Agreed Sam and from experience even the 0.0001 % that is given to the human 
intel specialist is usually crap ;-). There is just to much data that it's 
going to take some very sophisticated code to to work out all the connections 
and links between various individuals who use lets say a visa card to pay for 
tools at at BQ and then buy train tickets using the same card heading for 
London, but then email whilst on the train using the 3G network which is 
intercepted and linked to the credit cards indicating that a trip to London is 
taking place by a known target.

This maybe fantasy it may not be, but I personally think its not far from being 
a reality, possibly a decade away that the NSA/GCHQ or some agency will develop 
a system that can monitor and make realtime links to specific known targets, 
after a few more years we may find that all links generated by email and net 
traffic on known monitored  servers can be traced and tracked along with being 
linked for intelligence purposes all in real time. 



we live in interesting times if not scary times.




On 27 Sep 2013, at 20:41, Sam - MacAmbulance <[email protected]> wrote:

> Exactly, no matter how hard you try, online communication can and will be 
> intercepted, but the chances of an actual human reading them are absolutely 
> tiny. I'd reckon of the data collected by Tempora, 90% is porn, then if the 
> 10% that isn't, 0.0001% is 'interesting' to the authorities, then that data 
> is looked at by a person.
> 
> --
> MacAmbulance
> Sam Mullen
> 07747778022
> [email protected]
> 
> On 27 Sep 2013, at 20:29, Ray Packham <[email protected]> wrote:
> 
>> HI
>> 
>> That is true but it makes an amusing video to watch. The way we deal with 
>> secure traffic is to not put anything on the NET, its the only way.  I once 
>> worked on a Tempest proofing project for a Navy , stopping all EMF signals 
>> from exiting their building via CRT screens and also making their network 
>> secure, that was an interesting job, ahh the good old days when you knew who 
>> your enemies were, the Russians  and the Warsaw Pact  ;-)
>> 
>> Anyhow every file can have a hash that is unique and there are tables of 
>> hashes for images and documents etc, each file has its own header these 
>> headers again are readable and just one way that net traffic is scanned . 
>> There are other methods that GCHQ and other agencies use such as deep packet 
>> sniffing etc ( and I don't mean taking in the heady atmosphere of a 
>> Weeetabix box by the way , for those that don't know)  but I hope you get 
>> the general gist, hence my tongue in cheek comment 'maybe' as once the fonts 
>> are known its easy to beat.
>> 
>> Just think of numerous databases that email and internet traffic etc are all 
>> scanned and filtered against , the fonts  once known become breakable at 
>> some point...simples ;-)
>> 
>> Regards Ray
>> 
>> 
>> 
>> On 27 Sep 2013, at 19:21, Tony Crooks <[email protected]> wrote:
>> 
>>> 
>>> On 27 Sep 2013, at 19:06, Ray Packham <[email protected]> wrote:
>>> 
>>>> HI all
>>>> for those worried Tabout privacy here is a set of fonts that apparently 
>>>> cannot be read by OCR , Ive not tested it but presume it will work for a 
>>>> limited period in conjunction with other tools, maybe ;-) 
>>> 
>>> 
>>> Of course, the NSA etc., would be looking at the machine codes not the 
>>> character images so not sure how private these fonts would be in practice. 
>>> Shades of people sitting in cars outside a building recording the EMF 
>>> radiation from a CRT monitor to get the codes, isn’t it?
>>> 
>>> Regards,
>>> 
>>> Tony
>>> --
>>> Tony  Crooks
>>> ----------------------------------
>>> 53 Mendip Avenue • Eastbourne • BN23 8HP
>>> Mob: 07428706227 > Tel: 01323-460789
>>> <mailto: [email protected]>
>>> 
>>> 
>>> -- 
>>> You received this message because you are subscribed to the Google Groups 
>>> "Sussex Mac User Group" group.
>>> To unsubscribe from this group and stop receiving emails from it, send an 
>>> email to [email protected].
>>> To post to this group, send an email to [email protected].
>>> Visit this group at http://groups.google.com/group/smug.
>>> For more options, visit https://groups.google.com/groups/opt_out.
>> 
>> 
>> -- 
>> You received this message because you are subscribed to the Google Groups 
>> "Sussex Mac User Group" group.
>> To unsubscribe from this group and stop receiving emails from it, send an 
>> email to [email protected].
>> To post to this group, send an email to [email protected].
>> Visit this group at http://groups.google.com/group/smug.
>> For more options, visit https://groups.google.com/groups/opt_out.
> 
> 
> -- 
> You received this message because you are subscribed to the Google Groups 
> "Sussex Mac User Group" group.
> To unsubscribe from this group and stop receiving emails from it, send an 
> email to [email protected].
> To post to this group, send an email to [email protected].
> Visit this group at http://groups.google.com/group/smug.
> For more options, visit https://groups.google.com/groups/opt_out.

-- 
You received this message because you are subscribed to the Google Groups 
"Sussex Mac User Group" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to [email protected].
To post to this group, send an email to [email protected].
Visit this group at http://groups.google.com/group/smug.
For more options, visit https://groups.google.com/groups/opt_out.

Reply via email to