How NSA access was built into Windows

R. G. Newbury newbury at mandamus.org
Sun Jan 21 06:14:12 UTC 2007


David Boles wrote:

You are making a mountain out of a mole hill here. If, I said if, the 
NSA was
really  interested in what you are doing on your computer they would go to
your ISP and ask for your records. Your ISP keeps copies of every email that
you have ever sent. And copies of every email, this one included, that you
have ever received. They also keep records of every site that you have
visited. What day and time and how long you stayed. What files you have
downloaded. Maybe a pirated game? Maybe pirated music files. Maybe a little
p0rn? Many things. And if the NSA really did want to see what is on your HD
they would walk in and take it with them when they left.
- --

David, For all of your misdirection and ad hominem slurs, you still have 
not given any answers to the original question. It's all very nice to 
say that the NSA could get records from your ISP, every email, every 
website etc. Or just walk in and take your hard drive. But not every ISP 
in the USA keeps email records for a long time, nor web access logs. 
They do not have to do that.
And most will not just turn over such records without a search warrant 
being served on them.
And the NSA would need a search warrant to wander in and take your hard 
drive...But the NSA is forbidden to do those things within the USA, 
except (as now agreed) under the authority of a FISA warrant.

Or have you been drinking the cool-aid from moveon.org or the huffington 
post, that the guys in the black helicopters just do what they want 
whenever they want and GWB and DC let them.

And I hope you are not so disconnected from reality to recognize that 
the NSA has no legal capability of asking for those neat email logs in 
any other country in the world. So they eavesdrop on every electronic 
communication they can capture. They do what is illegal for you or I. It 
their job. So of COURSE it would be extremely useful for the NSA to be 
able to subvert a particular computer by way of a backdoor. If the NSA 
was NOT trying to do that they would not be doing their job. And of 
course that is why the DOJ still lists encryption software as 
'munitions' so they can ban exports. (Interesting that the 
constitutional questionibility of banning the export of what is 
elsewhere clearly recognized as covered under the First Amendment has 
never been argued at the appeal level.)

So lets hear your answer to the question: is it possible that Selinux 
could have a backdoor in it. and how difficult is it to compile a system 
that has no selinux modules included.
The answers does not require any analysis of the probabilities attached 
to the reasoning that the NSA would not bother to do this.

Geoff




More information about the fedora-list mailing list