.bullet.mail.sg3.yahoo.com with NNFMP; 15 Sep 2013 17:48:19 -0000
Received: from [106.10.167.144] by tm14.bullet.mail.sg3.yahoo.com with NNFMP; 15 Sep 2013 17:48:18 -0000
Received: from [127.0.0.1] by smtp117.mail.sg3.yahoo.com with NNFMP; 15 Sep 2013 17:48:18 -0000
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=yahoo.co.in; s=s1024; t=1379267298; bh=D5gLaXcX25l6wuvgUsQkzB7g3h24H2hgzskwsBe9Q1M=; h=X-Yahoo-Newman-Id:Message-ID:X-Yahoo-Newman-Property:X-YMail-OSG:X-Yahoo-SMTP:X-Rocket-Received:MIME-Version:To:From:Subject:Date:Content-Type; b=m2p2mKJ8Eu9DYv4JCmfgLeVYE6m1Ejvewfb/qt1pjNhgLYN88S8fPEsqChHmnicYJwnuI/l8iUgYECoHvPRH+r21N0p+bzxG0ZGVTaVEBdqdQCKLT/qn9vC7kfzAuWOB/RUe3fdi+QJ8OlK6U+R8bUedFkGveNgxvm3Ua6fHbFk=
X-Yahoo-Newman-Id: 925637..._at_smtp117.mail.sg3.yahoo.com
Message-ID: <925637.3365.bm_at_smtp117.mail.sg3.yahoo.com>
X-Yahoo-Newman-Property: ymail-3
X-YMail-OSG: am510hYVM1kg5eLc6W31rGtVtnMvFn1n9oHe4ZbYx5ypccF
 b18nn_O9FWBM70x8eDmPDRUZlx3V1uq3k_jfRckx1fIz7WS.XMc20Moj4UPJ
 h4aPWY06bmcRkNbVY_NUdudsMA7QOCZ3O5iKARJpQoHdq4MBLpzhES_EGffX
 ax8.FSN5wpC6UdSydWw3abmisflqmoqMPS3_3xO17Veut9d5kCpPSmMUWWFP
 YXh6agvn06HdgGIhKcNbPEh7l.nJLMzuMYgQT8xCc4fKLSfIPx1R.35wKKTo
 nNR3eNMmzPLhr4o7vDox3n.pqiKZXraj4PULpqK6V30EDP0GmjS6p9J8U.K.
 zXkyF8W1LyW2a9aBgL9CFU.dDVgZ8FovulBRZrneWciRBtp5aa9o6Mb72bd8
 2zF56gZQhKkgc0LBtY3dgQVl75TZZZLuy8aU_RQO_yBQ8mjJpj7HAd6pIIAY
 WRvmWl9G2jRs1._nwP2tM6LWY9EGMprr2JNY.6D08p.yLUoqbSzrMWn_akHU
 0MKzbkVoQpQmgtXKxHjExFwrRs07L9Y2pqX5S3WB5JnCnT5CE8YfszMCc6zB
 3GBBVHV7f156j_5N1_DEZVZh0w2Qu4x5q8CiqETXzeLshpfus9gAzLroV9F4
 fs5BrvKmUNV1gzg0mt9XfG_k_v.mSD.yhmyfDlITk8YWtV0I7LqB0iXfPciq
 0ULy1eY2b26w_bUDLp8nVdnlQknaIspiKru8iK.UU_z63jfj6JAFom_TTvsu
 LSOEGpRqOCUWjs67UcCqKtZhNdybXhYfmLIPAzPM0rW8z3OyCLPKRqL5Gd7S
 D9_uZj3mRqJLuhrpA4vBVo5tfLZb2s7rYE6XtgBEjYC007kQko94PTVayVDJ
 04sqVIY0taCmF_ev.RB1H_x0vcGQtRgjLQwPKO0sFGIBl0kWv2o3V.FJjgrV
 CuSZcuuCU3Tniq7uOQgs93ss0AeuQgd_8opMMXknuQFsbhZsAkXoEG8ojNRF
 BLS6TEFuwCo7CVbb9eSRS2wGLvoGApKY13MJMIFFblzP1QcZAS2eo3upUyvP
 Ug16vgnlf0zropEJRFK6BqSLgaVCvig91ykrFmXqZFybgeNmN1DFZmux4gl2
 yz0GQjv4j89ZDyHvAABDlArOQ0RS1P1FBz6yl4tM1uYqh69OjPMoVd6ny01G
 Oo5VXJ8pAnuzoZ2jFUxTzoO61xvXVIkxCcgb0XxYz3Xi2MW3B0SskjiticoZ
 iPe_bsWTQIE8WczO686RZoptIBnUEOc4UcIImDF_FC2RXr9sgCddzUmENK03
 SOOXoH2kWZnnrVn4dDTCjRSs7G2ARkJCYxx_iyPvlcnltFvpidCKUKHA_MO2
 tLTBdfEFdOw._RXGJ29jGGBeUjBQ0fxJf_GY_0LYciZXL.El1Tu8w38hey8G
 JmCrQNjWyJxC5vL0WznUlwL1KxnlryCFX20SCYGksxRMHO99Rc56f
X-Yahoo-SMTP: CZo5LQaswBDoiub2T5I2uEJ.bdRW_9Bz1CqTUQ--
X-Rocket-Received: from [223.237.200.38] (deepak_..._at_223.237.200.38 with )
        by smtp117.mail.sg3.yahoo.com with SMTP; 15 Sep 2013 10:48:18 -0700 PDT
MIME-Version: 1.0
To: "tscm-..._at_googlegroups.com" <tscm-..._at_googlegroups.com>
From: Deepak Seshadri <deepak_..._at_yahoo.co.in>
Subject: RE: [TSCM-L] {6512} NSA pays tech companies millions to
 engineerbackdoors into encryption protocols
Date: Sun, 15 Sep 2013 23:17:56 +0530
Content-Type: multipart/alternative;
        boundary="_70245193-DF08-4FBF-A9CF-9B3713F5C154_"

--_70245193-DF08-4FBF-A9CF-9B3713F5C154_
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain; charset="utf-8"

Hey but the government is also people only??? Just the other side!!! Its pe=
ople who only think to outwit people!=20

-----Original Message-----
From: "Wayne Blackburn" <texian..._at_sbcglobal.net>
Sent: =E2=80=8E15-=E2=80=8E09-=E2=80=8E2013 19:55
To: "tscm-..._at_googlegroups.com" <tscm-..._at_googlegroups.com>
Subject: RE: [TSCM-L] {6512} NSA pays tech companies millions to engineerba=
ckdoors into encryption protocols

Face it. The Government is scared=E2=80=94We the people are waking up!
=20
From: tscm-..._at_googlegroups.com [mailto:tscm-..._at_googlegroups.com] On Behal=
f Of Roger at Bugsweeps
Sent: Saturday, September 14, 2013 8:35 PM
To: TSCM..._at_yahoogroups.com; tscm-..._at_googlegroups.com
Subject: [TSCM-L] {6511} NSA pays tech companies millions to engineer backd=
oors into encryption protocols
=20
http://www.naturalnews.com/042038_NSA_tech_companies_encryption_protocols.h=
tml
=20
=20
NSA pays tech companies millions to engineer backdoors into encryption prot=
ocols=20
Friday, September 13, 2013 by: J. D. Heyes
Tags: NSA, tech companies, encryption protocols



=20
328 3




(NaturalNews) There is a saying that says, when it comes to government, the=
y've got you coming and going.

No truer words are spoken when the subject comes to serial invasions of you=
r privacy. Not only is the National Security Agency monitoring your every e=
lectronic communication, but the agency is paying your tech company and Int=
ernet service provider to hack you as well.

According to Britain's The Guardian newspaper, which broke the story of mas=
sive NSA spying earlier this year:

U.S. and British intelligence agencies have successfully cracked much of th=
e online encryption relied upon by hundreds of millions of people to protec=
t the privacy of their personal data, online transactions and emails, accor=
ding to top-secret documents revealed by former contractor Edward Snowden.

The files show that the National Security Agency and its UK counterpart GCH=
Q have broadly compromised the guarantees that internet companies have give=
n consumers to reassure them that their communications, online banking and =
medical records would be indecipherable to criminals or governments.

If need be, the use of 'brute force' to break encryption

In other words, those little privacy spiels that social media and tech comp=
anies put on their sites to "assure you" that your privacy is "guaranteed" =
- are lies. And what's more, they are government-sanctioned lies.

The files that Snowden - who is currently in Russia, having been granted te=
mporary political asylum by President Vladimir Putin - provided show that t=
he agencies use a number of methods in their systematic, continual assault =
on what they perceive as one of the biggest threats to their ability to acc=
ess billions of bytes of Internet traffic - "the use of ubiquitous encrypti=
on across the Internet."

The paper said the methods include covert measures ensuring NSA control ove=
r the establishment of international encryption standards, use of supercomp=
uters to break encryption protocols and protections using "brute force," an=
d - the most closely guarded of all secrets - "collaboration with technolog=
y companies and Internet service providers themselves."

Through the establishment of these covert and unconstitutional partnerships=
 - private firms have as much legal obligation to protect your privacy as t=
he government does - these agencies have had placed into commercial encrypt=
ion software the ability to penetrate it in what are known as "backdoors" o=
r "trapdoors."

According to the files provided by Snowden:

-- A decade-long NSA program targeting encryption technologies made a huge =
breakthrough in 2010, which then made "vast amounts" of data collected thro=
ugh Internet cable taps finally "exploitable."

-- The NSA spends $250 million taxpayer dollars annually on a program that,=
 among other goals, works through tech companies to "covertly influence" th=
e design of their products.

-- The secrecy of the programs' capabilities to thwart encryption is extrem=
ely closely guarded, and analysts are warned: "Do not ask about or speculat=
e on sources or methods."

-- The NSA describes its strong decryption programs as the "price of admiss=
ion for the U.S. to maintain unrestricted access to and use of cyberspace."

-- A GCHQ team has been developing ways to access encrypted traffic on each=
 of the "big four" service providers: Hotmail, Google, Yahoo and Facebook.

As usual, both agencies insist they need to defeat all encryption in order =
to maintain national security and combat terrorism and the ability of forei=
gn governments to gather intelligence.

But, of course, there is another aspect to this, and security experts have =
pointed it out: The agencies are attacking the essence of the Internet itse=
lf, as well as the privacy of all of its users.

'We had to comply'

"Cryptography forms the basis for trust online," Bruce Schneier, an encrypt=
ion specialist and fellow at Harvard's Berkman Center for Internet and Soci=
ety, told The Guardian. "By deliberately undermining online security in a s=
hort-sighted effort to eavesdrop, the NSA is undermining the very fabric of=
 the internet."

Classified briefings between the agencies celebrate their success at "defea=
ting network security and privacy," he said.

"For the past decade, NSA has lead [sic] an aggressive, multi-pronged effor=
t to break widely used internet encryption technologies," a 2010 GCHQ docum=
ent stated. "Vast amounts of encrypted internet data which have up till now=
 been discarded are now exploitable."

The paper and others have also reported previously that Microsoft has coope=
rated with NSA to circumvent encryption in its Outlook mail program, saying=
 it was obliged to comply with "existing or future lawful demands" when des=
igning its products.

Sources:

http://www.theguardian.com



Learn more: http://www.naturalnews.com/042038_NSA_tech_companies_encryption=
_protocols.html#ixzz2ev9jSDjQ
=20
--=20
You received this message because you are subscribed to the Google Groups "=
TSCM-L Professionals List" group.
To unsubscribe from this group and stop receiving emails from it, send an e=
mail to tscm-..._at_googlegroups.com.
For more options, visit https://groups.google.com/groups/opt_out.
--=20
You received this message because you are subscribed to the Google Groups "=
TSCM-L Professionals List" group.
To unsubscribe from this group and stop receiving emails from it, send an e=
mail to tscm-..._at_googlegroups.com.
For more options, visit https://groups.google.com/groups/opt_out.
--_70245193-DF08-4FBF-A9CF-9B3713F5C154_
Content-Transfer-Encoding: quoted-printable
Content-Type: text/html; charset="utf-8"

<HTML xmlns=3D"http://www.w3.org/TR/REC-html40" xmlns:v =3D "urn:schemas-mi=
crosoft-com:vml" xmlns:o =3D "urn:schemas-microsoft-com:office:office" xmln=
s:w =3D "urn:schemas-microsoft-com:office:word" xmlns:m =3D "http://schemas=
.microsoft.com/office/2004/12/omml"><HEAD>
<META content=3D"text/html; charset=3Dutf-8" http-equiv=3DContent-Type>
<META name=3DGenerator content=3D"Microsoft Word 12 (filtered medium)">
<STYLE>v\:* {behavior:url(#default#VML);}
o\:* {behavior:url(#default#VML);}
w\:* {behavior:url(#default#VML);}
.shape {behavior:url(#default#VML);}
</STYLE>

<STYLE><!--
/* Font Definitions */
_at_font-face
=09{font-family:"Cambria Math";
=09panose-1:2 4 5 3 5 4 6 3 2 4;}
_at_font-face
=09{font-family:Calibri;
=09panose-1:2 15 5 2 2 2 4 3 2 4;}
_at_font-face
=09{font-family:Tahoma;
=09panose-1:2 11 6 4 3 5 4 4 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
=09{margin:0in;
=09margin-bottom:.0001pt;
=09font-size:11.0pt;
=09font-family:"Calibri","sans-serif";}
a:link, span.MsoHyperlink
=09{mso-style-priority:99;
=09color:blue;
=09text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
=09{mso-style-priority:99;
=09color:purple;
=09text-decoration:underline;}
p
=09{mso-style-priority:99;
=09mso-margin-top-alt:auto;
=09margin-right:0in;
=09mso-margin-bottom-alt:auto;
=09margin-left:0in;
=09font-size:12.0pt;
=09font-family:"Times New Roman","serif";}
p.MsoAcetate, li.MsoAcetate, div.MsoAcetate
=09{mso-style-priority:99;
=09mso-style-link:"Balloon Text Char";
=09margin:0in;
=09margin-bottom:.0001pt;
=09font-size:8.0pt;
=09font-family:"Tahoma","sans-serif";}
span.BalloonTextChar
=09{mso-style-name:"Balloon Text Char";
=09mso-style-priority:99;
=09mso-style-link:"Balloon Text";
=09font-family:"Tahoma","sans-serif";}
span.EmailStyle19
=09{mso-style-type:personal;
=09font-family:"Calibri","sans-serif";
=09color:windowtext;}
span.EmailStyle21
=09{mso-style-type:personal-reply;
=09font-family:"Calibri","sans-serif";
=09color:#1F497D;}
.MsoChpDefault
=09{mso-style-type:export-only;
=09font-size:10.0pt;}
_at_page WordSection1
=09{size:8.5in 11.0in;
=09margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
=09{page:WordSection1;}
--></STYLE>
</HEAD>
<BODY lang=3DEN-US link=3Dblue vLink=3Dpurple>
<DIV>
<DIV style=3D"FONT-SIZE: 11pt; FONT-FAMILY: Calibri,sans-serif">Hey but the=
 government is also people only??? Just the other side!!! Its people who on=
ly think to outwit people! </DIV></DIV>
<DIV dir=3Dltr>
<HR>
<SPAN style=3D"FONT-SIZE: 11pt; FONT-FAMILY: Calibri,sans-serif; FONT-WEIGH=
T: bold">From: </SPAN><SPAN style=3D"FONT-SIZE: 11pt; FONT-FAMILY: Calibri,=
sans-serif"><A href=3D"mailto:texian..._at_sbcglobal.net">Wayne Blackburn</A><=
/SPAN><BR><SPAN style=3D"FONT-SIZE: 11pt; FONT-FAMILY: Calibri,sans-serif; =
FONT-WEIGHT: bold">Sent: </SPAN><SPAN style=3D"FONT-SIZE: 11pt; FONT-FAMILY=
: Calibri,sans-serif">=E2=80=8E15-=E2=80=8E09-=E2=80=8E2013 19:55</SPAN><BR=
><SPAN style=3D"FONT-SIZE: 11pt; FONT-FAMILY: Calibri,sans-serif; FONT-WEIG=
HT: bold">To: </SPAN><SPAN style=3D"FONT-SIZE: 11pt; FONT-FAMILY: Calibri,s=
ans-serif"><A href=3D"mailto:tscm-..._at_googlegroups.com">tscm-..._at_googlegrou=
ps.com</A></SPAN><BR><SPAN style=3D"FONT-SIZE: 11pt; FONT-FAMILY: Calibri,s=
ans-serif; FONT-WEIGHT: bold">Subject: </SPAN><SPAN style=3D"FONT-SIZE: 11p=
t; FONT-FAMILY: Calibri,sans-serif">RE: [TSCM-L] {6512} NSA pays tech compa=
nies millions to engineerbackdoors into encryption protocols</SPAN><BR><BR>=
</DIV>
<DIV class=3DWordSection1>
<P class=3DMsoNormal><SPAN style=3D"FONT-SIZE: 16pt; COLOR: #1f497d">Face i=
t. The Government is scared=E2=80=94We the people are waking up!<o:p></o:p>=
</SPAN></P>
<P class=3DMsoNormal><SPAN style=3D"FONT-SIZE: 16pt; COLOR: #1f497d"><o:p>&=
nbsp;</o:p></SPAN></P>
<DIV>
<DIV style=3D"BORDER-TOP: #b5c4df 1pt solid; BORDER-RIGHT: medium none; BOR=
DER-BOTTOM: medium none; PADDING-BOTTOM: 0in; PADDING-TOP: 3pt; PADDING-LEF=
T: 0in; BORDER-LEFT: medium none; PADDING-RIGHT: 0in">
<P class=3DMsoNormal><B><SPAN style=3D"FONT-SIZE: 10pt; FONT-FAMILY: 'Tahom=
a','sans-serif'">From:</SPAN></B><SPAN style=3D"FONT-SIZE: 10pt; FONT-FAMIL=
Y: 'Tahoma','sans-serif'"> tscm-..._at_googlegroups.com [mailto:tscm-..._at_googl=
egroups.com] <B>On Behalf Of </B>Roger at Bugsweeps<BR><B>Sent:</B> Saturda=
y, September 14, 2013 8:35 PM<BR><B>To:</B> TSCM..._at_yahoogroups.com; tscm-.=
.._at_googlegroups.com<BR><B>Subject:</B> [TSCM-L] {6511} NSA pays tech compan=
ies millions to engineer backdoors into encryption protocols<o:p></o:p></SP=
AN></P></DIV></DIV>
<P class=3DMsoNormal><o:p>&nbsp;</o:p></P>
<P class=3DMsoNormal><A href=3D"http://www.naturalnews.com/042038_NSA_tech_=
companies_encryption_protocols.html">http://www.naturalnews.com/042038_NSA_=
tech_companies_encryption_protocols.html</A><o:p></o:p></P>
<P class=3DMsoNormal><o:p>&nbsp;</o:p></P>
<P class=3DMsoNormal><o:p>&nbsp;</o:p></P>
<DIV align=3Dcenter>
<TABLE class=3DMsoNormalTable style=3D"WIDTH: 870pt" cellSpacing=3D0 cellPa=
dding=3D0 width=3D1450 border=3D0>
<TBODY>
<TR>
<TD style=3D"PADDING-BOTTOM: 0in; PADDING-TOP: 0in; PADDING-LEFT: 0in; PADD=
ING-RIGHT: 0in">
<TABLE class=3DMsoNormalTable style=3D"WIDTH: 870pt" cellSpacing=3D0 cellPa=
dding=3D0 width=3D1450 border=3D0>
<TBODY>
<TR>
<TD style=3D"PADDING-BOTTOM: 0in; PADDING-TOP: 0in; PADDING-LEFT: 0in; PADD=
ING-RIGHT: 0in; WIDTH: 588.75pt" vAlign=3Dtop width=3D981>
<TABLE class=3DMsoNormalTable style=3D"WIDTH: 562.5pt" cellSpacing=3D0 cell=
Padding=3D0 width=3D938 border=3D0>
<TBODY>
<TR>
<TD style=3D"PADDING-BOTTOM: 0in; PADDING-TOP: 4.5pt; PADDING-LEFT: 0in; PA=
DDING-RIGHT: 11.25pt; WIDTH: 123.75pt" vAlign=3Dtop width=3D206>
<P class=3DMsoNormal><SPAN style=3D"FONT-SIZE: 9pt; FONT-FAMILY: 'Arial','s=
ans-serif'"><IMG id=3DPicture_x0020_1 border=3D0 alt=3Dencryption src=3D"ci=
d:image001.jpg_at_01CEB18F.0BAF98A0" width=3D300 height=3D250><o:p></o:p></SPA=
N></P></TD>
<TD style=3D"PADDING-BOTTOM: 0in; PADDING-TOP: 0in; PADDING-LEFT: 0in; PADD=
ING-RIGHT: 0in; WIDTH: 438.75pt" vAlign=3Dtop width=3D731>
<P class=3DMsoNormal style=3D"mso-margin-top-alt: auto; mso-margin-bottom-a=
lt: auto"><B><SPAN style=3D"FONT-SIZE: 24pt; FONT-FAMILY: 'Arial','sans-ser=
if'">NSA pays tech companies millions to engineer backdoors into encryption=
 protocols <o:p></o:p></SPAN></B></P>
<P class=3DMsoNormal style=3D"MARGIN-BOTTOM: 12pt; mso-margin-top-alt: auto=
"><SPAN style=3D"FONT-SIZE: 9pt; FONT-FAMILY: 'Arial','sans-serif'">Friday,=
 September 13, 2013 by: J. D. Heyes<BR><I>Tags: <A href=3D"http://www.natur=
alnews.com/NSA.html"><SPAN style=3D"COLOR: #3366cc; TEXT-DECORATION: none">=
NSA</SPAN></A>, <A href=3D"http://www.naturalnews.com/tech_companies.html">=
<SPAN style=3D"COLOR: #3366cc; TEXT-DECORATION: none">tech companies</SPAN>=
</A>, <A href=3D"http://www.naturalnews.com/encryption_protocols.html"><SPA=
N style=3D"COLOR: #3366cc; TEXT-DECORATION: none">encryption protocols</SPA=
N></A></I><o:p></o:p></SPAN></P></TD></TR></TBODY></TABLE></TD>
<TD style=3D"PADDING-BOTTOM: 0in; PADDING-TOP: 0in; PADDING-LEFT: 0in; PADD=
ING-RIGHT: 0in; WIDTH: 281.25pt" vAlign=3Dtop width=3D469></TD></TR></TBODY=
></TABLE></TD></TR></TBODY></TABLE></DIV>
<P class=3DMsoNormal style=3D"BACKGROUND: white"><SPAN style=3D"FONT-SIZE: =
12pt; FONT-FAMILY: 'Times New Roman','serif'; COLOR: black"><o:p>&nbsp;</o:=
p></SPAN></P>
<DIV align=3Dcenter>
<TABLE class=3DMsoNormalTable style=3D"WIDTH: 870pt" cellSpacing=3D0 cellPa=
dding=3D0 width=3D1450 border=3D0>
<TBODY>
<TR>
<TD style=3D"PADDING-BOTTOM: 0in; PADDING-TOP: 0in; PADDING-LEFT: 0in; PADD=
ING-RIGHT: 0in; WIDTH: 487.5pt" vAlign=3Dtop width=3D813>
<TABLE class=3DMsoNormalTable style=3D"MARGIN-BOTTOM: 0.1in; WIDTH: 225pt; =
MARGIN-RIGHT: 11.25pt" cellSpacing=3D0 cellPadding=3D0 width=3D375 align=3D=
left border=3D0>
<TBODY>
<TR>
<TD style=3D"PADDING-BOTTOM: 7.5pt; PADDING-TOP: 0in; PADDING-LEFT: 0in; PA=
DDING-RIGHT: 0in">
<TABLE class=3DMsoNormalTable cellSpacing=3D0 cellPadding=3D0 border=3D0>
<TBODY>
<TR>
<TD style=3D"PADDING-BOTTOM: 0in; PADDING-TOP: 0in; PADDING-LEFT: 0in; PADD=
ING-RIGHT: 0in">
<P class=3DMsoNormal><SPAN style=3D"FONT-SIZE: 15pt; FONT-FAMILY: 'Tahoma',=
'sans-serif'; COLOR: #333333; LETTER-SPACING: -0.75pt">328</SPAN><SPAN styl=
e=3D"FONT-SIZE: 9pt; FONT-FAMILY: 'Arial','sans-serif'"> <o:p></o:p></SPAN>=
</P></TD>
<TD style=3D"PADDING-BOTTOM: 0in; PADDING-TOP: 0in; PADDING-LEFT: 0in; PADD=
ING-RIGHT: 0in"></TD>
<TD style=3D"PADDING-BOTTOM: 0in; PADDING-TOP: 0in; PADDING-LEFT: 0in; PADD=
ING-RIGHT: 0in"></TD>
<TD style=3D"PADDING-BOTTOM: 0in; PADDING-TOP: 0in; PADDING-LEFT: 0in; PADD=
ING-RIGHT: 0in">
<P class=3DMsoNormal><A href=3D"http://www.naturalnews.com/042038_NSA_tech_=
companies_encryption_protocols.html"><SPAN style=3D"FONT-SIZE: 9pt; FONT-FA=
MILY: 'Arial','sans-serif'; COLOR: #3366cc; TEXT-DECORATION: none"><IMG id=
=3DPicture_x0020_2 border=3D0 alt=3DDelicious src=3D"cid:image002.gif_at_01CEB=
18F.0BAF98A0" width=3D55 height=3D62></SPAN></A><SPAN style=3D"FONT-SIZE: 9=
pt; FONT-FAMILY: 'Arial','sans-serif'"><o:p></o:p></SPAN></P></TD>
<TD style=3D"PADDING-BOTTOM: 0in; PADDING-TOP: 0in; PADDING-LEFT: 0in; PADD=
ING-RIGHT: 0in">
<P class=3DMsoNormal><SPAN style=3D"FONT-SIZE: 9pt; FONT-FAMILY: 'Arial','s=
ans-serif'"><A href=3D"http://www.pinterest.com/pin/create/button/?url=3Dht=
tp%3A%2F%2Fwww.naturalnews.com%2F042038_NSA_tech_companies_encryption_proto=
cols.html&amp;media=3Dhttp%3A%2F%2Fwww.naturalnews.com%2Fgallery%2F300X250%=
2FMoney%2FHands-Passing-Money.jpg&amp;guid=3Dr7BjXyYAjY_h-0&amp;description=
=3DNSA%20pays%20tech%20companies%20millions%20to%20engineer%20backdoors%20i=
nto%20encryption%20protocols" target=3D_blank><SPAN style=3D"COLOR: #3366cc=
; TEXT-DECORATION: none">3</SPAN></A><o:p></o:p></SPAN></P></TD></TR></TBOD=
Y></TABLE></TD></TR>
<TR>
<TD style=3D"PADDING-BOTTOM: 22.5pt; PADDING-TOP: 0in; PADDING-LEFT: 7.5pt;=
 PADDING-RIGHT: 7.5pt">
<TABLE class=3DMsoNormalTable style=3D"WIDTH: 225pt" cellSpacing=3D0 cellPa=
dding=3D0 width=3D375 border=3D0>
<TBODY>
<TR>
<TD style=3D"PADDING-BOTTOM: 0in; PADDING-TOP: 0in; PADDING-LEFT: 0in; PADD=
ING-RIGHT: 0in; WIDTH: 83.25pt" width=3D139>
<P class=3DMsoNormal><A title=3D'"View this article in a printer friendly l=
ayout" t ' href=3D"http://www.naturalnews.com/z042038_NSA_tech_companies_en=
cryption_protocols.html"><SPAN style=3D"FONT-SIZE: 9pt; FONT-FAMILY: 'Arial=
','sans-serif'; COLOR: #3366cc; TEXT-DECORATION: none"><IMG id=3DPicture_x0=
020_3 border=3D0 alt=3Dhttp://www.naturalnews.com/images/Social-Print-Butto=
n.gif src=3D"cid:image003.gif_at_01CEB18F.0BAF98A0" width=3D101 height=3D21></=
SPAN></A><SPAN style=3D"FONT-SIZE: 9pt; FONT-FAMILY: 'Arial','sans-serif'">=
<o:p></o:p></SPAN></P></TD>
<TD style=3D"PADDING-BOTTOM: 0in; PADDING-TOP: 0in; PADDING-LEFT: 0in; PADD=
ING-RIGHT: 0in; WIDTH: 83.25pt" width=3D139>
<P class=3DMsoNormal><A title=3D'"Email this article to a friend" ' href=3D=
"mailto:Enter_Email_Here?subject=3DRecommended%20article,%20please%20read&a=
mp;body=3DCheck%20out%20this%20great%20article:http://www.naturalnews.com/0=
42038_NSA_tech_companies_encryption_protocols.htmlIt's%20really%20interesti=
ng."><SPAN style=3D"FONT-SIZE: 9pt; FONT-FAMILY: 'Arial','sans-serif'; COLO=
R: #3366cc; TEXT-DECORATION: none"><IMG id=3DPicture_x0020_4 border=3D0 alt=
=3Dhttp://www.naturalnews.com/images/Social-Email-Button.gif src=3D"cid:ima=
ge004.gif_at_01CEB18F.0BAF98A0" width=3D101 height=3D21></SPAN></A><SPAN style=
=3D"FONT-SIZE: 9pt; FONT-FAMILY: 'Arial','sans-serif'"><o:p></o:p></SPAN></=
P></TD>
<TD style=3D"PADDING-BOTTOM: 0in; PADDING-TOP: 0in; PADDING-LEFT: 0in; PADD=
ING-RIGHT: 0in; WIDTH: 58.5pt" width=3D98>
<P class=3DMsoNormal style=3D"TEXT-ALIGN: right" align=3Dright><A href=3D"h=
ttp://www.addtoany.com/share_save#url=3Dhttp%3A%2F%2Fwww.naturalnews.com%2F=
042038_NSA_tech_companies_encryption_protocols.html&amp;title=3DNSA%20pays%=
20tech%20companies%20millions%20to%20engineer%20backdoors%20into%20encrypti=
on%20protocols&amp;description=3DNSA%20pays%20tech%20companies%20millions%2=
0to"><SPAN style=3D"FONT-SIZE: 9pt; FONT-FAMILY: 'Arial','sans-serif'; COLO=
R: #3366cc; TEXT-DECORATION: none"><IMG id=3DPicture_x0020_5 border=3D0 alt=
=3Dhttp://www.naturalnews.com/images/Social-Share-Button.gif src=3D"cid:ima=
ge005.gif_at_01CEB18F.0BAF98A0" width=3D85 height=3D21></SPAN></A><SPAN style=
=3D"FONT-SIZE: 9pt; FONT-FAMILY: 'Arial','sans-serif'"><o:p></o:p></SPAN></=
P></TD></TR></TBODY></TABLE></TD></TR>
<TR>
<TD style=3D"PADDING-BOTTOM: 22.5pt; PADDING-TOP: 11.25pt; PADDING-LEFT: 7.=
5pt; PADDING-RIGHT: 7.5pt">
<P class=3DMsoNormal><A href=3D"http://hsionlineorders.net/HTML5/Sacred_Boo=
k_S_NoPop/?pco=3DPHSIP777&amp;efo=3DHSIOP130215" target=3D_blank><SPAN styl=
e=3D"FONT-SIZE: 9pt; FONT-FAMILY: 'Arial','sans-serif'; COLOR: #3366cc; TEX=
T-DECORATION: none"><IMG id=3DPicture_x0020_6 border=3D0 alt=3Dhttp://www.n=
aturalnews.com/ads/300x250/ExposedAd-NaturalNews-300x250.gif src=3D"cid:ima=
ge006.gif_at_01CEB18F.0BAF98A0" width=3D300 height=3D250></SPAN></A><SPAN styl=
e=3D"FONT-SIZE: 9pt; FONT-FAMILY: 'Arial','sans-serif'"><o:p></o:p></SPAN><=
/P></TD></TR></TBODY></TABLE>
<P class=3DMsoNormal style=3D"MARGIN-BOTTOM: 12pt"><SPAN style=3D"FONT-SIZE=
: 9pt; FONT-FAMILY: 'Arial','sans-serif'">(NaturalNews) There is a saying t=
hat says, when it comes to government, they've got you coming and going.<BR=
><BR>No truer words are spoken when the subject comes to serial invasions o=
f your privacy. Not only is the National Security Agency monitoring your ev=
ery electronic communication, but the agency is paying your tech company an=
d Internet service provider to hack you as well.<BR><BR>According to Britai=
n's <I>The Guardian</I> newspaper, which broke the story of massive NSA spy=
ing earlier this year:<BR><BR><I>U.S. and British intelligence agencies hav=
e successfully cracked much of the online encryption relied upon by hundred=
s of millions of people to protect the privacy of their personal data, onli=
ne transactions and emails, according to top-secret documents revealed by f=
ormer contractor Edward Snowden.<BR><BR>The files show that the National Se=
curity Agency and its UK counterpart GCHQ have broadly compromised the guar=
antees that internet companies have given consumers to reassure them that t=
heir communications, online banking and medical records would be indecipher=
able to criminals or governments.</I><BR><BR><B>If need be, the use of 'bru=
te force' to break encryption</B><BR><BR>In other words, those little priva=
cy spiels that social media and tech companies put on their sites to "assur=
e you" that your privacy is "guaranteed" - are lies. And what's more, they =
are government-sanctioned lies.<BR><BR>The files that Snowden - who is curr=
ently in Russia, having been granted temporary political asylum by Presiden=
t Vladimir Putin - provided show that the agencies use a number of methods =
in their systematic, continual assault on what they perceive as one of the =
biggest threats to their ability to access billions of bytes of Internet tr=
affic - "the use of ubiquitous encryption across the Internet."<BR><BR>The =
paper said the methods include covert measures ensuring <A href=3D"http://w=
ww.naturalnews.com/NSA.html"><SPAN style=3D"COLOR: #3366cc; TEXT-DECORATION=
: none">NSA</SPAN></A> control over the establishment of international encr=
yption standards, use of supercomputers to break encryption protocols and p=
rotections using "brute force," and - the most closely guarded of all secre=
ts - "collaboration with technology companies and Internet service provider=
s themselves."<BR><BR>Through the establishment of these covert and unconst=
itutional partnerships - private firms have as much legal obligation to pro=
tect your privacy as the government does - these agencies have had placed i=
nto commercial <A href=3D"http://www.naturalnews.com/encryption.html"><SPAN=
 style=3D"COLOR: #3366cc; TEXT-DECORATION: none">encryption</SPAN></A> soft=
ware the ability to penetrate it in what are known as "backdoors" or "trapd=
oors."<BR><BR>According to the files provided by Snowden:<BR><BR>-- A decad=
e-long NSA program targeting encryption technologies made a huge breakthrou=
gh in 2010, which then made "vast amounts" of data collected through Intern=
et cable taps finally "exploitable."<BR><BR>-- The NSA spends $250 million =
taxpayer dollars annually on a program that, among other goals, works throu=
gh <A href=3D"http://www.naturalnews.com/tech_companies.html"><SPAN style=
=3D"COLOR: #3366cc; TEXT-DECORATION: none">tech companies</SPAN></A> to "co=
vertly influence" the design of their products.<BR><BR>-- The secrecy of th=
e programs' capabilities to thwart encryption is extremely closely guarded,=
 and analysts are warned: "Do not ask about or speculate on sources or meth=
ods."<BR><BR>-- The NSA describes its strong decryption programs as the "pr=
ice of admission for the U.S. to maintain unrestricted access to and use of=
 cyberspace."<BR><BR>-- A GCHQ team has been developing ways to access encr=
ypted traffic on each of the "big four" service providers: Hotmail, Google,=
 Yahoo and Facebook.<BR><BR>As usual, both agencies <I>insist</I> they need=
 to defeat all encryption in order to maintain national security and combat=
 terrorism and the ability of foreign governments to gather intelligence.<B=
R><BR>But, of course, there is another aspect to this, and security experts=
 have pointed it out: The agencies are attacking the essence of the Interne=
t itself, as well as the privacy of all of its users.<BR><BR><B>'We had to =
comply'</B><BR><BR>"Cryptography forms the basis for trust online," Bruce S=
chneier, an encryption specialist and fellow at Harvard's Berkman Center fo=
r Internet and Society, told <I>The Guardian</I>. "By deliberately undermin=
ing online security in a short-sighted effort to eavesdrop, the NSA is unde=
rmining the very fabric of the <A href=3D"http://www.naturalnews.com/intern=
et.html"><SPAN style=3D"COLOR: #3366cc; TEXT-DECORATION: none">internet</SP=
AN></A>."<BR><BR>Classified briefings between the agencies celebrate their =
success at "defeating network security and privacy," he said.<BR><BR>"For t=
he past decade, NSA has lead [sic] an aggressive, multi-pronged effort to b=
reak widely used internet encryption technologies," a 2010 GCHQ document st=
ated. "Vast amounts of encrypted internet data which have up till now been =
discarded are now exploitable."<BR><BR>The paper and others have also repor=
ted previously that Microsoft has cooperated with NSA to circumvent encrypt=
ion in its Outlook mail program, saying it was obliged to comply with "exis=
ting or future lawful demands" when designing its products.<BR><BR>Sources:=
<BR><BR><A href=3D"http://www.theguardian.com/world/2013/sep/05/nsa-gchq-en=
cryption-codes-security" target=3D_blank><SPAN style=3D"COLOR: #3366cc; TEX=
T-DECORATION: none">http://www.theguardian.com</SPAN></A><o:p></o:p></SPAN>=
</P></TD></TR></TBODY></TABLE></DIV>
<P class=3DMsoNormal style=3D"BACKGROUND: white"><SPAN style=3D"FONT-SIZE: =
12pt; FONT-FAMILY: 'Times New Roman','serif'; COLOR: black"><BR><BR>Learn m=
ore: <A href=3D"http://www.naturalnews.com/042038_NSA_tech_companies_encryp=
tion_protocols.html#ixzz2ev9jSDjQ"><SPAN style=3D"COLOR: #003399; TEXT-DECO=
RATION: none">http://www.naturalnews.com/042038_NSA_tech_companies_encrypti=
on_protocols.html#ixzz2ev9jSDjQ</SPAN></A><o:p></o:p></SPAN></P>
<P class=3DMsoNormal><o:p>&nbsp;</o:p></P>
<P class=3DMsoNormal><SPAN style=3D"FONT-SIZE: 12pt; FONT-FAMILY: 'Times Ne=
w Roman','serif'">-- <BR>You received this message because you are subscrib=
ed to the Google Groups "TSCM-L Professionals List" group.<BR>To unsubscrib=
e from this group and stop receiving emails from it, send an email to <A hr=
ef=3D"mailto:tscm-..._at_googlegroups.com">tscm-..._at_googlegroups.com</A>.<BR>F=
or more options, visit <A href=3D"https://groups.google.com/groups/opt_out"=
>https://groups.google.com/groups/opt_out</A>.<o:p></o:p></SPAN></P></DIV>
<P></P>-- <BR>You received this message because you are subscribed to the G=
oogle Groups "TSCM-L Professionals List" group.<BR>To unsubscribe from this=
 group and stop receiving emails from it, send an email to tscm-..._at_googleg=
roups.com.<BR>For more options, visit <A href=3D"https://groups.google.com/=
groups/opt_out">https://groups.google.com/groups/opt_out</A>.<BR></BODY></H=
TML>
--_70245193-DF08-4FBF-A9CF-9B3713F5C154_--
Received on Sat Mar 02 2024 - 00:57:20 CST

This archive was generated by hypermail 2.3.0 : Sat Mar 02 2024 - 01:11:44 CST