{"id":77516,"date":"2015-07-14T20:12:12","date_gmt":"2015-07-15T00:12:12","guid":{"rendered":"http:\/\/rbach.net\/blog\/index.php\/"},"modified":"2022-09-13T12:33:36","modified_gmt":"2022-09-13T16:33:36","slug":"tla-does-good","status":"publish","type":"post","link":"https:\/\/rbach.net\/index.php\/tla-does-good\/","title":{"rendered":"TLA Does Good?"},"content":{"rendered":"<p><em><a href=\"https:\/\/web.archive.org\/web\/20151016075924\/http:\/\/vansonsoo.com\/shhh-a-feasible-strategy-despite-severe-innate-phone-security-eavesdropping-flaws-like-ss7\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-105781 size-medium\" title=\"TLA Does Good?\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/phones-eavesdropping-150x86.jpg?resize=150%2C86&#038;ssl=1\" alt=\"TLA Does Good?\" width=\"150\" height=\"86\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/phones-eavesdropping.jpg?resize=150%2C86&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/phones-eavesdropping.jpg?resize=75%2C43&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/phones-eavesdropping.jpg?resize=768%2C441&amp;ssl=1 768w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/phones-eavesdropping.jpg?resize=1024%2C588&amp;ssl=1 1024w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/phones-eavesdropping.jpg?w=1038&amp;ssl=1 1038w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/phones-eavesdropping.jpg?w=960&amp;ssl=1 960w\" sizes=\"auto, (max-width: 150px) 100vw, 150px\" \/><\/a><a href=\"http:\/\/www.zdnet.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">ZDNet<\/a> <\/em><a href=\"http:\/\/www.zdnet.com\/article\/nsa-xkeyscore-spy-united-nations-target-denial-service-more\/\" target=\"_blank\" rel=\"noopener noreferrer\">reports<\/a> that in the last batch of <a title=\"Edward Snowden\" href=\"https:\/\/web.archive.org\/web\/20211220064108\/https:\/\/www.crunchbase.com\/person\/edward-snowden\" target=\"_blank\" rel=\"crunchbase nofollow noopener noreferrer\">Snowden<\/a> documents, there may finally be some evidence that some <a href=\"http:\/\/www.urbandictionary.com\/define.php?term=Three-letter+Agencies\" target=\"_blank\" rel=\"noopener noreferrer\">TLA&#8217;s<\/a> were doing some good. They <strong>spied on criminals too<\/strong>. Apparently one Snowden\u00a0<a href=\"https:\/\/web.archive.org\/web\/20150805015300\/https:\/\/firstlook.org\/theintercept\/document\/2015\/07\/01\/osint-fusion-project\/\" target=\"_blank\" rel=\"noopener noreferrer\">document<\/a> boasts of how &#8220;criminals&#8221; can be found through a TLA <a href=\"http:\/\/www.theguardian.com\/world\/2013\/jul\/31\/nsa-top-secret-program-online-data\" target=\"_blank\" rel=\"noopener noreferrer\">program<\/a>.<\/p>\n<p><a href=\"http:\/\/www.madeinalabama.com\/2015\/06\/google-build-600-million-alabama-data-center\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-105785 size-medium\" title=\"some TLA's spied on criminals and not citizens\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/data_center_icon-e1569200500900-150x116.jpg?resize=150%2C116&#038;ssl=1\" alt=\"some TLA's spied on criminals and not citizens\" width=\"150\" height=\"116\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/data_center_icon-e1569200500900.jpg?resize=150%2C116&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/data_center_icon-e1569200500900.jpg?resize=75%2C58&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/data_center_icon-e1569200500900.jpg?resize=768%2C593&amp;ssl=1 768w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/data_center_icon-e1569200500900.jpg?w=946&amp;ssl=1 946w\" sizes=\"auto, (max-width: 150px) 100vw, 150px\" \/><\/a>Using this program TLAs can <strong>identify cyber attackers<\/strong>. <em>ZDNet<\/em> says that malicious users causing a &#8220;distributed denial-of-service&#8221; or <strong>DDoS attack<\/strong>, where a group of people overload a server or network with a flood of network traffic can be traced and identified. The TLA also used its program to troll <strong>online criminal forums<\/strong>.<\/p>\n<p><strong><em>rb-<\/em><\/strong><\/p>\n<p><em>Unfortunately, for law-abiding U.S. citizens, none of the Snowden documents to date have shown that the info collected on criminals was used to stop <a href=\"http:\/\/rbachnet.wwwmi3-ss40.a2hosted.com\/index.php\/zoup-pos-breached\/\" target=\"_blank\" rel=\"noopener noreferrer\">cyber<\/a> <a href=\"http:\/\/rbachnet.wwwmi3-ss40.a2hosted.com\/index.php\/data-breach-is-no-monkey-business\/\" target=\"_blank\" rel=\"noopener noreferrer\">attacks<\/a> or was passed on to law enforcement to take action.<\/em><\/p>\n<h6>Related articles<\/h6>\n<ul>\n<li><a href=\"http:\/\/go.theregister.com\/feed\/www.theregister.co.uk\/2015\/07\/10\/spamhaus_ddos_teen_sentenced\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Brit teen who unleashed &#8216;biggest ever distributed denial-of-service blast&#8217; walks free from court<\/a> (go.theregister.com)<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p><em><a title=\"Ralph Bach\" href=\"https:\/\/rbach.net\/index.php\/new-resume\/\" target=\"_blank\" rel=\"noopener noreferrer\">Ralph Bach<\/a>\u00a0has been in IT long enough to know better and has blogged from his\u00a0<a title=\"Bach Seat\" href=\"https:\/\/rbach.net\/\" target=\"_blank\" rel=\"noopener noreferrer\">Bach Seat<\/a>\u00a0about IT, careers and anything else that catches his attention since 2005. You can follow him at\u00a0<a class=\"broken_link\" href=\"http:\/\/www.linkedin.com\/in\/rb48334\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">LinkedIn<\/a>,\u00a0<a href=\"https:\/\/www.facebook.com\/ralph.bach.14\" target=\"_blank\" rel=\"noopener noreferrer\">Facebook<\/a>\u00a0and\u00a0<a href=\"https:\/\/twitter.com\/rbach48334\" target=\"_blank\" rel=\"noopener noreferrer\">Twitter<\/a>. Email the Bach Seat\u00a0<a href=\"mailto:\/\/bach.seat@gmail.com\" target=\"_blank\" rel=\"noopener noreferrer\">here<\/a>.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>TLA spies on cyber criminals but no proof they did anything with information.<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[3277,58,1185,1748,2364,4,2496],"class_list":["post-77516","post","type-post","status-publish","format-standard","hentry","category-security","tag-3277","tag-botnet","tag-cybersecurity","tag-ddos","tag-edward-snowden","tag-security","tag-tla"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/77516","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/comments?post=77516"}],"version-history":[{"count":6,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/77516\/revisions"}],"predecessor-version":[{"id":125857,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/77516\/revisions\/125857"}],"wp:attachment":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/media?parent=77516"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/categories?post=77516"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/tags?post=77516"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}