[cryptome] Re: Clandestine british base

  • From: Iao <iao.ms88@xxxxxxxxx>
  • To: cryptome@xxxxxxxxxxxxx
  • Date: Tue, 03 Jun 2014 13:18:13 -0600

Between  non-violent
direct  action  and  artful
social  engineering,almost
anything  is  possible.Some
outcomes  just  have  a
higher  probability  than
others.Expect  to  win. ..


tpb-crypto@xxxxxxxxxxx wrote:

>I'm sure someone that lives nearby can locate the correct cables and screw 
>with them. lol the spying base has security only around its perimeter, but 
>what is preventing people from breaking their cables outside the perimeter at 
>least once a week? Will an entire country stay without internet because of 
>that? Good! People will protest and ask for the problem to be solved, 
>companies will be upset with business stopping, less taxes will be collected, 
>everyone will be unhappy unless someone stops spying.
>I wish we created something so revolutionary that everything developed until 
>now would be scraped ... but considering how people scraped pen and paper, 
>that will only be a dream.
>I've lately endeavored to program for mobile phones and tried to build some 
>security aware software, that's nightmare, for one platform alone the 
>situation is worse than all desktop systems combined. Yes, security for 
>Android or even CyanogenMod is worse than for Windows XP, and that's not 
>because of the system. Cellphones are built from the ground up to not be 
>secure and be easily spied upon, all of them. The hardware itself is created 
>in a manner to allow it and software cannot interfere.
>So, even if you talk over redphone, someone can listen to it through GSM 
>backdoors built in which are impossible to disable.
>I've been wardriving to find and crack hotspots all over my town, can someone 
>suggest a device that looks and works like a phone but has only wifi 
>connection and can receive one of those open source phone systems? I would 
>like to try to live online like that and see what happens.
>Suggestions, please?
>> Message du 03/06/14 19:34
>> De : "Joe Products" 
>> A : cryptome@xxxxxxxxxxxxx
>> Copie à : 
>> Objet : [cryptome] Clandestine british base
>> Exclusive Above-top-secret details of Britain’s covert surveillance 
>> programme - including the location of a clandestine British base tapping 
>> undersea cables in the Middle East - have so far remained secret, despite 
>> being leaked by fugitive NSA sysadmin Edward Snowden. Government pressure 
>> has meant that some media organisations, despite being in possession of 
>> these facts, have declined to reveal them. Today, however, the Register 
>> publishes them in full.
>> The secret British spy base is part of a programme codenamed “CIRCUIT” and 
>> also referred to as Overseas Processing Centre 1 (OPC-1). It is located at 
>> Seeb, on the northern coast of Oman, where it taps in to various undersea 
>> cables passing through the Strait of Hormuz into the Persian/Arabian Gulf. 
>> Seeb is one of a three site GCHQ network in Oman, at locations codenamed “
>> TIMPANI”, “GUITAR” and “CLARINET”. TIMPANI, near the Strait of Hormuz, can 
>> monitor Iraqi communications. CLARINET, in the south of Oman, is 
>> strategically close to Yemen.
>> British national telco BT, referred to within GCHQ and the American NSA 
>> under the ultra-classified codename “REMEDY”, and Vodafone Cable (which owns
>> the former Cable & Wireless company, aka “GERONTIC”) are the two top earners
>> of secret GCHQ payments running into tens of millions of pounds annually.
>> ---------- Původní zpráva ----------
>> Od: tpb-crypto@xxxxxxxxxxx
>> Komu: cryptome@xxxxxxxxxxxxx
>> Datum: 3. 6. 2014 18:51:48
>> Předmět: [cryptome] Re: TrueCrypt compromised
>> "> Message du 03/06/14 10:51
>> > De : "Shaun O'Connor" 
>> >
>> > I take your point about the encryption dilemma(did I spell that
>> > correctly). I think the Jury is out on that particular issue though...
>> > 
>> > Personally I think we are in a perpetual game of cat and mouse with
>> > those who make it their business to know everything about everyone..
>> > 
>> The rewards for the spies are too great for this game to end one day.
>> The game will continue, but because of these disclosures by half-2015, the 
>> spies will have to start all over again, at least against people who are 
>> aware and actively protect their systems. Because those that got legacy 
>> systems will be forever under the treat.
>> Considering our increasing life expectancy and the fact that we are using 
>> Cobol and Fortran codes made 40 years ago in many financial and scientific 
>> institutions, we can count many exploits discovered in the last decade to be
>> still exploitable in 100 years. Because those systems won't go away.
>> An example of why this is possible, is how many webservers (not merely 
>> firmware routers hard to re-flash) you will find that are still vulnerable 
>> to heartbleed. The rate of correction seems to be asymptotic, thus always 
>> leaving some uncorrected systems till the end of their usable lives.
>> Put that in an automated system like spy agencies have, and you have 
>> interesting data streams forever to exploit. The only solution to stop them 
>> is to uncover their taps and block them, those are much smaller in number 
>> and easier to tackle than millions of machines."

Other related posts: