Why did the NSA even bother to get a internet tap, when they could have just re-routed packets through their servers?
(Maybe the extra delay is causing our messages to be re-sent creating duplicate messages?) http://www.wired.com/threatlevel/2013/12/bgp-hijacking-belarus-iceland/ Earlier this year, researchers say, someone mysteriously hijacked internet traffic headed to government agencies, corporate offices and other recipients in the U.S. and elsewhere and redirected it to Belarus and Iceland, before sending it on its way to its legitimate destinations. They did so repeatedly over several months. But luckily someone did notice. And this may not be the first time it has occurred — just the first time anyone has noticed. On Mon, Oct 7, 2013 at 5:16 PM, Paul Gilmartin <[email protected]> wrote: > On Mon, 7 Oct 2013 16:53:28 -0500, Mike Schwab wrote: > >>http://www.bbc.co.uk/news/technology-24429332 >>NSA using old versions of Firefox to infect PCs in order to identify TOR >>users. >> > Will virus scanners detect such infections, or has NSA arranged that the > scanners themselves have an Acquired Immune Deficiency? > >>NSA unable to break TOR itself. >>GO TOR developer U.S. Navy (who needed a secure way to share messages >>with submarines). > > -- gil > > ---------------------------------------------------------------------- > For IBM-MAIN subscribe / signoff / archive access instructions, > send email to [email protected] with the message: INFO IBM-MAIN -- Mike A Schwab, Springfield IL USA Where do Forest Rangers go to get away from it all? ---------------------------------------------------------------------- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [email protected] with the message: INFO IBM-MAIN
