To hear FBI Director James Comey tell it, strong encryption stops law enforcement dead in its tracks by letting terrorists, kidnappers and rapists communicate in complete secrecy.
But that’s just not true.
In the rare cases in which an investigation may initially appear to be blocked by encryption — and so far, the FBI has yet to identify a single one — the government has a Plan B: it’s called hacking.
Hacking — just like kicking down a door and looking through someone’s stuff — is a perfectly legal tactic for law enforcement officers, provided they have a warrant.
And law enforcement officials have, over the years, learned many ways to install viruses, Trojan horses, and other forms of malicious code onto suspects’ devices. Doing so gives them the same access the suspects have to communications — before they’ve been encrypted, or after they’ve been unencrypted.
Government officials don’t like talking about it — quite possibly because hacking takes considerably more effort than simply asking a telecom provider for records. Robert Litt, general counsel to the Director of National Intelligence, recently referred to potential government hacking as a process of “slow uncertain one-offs.”
But they don’t deny it, either. Hacking is “an avenue to consider and discuss,” Amy Hess, the assistant executive director of the FBI’s Science and Technology branch, said at an encryption debate earlier this month.
The FBI “routinely identifies, evaluates, and tests potential exploits in the interest of cyber security,” bureau spokesperson Christopher Allen wrote in an email.
Hacking In Action
There are still only a few publicly known cases of government hacking, but they include examples of phishing, “watering hole” websites, and physical tampering.
Phishing involves an attacker masquerading as a trustworthy website or service and luring a victim with an email message asking the person to click on a link or update sensitive information.
FBI email released to EFF.
This was controversial and received widespread media attention because of the FBI’s choice of a faked news article as their vector of attack. But it also told us two things about FBI hacking: that the FBI has been using that particular kind of malware attack since at least 2007, and that it took the public until 2014 to find out.
A watering hole attack infects a website with malware, so that anyone who visits it is also infected, potentially allowing the attackers to identify and control the visitor’s devices.
In 2013, as part of a child-porn investigation, the FBI seized a large number of web servers and installed malware that reveals personally identifying information of online visitors to several different popular websites, including an email provider. The sites were “Tor hidden service sites,” or sites that reroute web traffic around the globe to cloak their destination. The FBI snuck in a piece of code on every single website hosted by the Freedom Hosting service, directing information about hacked visitors back to a server in northern Virginia.
This watering hole attack landed a large number of people in the FBI’s trap, most of them innocent people who hadn’t committed any crimes. And the FBI never told them about it, because it never subpoenaed their identities — even though their computers had been compromised.
The earliest reported case of the FBI using physical tampering dates back all the way to 2001, when agents broke in and installed a system to record keystrokes on Nicodemo Scarfo Jr.’s computer as part of their investigation of the American Mafia.
Confidential informants tipped the FBI off to Scarfo, the son of notorious Philly mob boss “Little Nicky,” and his alleged gambling and extortion operations in New Jersey in 1999. The FBI obtained a search warrant to enter his office and look through his computer. When they found an encrypted folder on his desktop, they installed a keystroke logger in order to get his passkey — which turned out to be Little Nicky’s prison identification number.
The Products
As Wired first reported in 2007, the FBI has its own brand of malware called the Computer and IP Address Verifier (CIPAV), which can capture information about a machine including browser activity, IP address, operating system details, and other activity. The FBI, for instance, used CIPAV to discover the identity of the teen in Washington making bomb threats.
The Electronic Frontier Foundation obtained documents from the FBI in 2011 revealing more about CIPAV, or the “web bug,” as some agents describe it in internal emails. According to the documents, the FBI and other agencies have widely used the tool since 2001 in cities including Denver, El Paso, Honolulu, Philadelphia, Houston, Cincinnati, and Miami.
In fact, EFF noted at the time: “If the FBI already has endpoint surveillance-based tools for internet wiretapping, it casts serious doubt on law enforcement’s claims of ‘going dark.'”
The FBI also uses non-proprietary hacker tools.
Wired reported in 2014 that the FBI has turned to a popular hacker app called Metasploit, which publishes security flaws. In 2012, the FBI’s “Operation Torpedo” used the app to monitor users of the Tor network. Metasploit is a sort of one-stop shop for putting together hacking code, complete with fresh exploits and payloads. Metasploit revealed that the Flash plug-in connected to the Internet directly instead of opening the secretive Tor browser, and developed code that revealed a user’s real IP address. The FBI used a watering hole attack through child porn websites to install the code on users’ computers.
Federal and local agencies have also consulted with outside contractors, including the controversial Italian firm Hacking Team, to develop and deploy malicious code. The FBI asked Hacking Team in 2012 to help it monitor Tor users. Hacking Team then updated its “Remote Control System” malware to do that.
And as the Washington Post recently reported, an Obama administration working group exploring possible approaches tech companies might use to let law enforcement unlock encrypted communications came up with one that involves the targeted installation of malware — through automatic updates.
“Virtually all consumer devices include the capability to remotely download and install updates to their operating system and applications,” the task force wrote. Law enforcement would use a “lawful process” to force tech companies to “use their remote update capability to insert law enforcement software into a targeted device.” That malware would then “enable far-reaching access to and control of the targeted device.”
The Post did not report who came up with that idea, or whether it was already in use.
And little is known about how much access the agency has to the extensive hacking capabilities developed by other government agencies, especially the National Security Agency.
The NSA has a separate program, revealed by documents provided by whistleblower Edward Snowden, that aims to hack into computers on a massive scale — automating processes to help decide which attack method to use to get into millions of computers.
The NSA has safeguards on its programs ostensibly designed to protect against hacking into Americans’ computers, but it’s unclear how those protocols work in practice.
And the national security complex has invested in malware, or “offensive” cybersecurity, on a massive scale, according to a 2013 Reuters report, in order to infiltrate computer systems overseas. Most famously, the government developed the Stuxnet virus, which was deployed to disrupt Iran’s nuclear systems.
The Time a Judge Said No
All the known cases of the FBI implementing hacking techniques so far have dealt with obtaining information about the location of a device, what programs are running, and its owner — metadata, rather than actual content of messages.
Only once, at least in the public view, has the FBI plainly asked a judge to let it hack everything: photos, messages, emails, and more. And the FBI was told no.
In that case, a hacker infiltrated a Texas resident’s email and got his bank information. The hacker used anonymizing software that made it look like he was in Southeast Asia. The FBI applied for a warrant to search the computer in a number of extremely intrusive ways, including continuous monitoring for 30 days, surreptitiously taking pictures through the computer’s webcam, obtaining photographs and logs of Internet use, and more. The judge denied the FBI’s request because the agency didn’t know where the computer was, a violation of Rule 41 of the Federal Rules of Criminal Procedure, and because the request was not specific enough to satisfy the Fourth Amendment.
It’s unclear whether or not the FBI has ever succeeded in securing a warrant to hack in such an intrusive way. But it does demonstrate that the FBI has the ability, or at least the confidence, to try.
In other warrant requests to use what it calls “Network Investigative Techniques,” the FBI has listed things it wants to access, including the computer’s IP address or the computer’s time zone information, and finished off the list by asking for “other similar identifying information on the activating computer that may assist in identifying the computer, its location, other information about the computer, and the user of the computer may be accessed by the NIT.”
The FBI does not go into details about what this other information might be.
Better Than a Back Door
FBI email released to EFF.
Mayer analyzed the few public examples of law enforcement hacking he was able to find, most of them from the FBI and DEA: five public court orders and four judicial opinions.
He also looked through declassified FBI documents and found that officials there have “theorized that the Fourth Amendment does not apply” when investigators “algorithmically constrain the information that they retrieve from a hacked device, ensuring they receive only data that is — in isolation — constitutionally unprotected,” such as a name. Sometimes the FBI deploys malware on a device in order to find out who it belongs to.
Mayer said that in internal emails, federal investigators argued that targeted hacking might not constitute a search, and hinted at past times when officials may have hacked without getting a warrant first.
“I believe that hacking can be a legitimate and effective law enforcement technique,” Mayer concluded in his paper. “But appropriate procedural protections are vital, and present practices leave much room for improvement.”
“The FBI is extremely close-mouthed” about how often they hack, Steven Bellovin, a computer science professor at Columbia, told The Intercept. In a lengthy paper Bellovin co-wrote with fellow scholars Matt Blaze, Sandy Clark, and Susan Landau, the authors write that, compared to say the “installation of global wiretapping capabilities in the infrastructure,” hacking is “significantly more difficult — more labor intensive, more expensive, and more logistically complex” — which makes it harder to conduct “against all members of a large population.” They consider that a good thing.
And they argue that hacking is a much better solution for law enforcement than weakening encryption with back doors. This way, they write, law enforcement is motivated to find holes in security, rather than mandating a new one that weakens an already imperfect security system.
This is all so silly. Everyone knows we can trust the FBI, NSA, and others because they are from the government and they are here to help us.
You’re kidding, right?
Why not just use Tails:
https://tails.boum.org/
with open-source encryption, of course! (As Philip Zimmermann said, “If privacy is outlawed, only outlaws will have privacy.”)
…I just updated my Mac to El Capitan, joke #1…I have a firewall where I have blocked up to 9 Apple addresses so it doesn’t “phone home”, joke #2…all computers are a recording machine, read your logs, not a joke…I use a 3rd party firewall & anti-virsus, a “non-logging”(?) VPN and Tor Browser, joke #3…do I “feel” “safe” and “secure”? NO…I’m looking for a true geek to assist me in installing NetBSD or Sophos…the best way to stay safe is to unplug, tune in, turn-on and whatever else Tim Leary said, not a joke…
Seems Experian has more leaks than a Greek fishing boat. Suggest Comey Yo Securitah Homey sift thru THAT hot credit mess. All ya hafta do is stand there and let the 1’s and 0’s waft down upon ya. Jim Morrison, you ain’t, babeeeee… gotta go- GCHQ has all this info on Congress I wanna check out. Well, they SAID they were watching everyone…and they was….is….whateva….
And people say Theo is paranoid.. @OpenBSD for #freedom
This is another example where the government does not like the 4th amendment limitations and attempt to circumvent it. The words of the 4th amendment are simple: “The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.” Trying to convince people to leave the “door open” and mitigate the need for a warrant is questionable at best. I do not trust the government to do the right thing and neither did the Founders of this nation.
so let’s apply some common sense to this typical hyperbole from a site famous for it.
encryption is not actually a barrier to law enforcement, because they can hack.
if that were true, what advantage would the FBI have in coming out and saying this repeatedly? on your account, encryption is no barrier to them, because of hacking. Considering the huge amount of negative press these stories bring them, is it really credible that they would say this stuff if it wasn’t true and there was no reason for them to say it? Really? Is that truly a simpler explanation than that they are telling the truth?
Further, you spin the story horribly by saying FBI. As the FBI has said repeatedly, it might well be true that Federal investigators have the resources to throw significant resources at hacking into very serious cases where they can’t serve warrants due to encryption. But they are rightly concerned about state and local law enforcement, which typically have very limited resources. And the more impenetrable communications systems become widespread, the more of a problem this will be. and it already is, except you know better.
The point is that the FBI’s call for a backdoor isn’t (as their dishonest narrative would have it) driven by an absolute need for the ability to conduct limited lawful surveillance. They can function *within those limits* by hacking. They want a backdoor because they don’t want to abide by those limits. Too bad.
The comment about state and local law enforcement fails because it relies on the same fallacy as Bill O’Reilly’s argument (http://scienceblogs.com/goodmath/2009/07/28/bill-oreilly-on-life-expectanc/) that Canada’s higher life expectancy vis-a-vis the US can be explained by the fact that the US had ten times more people and thus ten times more deaths. Of course smaller-jurisdiction police forces have less in the way of resources — they don’t need as much because they’re dealing with fewer people and thus fewer criminals. As long as the amount of police resources per person is comparable, everything works out fine.
And people wonder why there are so many back doors in computer software. The US government asked for them.
No, the federal mafia didn’t “ask” for the backdoors, it demanded them, and threatened the companies and executive staff if they didn’t provide them.
Meanwhile, the exact contents of Hillary’s private server(s) appears to be an ongoing mystery. All of the bafflegab can’t conceal the fact that the FBI, et. al. could easily obtain this info (under congressional authority) but has chosen not to do so.
One law for the high and mighty, another for the peons. Guess who’s a 1% er?
I have absolutely no idea why the articles talks about “FBI” having or needing a warrant to “hack” you. Everyone and their dog knows this is not true actually…and even nowadays your regular “redneck” police force is employing tools for the effect. Is this article disinformation, actually? Acidental or on purpose?
Are you aware that evidence used in a trial must be obtained by legal means?
Illegal hacking can certainly be used as a means of obtaining information, but even then it is an individual, rather than mass, violation of rights. Each “hack” requires work while scooping up everybody’s data from the telecoms is automatic.
Hacking is mostly automated and casts a wide net, it is most definitely not restricted to a 1:1 basis. Sounds like you might have been watching CSI: Cyber. Also, google “parallel construction NSA” and you will see how easy it is to make your evidence appear to have been obtained by legal means.
The BIGGEST BIG BIG BIG crimes on the internet are not terrorists, or child porn, or kidnappers (for chrissake, did he really say kidnappers???) they are:
– Identity Theft
-Credit Card / Finance Details Theft
– Invasion of Privacy
– Vandalism of Personal Property through Viruses and Malware
– Increased End Costs to Consumers through Continued Compromising of IT Security
So please, tell me, how is LESS ENCRYPTION in any shape or form good for reducing those? With every lie they tell a very telling truth about themselves.
“””The BIGGEST BIG BIG BIG crimes on the internet are not terrorists, or child porn, or kidnappers (for chrissake, did he really say kidnappers???) they are: ….”””
Beg to differ but different I am.
Child porn is the sickest most vile crime on earth.
https://www.youtube.com/watch?v=_6FKEwjPmHQ
Elite child sex slaves “1981” forgotten documentary
Why because only the sickest most vile demons have sex with children.
https://www.youtube.com/watch?v=-QUuCWNyvv8
Was Jimmy Savile A Wizard? v1.0 **FULL DOCUMENTARY**
Paedophiles are beyond redemption.
Yet for all the surveillance they flourish. If the powers wanted to stop it they could.
Why not because they are the elite. Those that control the surveillance are in on it.
https://www.youtube.com/watch?v=u8-9tCwLsvg
Jimmy Savile’s Paedophile Friends Exposed. Bill Maloney
PMs Lords Royalty MI5 MI6 police Members of Parliament judges barristers solictitors moneyed people.
Money is one thing but Matthew 18: 6″If anyone causes one of these little ones–those who believe in me–to stumble, it would be better for them to have a large millstone hung around their neck and to be drowned in the depths of the sea.
Take money and you are poor.
Take the conscience and the child is destroyed.
You might differ on the definition of “biggest”, but surely you agree that the use of encryption protects communication, and makes it more difficult for law enforcement to dodge the 4th?
Yes encryption is privacy on the net. Privacy to communicate with others without goverment intrusion.
https://www.law.cornell.edu/wex/Fourth_amendment
“[t]he right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.”
The ultimate goal of this provision is to protect people’s right to privacy and freedom from arbitrary governmental intrusions. Private intrusions not acting in the color of governmental authority are exempted from the Fourth Amendment.
snip
The constitution for all its value seems to be a forgotten legal dogma in the US of A by its government and its judicary.
The good people of America remember it and think it will save them from the government and the judicary.
I think the whole system is flawed. And constitution or no costutition the result is power by the corrupt who seek to use the constitution when it benefits them and to ignore it when it does not. In this way the constitution is a meaningless piece of paper that fools the masses. I suggest the constitution is past its used by date.
Try a new system, Anarchy.
https://www.youtube.com/watch?v=j3VN54M1OXA
[On the internet]
Ah, breaker one-nine, this here’s the Gogo Duck. You gotta copy on me, NSA, c’mon? Ah, yeah, 10-4, NSA, fer shure, fer shure. By golly, it’s clean clear to Utah storage, c’mon. Yeah, that’s a big 10-4 there, NSA, yeah, we definitely got the front door, good buddy. Mercy sakes alive, looks like we got us a hacking
for ateTeanWheeler
Use services like StartMail or ProtonMail and iCloak.org (iCloak stik). Buy a used laptop in cash and remove the HDD and use the iCloak stik to boot into their OS. Or install Sophos OS on said laptop. Chech their site under free tools for more info. Also use VPN for added security along with startpage.com and their free proxy. So much more out there too.
It seems the FBI are the ones ultimately peddling the porn. It has seemed incredible to me that they cannot shut websites down or block them when they contain illegal material when they seem to have such utter control over the internet at every level, but now with unfolding dread I understand why.
Websites, however “dark” law enforcement want to pretend they are, are essentially “public” phenomena, otherwsie they fall into the realm of a closed intranet and so do not pose a particular threat to the public. So how can they be both “dark” and “public”? If Joe Public can find them, then surely so can these amazing Web Wizards. Some sites have a direct .com .org or .net address, whilst some sites are randomly redirected through Top Group Pages. These TGPs are relativeley new, in the past pornography was set up as individual sites or as small groups from a related publisher, all linked to some payment page, but this has changed.
Both these methods of access seem to be at a minimal level of security on the part of the would-be purveyors of illegal material to “darken” their profile on the Web, and also is vulnerable at the Top Group Page which has an unchanging .com or .net address.
What are the motives of the purveyors? There seems to be minimal opportunity to raise revenues through site subscription for such illegal material – again, a weakness in any counter-security they attempt to thwart law enforcement’s actions against them – so how determined would these purveyors be if the FBI and similar were to instead channel their resources into constantly blocking, shutting them down, and prosecuting them? How sophisticated will a crimial be to maintain a website containing their illegal material with minimal revenue streams and a whole lot of danger from the Feds? Not very, I would suggest. They are not peddling ideology, so maybe they are hacking their viewers for credit card info, but again, this seems like a rather hit-and-miss hopeful approach.
I do not think there is any gain for would-be purveyors to continue to try to make illegal material available if they were meeting with a concerted effort by various global police agencies to shut them down. So, this begs the question, WHY isn’t it happening?
The unpleasant answer seems to be that the FBI et al are happy for it to be there as it helps them to demonise the web, justify their megalomaniacal desire to control it, hack into private individuals’ computers and establish a totalitarian state. And the volume of materials out there would suggest this – not a lot, but just enough to point a justifying finger at and carry on with the real plan.
Try making Child Porn a cause celebre justification against the violation of your Human Rights. Meet the New Witchcraft, better than the Old Witchcraft, quicker burning, less smoke.
The war on encryption is flawed. The people that really WANT to encrypt their data will always find a way. It’s a privacy war against the general public. The ‘bad guys’ will find ways around it.
If you don’t want FBI, NSA and government snoop on your life, your communications you should protect your privacy. Use private browsers (DuckDuckGo), encrypted and private emails (ShazzleMail) and keep your digital communications to private.
I 100% agree with Kristina. Shazzlemail is the way to go to keep your email communications private.
Shutting down the mass survelleince programs is the only way. Digital data is intrinsically vulnerable, the only way it can be “safe” is for no one else to want to be looking at it or mining its associated metadata. Like the falling tree in the forest, if no one is there listening, no one hears…
The problem is, given the level of access to digital movements of money, the fact that they can operate from anywhere and their already secretive nature, CAN these agencies be effectively shut down, or can they simply slip into the background, operate off the radar and fund themselves illicitly? Well, muchas they’d like to pretend they can, no they cannot without the access to the huge data storage facilities into which all the web activity is being copied, along with the tacit cooperation of Google et al. Without these, they just become a bunch of sad, sweaty hackers stinking up their bedrooms AGAIN.
And yet neither of you own Shazzlemails servers or can attest to how “hacker” proof they may or may not be. So that’s kind of a remarkable assumption. I prefer regular mail where you lick a stamp or a mail system I’ve built myself then I at least know that if I own it I can attest to it’s security or insecurity as the case maybe. In a world where the security services have been doing everything in it’s power to undermine other people’s security efforts at every turn you’d be a fool to do anything less.
Hacking is actually a fourth amendment violation. Just a different kind than you’re probably used to hearing. When the FBI hacks your computer or phone, they basically take full control of your computer or phone. That’s taking possession of someone’s property without trial, which is technically unconstitutional. You can argue that the FBI can get a warrant for your diary, but they can’t do it in secret. I mean once your diary is taken by the FBI, you definitely know you shouldn’t write your confession in your diary in the FBI’s evidence room after you break into the evidence room.
Hacking is only “legal” because nobody bothered to challenge it in court.
In fact, I can prove all of this.
Almost 100 percent of cases that involve hacking have plea deal agreements. Or the lawyer for the defense is too stupid to realize that there is a constitutional question at play. Like that Silk Roads dude.
It’s also a third amendment violation as well since the United States is not at war, so the third amendment cannot be overridden by Act of Congress. An FBI virus is essential a government soldier quartered in your home without your permission.
So yeah. I mean I guess the FBI can hack you, but they know eventually that power will be ruled unconstitutional.
They’re just riding it out so the people whose constitutional rights were violated serve out their sentences. I mean they’re technically guilty. Who cares if their constitutional rights were violated right?
An even bigger question is, is the government hacking your computer to find evidence that you used your computer to commit a crime, or is the government hacking into your computer so they can use your computer to commit a crime and make it look like you did it? One thing I know for sure, somebody hacked my computer and used it to commit crimes, and I was tortured in prison for it.
If the government can drum up business (or cover up a mistake) by framing innocent people, and the criminals can avoid punishment by framing innocent people, what’s left for the innocent people? Hacking is all about lying. If an accusing witness gets caught lying in court, his testimony is dismissed as unreliable. At what point should a hacked computer be considered an unreliable witness? After criminals hack it? After the government hacks it? After everyone hacks it? Why should anyone trust ANYTHING that a hacked computer tells you?
Very astute, there’s the question nobody seems to have been able to grasp the answer too. What would you define as a hacked computer? Microcode bugs only sprang into existence the moment the American government refined and reformed the Unix operating systems which they happily licensed out to academic circles everywhere. Then law enforcement started inserting bugs in the security protocols known as IPSec and the microcode bugs have continued ever since whilst there most secure and unshakable and unhackable operating system known as NSA net has been kept out of public hands and hidden from public view. (9) hackers are under no illusions as to whom our real enemy is. I find it remarkable that on the eve of a bug being found in smart phones and published whilst the American president is busy shaking China’s hand agreeing to an end of hostilities that 24 hours later malware attacks over 650`000 handsets in China. Do you honestly believe that was some spotty teenagers or can you see the real culprits?
that’s an amazing reading of the Fourth Amendment, which specifically says that government can’t take your property without a *warrant.* Not a *trial.” With a warrant, “hacking” (which is not a technical legal term and therefore covers a wide range of law enforcement activities) does not violate the Fourth Amendment, and this has been tested in court repeatedly, contrary to your statement.
one day a nuke will be set off in the heart of the usa……….bye bye
Scary days.
I fear a Ukrainian “dirty bomb” using waste from Chernobyl as a kind of ultimate “Up Yours, hated Ruskies” being detonated in Red Square kicking it all off.
I think people forget just how many nukes HAVE been set off in the heart of the USA. The list at https://en.wikipedia.org/wiki/List_of_nuclear_weapons_tests_of_the_United_States includes underground and offshore testing in the later years, but many series like Plumbbob were all in Nevada, and right on the surface. Also look up “Downwinders” while you’re at it.
Of course, the mass casualties of a well targeted strike on a city would be something new, but how much does it matter anyway? The U.S. loses 55,000 every year to air pollution … a nuke strike just doubles it or so. Of course, the wealthy dead are lamented from every pulpit, but to inflict mass casualties you have to target the average working Joes. Hell, if somebody targeted Detroit the Republicans would probably call it a commendable case of natural selection (without quite admitting that exists, mind!), bring him over to Washington to be awarded the Key To The City, and put him up in a retirement home in Florida safe from international tribunals.
They would all be seeing those “opportunities” again! Every cloud…
I do not understand the use of the word big twice in the headline. Is it really a secret why the government opposes encryption? If you answer that no, than it’s certainly not a big secret or a big lie.
It’s not reasonable to expect our government to be completely honest about everything. Heck, it’s not reasonable to expect that out of anybody, collective or individual. In other words, I want my 10 minutes back.
If you really do not understand the title, read the first 3 or 4 paragraphs again. That should not take long, and then you might understand.
The FBI , DHS and CIA fabricate “terrorists” that they can then “arrest” and look like “Heroes”
Their snooping has little to do with “National Security” and everything to do with being in the back pocket of the Recording and Movie Industry lobbyists.
No matter which of the faux two parties bull you subscribe to…Our politicians obey LOBBYISTS.
If they gave a crap about ENFORING the law. Those involved in the MASSIVE ROBBERY OF THE UNITED STATES… er i mean “BAILOUT”
But lets face it all those criminals were POLITICAL LOBBYISTS and BANKERS, you know the REAL people who run this country.
Good comment that I totally agree with, but not all of us subscribe to the “two” current ruling parties. Some of us are Greens, Libertarians, etc., or don’t bother voting at all. But yeah, nowhere near enough people have the capacity and courage for independent political thought in our country, it’s quite frustrating, and it leads to the continuing decline and corruption of our country and even the world.
Laziness explains a lot about the motivation of the FBI and (in)Justice Department. Too lazy to use their expertise to help other government agencies secure our data, too lazy to prosecute the banksters, too lazy to do the leg work to ensure that spying and dirty tricks are applied only to those for whom probable cause applies, and too lazy to employ due process even in that case. To which we must of course add the motivation of greed, at least on the part of the higher-ups, who can look forward to cushy, lucrative jobs working for the criminals once they go through the revolving door.
They are establishing a Totalitarian State that can extend its principles and its grip across the globe. And we will not accept that.
Lazy people would not do this. Lazy people would order pizza, sit down in front of Netflix, and do nothing whilst their tax dollars pay for these schmucks’ evil game.
They are the Busy People, the American electorate are the Lazy People. Get it right before the bullets star flying. You may need to stop being lazy then…
Don’t ever think the FBI plays by the rules.
Stingray use, created terrorist plots, STASI stalking crew.
Comey / FBI STASI lowlife!
Our Bill of Rights are designed primarily to “restrain” government power where the “ends” NEVER justify unconstitutional “means”. FBI agents swore an oath of office to follow the constitutional rule of law. Some FBI agents may be well intentioned but they wrongly believe the opposite – that the ends always justify unconstitutional means. Judges are supposed to check & balance the FBI.
quote” Judges are supposed to check & balance the FBI.”unquote
Hahahahahahahahahaha… when pigs fly.
Unfortunately, swearing an oath to defend and uphold the Constitution has two prerequisites for effectiveness: that the person so swearing has actually read (and understands) the Constitution, and that they behave ethically. I remember the day I received my commission, and wondering, as I swore to uphold and defend the Constitution, how many of my fellow Ensigns actually knew what they were swearing to do. Not many, as it turned out. I suspect the same applies to people in law enforcement and Congress. And there is ample evidence that a certain high official, a former constitutional law professor according to his supporters, also belongs to that class.
Philly is so sloppy since Angelo went to heaven.
Did you know the first time the Feds used the tele tap was on the telegraph NY to Philly where they were juking betters in their bucket shops by managing the ticker prices, sort of like the wire service/numbers rackets. We busted down on that curbswap in 1910 until Phil Gramm called it back. Today we call it the CDS market for Sophistacats and go phishing, but avoid the floating barrels, folks. PU, that’s a really bad tranche coat.
What I’ve finally figured out is the ones who can go around the rules best, rule us. No matter what their fucking badges say. They all stink for looking the other way. Today, it’s admobsters auctioning you off in the street while the pipes keep playing Danny Boy. Does every territory have to have a war before it gets civilzed, Pleasant Valley?
The Followers of Chaos, Out of Control…
They are insane if they think a bunch of puky politicians, bank managers and their gimp hackers can rule the world. They are riding its Gravy Train right now, but they will run for cover like the cowards they are when they go to far and the trouble really starts.
However, hopefully the decent folk of the world will round them up, spank their arses and lock them away before this gets to happen.
But who knows, America is soooooooooooo profoundly f*cked up I am not sure it can look itself in the mirror any more.
“However, hopefully the decent folk of the world will round them up, spank their arses and lock them away before this gets to happen.”
That’s a given that’s already happening, in case you missed it, Linux is very much an NSA bug ridden burden that they’re own hackers are sick and tired of writing bugs for. I’ve said it once and I’ll say it again go download plan 9 it’s what the NSA and GCHQ have been trying to get there filthy hands on all along. More Unix than Unix made by Genuine hackers for other genuine hackers. Open Wall Linux hahaha the illuminati abbreviation Owl. Funny name for a firewall don’t you agree?? Open Wall…
It was the final two insults that achieved the desired effect.
1: We’ve got no secure operating system’s
2: Hackers need to do better.
For the record hackers are going insert themselves so deeply into the NSA`s arsehole there head is going to spin.
Jenna – excellent article. I do have a question regarding this:
“Federal and local agencies have also consulted with outside contractors including the controversial Italian firm Hacking Team to develop and deploy malicious code. The FBI asked Hacking Team in 2012 to help it monitor Tor users. Tor then updated its “Remote Control System” malware to do that.
Should this read “Hacking Team then updated its “Remote Control System” instead?
Thanks Jenna.