Beta

Slashdot: News for Nerds

×

Welcome to the Slashdot Beta site -- learn more here. Use the link in the footer or click here to return to the Classic version of Slashdot.

Thank you!

Before you choose to head back to the Classic look of the site, we'd appreciate it if you share your thoughts on the Beta; your feedback is what drives our ongoing development.

Beta is different and we value you taking the time to try it out. Please take a look at the changes we've made in Beta and  learn more about it. Thanks for reading, and for making the site better!

Comments

top

One Trillion Bq Released By Nuclear Debris Removal At Fukushima So Far

AHuxley Re:One trillion becquerels (82 comments)

I am sure some pro nuclear AC will put it in terms of fruit, nuts, flights or average medical exposure as the classic talking point. What this will do to your lungs or after ingestion is the risk never mentioned.

4 hours ago
top

Dropbox Head Responds To Snowden Claims About Privacy

AHuxley Re:owncloud? (149 comments)

Yes get the OS to create its own files to move up everyday. All the good aspects of the cloud, nothing to see but encrypted files your OS understands and can recreate, search. Storage space is all you need.

yesterday
top

Researchers Design Bot To Conduct National Security Clearance Interviews

AHuxley Re:Robo-Polygraph? (102 comments)

Re 'Wouldn't it be much more efficient to just eliminate the polygraph altogether?"
Not if your selling and using the kit at a state and federal level.
The UK and other nations know you have to look at a persons life story, interview parents face to face, extended family, friends. School, local courts, chased down old paper records and build up a real generational life story of reading material, internet use, political ideas, faith, links to other nations, links to other nations faith, cash flow.
The US finds this to be hard work that is stuck with cleared gov staff - no private sector profits. So they have passed testing onto a person doing a test in a chair.
At best they watch your reading habit on the internet, do some digital database searches and very carefully note what your reading before the test. A rapid spike in internet searches for "polygraph" or an order for print books on 'polygraph" before the test is noted.
The rest is just time saving questions about your life, reading lists, political connections, family with the cheap digital review/state federal database search as a guide.
The average person sees a complex medical device and the charm of an interviewer hinting they know the person is feeling a certain way and want to "help".
That the job is great for them, but they have to help with a second or third test and really open up, the 'feelings' aspect.
A real spy knows that they are loyal to, faith is and what the truth is - they have no issues or feelings to mess them up on the day.
An average skilled worker with a lot to offer will over think the questions and might fail. A huge loss for the nation over decades.
The UK thought hard about this in the 1980's and seemed to understand what a real look into a persons life was about vs a digital search and perfect interview skills on one day.
The calm spies stay in, the good useful people mess up and are not considered.

yesterday
top

Researchers Design Bot To Conduct National Security Clearance Interviews

AHuxley Re:Who would hire a ketamine user? (102 comments)

The use of slang, street smarts, been part of a hidden culture, keeping that side of you hidden and having traveled the world might be seen as useful.
Or to pick out a person who is not part of that culture very quickly.
The other aspects is cash flow, law enforcement files and blackmail over things you might have done to enjoy that expensive activity.
It really depends on what part of the gov found you or who you face in the interviews.
Some are deeply devout teetotaler other staff might be more world wise and want people who can fit in around the world.
Signals intelligence at home facing blackmail vs an understanding of human intelligence in the field globally.

yesterday
top

The Secret Government Rulebook For Labeling You a Terrorist

AHuxley Re:Can I even fly any more? (234 comments)

Re "Point is, if they want you on 'a list', they'll put you on the list, no matter what you do or don't do."
Reworking the old Soviet "owning a western watch" joke:
Three frequent flyers in a military prison get to talking about why they are there.
"I am here because I always got to airport five minutes late, and they charged me with sneaking in", says the first.
"I am here because I kept getting to airport 2 hours early, and they charged me with spying" says the second.
"I am here because I got to airport on time," says the third, "and they charged me with owning a watch."

yesterday
top

The Secret Government Rulebook For Labeling You a Terrorist

AHuxley Actually, (234 comments)

Thats interesting AC but recall the FBI infiltration program called Patcon (Patriot Conspiracy) around 1991?
The laws, funding, interest was always ready. This new more simple legal listing is just a new next step to gather more people onto new and existing databases.
Patriot Games
http://www.foreignpolicy.com/a...
If you want to go back further you had Project MINARET http://en.wikipedia.org/wiki/P...
i.e. "watch lists" of American citizens around 1967 and 1973.
No judicial oversight, no warrants for interception and even got some UK help too :)

yesterday
top

The Secret Government Rulebook For Labeling You a Terrorist

AHuxley Re:Slashdot Users (234 comments)

Re:"Face it, this site and it's users aren't even on their radar."
Yes we are AC
Recall Quantum insert? "GCHQ Created Spoofed LinkedIn and Slashdot Sites To Serve Malware"
http://news.slashdot.org/story...
http://arstechnica.com/tech-po... (Nov 11 2013)
We are of interest to some part of the intelligence alliance comprising Australia, Canada, New Zealand, the United Kingdom and the United States. What one nation finds is shared with the other 5 :) (and a few other nations too)

yesterday
top

Black Hat Presentation On Tor Cancelled, Developers Working on Bug Fix

AHuxley Re:popular online privacy tool Tor (50 comments)

Re Since when is Tor popular?
Think back to the mid/late 1990's as the start point for some onion routing topics.
Naval Research Labs Review had the 1997 paper "Private Web Browsing".
Would early/mid 2000 be another interesting time? The funding, grants, press where in place by 2005. More grants over 2007-2010+

2 days ago
top

Black Hat Presentation On Tor Cancelled, Developers Working on Bug Fix

AHuxley Re:TOR is actually sponsored by Uncle Sam (50 comments)

Follow the funding back in the day (Office of Naval Research and DARPA), understand the funding for the huge costly, fast exit nodes in the US early on.
The origins where for open source intelligence gathering by the US mil and the US gov support of "freedom fighters" spreading democracy.
The main issue early on was any user of the tech would be seen as a tool of the US gov. Not good if emerging human intelligence stands out on any telco system.
How was this set back to be fixed? By flooding the network with diverse users globally and offering free bandwidth, better speed and pushing the an open source grassroots technology front.
The press, dissidents and whistleblowers, all kinds of sites started to spread news about wanting to help people the in repressive countries.
ie a large group of users had to be created allow gov users to hide and help with the node/relay.
Carefully crafted news dropped the military and intelligence origins and pushed the press, First Amendment, dissidents, protected speech side.
Follow the early grants back ie "Pass-Through" funding.
Terms like '“Basic and Applied Research and Development in Areas Relating to the Navy Command, Control, Communications, Computers, Intelligence, Surveillance, and Reconnaissance.”" seems to be floating around.
Finally we got to Snowden and the Stinks page. "Critical mass" - the users are all on the same network, and we are back to the fast exit relays question.
Follow the few law enforcement stories, if you have all data moving out of a network, around the world a few times and then back into the same network?
Its simple to find the in ip, back from the message sent. We also now know that the "internet" in some countries is a known network Tempora https://en.wikipedia.org/wiki/... and XKeyscore http://daserste.ndr.de/panoram...

2 days ago
top

For Now, UK Online Pirates Will Get 4 Warnings -- And That's It

AHuxley Re:Warnings are discoverable ... (141 comments)

Thats a lot of cash to just spend on letters and a database. The letters get tracking and logging started within a legal gov framework. Someone seems to see a long term plan with the letters and logging funding. The chilling effect of just knowing your in a database and all your net use is been reviewed? Interconnected local databases? A digital version of the classic anti-social behaviour order (ASBO) at a 'community-based level?
That could see a vast network of watching, logging, reporting and costly face to face meetings with some 'injunction' that flows to a criminal offence if breached.
A lot of free support from tax payers for a new more very local ACTA :)

2 days ago
top

For Now, UK Online Pirates Will Get 4 Warnings -- And That's It

AHuxley Re:4 warnings per? (141 comments)

A per year quota that uses your details as the only unique information? Your address, isp can change but the count stays with you as the person who signed up with that isp and ip as found.

2 days ago
top

For Now, UK Online Pirates Will Get 4 Warnings -- And That's It

AHuxley Re:Warnings are discoverable ... (141 comments)

Yes the 4 letters show a history of infringement and the isp's can show bandwidth use too. Its the legal cover for the hard part of traditional cases for free via a stored database of letters sent.
Some nice political cover and colour of law. They only want to educate you with warnings.
Its the lawyers that take the final step to seek an identity. The gov and providers can walk away from any long term logging questions. Months of stored logs are just for the 4 letter compliance.

2 days ago
top

Experiment Shows People Exposed To East German Socialism Cheat More

AHuxley Re:let me correct that for you. (605 comments)

AC its just post ww2 branding. When the Soviet military looked around for people it could trust it had to find people who where not killed by ww2 "Fascist" Germany and would want to support East Germany. A bit like the Neocons/Trotskyist in the USA - you work with what you have and shape it over a few generations.
Fascist as a slogan solved all the generational ww2 problems for the emerging East German. Every old person was tainted by it. The next East Germans could be seen as safer as they where shaped by the new gov. In this role of undoing the harm "Fascist" Germany had done to Germany, wider Europe and Soviet Union great care was taken with domestic branding to make young and old understood what the price of rebuilding from rubble was all about - stopping "Fascist" Germany from reforming and going to war again.
The old people just wanted to forget the war and rebuild, the young people on average thought a new nation not at war was a nice change considering what Germany was like.
So to an average outside person looking in, reading books and picking up words you would see the terms "Anti-Fascist" a lot. You would see aid to Africa/Asia as been socialist. You would read about East Germany spending vast sums on support to back "socialist" revolutions, science, sport, space.
Deep down the Stasi knew the truth. The Soviet Union was paying real cash to rebuild East Germany, they where always going to be in debt, a post ww2 political bargaining chip.
The slogans fooled the West, the public, a few AC's on slashdot and provided nation building. The Stasi understood reality they where in - they needed real hard currency, needed to rebuild and needed to project a nation of science, wealth, sport, 3rd world aid, space science, nuclear power... but had no cash, just huge loans and some export deals with huge sneaky Western brands seeking very cheap workers. The Stasi also worked out one vital fact. The Soviet Union would never protect them long term, East Germany was for sale to the West. Price was the only question. So the Stasi worked hard to keep their power knowing their nation was all they had. Anti-Fascist aspect kept Russia happy and Russian support flowing, "socialist" worked well in their part of the world. The rest is just West Germany playing its own games with the US and UK for extra support. The real "Fascist" escaped with Operation Paperclip https://en.wikipedia.org/wiki/..., worked without issue in West Germany or at a low level faced tame courts many years after ww2.
In the East Germany they just replaced the old uniforms, found new songs and added new colors to the mass rallies with new "socialist" books to quote.
There is often a lot more behind terms like "Anti-Fascist Protection Rampart" than just found in "Cold" War history books AC.

2 days ago
top

Experiment Shows People Exposed To East German Socialism Cheat More

AHuxley Re:Money (605 comments)

Money was not really the issue. A nice home, a good education, travel papers to the West (not been restricted only to the East/Soviet Union) was a real goal worth attempting and protecting.
The problem was even if you put in the hard work, stayed loyal to the gov and its meetings, had the skills you might not be able to escape your parents pasts.
ie same skills, age, level of trust to a point but if your parents where pre ww2 wealthy you might not get anywhere out of the East.
ie if you got to work in the West the gov kept your family back and watched you. Any issues and your lost that paperwork.
As things got more relaxed with visits from the West people could get small gifts in. Very strange that this study got pushed onto Slashdot by an AC :)

2 days ago
top

Experiment Shows People Exposed To East German Socialism Cheat More

AHuxley Re:Classic game theory ? (605 comments)

AC if you actually saw an East German factory or product you would note the lack of 'automation'. A few areas that needed tech eg computer design and lens work got the top quality hardware support. The rest of East Germany was left to its own 1950's devices. The East German work force was rather dynamic post WW2 as the people who did not escape kept tiny workshops and firms at first. They produced what they has always made for the gov but where left alone as to how. Later the East German gov reached in and closed all the small brands and firms, pulling them together as vast regional efforts (1970's on). All the ability to over or under produce was lost as well as any advancement in the way things where produced. People got jobs, went to work, did them, went to political meetings and then went home. That was it. There was not much "automation" as that would cost real cash, need cash for spare parts and replace workers who needed jobs for life.
East Germany did not have the spare cash to just waste on automation. They would have had to take out huge loans, import the tech, import the skills, keep it running and then export the results to pay the huge loans back in a real currency. The exception was Western brands invited in to use the workers in the East to make products for export and then share the extra profits with East Germany gov. But that kind of spoils the "Communism" propaganda spin AC. A lot of cash was made like that but it shows a nice cash flow interconnect between East and West that does not fit into the Wall and free West propaganda.

2 days ago
top

Activist Group Sues US Border Agency Over New, Vast Intelligence System

AHuxley Re:Why oppose this? (82 comments)

The US tried that for a very short time under Nixon https://en.wikipedia.org/wiki/.... A massive movement of staff to secure the border was in place and worked very well.
The flow of drugs, drug money laundering in US banks and illegal labor was at risk. Over time the US returned to a policy that can be seen today.
A free flow of people, goods and the need for expensive financial instruments ensures wonderful regional profit.
The UK was a great example too with its visa "expires" database. The UK forgot how/why to count visa in and visa out (was International Passenger Survey).
The main reason seems to be a super cheap flow of workers and the UK will try and bring back "exit checks" in a year or so :)
As for US policy - cheap workers with no on site wage or health laws was always the big win to keep wide open boarders for decades.

3 days ago
top

The Loophole Obscuring Facebook and Google's Transparency Reports

AHuxley Mutual Legal Assistance Treaty (18 comments)

Seems Switzerland was first in 1977 (common law nation and a civil law nation). Seem about more than 60? countries have some form of judicial assistance treaties with the USA. ie direct communication between Justice Departments.
It will be interesting to see what the Freedom of information requests turn up. The "the company's choice whether or not to respond" .. "And they often will" and the lack of interest to place the numbers on "transparency reports" is chilling.
Seems the option is slow but "requests specifically for computer records increasing ten-fold" would point to some long term interest in this method.

3 days ago
top

Snowden Seeks To Develop Anti-Surveillance Technologies

AHuxley Re:Don't you want to be a traitor too? (129 comments)

How many more wars?
As for 'if the Germans knew about it." is the classic understanding of ww2 crypto. Germany trusted the machine, upgraded it a bit and had all its spies turned.
Lets take Normandy. Army Group B has some idea, Pz Lehr Division was moved, Germany had a spy near the British ambassador to Turkey, the Royal Navy had lost aspects to its low level codes, British railroads codes had been lost by late 1943, the German airforce saw changes in US and UK practice traffic, US Transport Command lost its codes, US M-209 and M-138 strip traffic was not totally secure, the A-3 A-3 speech scrambler was not so great, the Polish government in exile had code issues, a few German spies still existed in Sweden and Portugal, SIS-SOE agents where under watch in France
ie Germans moved units to Normandy.
As for "Enigma type machine encrypted messages" post ww2, the Soviet Union had a good understanding of the UK via humans. The Soviet Union was also moving to much tighter one time pad use as it fully understood its code reuse was a huge fault. But they had so much intel to send, they had few options but to risk it.
If govs cant get to one main code, they go for the weak ones, they go for people, they go for the weak codes that get used all day in sloppy ways.
For all the Enigma faith, Germany seemed to understand something was not perfect and worked hard to try and stay ahead.
New rotors, wheel permutations, random indicators, protections to counter cribbing, CY procedure, Uhr device, the UKW-D reflector but it all failed as cryptologic security was so split up. But people keep the old WW2 stories about Germany, Russia, Finland, Australia, Japan code work as just been all safe or all broken.
Post ww2 is filled with new advances and attempts by the UK and US. All very interesting, great in the new history books as more papers are released.
So for that Enigma vision we all give up our rights via an oath to authority for generations?
The talks did cover the authority and rights, press aspect in the last 30 mins.

3 days ago
top

Snowden Seeks To Develop Anti-Surveillance Technologies

AHuxley Re:Kinda Like Mega (129 comments)

Thats what the talks mentioned too, a set of small steps. Encryption but the wisdom to understand the networks as they are now.

3 days ago
top

Snowden Seeks To Develop Anti-Surveillance Technologies

AHuxley Re:soviet era crypto (129 comments)

1+ for 'So forget crypto as a privacy device, unless you're prepared to make it yourself, test in yourself, and be responsible for it yourself. The only unbreakable crypto is the (TRULY F'ING RANDOM) one-time pad, and only if it's used correctly."
Thats really the only way, one time pad used once, number stations. The key to all the free quality crypto was that all the press where been watched anyway so you get to encode all you want. The moment you send, attempt contact, its just tracked back. No need for a gov to waste time on the decrypt, just watch for encryption been used and all the press. Then get the hardware, software and the plain text before its encoded.

3 days ago

Submissions

top

NSA Admits Retaining Snowden Emails, no FOIA for US press

AHuxley AHuxley writes  |  about two weeks ago

AHuxley (892839) writes "The http://thedesk.matthewkeys.net... reports on a FOIA request covering "... all e-mails sent by Edward Snowden"
Remember how Snowden should have raised his concerns with his superiors within the NSA?
Remember how no such communication could be found?
Remember how one such communication was released but did not seem to be raising direct concerns?
Well some record of e-mail communications seems to exist but they are exempt from public disclosure under the federal Freedom of Information Act."

Link to Original Source
top

Australian police use telocs for cell "tower dump" of all connected users data

AHuxley AHuxley writes  |  about two weeks ago

AHuxley (892839) writes "The Sydney Morning Herald is reporting that Australian federal and state police are using a no warrant cell phone tower metadata access technique called a "tower dump". A "tower dump" provides the identity, activity and location of all cell phones that connect a cellphone tower(s) over time (an hour or two). The metadata from thousands of phones and numbers connected are then sorted. Australian law-enforcement agencies made 330,000 requests for metadata in 2012-13.
Some US views on the same legal issues:
Judge Questions Tools That Grab Cellphone Data on Innocent People (Oct 22, 2012)
http://blogs.wsj.com/digits/20...
Will Telcos Follow ISPs and Extend Warrant Protection for All? (JUNE 17, 2014)
https://www.eff.org/deeplinks/...
"Lawsuit seeks details on Chicago Police purchases of cellular tracking gear" (June 10, 2014)
http://www.suntimes.com/news/m...
"Records from more than 125 police agencies in 33 states revealed one in four used a tactic called a “tower dump,”....""

Link to Original Source
top

The US legal system and secret laws: FOIA vs OLC, FBI, CIA?

AHuxley AHuxley writes  |  about 6 months ago

AHuxley (892839) writes "Follow the ongoing EFF work on obtaining a document FOIA (Freedom of Information Act) requests have found to be exempt under "internal deliberations".
Are secret laws been used to provide more cover for a CIA's $10 million telco record deal?
Welcome to the world of past telco exigent letters and National Security Letters.
"FBI Replaced Legal Process with Post-It Notes to Obtain Phone Records"
https://www.eff.org/deeplinks/2010/01/fbi-replaced-legal-process-post-it-notes-obtain-ph
http://www.techdirt.com/articles/20131107/13445725172/so-much-nsa-chiefs-offer-to-store-data-neutral-site-att-receiving-10-millionyr-cia-phone-records.shtml
http://www.techdirt.com/articles/20100121/1418107862.shtml http://www.techdirt.com/articles/20100121/1418107862.shtml"

Link to Original Source
top

Mystery of 1000's of FBI documents posted to US press in 1971 solved

AHuxley AHuxley writes  |  about 7 months ago

AHuxley (892839) writes "A team of eight antiwar activists broke into an FBI office in Media, Pennsylvania and removed at least 1000 documents.
Once removed and sorted, the bulk of the files showed FBI spying on US political groups. Cointelpro had been found.
43 year later more details about how the anonymously packages ended up with select US reporters weeks later.
Years later the full extent of COINTELPRO (COunter INTELligence PROgram) was finally understood.
http://en.wikipedia.org/wiki/COINTELPRO"

Link to Original Source
top

US mil drone visions to 2038: groups, more AI, lower costs, exports.

AHuxley AHuxley writes  |  about 7 months ago

AHuxley (892839) writes "The US Department of Defense (DoD) has released a 150 page document covering its vision for the future role of unmanned systems.
The report mostly covers drones (unmanned aerial systems) use but offers insight into land, and sea technology too.
Pre-programmed tasks, new algorithms, more sensors, and complex machine learning will be advanced to help try and reduce projected funding needs. For example humans will not be needed for the duration of the mission until a drone swarm is released. The need to shape cultural hurdles, standards, and export regulations around the use of drones will also be worked on.
pdf at http://www.defense.gov/news/newsarticle.aspx?id=121392 or
http://publicintelligence.net/dod-unmanned-systems-2013/"

Link to Original Source
top

US federal judge on laptop search laws at U.S. borders

AHuxley AHuxley writes  |  about 7 months ago

AHuxley (892839) writes "The American Civil Liberties Union sought to challenge the Ul legal "border exemption" three years ago.
Can your laptop be seized and searched at the border?
A 32 page decision provides new legal insight into legal thinking around suspicion less searches, making copies, keeping copies.
"think twice about the information you carry on your laptop.."
“Is it really necessary to have so much information accessible to you on your computer?”
i.e. your electronic devices searchable and sizeable for any reason at the U.S. border.
ACLU may appeal. The decision: https://www.aclu.org/sites/default/files/assets/abidor_decision.pdf Also note the Kool-Aid comment."

Link to Original Source
top

Pentagon could remove US Cyber Command from the NSA

AHuxley AHuxley writes  |  about 9 months ago

AHuxley (892839) writes "USCYBERCOM was a powerful new command to conduct full spectrum military cyberspace operations created in 2006 and reached full operational capability by late 2010.
Could CYBERCOM be returning to its US military origin away from public spotlight of its more civilian setting in the NSA via the Director of National Intelligence (DNI)?
The NSA may have its powers returned to that of keeping US codes safe, ensuring international cryptography is useless, spying and its ongoing US domestic surveillance duties. The newer, coveted global operations role hidden before more relations by Snowden, other whistleblowers or investigative journalists induce public hearings?
Cyber Commands “offensive” operations on the Internet would then be secure form hearings, investigations or any new laws or limits.
Will part of the US mil get their offensive cyber warfare role back from an agency that gained many new roles in a very short time frame and much publicly?
Expect to see the spin of many classic sock puppets with good news stories about why the NSA needs its new powers to reach out globally and within the USA e.g.
http://www.zerohedge.com/news/2013-10-31/document-reveals-official-nsa-talking-points-use-911-attacks-sound-bite
Some links about the role, formation and use of Cyber Command can be found at https://en.wikipedia.org/wiki/United_States_Cyber_Command"

Link to Original Source
top

Thomas Drake NSA whistleblower on allies and US rights

AHuxley AHuxley writes  |  about 9 months ago

AHuxley (892839) writes "Thomas Drake a decorated United States air force, navy veteran and whistleblower from a position as a senior executive at America's National Security Agency.
His views on the 4th amendment, the foreign intelligence surveillance act and the role of an extraordinarily broad dragnet of electronic surveillance in the US.
The interview talks about countries going along with US surveillance as they feel they will never be caught and the telco tech is in place."

Link to Original Source
top

NSA Cold War domestic operations declassified

AHuxley AHuxley writes  |  about 10 months ago

AHuxley (892839) writes "With the US trying to understand the domestic role of their foreign intelligence and counterintelligence services in 2013, what can a declassified look back into the 1960's and 1970's add to the ongoing legal debate? Welcome to the world of Interagency Security Classification Appeals Panel and the work done by the National Security Archive at George Washington University. Read about prominent anti-war critics and US senators been tracked and who was on the late 1960's NSA watch list. From Rev. Martin Luther King to civil rights leader Whitney Young, boxer Muhammad Ali, Tom Wicker, the Washington bureau chief and Washington Post columnist Art Buchwald, Sen. Howard Baker (R-Tenn.). The NSA was aware of the legality of its work and removed all logos or classification markings, using the term 'For Background Use Only". Even back then NSA director at the time, Lew Allen noted: “appeared to be a possible violation of constitutional guarantees,” page 86:
via http://www2.gwu.edu/~nsarchiv/NSAEBB/NSAEBB441/docs/doc%205%202008-021%20Burr%20Release%20Document%202%20-%20Part%20B.pdf
What did the NSA think about signals intelligence sites in your country? See if your country makes the "indefinite" list on page 392:
http://www2.gwu.edu/~nsarchiv/NSAEBB/NSAEBB441/docs/doc%201%202008-021%20Burr%20Release%20Document%201%20-%20Part%20A2.pdf"

Link to Original Source
top

Australia, NZ to get NSA GCHQ net encryption access too

AHuxley AHuxley writes  |  about 10 months ago

AHuxley (892839) writes "Slashdot readers have seen and commented on the news surrounding internet encryption and who can get access.
The Sydney Morning Herald is reporting that the Australian Signals Directorate (was Defence Signals Directorate, DSD) and New Zealand's GCSB are expected to invited into the same initiative."

Link to Original Source
top

Australian gov Ok with NSA spying

AHuxley AHuxley writes  |  about a year ago

AHuxley (892839) writes "Australia’s Foreign Minister Bob Carr seems to be fine with US international data collection (spying) with the help of US consumer hardware, telcos and software vendors by the NSA (National Security Agency). It would seem the protections offered to all US citizens under the US "Bill of Rights and its Supreme Court, on where individuals stand in relationship to Government" will some how be offered to or balance out Australian law on privacy and data protection. Will a "lively political system" in the USA look after the privacy of Australians?
Network Ten’s Meet the Press program has the text of the interview here http://resources.news.com.au/files/2013/06/09/1226660/835253-meet-the-press-transcript.pdf"

Link to Original Source
top

Using social media about military operations make you a target?

AHuxley AHuxley writes  |  about a year and a half ago

AHuxley (892839) writes "Could using social media or blog comments about any military operation make you a legal military target? Australian army Land Warfare Studies Centre analyst Chloe Diggins looks at what could make a web 2.0 user a combatant.
The Geneva Convention protecting civilians could be removed if a power feels uploading, downloading or sharing is part of the fight. How long before "knowingly providing material support or resources to an entity that has been designated as Foreign Terrorist Organizations under section 219 of the Immigration and Nationality Act." becomes just "providing material support or resources to an entity that has been designated""

Link to Original Source
top

US seeking a 15.7% levy on submarine cable operators

AHuxley AHuxley writes  |  about 2 years ago

AHuxley (892839) writes "The US Federal Communications Commission (FCC) is considering an expansion to the Universal Service Fund. Submarine cable operators with landings in the United States could face a 15.7 percent levy on quarterly revenues. Some history on US telco rates can be found at: http://www.commsday.com/commsday/2012/comment-bad-timing-proposed-undersea-cable-tax/"
Link to Original Source
top

OzLog: unlimited private data retention for Oz law

AHuxley AHuxley writes  |  more than 2 years ago

AHuxley (892839) writes "delimiter.com.au has news on ISP data retention ideas in Australia.
Australia would like to follow the EU down the "European Directive on Data Retention" path.
Australian law enforcement agencies may have the option to request a log of all a users of interest telco usage without any review or time limits.
Another option would be for local politics eg. an activist community. Data retention over a postcode (suburb).
The data collection could also be out sourced to private contractors."

Link to Original Source
top

What did your telco sell in Bahrain?

AHuxley AHuxley writes  |  more than 2 years ago

AHuxley (892839) writes "Follow the trial of interception technology as it is exported and supported around the world.
Documentation is divested and NDA's protect the deals done by telcos. Western-made and supported surveillance software offers tracking and transcripts that end in windowless rooms and torture."

Link to Original Source
top

RIM CEO on BBC: India and Middle East

AHuxley AHuxley writes  |  more than 3 years ago

AHuxley (892839) writes "Recall:
http://mobile.slashdot.org/story/10/10/08/1454237/UAE-Says-RIM-Played-Ball-Will-Maintain-Service
http://mobile.slashdot.org/story/10/08/27/2137241/BlackBerry-Battle-In-India-Going-Down-To-the-Wire
http://yro.slashdot.org/story/10/08/07/1625245/Saudi-Says-RIM-Deal-Reached-BlackBerry-OK-If-We-Can-Read-the-Messages
http://yro.slashdot.org/story/10/08/07/1625245/Saudi-Says-RIM-Deal-Reached-BlackBerry-OK-If-We-Can-Read-the-Messages ?
Well try to forget, its really really unfair and a matter of national security."

Link to Original Source
top

The top 100 IT suppliers to the UK gov for 2009-10

AHuxley AHuxley writes  |  more than 3 years ago

AHuxley (892839) writes "Using Freedom of Information requests the Guardian has listed how the UK are spending £42bn on IT.
12 departments and two non-departmental bodies.
On the top are BAE Systems and Detica. Hewlett Packard is third getting £1.63bn from five departments. GCHQ has an exemption."

Link to Original Source
top

NSA jobs vs Silicon Valley over the next 10 years?

AHuxley AHuxley writes  |  more than 3 years ago

AHuxley (892839) writes "The hometownannapolis reports on a new cyber curriculum at a local high school to feed the ever growing needs of the NSA and Cyber Command.
A quote from Dutch Ruppersberger (D-MD) about job growth in the local national security sector stands out: “In 10 years, we will be larger than Silicon Valley,” Could the new funding for the expansion of the National Security Agency and the Army's new Cyber Command be the next big growth area for the US?"

Link to Original Source
top

Lockheed Martin's secret UK Census building

AHuxley AHuxley writes  |  more than 3 years ago

AHuxley (892839) writes "secret-bases.co.uk reports: Back in early 2010, Lockheed Martin – the prime contractor for the UK Census programme starting on 27th March 2011 – acquired a "secret" building on a 30-month lease for use as the data processing centre for uploaded census forms. The location was found after a senior Lockheed Martin / UK Data Capture employee registered an associated domain on a server whose IP address network, belonging to Lockheed Martin, was itself registered to the precise address of the building. The US spelling of "centre" was also noted."
Link to Original Source

Journals

top

Glenn Greenwald Keynote 30c3

AHuxley AHuxley writes  |  about 7 months ago http://www.dw.de/glenn-greenwald-calls-for-snowden-asylum-at-chaos-computer-club-congress/a-17327867
https://soundcloud.com/dlf-wissenschaft/keynote-glenn-greenwald-30c3
Into details of Hong kong - understanding TrueCrypt use.
World understanding about protecting own security, notes more PGP use in his email.
Limits on US surveillance, debate, political, legal reform - PR.
Secret court oversight - rubber stamp, role of generations of gov loyalists.
Hope with skills of the developers of encryption to protect communications - slows down rate of privacy loss.
PR of been seen at hacker events by US gov officials.
Will **you** work to help destroy privacy?
Act of conscience is spreading - Chelsea Manning, Daniel Ellsberg, wikileaks,
Price of transparency - gov punishment vs growing lists of whistleblowers -effective use of fear
Inspiration of more whistleblowers?
EU leaders greatly helped by Snowden news but not willing to help Snowden.
New book - role of free press vs tame US/UK media, gov false claims to public
Iraq war reflections, Snowden first doc.
http://en.wikipedia.org/wiki/Boundless_Informant
Tame media, no oversight, US/UK media
Five eyes - no more privacy globally for electronic communications.
Q&A:
All communications tracked by govs, motivation - economic, politically - down to one goal: power.
What to release - powerful debate, interest - 6 months into, more on way.
True face of UK gov vs press freedom - now a joke.
German gov support of NSA - no change to German policy

top

Australian intelligence on cyber security, data acquisition, the private sector.

AHuxley AHuxley writes  |  more than 2 years ago http://www.asio.gov.au/Publications/Public-Statements/2012/24-Jan-2012-Sydney-Institute.html An interesting paper on the "malicious by-product, of the information technology age"
Are the Australian public gradually become aware of their own privacy as they use information technology?

top

NewsRight and your next /. story link?

AHuxley AHuxley writes  |  more than 2 years ago With http://paidcontent.org/article/419-newsright-launches-with-29-publishers-not-a-litigation-shop/ seeking to set up "business relationships and contracts" for their online content.
Could it be time for a link database to see if a link been posted goes back to a NewsRight member?

top

Bungies 1998 Myth 2 (private) beta Linux testing

AHuxley AHuxley writes  |  more than 3 years ago http://tain.totalcodex.net/forum/viewtopic.php?f=2&t=5451#p53236
Myth 2 was a 1998 real-time tactics computer game for the PC/Macintosh (and in the past Linux).
A new native Linux executable version of 1.7.2 (current Mac/Win) seems to be in testing.

top

Kentucky police search homes without a warrant based on smell/sounds

AHuxley AHuxley writes  |  more than 3 years ago The nytimes reports on how Justices Look Again at How Police May Search Homes after a case in Kentucky where police smelled burning marijuana coming from an apartment and kicked the door in.
Justice Kagan said, âoeis going to enable the police to penetrate the home, to search the home, without a warrant, without going to see a magistrate, in a very wide variety of cases.â
"He said a sensible criminal would answer the door but decline to let the police enter without a warrant."

top

New zero-day hole in Flash Player

AHuxley AHuxley writes  |  more than 3 years ago http://news.cnet.com/8301-27080_3-20016301-245.html
A new zero-day hole in Flash Player that reportedly is being exploited in the wild and could allow an attacker to take control of a computer.
The critical vulnerability affects Adobe Flash Player 10.1.82.76 and earlier versions for Windows, Mac, Linux, Solaris, and Android.
It also affects Adobe Reader 9.3.4 and earlier version for Windows, Mac, and Unix and Adobe Acrobat 9.3.4 and earlier versions for Windows and Mac.

top

Apple's Facetime Open standards, closed link?

AHuxley AHuxley writes  |  more than 3 years ago Was just reading http://herot.typepad.com/cherot/2010/06/iphone-facetime-protocol.html that links to
http://www.packetstan.com/2010/07/special-look-face-time-part-1.html
http://www.packetstan.com/2010/07/special-look-face-time-part-2-sip-and.html
http://www.packetstan.com/2010/07/special-look-face-time-part-3-call.html
The "client-side SSL certificate, giving Apple the ability to grant or deny access on a per-device basis" is known, but has anything changed with the new touch?

top

OS X, Disk Utility and the 3 strange ip's

AHuxley AHuxley writes  |  more than 3 years ago Last night I was reading http://www.theregister.co.uk/2010/09/09/ios_4_dot_1_jailbreak/
I clicked on the " was first announced by" link to http://twitter.com/pod2g/status/23950781610
Suddenly "Disk Utility" starts up and Little Snitch shows connections to "business.twitter.com" and the 3 ip's
128.242.245.116, 128.242.245.20, 128.242.245.212
http://img138.imageshack.us/img138/6296/duip.jpg
2010-09-09 22:12:32 +0930: Checksumming âoe23950781610â using UDIF-CRC32 was also recorded in the Disk Utility log.
Disk Utility is a utility created by Apple for performing disk-related tasks in Mac OS X.
Little Snitch is a software outgoing firewall for Mac OS X.
Any ideas? Thanks.

top

Legality of Oz net filter trials?

AHuxley AHuxley writes  |  about 4 years ago http://www.zdnet.com.au/net-filter-trials-unlawful-claims-engineer-339304184.htm

An Australia network engineer Mark Newton has been asking about the intercepted customers' internet traffic aspect of the Australian filter trial. Australia seems to be using a Marshall R3000 series for web monitoring, filtering and reporting.
This may breached section 7(1)(b) of the Telecommunications (Interception and Access) Act 1979. by "authorising, suffering or permitting said equipment to be used in that manner".
""A copy of every single packet of data generated by an end user and sent to the internet is supplied to a network switch's 'mirrored port' and forwarded to whatever device is connected to it," Newton told the department. "Although the vendor makes the unverified claim that the R3000 only 'inspects' outgoing web requests and, in those requests, only examines destination URLs, a complete transcript of all internet data is nevertheless supplied to the R3000 for monitoring."
" The department continues to believe its internet filtering live trials had not breached the Act.
More on the filter trail tech used in Australia http://www.arnnet.com.au/article/307138/internet_filter_isps_reveal_clean-filter_technologies/?fp=16&fpid=1

top

Oz telco network maps a security risk

AHuxley AHuxley writes  |  about 4 years ago zdnet writes Telstra and Optus say a proposal by the Australian Competition and Consumer Commission (ACCC) to publish infrastructure location information could be a risk to security.
Telstra said in its response to the discussion that only limited infrastructure information should be published to carriers and carriage service providers and should not be given to the general public.
Telstra notes "persons â" both within Australia and overseas â" determined to assault the public health and safety of Australian people and institutions, could access publicly available certain telecommunications network information to precisely identify points of access to the network."
Is someone worried the public will add up the costs of a low redundancy choke points in the telco network and ask where all the cash went? Does Australia need a Sean Gorman to map our networks?
http://www.wired.com/wired/archive/12.01/start.html?pg=10

top

Pentagon tries mind-control in Afghanistan

AHuxley AHuxley writes  |  about 4 years ago http://www.wired.com/dangerroom/2010/06/to-reach-afghans-pentagon-drafts-mimes-storytellers-wizard-of-oz/#more-26471
Mind-control and social engineering keeps the masses in the USA passive and stuck in their own little worlds.
So the Pentagon is trying to convince Afghanistan to accept endless advertising, mass media, polls, celebrities and sports figures in a culturally-specific narrative.
Pentagon-funded researchers are building computer models of how the societies of Afghanistan and Iraq work http://www.wired.com/dangerroom/2009/03/darpas-social-s/
and releasing neuroscientists, artificial intelligence specialists, and gadgeteers for real world testing.
A demo will start vis Wizard of Oz and then allow the US to roll out ideas for grass roots organizing and collective decision making.
Someone dust off the Vietnam era http://en.wikipedia.org/wiki/Civil_Operations_and_Revolutionary_Development_Support for the web 2.0 generation?

top

Police push to continue warrantless cell tracking

AHuxley AHuxley writes  |  about 4 years ago http://news.cnet.com/8301-31921_3-20008941-281.html
"A law requiring police to obtain a search warrant before tracking Americans' cell phones may imperil criminal investigations and endanger children's lives, a law enforcement representative told Congress this week."
"Obtaining a search warrant when monitoring the whereabouts of someone "who may be attempting to victimize a child over the Internet will have a significant slowing effect on the processing of child exploitation leads," said Richard Littlehale of the Tennessee Bureau of Investigation. "If that is acceptable, so be it, but it is a downstream effect that must be considered.""
"Connecticut federal judge shows that the FBI monitored the whereabouts of about 180 cell phones--without a warrant--while conducting surveillance of two men suspected of robbing local banks."

top

Windows Messenger 4: No video for you!

AHuxley AHuxley writes  |  about 4 years ago http://arstechnica.com/microsoft/news/2010/06/windows-live-messenger-wave-4-almost-excellent-fatally-flawed.ars
"Video Call" is obviously more limited. If one party has no webcam, there's no Video Call option. If one party doesn't want to broadcast their webcam, or their microphone, video call isn't an option. And yet the new Messenger discards the basic webcam features. It's video call or nothing. I have nothing against Video Calls, and use the feature from time to time. But I use the basic webcam capabilities more. It's not a bug. It's not an accidental omission. It's a deliberate decision by Microsoft: the new Messenger will have only one webcam mode, and it's Video Call. The company claims that by concentrating on one webcam mode they can make it better. Apparently the picture quality is improved." Why not just use a mic icon if you have sound only? Yahoo, tinychat ect let the users use any audio, visual or text chat they like and it all works fine from adsl 2+ to 56k, 1 on 1 or groups.

top

Bing-Zune integration still not working

AHuxley AHuxley writes  |  about 4 years ago http://news.cnet.com/8301-13526_3-20008931-27.html
"this time, the player told me that I needed to enable application storage in my version of the Silverlight player. (Silverlight is a Microsoft platform for creating rich Internet applications, like audio and video, and basically competes with Adobe's Flash.) A casual user would have given up, but having a professional interest in the feature, I followed the instructions on the screen, only to find that my copy of Silverlight already had the box checked to enable application storage. Sigh. I unchecked and rechecked it. Still no luck. "

top

More on Google remote app wipe

AHuxley AHuxley writes  |  about 4 years ago http://news.cnet.com/8301-27080_3-20008922-245.html
Google has remotely removed two free apps from several hundred Android phones because the apps misrepresented their purpose and thus violated Android developer policies, according to a company spokesman.
"The apps "were not designed to be used maliciously, and did not have permission to access private data--or system resources" beyond accessing the Internet, Rich Cannings, Android Security Lead, wrote in at http://android-developers.blogspot.com/2010/06/exercising-our-remote-application.html

top

Stephen Conroy saved by by sensitive negotiations?

AHuxley AHuxley writes  |  more than 4 years ago http://www.crn.com.au/News/217702,ludlam-change-in-comms-ministry-unlikely.aspx
From Communications spokesperson Senator Scott Ludlam "a change in Communications Ministers is "really unlikely".., due to difficulties in handing over the Department of Broadband, Communications and the Digital Economy (DBCDE) while significant, sensitive Telstra and NBN Co dealings take place."

top

You Don’t Want ISPs to Innovate

AHuxley AHuxley writes  |  more than 4 years ago http://www.wired.com/epicenter/2010/06/you-dont-want-isps-to-innovate/
"Building out infrastructure means redirecting stock-dividend dollars and putting them back into the company, which Wall Street punishes companies for â" and which hurts the massive stock packages of telecom executives. Itâ(TM)s literally not in telecom executivesâ(TM) best interest to invest in broadband and solid networks."

top

Next WikiLeaks Release May Involve ECHELON

AHuxley AHuxley writes  |  more than 4 years ago

http://www.abc.net.au/news/stories/2010/06/22/2933892.htm
He agreed it would be of the "calibre" of publishing information about the way the top secret Echelon system - the US-UK electronic spying network which eavesdrops on worldwide communications traffic - had been used.

top

Australian Greens to host anti-filter forum

AHuxley AHuxley writes  |  more than 4 years ago

http://www.itnews.com.au/News/217576,greens-to-host-anti-filter-forum.aspx

top

Fears internet costs will rise due to NBN

AHuxley AHuxley writes  |  more than 4 years ago

http://www.theaustralian.com.au/news/nation/fears-internet-costs-will-rise-due-to-nbn/story-e6frg6nf-1225882485870
"This deal between the NBN and Telstra could make broadband prices much worse for consumers if the NBN Co only decides to lease backhaul from Telstra and leaves the other backhaul providers stranded,"
Great backhaul lock in from one old monopoly to another.

Slashdot Account

Need an Account?

Forgot your password?

Don't worry, we never post anything without your permission.

Submission Text Formatting Tips

We support a small subset of HTML, namely these tags:

  • b
  • i
  • p
  • br
  • a
  • ol
  • ul
  • li
  • dl
  • dt
  • dd
  • em
  • strong
  • tt
  • blockquote
  • div
  • quote
  • ecode

"ecode" can be used for code snippets, for example:

<ecode>    while(1) { do_something(); } </ecode>
Create a Slashdot Account

Loading...