“It’s worth considering the various vectors of technical and legal data-gathering that high-level adversaries in America and Britain (and likely other countries, at least in the ‘Five Eyes‘ group of anglophone allies) are likely using in parallel to go after a given target. So far, the possibilities include: A company volunteers to help (and gets paid for it). Spies copy the traffic directly off the fiber. A company complies under legal duress. Spies infiltrate a company. Spies coerce upstream companies to weaken crypto in their products/install backdoors. Spies brute force the crypto. Spies compromise a digital certificate. Spies hack a target computer directly, stealing keys and/or data, sabotage.”
Let us count the ways: How the feds (legally, technically) get our data
- Post author:The Freedom Watch Staff
- Post published:September 8, 2013
- Post category:Network Archives / The Freedom Watch
Tags: Alternative News, Bankocracy, CLibertyC, constitutional liberty coalition, economic Trends, False Sense Of Security, Fascism, for life and liberty, Land Of The Flea, military industrial complex, Orwellian, Resistance, security, sound money, The Freedom Watch, Western Intel
The Freedom Watch Staff
News before it is news for the resistance from a trusted correspondent.
The Freedom Watch Network