Re: Bypassing Local Authorities

--- Tyler Durden <camera_lumina@hotmail.com> wrote:
Well, duh. Controlling who perceives what about any given operation is part of the process. Contrariwise, discovering the particulars about who is fucking who is part of the process of analysing the operations of an adversary. With government-class agencies, both sides of any given action will often be aware of the efforts of their opposites to use counterintelligence techniques to obscure and conceal tactical and strategic goals. This is why it is so much easier when they are running an operation against smaller adversaries. Little guys don't have access to the kind of intelligence products that would allow them to protect themselves.
Assuming that they have not already had the foresight to run their own popular public email services through cut-outs, and/or infiltrated existing services with their personnel...
One imagines that is true.
Not necessarily, but then most people seem to underestimate the guile of people who have the intellect and buisiness sense to create and run large and successful corporations.
A tempest attack on the computer(s) you use to access your email accounts would be the easiest method, I would think, second only to sniffing your ethernet or WAN traffic. Remember, it's only illegal if they get caught in the act, and as we know, TLAs and security companies jealously guard their sources and methods to the point where they will collect the same information twice (or more, if they have big budgets) if it will serve to disguise the kind and use of their initial and more secretive and possibly very illegal methods.
So, what's the colour of the sky on your planet?
There may be some interesting consequences, however, to this.
I would suspect so. Given the prior importance given to key escrow by US TLAs, we know that the people in these departments are heavily invested in the idea that mere mortal citizens should not have access to secure systems. It is only an effort of the imagination to speculate on the various attacks that might be perpetrated on the 'control points' of civilian information system security infrastructure to gain an idea of the ways in which our ability to acquire personal security may be compromised by the 'l33t control-freaks who inhabit SpookWorld. Personally, I believe that I fail to receive an unknown amount of email and telephone communications because of cut-out mediated privacy invasions of the kind that you suggest here. In the trivial case, some asshole might periodically log-in to my email accounts and delete (after copying) incoming messages that their masters feel that I should not see. Obviously this could also be done by way of various kinds of man-in-the-middle attack. Regards, Steve ______________________________________________________________________ Post your free ad now! http://personals.yahoo.ca
participants (1)
-
Steve Thompson