The Gentlemen Revolutionaries

Dedicated to the Preservation of the First Amendment

Name:
Location: Philadelphia, Pennsylvania, United States

Thursday, June 29, 2006

Chances are they are watching you read this site

The NSA's illegal tapping program keeps getting worse. First it was international phone calls, then it came out that domestic phone calls were being monitored as well, and now it appears that your internet traffic is most likely being monitored as well... not just where you go but the content that you get when you are there. This means they can see the sites, see what you put up or download, see your emails, see your financial records, see any personal inmformation at all that you put on the net, no matter how secure or encrypted it is.

So we have gone from sketchy, to illegal, to downright, no way getting around it, insane. This is probably the most illegal act the Bush administration is taking and it is time for congress to act. But they wont, so it is up to us. Write your congressmen, and for god sakes vote and vote for someone that will put a stop to this garbage (though i am not endorsing one party over the other that probably means democrats).

Background info on this is here (Great read really quality info on how the government is abusing you): http://blogs.zdnet.com/ip-telephony/index.php?p=1103



Here are directions on how to find out if you are being watched or if the site you are frequenting is being watched:



With that in mind, here's the 27B Stroke 6 guide to detecting if your
traffic is being funneled into the secret room on San Francisco's Folsom
street.

If you're a Windows user, fire up an MS-DOS command prompt. Now
type
tracert followed by the domain name of the website, e-mail host, VoIP
switch, or
whatever destination you're interested in. Watch as the program
spits out your
route, line by line.

C:\> tracert nsa.gov

1 2 ms 2 ms 2 ms
12.110.110.204
[...]
7 11 ms 14 ms 10 ms
as-0-0.bbr2.SanJose1.Level3.net
[64.159.0.218]
8 13 12 19 ms
ae-23-56.car3.SanJose1.Level3.net
[4.68.123.173]
9 18 ms 16 ms 16 ms
192.205.33.17
10 88 ms 92 ms 91 ms
tbr2-p012201.sffca.ip.att.net
[12.123.13.186]
11 88 ms 90 ms 88 ms
tbr1-cl2.sl9mo.ip.att.net
[12.122.10.41]
12 89 ms 97 ms 89 ms
tbr1-cl4.wswdc.ip.att.net
[12.122.10.29]
13 89 ms 88 ms 88 ms
ar2-a3120s6.wswdc.ip.att.net
[12.123.8.65]
14 102 ms 93 ms 112 ms
12.127.209.214
15 94 ms 94 ms
93 ms 12.110.110.13
16 * * *
17 * * *
18 * *

In the above
example, my traffic is jumping from Level 3
Communications to AT&T's
network in San Francisco, presumably over the OC-48
circuit that AT&T
tapped on February 20th, 2003, according to the Klein
docs.

The
magic string you're looking for is sffca.ip.att.net. If it's
present
immediately above or below a non-att.net entry, then -- by Klein's
allegations -- your packets are being copied into room 641A, and from there,
illegally, to the NSA.



If you are behind a corporate firewall you will have to wait till you get home to do this, and if you are behind a router at home, make sure you turn off that firewall temporarily (be certain that you turn it back on!).

0 Comments:

Post a Comment

<< Home