Welcome to General Chat - GAW Community Area
This General Chat area started off as a place for people to talk about things that are off topic, however it has quickly evolved into a community and has become an intergral part of the GAW experience for many of us.
Based on it's evolving needs and plenty of user feedback, we are trying to bring some order and institute some rules. Please make sure you read these rules and participate in the spirit of this community.
Rules for General Chat
-
Be respectful to each other. This is of utmost importance, and comments may be removed if deemed not respectful.
-
Avoid long drawn out arguments. This should be a place to relax, not to waste your time needlessly.
-
Personal anecdotes, puzzles, cute pics/clips - everything welcome
-
Please do not spam at the top level. If you have a lot to post each day, try and post them all together in one top level comment
-
Try keep things light. If you are bringing in deep stuff, try not to go overboard.
-
Things that are clearly on-topic for this board should be posted as a separate post and not here (except if you are new and still getting the feel of this place)
-
If you find people violating these rules, deport them rather than start a argument here.
-
Feel free to give feedback as these rules are expected to keep evoloving
In short, imagine this thread to be a local community hall where we all gather and chat daily. Please be respectful to others in the same way
In the recent past, reached out to Mary Fanning (of The American Report) to discuss some topics related to Hammer and Scorecard. Today, I followed up with another communication. And then it occured to me, that it may be of interest to you folks here:
--
Mary,
I recently sent you a brief outline “connecting the dots” interspersed between Hammer and Scorecard and Italy-Did-It. I write to you here on a different aspect of the Hammer and Scorecard topic.
First off – thank you for bringing the Whistleblower Tapes to the American public. I have listened to each of them multiple times. And I noticed some unconnected dots that I thought I’d connect for you.
You may recall from The Tapes that at one point Arpaio and Blixseth refer to Obama’s birth certificate. And they say – without justification – that the birth certificate issue and The Hammer issue are “sort of the same thing.” But they don’t say how they are connected and what makes them the same. Given how they characterized The Hammer, I don’t think they actually understood how they are connected.
The Hammer locates a “target” server’s private asymmetric encryption key – in part, through brute computational force. It uses computational power to exhaust the solution space until it finds the sought-after key. I could explain – slowly and understandably – what that means, should it interest you, but the bottom line is this: possession of a “target server’s” private asymmetric key permits the possessor to eavesdrop on all thought-to-be-secure communications with that target server.
If you have Bank of America’s private asymmetric key, you can decrypt all communication to and from Bank of America. If you have the private asymmetric key used by the email server at NYU, you can decrypt all communication to and from that server. And so on.
Consider this: the NSA stores all of the IP packets ever communicated via our domestic Internet infrastructure. So, if it is interested in a particular communication session, it can retrieve the packets constituting that communication session, send them – in proper sequence and on a one-by-one basis – to The Hammer, which will decrypt the contents of each packet, and then the whole communication session can be eavesdropped upon.
So, Mary, want to know what this has to do with Obama’s birth certificate? Here’s what. You use the Hammer to find the private asymmetric encryption key for the servers operating the Department of Health for Hawaii. Then you use the NSA’s capabilities to “replay” the communication session by which one of its system administrators logged into the server. The outcome? You literally see the system administrator’s login credentials – i.e., his or her username and password. So you just use that to login, and then issue Obama a birth certificate.
You’re not really “hacking” anything in the traditional sense. You’re just watching the administrators login, and then using their credentials. That’s how they exfiltrated all of that Bank of America data that is referred to in The Tapes. That’s how they compromised the Florida voting database that they mentioned in The Tapes. They can repeat that exploit on any target system, as long as it is in the USA.
The word needs to get out. And to do that, it requires someone who can explain in – simple terms – what the Hammer really is, and what the consequences of it falling into the wrong hands really is. I’m here to help, should that be of interest.
My sincere admiration, gratitude and regards, -“Simon”
Great explanation of the what Hammer does, technically, under the hood. This deserves to be in its own post.
BTW, do you have a link to the whistleblower tapes?
Link: https://soundcloud.com/david-broyles-327307388
(Scroll down to find the links to the audio files, five in all.)
I'm happy to post this, will do that in a minute.