Why did the NSA even bother to get a internet tap, when they could
have just re-routed packets through their servers?

(Maybe the extra delay is causing our messages to be re-sent creating
duplicate messages?)

http://www.wired.com/threatlevel/2013/12/bgp-hijacking-belarus-iceland/

Earlier this year, researchers say, someone mysteriously hijacked
internet traffic headed to government agencies, corporate offices and
other recipients in the U.S. and elsewhere and redirected it to
Belarus and Iceland, before sending it on its way to its legitimate
destinations. They did so repeatedly over several months. But luckily
someone did notice.

And this may not be the first time it has occurred — just the first
time anyone has noticed.

On Mon, Oct 7, 2013 at 5:16 PM, Paul Gilmartin <[email protected]> wrote:
> On Mon, 7 Oct 2013 16:53:28 -0500, Mike Schwab wrote:
>
>>http://www.bbc.co.uk/news/technology-24429332
>>NSA using old versions of Firefox to infect PCs in order to identify TOR 
>>users.
>>
> Will virus scanners detect such infections, or has NSA arranged that the
> scanners themselves have an Acquired Immune Deficiency?
>
>>NSA unable to break TOR itself.
>>GO TOR developer U.S. Navy (who needed a secure way to share messages
>>with submarines).
>
> -- gil
>
> ----------------------------------------------------------------------
> For IBM-MAIN subscribe / signoff / archive access instructions,
> send email to [email protected] with the message: INFO IBM-MAIN



-- 
Mike A Schwab, Springfield IL USA
Where do Forest Rangers go to get away from it all?

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [email protected] with the message: INFO IBM-MAIN

Reply via email to