It looks like you're using an Ad Blocker.
Please white-list or disable AboveTopSecret.com in your ad-blocking tool.
Thank you.
Some features of ATS will be disabled while you continue to use an ad-blocker.
At a recent RSA Security Conference, Nico Sell was on stage announcing that her company—Wickr—was making drastic changes to ensure its users' security.
She said that the company would switch from RSA encryption to elliptic curve encryption, and that the service wouldn't have a backdoor for anyone.
As she left the stage, before she'd even had a chance to take her microphone off, a man approached her and introduced himself as an agent with the Federal Bureau of Investigation. He then proceeded to "casually" ask if she'd be willing to install a backdoor into Wickr that would allow the FBI to retrieve information.
From 2004 to 2007 there was a 62 percent growth in the number of wiretaps performed under CALEA — and more than 3,000 percent growth in interception of internet data such as email.[1] By 2007, the FBI had spent $39 million on its DCSNet system, which collects, stores, indexes, and analyzes communications data.
It was clear that the FBI agent didn't know who he was dealing with, because Sell did not back down. "Washington thought it was very important to have freedom of information and private correspondence without government surveillance." Her lecture concluded, she proceeded to grill the agent. "I asked if he had official paperwork for me, if this was an official request, who his boss was," said Sell. "He backed down very quickly."
"Ten years ago, I'd have said yes," said Sell. "Because if law enforcement asks you to catch bad guys, who wouldn't want to help?"
"I'm not against helping law enforcement, but the most important thing to me is protecting my friends and family the best way I know how," said Sell.
She suggested that the NSA and other agencies go back to a model where individuals are targeted, instead of monitoring all communications and sorting it out later. "There are plenty of ways to track people without trampling human rights," she said.
We are ALL on watch lists because of the three hop rule.
gladtobehere
I would assume that as a result of her "noncooperation", she and her colleagues have been added to a watch list?
·military-grade encryption of text, picture, audio and video messages
·sender-based control over who can read messages, where and for how long
·best available privacy, anonymity and secure file shredding features
·security that is simple to use
NullVoid
Scam
Lets put it this way, its a stunt so you can trust this Wickr app, when actually its already implanted.
How about that twist ?
·military-grade encryption of text, picture, audio and video messages
·sender-based control over who can read messages, where and for how long
·best available privacy, anonymity and secure file shredding features
·security that is simple to use
How do they know its military grade if they dont deal with military ?
Best available privacy etc etc - so they KNOW you NEED it, most people dont
Simple to use - so simple, that you would use it at all time, revealing more each time
Imagine you sitting at the server, all gates open and only those WHO NEED it come through, easy target filtering.
I think this is a honeypot.edit on 11-1-2014 by NullVoid because: (no reason given)
Guyfriday
reply to post by NullVoid
I totally agree. SCAM
Why would the FBI show up at a conference, and approach her like that? The FBI would just make an appointment with her at her office.
It smells like a scam. I bet the NSA worked with the company while developing the encryption system. By staging the FBI encounter she can legally say that the FBI was told "NO", and that they are not involved. While the truth could very well be that. (since the FBI and the NSA are two different groups) This will allow people to believe that the system is safe, while all along the NSA would have an "IN" to the system.