Saturday, May 24, 2014

The Internet Part 2 by KimB

The Emperor has No Clothes”.

The NSA and all of the other world's security services, are dependent on a simple requirement: That Nothing Change. A small change and their entire empire of surveillance collapses. So the NSA et al, will attempt to block changes but they control only a small part of the world, a very small part. Once a change is initiated elsewhere, it cascades through the system. Their job is to prevent changes at all costs.

The first change is:
The Internet was build on “trust” but it was never designed to be “secure” and it was never designed to be “securable”.
The great idea that we, the people of the world, could “trust” the Internet to perform our tasks was a laudable vision. I could “trust” that a email I sent to someone would get there auto-magically and without being intercepted and read along the way. I could “trust” that my personal information was secure and that no one without my authorization could see it.

Unfortunately, there were some who did not share in this view, both the NSA (as a catch all phrase for all world government surveillance organizations) and corporations took advantage of my “trust”. Some did ask for permission but hid what they were doing with the information or subtly changed or reworded their requests because they knew that few would willing agree to their ultimate goals, not even for free email.

Once you understand that the basis of Internet Trust cannot be recovered, then you have to look deeper into the technology to see all the places The Emperor has No Clothes. The changes won't be “fun” and they won't be “convenient” but they will happen, they are happening and they've been in progress for sometime because while the average person on the planet may not have been aware of the NSA data trawl, other governments certainly were and those governments are no longer going to Go Along To Get Along. The benefit to any government not on the NSA's “friends list” has expired.

Techie Talk Time
Warning eye-glazing-over information about to appear. Try to prop the eyelids open for a short period.

Everything in the Internet or any Computer System is based on a 7 layer cake called the OSI Model. This 7 layer cake defines exactly how your email gets from your PC to the Destination. It's applied to Big Iron like supercomputers as well as your cellphone or phablet. It's the recipe for how things happen, where and when.

Just like a cake, there's a time for mixing, there's a time for baking, there's a time for frosting. All the items go in order, every time, all the time. When it goes in order, according to the recipe out comes the Internet all nice and tasty, ready to eat, looking like “MORE!” as soon as you see it.

Within each of the 7 layers, are specialties. You may buy Organic Flour at the store, but the flour is milled and packaged by someone else, before that it was planted and harvested. There are many kinds of flours to select from. Each different and unique but all fitting within a particular layer.

The NSA has tinkered in every single layer of the cake recipe. There's no layer they have not compromised, accessed or exploited. Your Organic Flour is not Organic. The flour is not 100% wheat. The wheat did not come from a farm in Kansas as stated on the package but comes from an undisclosed location. There are GMOs in the flour and it has some additives not listed in the ingredients list too. In short, the flour is not at all what you thought it was and you won't be buying that brand again.

The same goes for every layer in the OSI Model. It's all tainted. The reason the NSA et al. were able to taint the layers, is because we “trusted” the Internet and “trusted” that other providers of each ingredient or component would be honest and do the best they could for their area. But clearly we were wrong in our trust.

The NSA made sure “we” didn't know, but many did know. The history of the Internet and the results of the exposés, showed that many did know what was going on but the NSA could easily overwhelm the their concerns with “You know nothing John Snow...” and submerge their true purposes by isolating and limiting the sources of information and using “Trust Me” answers.

[Editor's note: This story is Part 2 of 3 and was written by KimB.]

OSI 7 Layer Model
OSI 7 Layer Model

No comments: