It's always time for that hat.

On 9/19/08, Stuart VanZee <[EMAIL PROTECTED]> wrote:
>> From: Ted Unangst
>> Sent: Friday, September 19, 2008 1:12 PM
>> Cc: Misc OpenBSD
>> Subject: Re: NSA Resources For Rapid Targeting and Routing Analysis
>>
>>
>> On Fri, Sep 19, 2008 at 12:38 PM, Doug Milam
>> <[EMAIL PROTECTED]> wrote:
>> > Subject: NSA Resources For Rapid Targeting and Routing Analysis
>> > Date: Sat,  2 Jun 2007 08:53:31 +0200 (CEST)
>> >
>> > In order to send ICMP or TCP packets (or spoofed UDP
>> packets), "pinging" for rapid
>> > acquisition and analysis of a target IP's packet traffic
>> routing data at the Internet
>> > IXP-level, NSA has primarily used, starting earlier than
>> early 2006, the following
>> > IP ranges, with identification information where available,
>> for initial rapid target
>> > "pings." Other resources for subsequent tracking of a
>> target's IP packet traffic have
>> > been previously reported via Cryptome.org.
>>
>> Can somebody please translate that into normal?
>>
>>
>>
>
> Is it time to invest in a tin foil hat?
>
> s

Reply via email to