View Full Version : Microsoft Online Services Global Criminal Compliance Handbook
Skybird
02-27-10, 10:44 AM
Some reading for those funny guys who still believe their internet activities are anonymous and "safe" :haha:.
http://file.wikileaks.org/files/microsoft-spy.pdf
24. Feb. 2010: Cryptome.org takedown: Microsoft Global Criminal Compliance Handbook, 24 Feb 2010 (http://file.wikileaks.org/files/microsoft-spy.pdf) Cryptome.org (http://cryptomeorg.siteprotect.net/) is a venerable New York based anti-secrecy site that has been publishing since 1999. On Feb 24, 2010, the site was forcably taken down following its publication Microsoft's "Global Criminal Compliance Handbook", a confidential 22 page booklet designed for police and intelligence services. The guide provides a "menu" of information Microsoft collects on the users of its online services. Microsoft lawyers threatened Cryptome and its "printer", internet hosting provider giant Network Solutions under the Digital Millennium Copyright Act (DMCA). The DMCA was designed to protect the legitimate rights of publishers, not to conceal scandalous internal documents that were never intended for sale. Although the action is a clear abuse of the DMCA, Network Solutions, a company with extensive connections to U.S. intelligence contractors, gagged the site in its entirety. Such actions are a serious problem in the United States, where although in theory the First Amendment protects the freedom of the press, in practice, censorship has been privatized via abuse of the judicial system and corporate patronage networks.
In case you do not know that site, link it. It does not hurt to have a look there every once in a while, to check out the latest stuff they got. Tells you a lesson on the difference between what you've been told and what's really going on while you watch at the other direction:
http://wikileaks.org/
Ishmael
02-27-10, 11:20 AM
Take the word of a 30-year Telecomm Broadband Network Operations Specialist.
Privacy of Communications is DEAD!
It has gone the way of the dodo and the passenger pigeon. Read my articles on the growth of the Worldwide Surveillance Society here:
http://www.boilingfrogspost.com/2009/11/07/an-analysis-of-warrantless-wiretapping-part-i/
http://www.boilingfrogspost.com/2009/11/18/an-analysis-of-warrantless-wiretapping-part-ii/
Also download and listen to the podcast interviews with James Bamford and NSA whistleblower Russell Tice there for more information.
http://www.boilingfrogspost.com/
Skybird
02-27-10, 11:43 AM
Take the word of a 30-year Telecomm Broadband Network Operations Specialist.
Privacy of Communications is DEAD!
Oh, I do! I have an according behavior protocol in place since many years both for telephone and internet.
Even most banking transfers I do manually, not automatically or via PC-banking. Some things, though, cannot be avoided (like paying electricity or the health insurrance via automatic debit teansfer - it's mandatory). EC-card I use very rarely, credit card almost never (only for internet buys where I have no alternative), and payback cards and such nonsens I reject alltogether.
If you have any more tips for this "paranoid" over here, I'm a happy listener! :DL
the bad thing is that the young ones simply do not get raised in sufficient knowledge about these things. they get trained and streamlined for uncritical naivety regarding privacy and data protection. that way they serve the function that market and control wants them to fulfill, and cannot even imagine that maybe the way of going that they know could be put in question. They cannot even imagine why one eventually may want to do that.
Nice article, btw, although I did not fully understand the technical part in part 1, but the conclusions from it I got. Now I go to the rest of part 2.
Schroeder
02-27-10, 02:34 PM
@Skybird
Actually it's even worse. I know a lot of people who are fully aware of all that stuff and are still using Facebook, payback cards and Google. They just don't care....But I'm afraid one day they will... it just will be too late then when the Gestapo knocks at the door.:dead:
Skybird
02-27-10, 06:48 PM
@Skybird
Actually it's even worse. I know a lot of people who are fully aware of all that stuff and are still using Facebook, payback cards and Google. They just don't care....But I'm afraid one day they will... it just will be too late then when the Gestapo knocks at the door.:dead:
That's what I described - that people even can no longer see why they better should want to be critical about these things.
It remains to be true in sevewral very different contexts: people who cannot value freedom, do not deserve it.
And maybe they even do not take note of freedom being taken away from them.
Ishmael
02-27-10, 08:53 PM
Oh, I do! I have an according behavior protocol in place since many years both for telephone and internet.
Even most banking transfers I do manually, not automatically or via PC-banking. Some things, though, cannot be avoided (like paying electricity or the health insurrance via automatic debit teansfer - it's mandatory). EC-card I use very rarely, credit card almost never (only for internet buys where I have no alternative), and payback cards and such nonsens I reject alltogether.
If you have any more tips for this "paranoid" over here, I'm a happy listener! :DL
Nice article, btw, although I did not fully understand the technical part in part 1, but the conclusions from it I got. Now I go to the rest of part 2.
Thanks for the kudo, Dude. As for protecting yourself, short of encrypting all your telecomm business, Voice AND Data, we're all sort of stuck.
As for me, I don't self-censor at all. My attitude is F__k 'em. What are they going to do? Put me on a destroyer and send me to Westpac? Send me to Guantanamo, Cuba? I've already BEEN there. So I routinely advocate the violent overthrow of the US government as part of my own, PERSONAL, plan of World Domination. In this way, I'm dismissed as a crackpot and as the Abbe Faria said,
"Thus neglect becomes our ally."
Plus now, since I'm effectively broke, I don't even worry about identity theft. If somebody tries to steal MY identity, they'll have MY bill collectors coming after THEM. So here's MY Facebook page picture:
http://img32.imageshack.us/img32/7809/politicallyincorrectcou.jpg
Now consider that I have both:
1. A nuclear weapons background.
2. I've been to Pakistan, Iran and most of the rest of the Muslim world from Morocco to Malaysia.
Think they have a dossier on me?
But I also know one other thing. As a fourth-generation Native Californian AND a genuine Ventura-born Beach Boy, that makes me,
The Last, Best Hope of the Uttermost West.
So, Cowabunga, Dude! Keep her between the anchors.
http://img714.imageshack.us/img714/6508/dukes3.jpg
PS. You also may be interested in my pieces on the Minot/Barksdale loose Nukes episode here:
http://www.boilingfrogspost.com/2009/12/07/minotbarksdale-nuclear-bent-spear-incident-part-i/
http://www.boilingfrogspost.com/2010/01/05/minotbarksdale-nuclear-bent-spear-incident-part-ii/
One quick note on that. More people were disciplined over THAT incident than 9/11.
Onkel Neal
02-28-10, 12:22 AM
@Skybird
Actually it's even worse. I know a lot of people who are fully aware of all that stuff and are still using Facebook, payback cards and Google. They just don't care....But I'm afraid one day they will... it just will be too late then when the Gestapo knocks at the door.:dead:
Hmmm. that would be me. I do everything by computer, ATM, and credit card. And sure enough, they found me; a guy knocked on the door today, said he was painting house numbers on the street curb for $10. I screamed, "The Internet sent you, didn't it? Be gone!"
Let's do the time warp again. (http://blogs.zdnet.com/BTL/?p=31024&tag=rightCol;top-rated)
Schroeder
02-28-10, 06:30 AM
Hmmm. that would be me. I do everything by computer, ATM, and credit card. And sure enough, they found me; a guy knocked on the door today, said he was painting house numbers on the street curb for $10. I screamed, "The Internet sent you, didn't it? Be gone!"
Let's do the time warp again. (http://blogs.zdnet.com/BTL/?p=31024&tag=rightCol;top-rated)
Neal, take a look ten years down the road. So far a lot of new laws have been made that intrude our private life. If one wants to one can get a pretty good picture of everybody. Today we are allowing the means to be installed that will control us tomorrow. Just imagine the next dictatorship that might crop up somewhere, they will have one hell of an easy task to track down all resistance just with the stuff that IS ALREADY installed (here in Europe I wouldn't be surprised if some countries were turning that way again, people are fed up with incompetent corrupt governments and that is the right breeding ground for extremists). You can hardly take a step out of your home without giving away were you have been, what route you took to your destination, whom you talked to and what you have bought in the supermarkets. I find that scary at best. We've had dictatorships here and the Gestapo and the Stasi would have been delighted to have our current legal means of spying on people. It would have made their jobs of finding dissidents so much easier.
Onkel Neal
02-28-10, 02:36 PM
Yeah, you could be right. I cannot really wrap my head around it, but I won't say it's impossible.
krashkart
02-28-10, 03:49 PM
This has been used many times already around the nets, but:
http://en.wikipedia.org/wiki/Nineteen_Eighty-Four
I dunno, really. I try not to worry too much about the possibilities and whatever the realities may be in this day and age. I still try to limit how much personal information I let slip out. If I were a really good analyst of computer and internet systems, along with the security aspects (however many there are), I might have a better idea of how many holes my computer has open to the agencies.
Wasn't more than a couple of months ago, though, that China hacked the Medicare databases here in Iowa. Information of about 80,000 beneficiaries is now in their hands. What they intend on doing with it is anyone's guess. I'm actually more concerned about how well our government can protect the information they keep than what they can "take" from us.
I'll have to cite some sources on the Medicare hacking a bit later. We're about to partake of some fine peasant food. :up:
Castout
02-28-10, 06:37 PM
Ummm I got a suspicion that cell phone makers are shipping their products with special chip that's put in just to help tapping and monitoring :D even the infrastructure itself could be tampered with.
Umm I would be suspicious for paid Chinese firewall too, the mobile version too. . .
As for microsoft spying on its users well that's even a stronger case of suspicion....well the temptation is so strong and the intelligence agency just couldn't resist it they just couldn't I'm sure.
Sometimes I type profanity directed at certain villain into google when I'm in a foul mood :D
Heck the worst part is internet monitoring or communication tapping in general is nothing compared to mind reading that is more known as remote viewing. That's really intruding into a person's most sacred and private space:his mind and hearts. But of course so many people are either ignorant or skeptic. added to the fact that people in general would panic at having this knowledge disclosed at least in the beginning and it's a secret weapon best kept secret for as long as possible.
Hmmm. that would be me. I do everything by computer, ATM, and credit card. And sure enough, they found me; a guy knocked on the door today, said he was painting house numbers on the street curb for $10. I screamed, "The Internet sent you, didn't it? Be gone!"
Let's do the time warp again. (http://blogs.zdnet.com/BTL/?p=31024&tag=rightCol;top-rated)
http://www.just-whatever.com/wp-content/uploads/2007/01/dontworry1.jpg
Ishmael
02-28-10, 10:57 PM
Castout: Read my pieces and look at Klein's affadavit. The actual surveillance takes place in the telco central offices where all the voice, wireless, internet and data come together in a telecom choke point. The surveillance looks at blocks of traffic at the OC-3/12/48 level. that's 3, 12 or 48 DS-3s, each containing the equivalent of 672 voice channels. So it's a Blanket surveillance ongoing through the use of Semantic Traffic Analyzers which look for key words like Jihad or terror, or explosives of "F__K the government. I hope that clears things up for you.
Castout
02-28-10, 11:08 PM
Castout: Read my pieces and look at Klein's affadavit. The actual surveillance takes place in the telco central offices where all the voice, wireless, internet and data come together in a telecom choke point. The surveillance looks at blocks of traffic at the OC-3/12/48 level. that's 3, 12 or 48 DS-3s, each containing the equivalent of 672 voice channels. So it's a Blanket surveillance ongoing through the use of Semantic Traffic Analyzers which look for key words like Jihad or terror, or explosives of "F__K the government. I hope that clears things up for you.
Thanks for the information. I'm gonna email myself with the words sex bomb and white house :rotfl2:
I'll educate myself with the provided links. And umm yea this post is gonna make it on their list as it contains the filtered words :O:
Ishmael
03-01-10, 12:06 AM
Thanks for the information. I'm gonna email myself with the words sex bomb and white house :rotfl2:
I'll educate myself with the provided links. And umm yea this post is gonna make it on their list as it contains the filtered words :O:
Dude! LOVE the Air-conditioned Honda! Plus, you're from Djakarta, Indonesia, A Muslim Country. Thank you, kindly. More grist for the dossier. So I leave you with a NATIVE American Perspective on our milieu. Santee Sioux Poet and AIM founder John Trudell. "In My Reality, I'm Crazy."
http://www.youtube.com/watch?v=s64x3yAm410
Yatta Hey! Anawashte, Kola!
http://img520.imageshack.us/img520/8416/yeibichiia2.jpg
Yei Bi Chii, The Surf Kachina
vBulletin® v3.8.11, Copyright ©2000-2025, vBulletin Solutions Inc.