-
Notifications
You must be signed in to change notification settings - Fork 0
/
appendix.html
188 lines (126 loc) · 11.6 KB
/
appendix.html
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
<!DOCTYPE html>
<!--[if lt IE 7]> <html class="no-js lt-ie9 lt-ie8 lt-ie7"> <![endif]-->
<!--[if IE 7]> <html class="no-js lt-ie9 lt-ie8"> <![endif]-->
<!--[if IE 8]> <html class="no-js lt-ie9"> <![endif]-->
<!--[if gt IE 8]><!--> <html class="no-js"> <!--<![endif]-->
<head>
<meta charset="utf-8">
<meta http-equiv="X-UA-Compatible" content="IE=edge,chrome=1">
<title>NSA Customer Appreciation Appendix</title>
<meta name="description" content="">
<meta name="viewport" content="width=device-width">
<link href='http://fonts.googleapis.com/css?family=Bitter:400,700,400italic' rel='stylesheet' type='text/css'>
<link rel="stylesheet" href="css/bootstrap.css">
<style>
body {
padding-top: 20px;
padding-bottom: 0px;
}
</style>
<link rel="stylesheet" href="css/bootstrap-responsive.css">
<link rel="stylesheet" href="css/main.css">
<script src="http://ajax.googleapis.com/ajax/libs/jquery/2.0.3/jquery.min.js"></script>
<script src="js/vendor/modernizr-2.6.2-respond-1.1.0.min.js"></script>
<script src="js/jquery.cycle.all.js"></script>
<script type="text/javascript">
$(document).ready(function() {
$('.bubblecaption').cycle({
fx: 'scrollLeft' // choose your transition type, ex: fade, scrollUp, shuffle, etc...
});
});
</script>
</head>
<body>
<div class="container">
<!-- Main hero unit for a primary marketing message or call to action -->
<div class="hero-unit">
<div class="logo">
<a href="index.html"><img src="http://watchingover.us/img/NSA-circle-logo.gif"/></a>
<h1>National Security Agency<br />Customer Appreciation Page</h1>
</div>
<div class="bubble">
<div class="bubblecaption">
<div class="captioncontainer"><p><em><strong>“No one knows you like we do!”</strong></em></p></div>
<div class="captioncontainer"><div class="longcaption"><p><em><strong>“Keeping tabs on the terrorists and everyone else.”</strong></em></p></div></div>
<div class="captioncontainer"><p><em><strong>“Your secrets are safe with us.”</strong></em></p></div>
<div class="captioncontainer"><div class="longcaption"><p><em><strong>“Screening the screens, monitoring the monitors.”</strong></em></p></div></div>
<div class="captioncontainer"><p><em><strong>“Trust the computers.”</strong></em></p></div>
<div class="captioncontainer"><div class="longcaption"><p><em><strong>“A government so small you can carry it with you everywhere.”</strong></em></p></div></div>
</div>
</div>
</div>
<div class="content">
<div class="aintro">
<div class="headline">
<div class="headlinemicro">
<h1>SHARING PASSWORDS<br />
IS IDENTITY PIRACY</h1></div>
<div class="headlinemicro2">
<h1>IDENTITY PIRACY<br />
IS CONSPIRACY</h1></div>
</div>
<div class="aintrotext"><p>“Unprotected <strong><em>masswords</em></strong>” — “shared <strong><em>cofiles</em></strong>” — “community <strong><em>hackounts.</em></strong>” Sorting through the emails and telephone calls of otherwise law-abiding citizens, the NSA has learned of many different names for sharing online accounts that are intended for private, individualized use. Many people even perform these acts without even having a name for them—sharing their passwords on movie services, for instance. But the NSA only has one word for all kinds of identity piracy: <em>CONSPIRACY!</em></p>
<p>Sharing digital identities with others not only violates your contracts with your favorite companies; it violates the spirit of American individualism. Worst of all, identity piracy may put you and your neighbors in danger by making it harder for the NSA to identify and track suspicious characters.</p>
<p>To make sure that you are not accidentally engaging in this pernicious activity, please carefully read the following descriptions of the conspiracies of identity pirates.</p>
</div>
</div>
<div class="leftside">
<div class="fifty"><h2>The Chinese Dragon</h2>
<p><em>A closed group shares a single identity.</em></p>
<p>The most common use is sharing digital subscription services like Netflix, or letting non-students make use of a university’s digital archives. On services that sell digital content, such as Apple ID, Amazon, and Xbox Live, conspirators are able to purchase once and share immediately. In some cases this practice is blocked by the hardware, but modifying that hardware is less expensive than the software that can be shared in this way. </p>
<p>Bolder Chinese Dragons have begun to speak collectively using communal email accounts or social network profiles. </p>
<p>Most Chinese Dragons include a single user who plays “head” by maintaining the account’s official credentials; the enrolled student, for instance, who permits others to read her college’s e-books. But there are Headless Chinese Dragons too.</p>
<p>Law-abiding citizens might assume that the heads of Chinese Dragons cannot share their accounts without sharing <em>everything.</em> Unfortunately, this is usually not the case. Though many accounts require a credit card to register, very few allow the user(s) to retrieve that information. On services such as Amazon that enable purchases with a stored credit card, identity pirates usually open the account with a nearly empty pre-paid card. When someone later wishes to make a purchase, they input their own card number, then delete the credit card information fully before logging off of the service.</p></div>
<div class="fifty"><h2>The Rotating Cast</h2>
<p><em>A group of people share a handful of identities, taking turns with them.</em></p>
<p>For example, a Rotating Cast might maintain five cell phone accounts, repeatedly reshuffling the actual cell phones between various individuals or locations, and maintaining the same phone numbers on all phones.</p></div>
</div>
<div class="fifty"><h2>The Public Playground</h2>
<p><em>An account designed to attract as many users as possible.</em></p>
<p>Public Playgrounds are established when an individual or group circulates an account name and password, inviting others to make use of it. People often use this for collaborative writing experiments with no ill intent.</p>
<p>Identity pirates sometimes complicate this approach by adding an offline component. An email account with its password painted under an overpass, for instance, can serve as a local anonymous messaging board.</p>
<p>On some services, however, the appearance of a Public Playground will causes administrators to reset the password; or a single user may accidentally change it, locking others out. For this reason, Public Playgrounds is usually used for short-term projects. The longer-lasting form is the Double-Hydra.</p></div>
<div class="fifty"><h2>The Double-Hydra</h2>
<p><em>A system for generating account names and/or passwords to be shared as widely as possible.</em></p>
<p>Imagine a creature that grows more heads when heads are removed, and more bodies when bodies are removed. </p>
<p>Consider, for instance, this tweet: “SN= syzygy(this year), if can’t +1; PW=SN backwards, if can’t +1.” The first person to read it registers the screen name syzygy2013 with password 3102ygyzys and retweets the message. A growing network of dozens of people use that account for several months before the administrators force the password to be reset. The first person to notice logs in and changes the password to 3103ygyzys. It is only a few minutes before regular users can log in, and if the account is ever closed entirely, they will meet again using screen name syzygy2014. </p></div>
</div>
</div> <!-- /container -->
<div class="bottom">
<div class="sidebar2">
<div class="sticker"><h3><strong>Sport the PRISM Sticker!</strong></h3>
<a href="https://store.crimethinc.com/x/stickers.html"><img src="img/prism-sticker.png" /></a>
<p>Let everyone know you stand behind us. <a href="https://store.crimethinc.com/x/stickers.html"><strong>5 for $1, 20 for $2.</strong></a></p>
</div>
<div class="book"><h3><strong>Download the Patriot Activity Book!</strong></h3>
<a href="NSA-for-kids.pdf"><span class="nsakids"><img src="img/NSAkids.jpg" /></span></a>
<p>Help your kids learn about the importance of our programs.<br />It’s fun! <a href="NSA-for-kids.pdf"><strong>[PDF, 2MB]</strong></a></p>
</div>
<div class="wallpaper"><h3><strong>Spruce Up Your Desktop with PRISM Wallpaper!</strong></h3>
<img src="img/wallpaper.jpg" />
<p>
[Phone]<br />
<strong><a href="wallpaper/960x640.jpg">960 x 640</a> • <a href="wallpaper/1136x640.jpg">1136 x 640</a></strong><br /><br />
[Tablet]<br />
<strong><a href="wallpaper/1024x1024.jpg">1024 x 1024</a> • <a href="wallpaper/2048x2048.jpg">2048 x 2048</a></strong><br /><br />
[Computer]<br />
<strong><a href="wallpaper/1600x1200.jpg">1600 x 1200</a> • <a href="wallpaper/2560x1440.jpg">2560 x 1440</a></strong>
</p>
</div>
<div class="footer">
<div class="footerlogo"><img src="img/cwclogo.png" /></div>
<div class="credit1"><p>Deployed by the <a href="http://crimethinc.com"><br /><strong>CrimethInc. Workers' Collective</strong></a> <br />on contract to the NSA. </p></div>
<div class="credit2"><p>NSA logo based on original by <br /><a href="https://www.eff.org/nsa-spying">Electronic Frontier Foundation</a>.</p></div>
</div>
</div>
</div>
<!-- <script src="//ajax.googleapis.com/ajax/libs/jquery/1.10.1/jquery.min.js"></script>
<script>window.jQuery || document.write('<script src="js/vendor/jquery-1.10.1.min.js"><\/script>')</script>-->
<script src="js/vendor/bootstrap.min.js"></script>
<script src="js/main.js"></script>
<a title="Real Time Web Analytics" href="http://clicky.com/100640728"><img alt="Real Time Web Analytics" src="//static.getclicky.com/media/links/badge.gif" border="0" /></a>
<script src="//static.getclicky.com/js" type="text/javascript"></script>
<script type="text/javascript">try{ clicky.init(100640728); }catch(e){}</script>
<noscript><p><img alt="Clicky" width="1" height="1" src="//in.getclicky.com/100640728ns.gif" /></p></noscript>
</body>
</html>