Skip to main content

View Diary: NSA whistleblower Russell Tice on Countdown w/KO, Day Two (update X4) (152 comments)

Comment Preferences

  •  Probably the ability to (2+ / 0-)
    Recommended by:
    blueoasis, MinervainNH

    backdoor through any computer anywhere that is connected to a telephone cord or ethernet cord, or  that has bluetooth or wifi, and have full access while completely unseen (ie. webcams, microphones, possibly even tiny drivers at the bios level that allow speakers to act in the opposite direction acting like microphones in case a microphone isn't present).  I bet every computer that connects to the outside world in any fashion is 100% rooted at the moment the on button is pressed.

    Also, every cell phone is rooted, allowing full access to the camera, microphones, and gps at cell tower, blu tooth, or wifi connection to the outside world.

    •  You don't need to. (4+ / 0-)

      All you need to do is tap a limited set of net hubs.  While extremely distributed in nature, the number of net hubs that would need to be tapped is within the realm of possibility.

      After that, it's just a matter of computing capacity to run the analysis software, and the storage capacity to store the data.

      Quick to judge, Quick to anger, Slow to understand; Ignorance and prejudice and fear walk hand in hand. -- Neil Peart

      by JRandomPoster on Thu Jan 22, 2009 at 09:12:43 PM PST

      [ Parent ]

Subscribe or Donate to support Daily Kos.

Click here for the mobile view of the site