Beta
×

Welcome to the Slashdot Beta site -- learn more here. Use the link in the footer or click here to return to the Classic version of Slashdot.

Thank you!

Before you choose to head back to the Classic look of the site, we'd appreciate it if you share your thoughts on the Beta; your feedback is what drives our ongoing development.

Beta is different and we value you taking the time to try it out. Please take a look at the changes we've made in Beta and  learn more about it. Thanks for reading, and for making the site better!

Comments

top

NSA Director Says Agency Is Still Trying To Figure Out Cyber Operations

AHuxley trapped in nomenclature (92 comments)

The other fun part is what where "nuclear plans" doing on the web to be found?
On average they might have been kind of expected to be found? The press getting whispers to stoke public outrage to show that they where very real?
A nation goes to try and build from altered plans that wastes a decade and makes import supply lines and requests show up?
The domestic press feeds a perfect operation to ensure plans are seen as real but nobody told the rest of the cleared political or signals intelligence teams not to worry.
For that to work the internet has to be fully connected to all kinds of interesting mil sites just waiting to be found, downloaded from and then discovered to have been accessed from around the world.
The only trick is to keep the term honeypot away from the tech press. Or not have the press recall the same trick been done with altered paper plans sold in old Europe.
Thats the problem with massive signals intelligence teams and other massive intelligence moving agencies all having their own hidden missions.
In the past signals intelligence teams could be kept as support only and intelligence agencies could roam the world tricking other nations for decades while keeping political leaders in the loop.
Now active signals intelligence teams, contractors and the press with political contacts are reporting on active projects by intelligence agencies as if they where fact vs just fun cover stories.
Protect the super new plans from been downloaded for free from wide open sites every year, get good press... more political interest and a bump in next years budget.
Act of luck or just net activity looking for wide open sites every year and finding decades of complex 'plans' waiting?

yesterday
top

NSA Director Says Agency Is Still Trying To Figure Out Cyber Operations

AHuxley This isn't impossible... (92 comments)

The problem for that is the origin. Other nations and their fellow travellers, cult members, dual citizens, deep cover agents or useful groups can stage any kind of network event with internal or expected external IP address, time zones and other code hints all pointing to the expected 'country' or group.
Contractors, the politically connected all then feed from the event with digital products, services, clean ups, changes, new expensive training and long term monitoring.
All that is found is a legal working company legend, cut out or site used. How would a country find where the bad code entered the internet?
The neutral country with great hosting and low bandwidth costs that all was traced back to? The country who has on average produced expert coders over generations of very gifted academics? The code used kind of looks like something from that part of the world? Something was left to be found days later in the code in that language, it fits the time zone, ip and with international politics?
It could all be a distraction, false flag or just average code re used by an unexpected nation for their own national interest with the skills to have a great cover story.
The only good method is to air gap a nations vital infrastructure and clear all on site local staff.
The problem with networks is they face the wider world or strangers can build trust with cleared staff who then allow code to move along a trusted internal network.
All a nation gets in the end is a local staff members account was the origin or easy found, expected code fragments 100% that 'that' country.
International partners then have to be 100% told it was that 'that' country.
Then what? Other nations share the same code and other their different country of origin findings that they where 100% sure of?

yesterday
top

NSW Police Named as FinFisher Spyware Users

AHuxley Is Australia different? (73 comments)

Think of it in Cold War terms.
Communist using the under the cover of workers rights, trying law reform, Vietnam war protests or other national or State issues.
That would need a close working relationship between national and state gov staff, local police. To find the foreign aspect and have real locals watching every public meeting or protest and befriend the group or person.
The operational capability of hardware and software once in the hands of the mil or national gov due to buying and running costs is now at a much lower level.
Consumer culture also allows for people to be much for relaxed around computers and other cellular devices. The cell phone is on, mic is active and stays on as two people meet face to face.
No more plain old telephone service recording, tracking beacon in the car and hope to have enough local staff to be in position for that face to face meeting if the car is not used.
The only change is the total cost of tracking below the federal level and quality of audio or images.

yesterday
top

NSW Police Named as FinFisher Spyware Users

AHuxley It doesn't appear to affect linux based machines. (73 comments)

It depends on how the product was crafted per person.
On some consumer OS versions all you have to do is get under the consumer grade antivirus by not having to use in the wild malware thats been found.
That product has to avoid consumer grade antivirus behavior analysis, cosumer software firewalls over days and get the data out.
The 'out' part can be just as fun. A waiting consumer computer that looks like any other home computer in an empty home at the end of a city street with rental phone company records to match.
As for Linux http://www.theguardian.com/tec... (16 September 2014)
http://www.theguardian.com/tec...
has the line " can infect Apple OS X, Windows and Linux computers as well as Android, iOS, BlackBerry, Symbian and Windows Phone devices."
The issue is consumer grade antivirus has to have something to find and report back on. If the software is crafted per person and then removed in a short time that consumer grade antivirus option will never be a factor.
The other option is just to go for the keyboard or other cell phone input layer on the active cell device. A user can then encrypt, hide ip all they want at a software or higher hardware level but every keystroke is collected.
With a correct password any later software alterations would be part of the next expected, correct Linux checksums. The keyboard logger would not even have to use any internet network, it could just go very short range wireless avoiding all software/hardware packet sniffers efforts.

yesterday
top

FBI Completes New Face Recognition System

AHuxley Re:Sunglasses (128 comments)

Re sunglasses
Fashion that will hide you from face-recognition technology ( 1/06/14)
http://io9.com/how-fashion-can...
"For example, if you are wearing sunglasses, the system will recognize the sunglasses and then ignore that part of your face. The program will then simply analyze whatever is left behind. "... "that it's possible to recognize faces with 30% and in some cases 50% occlusion."

yesterday
top

FBI Completes New Face Recognition System

AHuxley Re:I hope it's better than the existing system.... (128 comments)

Re "It's probably also worth nothing that it's an investigation tool and can't be used as a source of positive identification."
Just like phone call parallel construction? Just like the use of lower cost cellular phone surveillance devices at a city and State level?
CCTV from city, state, federal and other sites will be joined in public private partnerships to ensure every face in some areas gets a good probability of been compared to existing databases or new faces saved for years.
Add in cell phone information at the same time, tracking license plates, getting the passengers face, over time builds up years of positive identification.
Add in tame partnerships between the private sector and the federal gov, very tame social media, very tame web 2.0 providers and helpful telcos.
The cpu costs per face and time per face is low, storage costs are low. Side on images and the physics of the lens distance is really the only difficult part left.
Funding for more CCTV can help with that. Social media can also be used to induce the wider public to upload many pictures of staff, friends, random faces in public for national "promote awareness" events. With gps, camera details kept in the uploaded file, good lighting, more resolution and lots of faces facing in the right direction for facial recognition.

yesterday
top

New Details About NSA's Exhaustive Search of Edward Snowden's Emails

AHuxley What the meaning of the words 'concerns' is? (196 comments)

Recall the "NSA Releases Snowden Email, Says He Raised No Concerns About Spying" (05.29.14)
http://www.wired.com/2014/05/s...
".... the NSA released a statement and a copy of the only email it says it found from Snowden.
That email, the agency says, asked a question about legal authority and hierarchy but did not raise any concerns."
Now its just about FIOA requests finding more or wondering what was held back as as the gov felt it "did not raise any concerns"....
From no emails to one email found back to none under a definition of what "identify" is going to find?
The other option is to only look for a few narrow legal terms that would constitute a formal complaint and not find one.

2 days ago
top

Treasure Map: NSA, GCHQ Work On Real-Time "Google Earth" Internet Observation

AHuxley Re:it's over: the media (in the US) have moved on. (260 comments)

Depends on the phone used, telco and gov. Just pressing off might be the only option with some tame telco products. Removing a battery might be an option with other telco products.
A gov or mil may wish to map out the path taken by a member of the press A person turns their phone off in the same area and then both phones are turned on again moving away from each other later?
Kind of easy to track the members of the press still covering gov and mil stories in person per city.
If one person left their phone battery in thats a live malware or telco activated mic in real time. Treasure Map would be fun for the office computer, home computer, any devices on the move.

2 days ago
top

Treasure Map: NSA, GCHQ Work On Real-Time "Google Earth" Internet Observation

AHuxley Re:Past all the NATed machines. hmm (260 comments)

The content can be sorted, saved once a person is found to be interesting. The ip, MAC and other data around all network use is the Treasure Map prize.
What network data a business, university or household sends can be looked at in real time for keywords, voice prints or people been tracked.
Treasure Map provides a much better/deeper understanding of the local network than just ending at an .edu or .com with a lot of users per day on different networks.
Tame software, tame hardware, junk weak crypto, the tame admin staff member "invited" into a gov public private security partnership could open a lot of the networks expected to be difficult.
That laptop might drift from a dorm room to free wifi to a home to friends house. A lot of different networks but thanks to public private partnerships not every network is difficult anymore.

2 days ago
top

Treasure Map: NSA, GCHQ Work On Real-Time "Google Earth" Internet Observation

AHuxley Re:Technical Perspective (260 comments)

Average nations internet service providers can keep ip, time and user name for a few years at a low cost?
Average phone companies can keep all details on all calls connected over many years.
Nations have the data split in real time, the ip, get help from the tame telcos and fully understand the internet crypto as used.
Collect everything surrounding all message, keywords and usage, save and sort. Find people been tracked connecting to new people, trace the hops and then add in all the new people to trace.
Storage is now cheap, cpu speed is cheap to sort hops, compression keeps pace over years.
Voice prints, keywords, phone numbers called all worked well in the past but no need to be so selective with the data around a call, message, fax, email, chat, web 2.0 use.
eg voice print information will will ensure any call connected with that person globally is kept.
A new person or people already in the system? Keyword use look into every message so all network users can be sorted, added.
1960's tech for calls made, numbers used. Voice prints are not new. Massive domestic surveillance exposed in 1970's has been in news a lot.

2 days ago
top

Treasure Map: NSA, GCHQ Work On Real-Time "Google Earth" Internet Observation

AHuxley Re:So they'll suffer from TMI (260 comments)

Nations can just use their number stations. One time pads and decades of very safe trusted sleeper agents are promoted.
Signals gathering expects the world to be using this generations ww2 ENIGMA like network over decades - tame telco crypto networks and internet will bring back lots of useful data as all other nations are not careful.
The interview with whistleblower William Binney: 'The NSA's main motives: power and money' (19.08.2014)
http://www.dw.de/binney-the-ns...
"Money. It takes a lot of money, you have to build up Bluffdale [the location of the NSA's data storage center, in Utah] to store all the data. If you collect all the data, you've got to store it, you have to hire more people to analyze it, you have to hire more contractors, managers to manage the flow. You have to start a big data initiative. It's an empire. Look at what they've built!"
Face to face, holidays, dual citizens, smart people invited in by rushed digital clearances. Clearances issued for a contractor to bring in expert staff.
Other nations have no need for their own to use the "Treasure Mapped" internet in any interesting ways.

2 days ago
top

Treasure Map: NSA, GCHQ Work On Real-Time "Google Earth" Internet Observation

AHuxley Re:it's over: the media (in the US) have moved on. (260 comments)

The good news is people meeting the press are more aware of having their cell phone on or powered and with them.
The press can now understand that turning off a phone can be seen as getting ready to meet a contact.
Anyone in the same area at the same time who turns off their phone might be that contact. Kind of a short list :)
The press is more aware of been under constant surveillance.
Treasure Map just adds to the collect it all idea and that digital entry or exit points can be fully reconstructed or are always been tracked.
Thats a lot of expensive effort to put into signals intelligence considering what most skilled nations fully understood about global telephone and computer networks going back over decades.

2 days ago
top

Treasure Map: NSA, GCHQ Work On Real-Time "Google Earth" Internet Observation

AHuxley From looking for people to collecting it all (260 comments)

Looking at where all data enters and exits the internet (www or the World Wide Wiretap)
Wifi, VPN, implanted OS or hardware devices, pubic, private, down to MAC address as expected.
Sorting by Infected hosts or Tor router?
All part of collect it all :)

2 days ago
top

Navy Guilty of Illegally Broad Online Searches: Child Porn Conviction Overturned

AHuxley Re:capabilities (285 comments)

Slashdot users may recall news from 2008 "Let’s Monitor All P2P" (April 17, 2008)
http://www.dailytech.com/Senat...
"Agents then track the offender on a “daily” basis, identifying them by their IP address and, in some cases, a “unique serial number” sourced from offender’s computer."
"Investigators have recorded almost 1.3 million of the unique serial numbers thus far, with about half of them residing in the United States – and that number is steadily increasing each month due to “extensive capturing” conducted since October 2005."

3 days ago
top

Treasure Map: NSA, GCHQ work on real-time 'Google Earth' internet observation

AHuxley From looking for files, people (1 comments)

to just looking at where all data enters and exits the internet (www or the World Wide Wiretap)
Wifi, VPN, implanted OS or hardware devices, pubic, private, down to MAC address as expected.
Infected hosts?
All part of collect it all :)

3 days ago
top

New Details About NSA's Exhaustive Search of Edward Snowden's Emails

AHuxley Re:NSA's exhaustive Search .. (4 comments)

Mil and gov have two options:
The classic: dont connect the network with the files on during the day of the search.
Enter a few narrowly defined legal terms and get no results back from a total network search.
Other options can be water damage to files, loss due the hardware issues, a computer crashed... the selection of operating systems understood to totally reuse very limited backup storage.

3 days ago
top

New Details About NSA's Exhaustive Search of Edward Snowden's Emails

AHuxley What the meaning of the words 'concerns' is? (4 comments)

Recall the "NSA Releases Snowden Email, Says He Raised No Concerns About Spying" (05.29.14)
".... the NSA released a statement and a copy of the only email it says it found from Snowden.
That email, the agency says, asked a question about legal authority and hierarchy but did not raise any concerns."
Now its just about FIOA requests finding more or wondering what was held back as as the gov felt it "did not raise any concerns"....
From no emails to one email found back to none under a definition of what identify is felt to find?

3 days ago
top

Navy Guilty of Illegally Broad Online Searches: Child Porn Conviction Overturned

AHuxley Re:capabilities (285 comments)

That has been going on for many, many years. Every file of interest to law enforcement globally is logged and tracked over many different kinds of networks, p2p like networks in real time.
All users moving any known file have unique data about their network and computers used (beyond MAC, ip) recorded as the file is networked.
The US gov could have looked at all networks and then sorted for gov and mil workers legally. Or had the mil sort for on base networking connections on a base or mil network.
Or looked at gov/mil issued computer hardware, software and for network misuse on mil sites.
Instead the US mil collected all and then tried to sort out all people not part of any mil base.... or gov....

3 days ago
top

U.S. Threatened Massive Fine To Force Yahoo To Release Data

AHuxley Re:Whenever I read stuff like this (223 comments)

Re 'change in our freedoms?"
"It takes a lot of money, you have to build up Bluffdale [the location of the NSA's data storage center, in Utah] to store all the data. If you collect all the data, you've got to store it, you have to hire more people to analyze it, you have to hire more contractors, managers to manage the flow. You have to start a big data initiative. It's an empire. Look at what they've built!"
Binney: 'The NSA's main motives: power and money'
http://www.dw.de/binney-the-ns... (9.08.2014)

Signals intelligence was to "collect it all" and then sort. The next step was some lock box law for phone records to get around parallel construction in open US courts.
The UK understood if people know about signals intelligence they can move away from telco products.
The US seems to hope that all people will enjoy the freedom of buying and using that next tame consumer grade telco product.

5 days ago

Submissions

top

NSA Admits Retaining Snowden Emails, no FOIA for US press

AHuxley AHuxley writes  |  about 2 months ago

AHuxley (892839) writes "The http://thedesk.matthewkeys.net... reports on a FOIA request covering "... all e-mails sent by Edward Snowden"
Remember how Snowden should have raised his concerns with his superiors within the NSA?
Remember how no such communication could be found?
Remember how one such communication was released but did not seem to be raising direct concerns?
Well some record of e-mail communications seems to exist but they are exempt from public disclosure under the federal Freedom of Information Act."

Link to Original Source
top

Australian police use telocs for cell "tower dump" of all connected users data

AHuxley AHuxley writes  |  about 2 months ago

AHuxley (892839) writes "The Sydney Morning Herald is reporting that Australian federal and state police are using a no warrant cell phone tower metadata access technique called a "tower dump". A "tower dump" provides the identity, activity and location of all cell phones that connect a cellphone tower(s) over time (an hour or two). The metadata from thousands of phones and numbers connected are then sorted. Australian law-enforcement agencies made 330,000 requests for metadata in 2012-13.
Some US views on the same legal issues:
Judge Questions Tools That Grab Cellphone Data on Innocent People (Oct 22, 2012)
http://blogs.wsj.com/digits/20...
Will Telcos Follow ISPs and Extend Warrant Protection for All? (JUNE 17, 2014)
https://www.eff.org/deeplinks/...
"Lawsuit seeks details on Chicago Police purchases of cellular tracking gear" (June 10, 2014)
http://www.suntimes.com/news/m...
"Records from more than 125 police agencies in 33 states revealed one in four used a tactic called a “tower dump,”....""

Link to Original Source
top

The US legal system and secret laws: FOIA vs OLC, FBI, CIA?

AHuxley AHuxley writes  |  about 8 months ago

AHuxley (892839) writes "Follow the ongoing EFF work on obtaining a document FOIA (Freedom of Information Act) requests have found to be exempt under "internal deliberations".
Are secret laws been used to provide more cover for a CIA's $10 million telco record deal?
Welcome to the world of past telco exigent letters and National Security Letters.
"FBI Replaced Legal Process with Post-It Notes to Obtain Phone Records"
https://www.eff.org/deeplinks/2010/01/fbi-replaced-legal-process-post-it-notes-obtain-ph
http://www.techdirt.com/articles/20131107/13445725172/so-much-nsa-chiefs-offer-to-store-data-neutral-site-att-receiving-10-millionyr-cia-phone-records.shtml
http://www.techdirt.com/articles/20100121/1418107862.shtml http://www.techdirt.com/articles/20100121/1418107862.shtml"

Link to Original Source
top

Mystery of 1000's of FBI documents posted to US press in 1971 solved

AHuxley AHuxley writes  |  about 8 months ago

AHuxley (892839) writes "A team of eight antiwar activists broke into an FBI office in Media, Pennsylvania and removed at least 1000 documents.
Once removed and sorted, the bulk of the files showed FBI spying on US political groups. Cointelpro had been found.
43 year later more details about how the anonymously packages ended up with select US reporters weeks later.
Years later the full extent of COINTELPRO (COunter INTELligence PROgram) was finally understood.
http://en.wikipedia.org/wiki/COINTELPRO"

Link to Original Source
top

US mil drone visions to 2038: groups, more AI, lower costs, exports.

AHuxley AHuxley writes  |  about 8 months ago

AHuxley (892839) writes "The US Department of Defense (DoD) has released a 150 page document covering its vision for the future role of unmanned systems.
The report mostly covers drones (unmanned aerial systems) use but offers insight into land, and sea technology too.
Pre-programmed tasks, new algorithms, more sensors, and complex machine learning will be advanced to help try and reduce projected funding needs. For example humans will not be needed for the duration of the mission until a drone swarm is released. The need to shape cultural hurdles, standards, and export regulations around the use of drones will also be worked on.
pdf at http://www.defense.gov/news/newsarticle.aspx?id=121392 or
http://publicintelligence.net/dod-unmanned-systems-2013/"

Link to Original Source
top

US federal judge on laptop search laws at U.S. borders

AHuxley AHuxley writes  |  about 9 months ago

AHuxley (892839) writes "The American Civil Liberties Union sought to challenge the Ul legal "border exemption" three years ago.
Can your laptop be seized and searched at the border?
A 32 page decision provides new legal insight into legal thinking around suspicion less searches, making copies, keeping copies.
"think twice about the information you carry on your laptop.."
“Is it really necessary to have so much information accessible to you on your computer?”
i.e. your electronic devices searchable and sizeable for any reason at the U.S. border.
ACLU may appeal. The decision: https://www.aclu.org/sites/default/files/assets/abidor_decision.pdf Also note the Kool-Aid comment."

Link to Original Source
top

Pentagon could remove US Cyber Command from the NSA

AHuxley AHuxley writes  |  about 10 months ago

AHuxley (892839) writes "USCYBERCOM was a powerful new command to conduct full spectrum military cyberspace operations created in 2006 and reached full operational capability by late 2010.
Could CYBERCOM be returning to its US military origin away from public spotlight of its more civilian setting in the NSA via the Director of National Intelligence (DNI)?
The NSA may have its powers returned to that of keeping US codes safe, ensuring international cryptography is useless, spying and its ongoing US domestic surveillance duties. The newer, coveted global operations role hidden before more relations by Snowden, other whistleblowers or investigative journalists induce public hearings?
Cyber Commands “offensive” operations on the Internet would then be secure form hearings, investigations or any new laws or limits.
Will part of the US mil get their offensive cyber warfare role back from an agency that gained many new roles in a very short time frame and much publicly?
Expect to see the spin of many classic sock puppets with good news stories about why the NSA needs its new powers to reach out globally and within the USA e.g.
http://www.zerohedge.com/news/2013-10-31/document-reveals-official-nsa-talking-points-use-911-attacks-sound-bite
Some links about the role, formation and use of Cyber Command can be found at https://en.wikipedia.org/wiki/United_States_Cyber_Command"

Link to Original Source
top

Thomas Drake NSA whistleblower on allies and US rights

AHuxley AHuxley writes  |  about a year ago

AHuxley (892839) writes "Thomas Drake a decorated United States air force, navy veteran and whistleblower from a position as a senior executive at America's National Security Agency.
His views on the 4th amendment, the foreign intelligence surveillance act and the role of an extraordinarily broad dragnet of electronic surveillance in the US.
The interview talks about countries going along with US surveillance as they feel they will never be caught and the telco tech is in place."

Link to Original Source
top

NSA Cold War domestic operations declassified

AHuxley AHuxley writes  |  about a year ago

AHuxley (892839) writes "With the US trying to understand the domestic role of their foreign intelligence and counterintelligence services in 2013, what can a declassified look back into the 1960's and 1970's add to the ongoing legal debate? Welcome to the world of Interagency Security Classification Appeals Panel and the work done by the National Security Archive at George Washington University. Read about prominent anti-war critics and US senators been tracked and who was on the late 1960's NSA watch list. From Rev. Martin Luther King to civil rights leader Whitney Young, boxer Muhammad Ali, Tom Wicker, the Washington bureau chief and Washington Post columnist Art Buchwald, Sen. Howard Baker (R-Tenn.). The NSA was aware of the legality of its work and removed all logos or classification markings, using the term 'For Background Use Only". Even back then NSA director at the time, Lew Allen noted: “appeared to be a possible violation of constitutional guarantees,” page 86:
via http://www2.gwu.edu/~nsarchiv/NSAEBB/NSAEBB441/docs/doc%205%202008-021%20Burr%20Release%20Document%202%20-%20Part%20B.pdf
What did the NSA think about signals intelligence sites in your country? See if your country makes the "indefinite" list on page 392:
http://www2.gwu.edu/~nsarchiv/NSAEBB/NSAEBB441/docs/doc%201%202008-021%20Burr%20Release%20Document%201%20-%20Part%20A2.pdf"

Link to Original Source
top

Australia, NZ to get NSA GCHQ net encryption access too

AHuxley AHuxley writes  |  1 year,5 days

AHuxley (892839) writes "Slashdot readers have seen and commented on the news surrounding internet encryption and who can get access.
The Sydney Morning Herald is reporting that the Australian Signals Directorate (was Defence Signals Directorate, DSD) and New Zealand's GCSB are expected to invited into the same initiative."

Link to Original Source
top

Australian gov Ok with NSA spying

AHuxley AHuxley writes  |  about a year ago

AHuxley (892839) writes "Australia’s Foreign Minister Bob Carr seems to be fine with US international data collection (spying) with the help of US consumer hardware, telcos and software vendors by the NSA (National Security Agency). It would seem the protections offered to all US citizens under the US "Bill of Rights and its Supreme Court, on where individuals stand in relationship to Government" will some how be offered to or balance out Australian law on privacy and data protection. Will a "lively political system" in the USA look after the privacy of Australians?
Network Ten’s Meet the Press program has the text of the interview here http://resources.news.com.au/files/2013/06/09/1226660/835253-meet-the-press-transcript.pdf"

Link to Original Source
top

Using social media about military operations make you a target?

AHuxley AHuxley writes  |  about 2 years ago

AHuxley (892839) writes "Could using social media or blog comments about any military operation make you a legal military target? Australian army Land Warfare Studies Centre analyst Chloe Diggins looks at what could make a web 2.0 user a combatant.
The Geneva Convention protecting civilians could be removed if a power feels uploading, downloading or sharing is part of the fight. How long before "knowingly providing material support or resources to an entity that has been designated as Foreign Terrorist Organizations under section 219 of the Immigration and Nationality Act." becomes just "providing material support or resources to an entity that has been designated""

Link to Original Source
top

US seeking a 15.7% levy on submarine cable operators

AHuxley AHuxley writes  |  more than 2 years ago

AHuxley (892839) writes "The US Federal Communications Commission (FCC) is considering an expansion to the Universal Service Fund. Submarine cable operators with landings in the United States could face a 15.7 percent levy on quarterly revenues. Some history on US telco rates can be found at: http://www.commsday.com/commsday/2012/comment-bad-timing-proposed-undersea-cable-tax/"
Link to Original Source
top

OzLog: unlimited private data retention for Oz law

AHuxley AHuxley writes  |  more than 2 years ago

AHuxley (892839) writes "delimiter.com.au has news on ISP data retention ideas in Australia.
Australia would like to follow the EU down the "European Directive on Data Retention" path.
Australian law enforcement agencies may have the option to request a log of all a users of interest telco usage without any review or time limits.
Another option would be for local politics eg. an activist community. Data retention over a postcode (suburb).
The data collection could also be out sourced to private contractors."

Link to Original Source
top

What did your telco sell in Bahrain?

AHuxley AHuxley writes  |  about 3 years ago

AHuxley (892839) writes "Follow the trial of interception technology as it is exported and supported around the world.
Documentation is divested and NDA's protect the deals done by telcos. Western-made and supported surveillance software offers tracking and transcripts that end in windowless rooms and torture."

Link to Original Source
top

RIM CEO on BBC: India and Middle East

AHuxley AHuxley writes  |  more than 3 years ago

AHuxley (892839) writes "Recall:
http://mobile.slashdot.org/story/10/10/08/1454237/UAE-Says-RIM-Played-Ball-Will-Maintain-Service
http://mobile.slashdot.org/story/10/08/27/2137241/BlackBerry-Battle-In-India-Going-Down-To-the-Wire
http://yro.slashdot.org/story/10/08/07/1625245/Saudi-Says-RIM-Deal-Reached-BlackBerry-OK-If-We-Can-Read-the-Messages
http://yro.slashdot.org/story/10/08/07/1625245/Saudi-Says-RIM-Deal-Reached-BlackBerry-OK-If-We-Can-Read-the-Messages ?
Well try to forget, its really really unfair and a matter of national security."

Link to Original Source
top

The top 100 IT suppliers to the UK gov for 2009-10

AHuxley AHuxley writes  |  more than 3 years ago

AHuxley (892839) writes "Using Freedom of Information requests the Guardian has listed how the UK are spending £42bn on IT.
12 departments and two non-departmental bodies.
On the top are BAE Systems and Detica. Hewlett Packard is third getting £1.63bn from five departments. GCHQ has an exemption."

Link to Original Source
top

NSA jobs vs Silicon Valley over the next 10 years?

AHuxley AHuxley writes  |  more than 2 years ago

AHuxley (892839) writes "The hometownannapolis reports on a new cyber curriculum at a local high school to feed the ever growing needs of the NSA and Cyber Command.
A quote from Dutch Ruppersberger (D-MD) about job growth in the local national security sector stands out: “In 10 years, we will be larger than Silicon Valley,” Could the new funding for the expansion of the National Security Agency and the Army's new Cyber Command be the next big growth area for the US?"

Link to Original Source
top

Lockheed Martin's secret UK Census building

AHuxley AHuxley writes  |  more than 3 years ago

AHuxley (892839) writes "secret-bases.co.uk reports: Back in early 2010, Lockheed Martin – the prime contractor for the UK Census programme starting on 27th March 2011 – acquired a "secret" building on a 30-month lease for use as the data processing centre for uploaded census forms. The location was found after a senior Lockheed Martin / UK Data Capture employee registered an associated domain on a server whose IP address network, belonging to Lockheed Martin, was itself registered to the precise address of the building. The US spelling of "centre" was also noted."
Link to Original Source

Journals

top

Glenn Greenwald Keynote 30c3

AHuxley AHuxley writes  |  about 9 months ago http://www.dw.de/glenn-greenwald-calls-for-snowden-asylum-at-chaos-computer-club-congress/a-17327867
https://soundcloud.com/dlf-wissenschaft/keynote-glenn-greenwald-30c3
Into details of Hong kong - understanding TrueCrypt use.
World understanding about protecting own security, notes more PGP use in his email.
Limits on US surveillance, debate, political, legal reform - PR.
Secret court oversight - rubber stamp, role of generations of gov loyalists.
Hope with skills of the developers of encryption to protect communications - slows down rate of privacy loss.
PR of been seen at hacker events by US gov officials.
Will **you** work to help destroy privacy?
Act of conscience is spreading - Chelsea Manning, Daniel Ellsberg, wikileaks,
Price of transparency - gov punishment vs growing lists of whistleblowers -effective use of fear
Inspiration of more whistleblowers?
EU leaders greatly helped by Snowden news but not willing to help Snowden.
New book - role of free press vs tame US/UK media, gov false claims to public
Iraq war reflections, Snowden first doc.
http://en.wikipedia.org/wiki/Boundless_Informant
Tame media, no oversight, US/UK media
Five eyes - no more privacy globally for electronic communications.
Q&A:
All communications tracked by govs, motivation - economic, politically - down to one goal: power.
What to release - powerful debate, interest - 6 months into, more on way.
True face of UK gov vs press freedom - now a joke.
German gov support of NSA - no change to German policy

top

Australian intelligence on cyber security, data acquisition, the private sector.

AHuxley AHuxley writes  |  more than 2 years ago http://www.asio.gov.au/Publications/Public-Statements/2012/24-Jan-2012-Sydney-Institute.html An interesting paper on the "malicious by-product, of the information technology age"
Are the Australian public gradually become aware of their own privacy as they use information technology?

top

NewsRight and your next /. story link?

AHuxley AHuxley writes  |  more than 2 years ago With http://paidcontent.org/article/419-newsright-launches-with-29-publishers-not-a-litigation-shop/ seeking to set up "business relationships and contracts" for their online content.
Could it be time for a link database to see if a link been posted goes back to a NewsRight member?

top

Bungies 1998 Myth 2 (private) beta Linux testing

AHuxley AHuxley writes  |  more than 3 years ago http://tain.totalcodex.net/forum/viewtopic.php?f=2&t=5451#p53236
Myth 2 was a 1998 real-time tactics computer game for the PC/Macintosh (and in the past Linux).
A new native Linux executable version of 1.7.2 (current Mac/Win) seems to be in testing.

top

Kentucky police search homes without a warrant based on smell/sounds

AHuxley AHuxley writes  |  more than 3 years ago The nytimes reports on how Justices Look Again at How Police May Search Homes after a case in Kentucky where police smelled burning marijuana coming from an apartment and kicked the door in.
Justice Kagan said, âoeis going to enable the police to penetrate the home, to search the home, without a warrant, without going to see a magistrate, in a very wide variety of cases.â
"He said a sensible criminal would answer the door but decline to let the police enter without a warrant."

top

New zero-day hole in Flash Player

AHuxley AHuxley writes  |  about 4 years ago http://news.cnet.com/8301-27080_3-20016301-245.html
A new zero-day hole in Flash Player that reportedly is being exploited in the wild and could allow an attacker to take control of a computer.
The critical vulnerability affects Adobe Flash Player 10.1.82.76 and earlier versions for Windows, Mac, Linux, Solaris, and Android.
It also affects Adobe Reader 9.3.4 and earlier version for Windows, Mac, and Unix and Adobe Acrobat 9.3.4 and earlier versions for Windows and Mac.

top

Apple's Facetime Open standards, closed link?

AHuxley AHuxley writes  |  about 4 years ago Was just reading http://herot.typepad.com/cherot/2010/06/iphone-facetime-protocol.html that links to
http://www.packetstan.com/2010/07/special-look-face-time-part-1.html
http://www.packetstan.com/2010/07/special-look-face-time-part-2-sip-and.html
http://www.packetstan.com/2010/07/special-look-face-time-part-3-call.html
The "client-side SSL certificate, giving Apple the ability to grant or deny access on a per-device basis" is known, but has anything changed with the new touch?

top

OS X, Disk Utility and the 3 strange ip's

AHuxley AHuxley writes  |  about 4 years ago Last night I was reading http://www.theregister.co.uk/2010/09/09/ios_4_dot_1_jailbreak/
I clicked on the " was first announced by" link to http://twitter.com/pod2g/status/23950781610
Suddenly "Disk Utility" starts up and Little Snitch shows connections to "business.twitter.com" and the 3 ip's
128.242.245.116, 128.242.245.20, 128.242.245.212
http://img138.imageshack.us/img138/6296/duip.jpg
2010-09-09 22:12:32 +0930: Checksumming âoe23950781610â using UDIF-CRC32 was also recorded in the Disk Utility log.
Disk Utility is a utility created by Apple for performing disk-related tasks in Mac OS X.
Little Snitch is a software outgoing firewall for Mac OS X.
Any ideas? Thanks.

top

Legality of Oz net filter trials?

AHuxley AHuxley writes  |  more than 4 years ago http://www.zdnet.com.au/net-filter-trials-unlawful-claims-engineer-339304184.htm

An Australia network engineer Mark Newton has been asking about the intercepted customers' internet traffic aspect of the Australian filter trial. Australia seems to be using a Marshall R3000 series for web monitoring, filtering and reporting.
This may breached section 7(1)(b) of the Telecommunications (Interception and Access) Act 1979. by "authorising, suffering or permitting said equipment to be used in that manner".
""A copy of every single packet of data generated by an end user and sent to the internet is supplied to a network switch's 'mirrored port' and forwarded to whatever device is connected to it," Newton told the department. "Although the vendor makes the unverified claim that the R3000 only 'inspects' outgoing web requests and, in those requests, only examines destination URLs, a complete transcript of all internet data is nevertheless supplied to the R3000 for monitoring."
" The department continues to believe its internet filtering live trials had not breached the Act.
More on the filter trail tech used in Australia http://www.arnnet.com.au/article/307138/internet_filter_isps_reveal_clean-filter_technologies/?fp=16&fpid=1

top

Oz telco network maps a security risk

AHuxley AHuxley writes  |  more than 4 years ago zdnet writes Telstra and Optus say a proposal by the Australian Competition and Consumer Commission (ACCC) to publish infrastructure location information could be a risk to security.
Telstra said in its response to the discussion that only limited infrastructure information should be published to carriers and carriage service providers and should not be given to the general public.
Telstra notes "persons â" both within Australia and overseas â" determined to assault the public health and safety of Australian people and institutions, could access publicly available certain telecommunications network information to precisely identify points of access to the network."
Is someone worried the public will add up the costs of a low redundancy choke points in the telco network and ask where all the cash went? Does Australia need a Sean Gorman to map our networks?
http://www.wired.com/wired/archive/12.01/start.html?pg=10

top

Pentagon tries mind-control in Afghanistan

AHuxley AHuxley writes  |  more than 4 years ago http://www.wired.com/dangerroom/2010/06/to-reach-afghans-pentagon-drafts-mimes-storytellers-wizard-of-oz/#more-26471
Mind-control and social engineering keeps the masses in the USA passive and stuck in their own little worlds.
So the Pentagon is trying to convince Afghanistan to accept endless advertising, mass media, polls, celebrities and sports figures in a culturally-specific narrative.
Pentagon-funded researchers are building computer models of how the societies of Afghanistan and Iraq work http://www.wired.com/dangerroom/2009/03/darpas-social-s/
and releasing neuroscientists, artificial intelligence specialists, and gadgeteers for real world testing.
A demo will start vis Wizard of Oz and then allow the US to roll out ideas for grass roots organizing and collective decision making.
Someone dust off the Vietnam era http://en.wikipedia.org/wiki/Civil_Operations_and_Revolutionary_Development_Support for the web 2.0 generation?

top

Police push to continue warrantless cell tracking

AHuxley AHuxley writes  |  more than 4 years ago http://news.cnet.com/8301-31921_3-20008941-281.html
"A law requiring police to obtain a search warrant before tracking Americans' cell phones may imperil criminal investigations and endanger children's lives, a law enforcement representative told Congress this week."
"Obtaining a search warrant when monitoring the whereabouts of someone "who may be attempting to victimize a child over the Internet will have a significant slowing effect on the processing of child exploitation leads," said Richard Littlehale of the Tennessee Bureau of Investigation. "If that is acceptable, so be it, but it is a downstream effect that must be considered.""
"Connecticut federal judge shows that the FBI monitored the whereabouts of about 180 cell phones--without a warrant--while conducting surveillance of two men suspected of robbing local banks."

top

Windows Messenger 4: No video for you!

AHuxley AHuxley writes  |  more than 4 years ago http://arstechnica.com/microsoft/news/2010/06/windows-live-messenger-wave-4-almost-excellent-fatally-flawed.ars
"Video Call" is obviously more limited. If one party has no webcam, there's no Video Call option. If one party doesn't want to broadcast their webcam, or their microphone, video call isn't an option. And yet the new Messenger discards the basic webcam features. It's video call or nothing. I have nothing against Video Calls, and use the feature from time to time. But I use the basic webcam capabilities more. It's not a bug. It's not an accidental omission. It's a deliberate decision by Microsoft: the new Messenger will have only one webcam mode, and it's Video Call. The company claims that by concentrating on one webcam mode they can make it better. Apparently the picture quality is improved." Why not just use a mic icon if you have sound only? Yahoo, tinychat ect let the users use any audio, visual or text chat they like and it all works fine from adsl 2+ to 56k, 1 on 1 or groups.

top

Bing-Zune integration still not working

AHuxley AHuxley writes  |  more than 4 years ago http://news.cnet.com/8301-13526_3-20008931-27.html
"this time, the player told me that I needed to enable application storage in my version of the Silverlight player. (Silverlight is a Microsoft platform for creating rich Internet applications, like audio and video, and basically competes with Adobe's Flash.) A casual user would have given up, but having a professional interest in the feature, I followed the instructions on the screen, only to find that my copy of Silverlight already had the box checked to enable application storage. Sigh. I unchecked and rechecked it. Still no luck. "

top

More on Google remote app wipe

AHuxley AHuxley writes  |  more than 4 years ago http://news.cnet.com/8301-27080_3-20008922-245.html
Google has remotely removed two free apps from several hundred Android phones because the apps misrepresented their purpose and thus violated Android developer policies, according to a company spokesman.
"The apps "were not designed to be used maliciously, and did not have permission to access private data--or system resources" beyond accessing the Internet, Rich Cannings, Android Security Lead, wrote in at http://android-developers.blogspot.com/2010/06/exercising-our-remote-application.html

top

Stephen Conroy saved by by sensitive negotiations?

AHuxley AHuxley writes  |  more than 4 years ago http://www.crn.com.au/News/217702,ludlam-change-in-comms-ministry-unlikely.aspx
From Communications spokesperson Senator Scott Ludlam "a change in Communications Ministers is "really unlikely".., due to difficulties in handing over the Department of Broadband, Communications and the Digital Economy (DBCDE) while significant, sensitive Telstra and NBN Co dealings take place."

top

You Don’t Want ISPs to Innovate

AHuxley AHuxley writes  |  more than 4 years ago http://www.wired.com/epicenter/2010/06/you-dont-want-isps-to-innovate/
"Building out infrastructure means redirecting stock-dividend dollars and putting them back into the company, which Wall Street punishes companies for â" and which hurts the massive stock packages of telecom executives. Itâ(TM)s literally not in telecom executivesâ(TM) best interest to invest in broadband and solid networks."

top

Next WikiLeaks Release May Involve ECHELON

AHuxley AHuxley writes  |  more than 4 years ago

http://www.abc.net.au/news/stories/2010/06/22/2933892.htm
He agreed it would be of the "calibre" of publishing information about the way the top secret Echelon system - the US-UK electronic spying network which eavesdrops on worldwide communications traffic - had been used.

top

Australian Greens to host anti-filter forum

AHuxley AHuxley writes  |  more than 4 years ago

http://www.itnews.com.au/News/217576,greens-to-host-anti-filter-forum.aspx

top

Fears internet costs will rise due to NBN

AHuxley AHuxley writes  |  more than 4 years ago

http://www.theaustralian.com.au/news/nation/fears-internet-costs-will-rise-due-to-nbn/story-e6frg6nf-1225882485870
"This deal between the NBN and Telstra could make broadband prices much worse for consumers if the NBN Co only decides to lease backhaul from Telstra and leaves the other backhaul providers stranded,"
Great backhaul lock in from one old monopoly to another.

Slashdot Login

Need an Account?

Forgot your password?

Submission Text Formatting Tips

We support a small subset of HTML, namely these tags:

  • b
  • i
  • p
  • br
  • a
  • ol
  • ul
  • li
  • dl
  • dt
  • dd
  • em
  • strong
  • tt
  • blockquote
  • div
  • quote
  • ecode

"ecode" can be used for code snippets, for example:

<ecode>    while(1) { do_something(); } </ecode>