I'm sure someone that lives nearby can locate the correct cables and screw with them. lol the spying base has security only around its perimeter, but what is preventing people from breaking their cables outside the perimeter at least once a week? Will an entire country stay without internet because of that? Good! People will protest and ask for the problem to be solved, companies will be upset with business stopping, less taxes will be collected, everyone will be unhappy unless someone stops spying. I wish we created something so revolutionary that everything developed until now would be scraped ... but considering how people scraped pen and paper, that will only be a dream. I've lately endeavored to program for mobile phones and tried to build some security aware software, that's nightmare, for one platform alone the situation is worse than all desktop systems combined. Yes, security for Android or even CyanogenMod is worse than for Windows XP, and that's not because of the system. Cellphones are built from the ground up to not be secure and be easily spied upon, all of them. The hardware itself is created in a manner to allow it and software cannot interfere. So, even if you talk over redphone, someone can listen to it through GSM backdoors built in which are impossible to disable. I've been wardriving to find and crack hotspots all over my town, can someone suggest a device that looks and works like a phone but has only wifi connection and can receive one of those open source phone systems? I would like to try to live online like that and see what happens. Suggestions, please? > Message du 03/06/14 19:34 > De : "Joe Products" > A : cryptome@xxxxxxxxxxxxx > Copie à : > Objet : [cryptome] Clandestine british base > > > Exclusive Above-top-secret details of Britain’s covert surveillance > programme - including the location of a clandestine British base tapping > undersea cables in the Middle East - have so far remained secret, despite > being leaked by fugitive NSA sysadmin Edward Snowden. Government pressure > has meant that some media organisations, despite being in possession of > these facts, have declined to reveal them. Today, however, the Register > publishes them in full. > > The secret British spy base is part of a programme codenamed “CIRCUIT” and > also referred to as Overseas Processing Centre 1 (OPC-1). It is located at > Seeb, on the northern coast of Oman, where it taps in to various undersea > cables passing through the Strait of Hormuz into the Persian/Arabian Gulf. > Seeb is one of a three site GCHQ network in Oman, at locations codenamed “ > TIMPANI”, “GUITAR” and “CLARINET”. TIMPANI, near the Strait of Hormuz, can > monitor Iraqi communications. CLARINET, in the south of Oman, is > strategically close to Yemen. > > > > > > > > > > British national telco BT, referred to within GCHQ and the American NSA > under the ultra-classified codename “REMEDY”, and Vodafone Cable (which owns > the former Cable & Wireless company, aka “GERONTIC”) are the two top earners > of secret GCHQ payments running into tens of millions of pounds annually. > > ---------- Původní zpráva ---------- > Od: tpb-crypto@xxxxxxxxxxx > Komu: cryptome@xxxxxxxxxxxxx > Datum: 3. 6. 2014 18:51:48 > Předmět: [cryptome] Re: TrueCrypt compromised > > "> Message du 03/06/14 10:51 > > De : "Shaun O'Connor" > > > > I take your point about the encryption dilemma(did I spell that > > correctly). I think the Jury is out on that particular issue though... > > > > Personally I think we are in a perpetual game of cat and mouse with > > those who make it their business to know everything about everyone.. > > > > The rewards for the spies are too great for this game to end one day. > > The game will continue, but because of these disclosures by half-2015, the > spies will have to start all over again, at least against people who are > aware and actively protect their systems. Because those that got legacy > systems will be forever under the treat. > > Considering our increasing life expectancy and the fact that we are using > Cobol and Fortran codes made 40 years ago in many financial and scientific > institutions, we can count many exploits discovered in the last decade to be > still exploitable in 100 years. Because those systems won't go away. > > An example of why this is possible, is how many webservers (not merely > firmware routers hard to re-flash) you will find that are still vulnerable > to heartbleed. The rate of correction seems to be asymptotic, thus always > leaving some uncorrected systems till the end of their usable lives. > > Put that in an automated system like spy agencies have, and you have > interesting data streams forever to exploit. The only solution to stop them > is to uncover their taps and block them, those are much smaller in number > and easier to tackle than millions of machines."