.@emptywheel Definitely rang my alarm bells here! "NSA tuned its sensors" sounds like tuning knob to pickup different radio station.
-
-
Replying to @LemonSlayerUS
"Hello?!?! Superpowerful tool kit, are you out there?!?!? Hello????"
2 replies 1 retweet 1 like -
Replying to @emptywheel @LemonSlayerUS
Of course other implication is place where NSA guy left the tools was unaccessible. "Go back and get them!" "I can't!"
1 reply 1 retweet 1 like -
Replying to @emptywheel
.
@emptywheel Or I was thinking he did go back, but toolset wasn't there any longer. Oops!1 reply 1 retweet 1 like -
Replying to @LemonSlayerUS
In which case you'd think NSA would be like ALERT ALERT.
1 reply 1 retweet 1 like -
Replying to @emptywheel
.
@emptywheel Which brings up question of how did NSA learn toolkit had been snatched. If no Internet usage detected, remote computer traced?1 reply 1 retweet 1 like -
Replying to @LemonSlayerUS
.
@emptywheel@csoghoian Also brings up how did hackers learn of remote computer among billions in world? Implications: A Really Big Reveal!1 reply 1 retweet 2 likes -
Replying to @LemonSlayerUS
.
@emptywheel@csoghoian 1) Learned of NSA's "sensor tuning" via AT&T's Mark Klein reveal of Narus STA 6400 "Semantic Traffic Analyzer" use.1 reply 2 retweets 1 like -
Replying to @LemonSlayerUS
.
@emptywheel@csoghoian 2) More then revealed from Snowden NSA docs about "selectors" described as email addresses, phone numbers.1 reply 1 retweet 1 like -
Replying to @LemonSlayerUS
.
@emptywheel@csoghoian 3) Reuters piece now implies NSA "selectors' can also be code vectors used to target remote computers.2 replies 1 retweet 1 like
That is presumably how they use(d) upstream for cyber. @csoghoian
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.