×

Welcome to the Slashdot Beta site -- learn more here. Use the link in the footer or click here to return to the Classic version of Slashdot.

Thank you!

Before you choose to head back to the Classic look of the site, we'd appreciate it if you share your thoughts on the Beta; your feedback is what drives our ongoing development.

Beta is different and we value you taking the time to try it out. Please take a look at the changes we've made in Beta and  learn more about it. Thanks for reading, and for making the site better!

Comments

top

Private Keys Stolen Within Hours From Heartbleed OpenSSL Site

AHuxley Re:https is dead (151 comments)

Hi jon,
How safe are Perfect Forward Security (PFS) and other "per-session" encryption keys from this mess? Thanks

4 days ago
top

NSA Allegedly Exploited Heartbleed

AHuxley Re:It's time we own up to this one (149 comments)

Re even qualified to implement protocols like this. Thats a very interesting point. How many have their tools of the trade via a top university settings and a security clearance option and dependant funding.
Once you start down the math path the classes get smaller and fewer stay for needed years vs lure of private sector telco or unrelated software work.
Most nations really do produce very few with the skills and keep them very happy.
Trips, low level staff to help, good funding, guidance, friendships all just seem to fall into place.
Bringing work home and helping open source could be seen as been an issue later vs students or team members who did open source games or made apps.

about a week ago
top

NSA Allegedly Exploited Heartbleed

AHuxley Re:Allegedly? (149 comments)

Re how did nobody else find out about this until now?
The same reason NATO and other US allies did not understand the NSA Martin and Mitchell defection http://en.wikipedia.org/wiki/M... in 1960 with the press conference saying:
"As we know from our previous experience working at N.S.A., the United States successfully reads the secure communications of more than forty nations, including its own allies."
Embassies, govs and firms went on using the same junk standard crypto hardware over decades of revisions. Some even got to re read their own secure embassy communications 'leaked' to the Western press.
There seems to be something missing on the story of gov, staff and developers when it comes to crypto products.
Skilled EU gov experts handing their own political leaders broken crypto that 5++ other nations can break seems too good to be true over generations.
Junk in the hardware decades, junk in the software decades all for speed, interoperability and after a good sales pitch?
Or a lot of skilled people around the world know and just tell their respective govs to bait the junk communications networks until US political leaders speak out.

about a week ago
top

NSA Allegedly Exploited Heartbleed

AHuxley Re:Conflict of interest (149 comments)

Re How do you propose to separate them? Offense and defense are not really two separate things; if you can do one, you can do the other.
Think back to past presidents views on parts of the the US intelligence community.
JKF had is views on the CIA after the Bay of pigs.
Rockefeller Commission, Church Committee, Pike Committee, Murphy Commission, the Select Committee on Intelligence and the Directorate of Operations events in 1977. The domestic activities, human experimentation issues and need for a ban on assassinations all became public. The CIA changed to technical collection removing a lot of staff.
Then you had joys of the Iran-Contra Affair then onto Intelligence Authorization Act.
The NSA could face the same path due to the loud, public domestic activities around U.S. citizens and persons with U.S. permanent residence. A return to its classic quiet support role around the world vs its new emerging need to play a role or say in offensive direct action roles.
The GCHQ had it right - stay hidden, build a vast tech, political and staff foundation going back generations and never comment on very much.
Recall the end of the Clipper conversations the US gov had with the public over role of US code experts and US exports?
In the end it seemed you could have any crypto you wanted at any price or for free....
The "separate" has to come back to protecting U.S. citizens from a vast life long domestic spying program and global junk US crypto standards.

about a week ago
top

OpenSSL Bug Allows Attackers To Read Memory In 64k Chunks

AHuxley Re:I take it this is a server concern (303 comments)

It really depends on the end game for *you*.
Client data might be used for "full spectrum" efforts e.g. propaganda, deception, mass messaging, pushing stories, spoofing, alias development or psychology.
i.e. the service you use is weekend.
The other aspect is how many groups knew of this crypto trick? The US and just a few friendly govs, their staff, their contractors and any ex staff or staff open to faith or cash needs.
Just another way in :)
http://www.businessweek.com/ar...

about two weeks ago
top

OpenSSL Bug Allows Attackers To Read Memory In 64k Chunks

AHuxley Re:Things are starting to turn around (303 comments)

Re " both models have advantages and disadvantages depending on what the product is, the size of its market, the type of market, etc. and sometimes those advantages can't even be realised"
The problem with a closed source effort is what we saw with Prism http://www.theguardian.com/wor...
The legal system and dev staff stay with the closed source product.
With open source code - when an issue is found days, months, years later it can be corrected, fully understood and fed back into further world wide crypto education.
The other option is to trust known weakened corporate encryption over many new versions and have faith in their legal teams ... just like you did the first few times...
The other emerging aspect is that of US National Security Letters (NSL) for ongoing bulk collection 'efforts' vs a more global open source code.
After Snowden many more people will be looking at crypto, with open source code someone might be able to offer reviewed, tested fixes to junk standards.

about two weeks ago
top

U.S. Supreme Court Declines To Rule On Constitutionality of Bulk Surveillance

AHuxley Re:Please NOTE... (141 comments)

Thats the question, with todays computerized lists, decades of state and federal informants, interconnected fusion centres and war hardened troops all that you need is flimsy legality of local door to door searches.
A knock on the door to surrender all now listed 'illegal' hardware. A truck waiting for a drive to a local reeducation camp would be quick solution for many.
Any people not understanding the lawful request to comply would be re interviewed and their complex views taken into consideration by teams with different skills.
At a later time flat empty blocks of land will become available at affordable prices for redevelopment with local tax breaks.
The past owners having moved away during difficult economic times a few years ago...

about two weeks ago
top

U.S. Supreme Court Declines To Rule On Constitutionality of Bulk Surveillance

AHuxley Re:Need to follow the proper approach (141 comments)

A few different groups tried that with very skilled lawyers and had some success.
http://www.freedomwatchusa.org...
The problem now is a new legal limbo - you can have all the Fourth Amendment you want but NSA color of law efforts have ensured your US domestic/international network use fair game.
Your legal protections cannot be weakened, removed and still stand but the NSA seems to have ensured no timely legal remedy from a vast long term illegal domestic surveillance network.
Many people saw a vast illegal domestic surveillance network forming as a US digital Berlin Wall and hoped they would end up the west with court rulings.
With US legal indifference to an illegal domestic surveillance network and no firm legal support on the Fourth Amendment: welcome to the new legal selective, color of law side of US history.

about two weeks ago
top

How Many People Does It Take To Colonize Another Star System?

AHuxley Re:Sure, but... (392 comments)

You have a some very old royal bloodlines that tried interesting ways to keep 'pure'.
You had some very smart, wealthy bloodlines that tried interesting ways to keep in their structure close and preserve/enhance expected positive traits.
You now have a few faiths and cults who dont mix very much and shame/demand their communities stay very local :)
Over generations you see a few hints at really rare, diverse medical conditions become more common and needing longterm care and medical experts.

about two weeks ago
top

TCP/IP Might Have Been Secure From the Start If Not For the NSA

AHuxley Re:Whenever I hear anti-NSA rhetoric... (149 comments)

Re Would Mr. Snowden receive the same respect and adoration
Yes as US gov protections in place for just such legal events eg safe from US gov surveillance without a warrant.
If you see the US Constitution protections been removed via color of law efforts you have the duty, right and responsibility to bring such facts to the US publics attention.
The US political and legal system can then correct the legal issues.
The US legal issues raised by Snowden are easy to understand in an open court by most legal professionals and the wider public.
http://www.freedomwatchusa.org...
Months after Snowden US warrantless reality is uncovered:
"NSA performed warrantless searches on Americans' calls and emails – Clapper" (2 April 2014)
http://www.theguardian.com/wor...
The main issue for "understanding" is that the entire US copper and optical telco hardware is surveillance friendly.
Another issue for "understanding" is that the entire US copper and optical telco software layer is surveillance friendly.
Another issue for "understanding" is that encryption standards are junk - the US gov gets back to plain text, ex staff get back too, other countries get back to plain text, so can their ex staff and people who can pay them...
People are finally understanding the entire structure of their telecommunications network is really like "ENIGMA" version 10? 50? in the 1960,1970, 1980, 1900's --2000 and beyond. Lots of new fancy digital "rotors" to sell but its all back to plain text in real time over decades.
So today people are finally looking at the origins of TCP/IP and wondering how it was shaped, set as a standard and promoted.
Expect skilled academics to start going over ever historic telco layer and many common encryption standard too.

about two weeks ago
top

Book Review: How I Discovered World War II's Greatest Spy

AHuxley Re:germany ran out of people (102 comments)

The German kill ratio was always amazing due to their skills at training the small units to swap roles and keep the fire rate up with good weapon systems. Their tank crews where also well trained even without 'real' tanks in the 1930's. The supply line issue and complex mechanical designs also took a toll on German forces. Fuel would arrive but no ammo or parts. If parts did arrive you needed local expert workshop like conditions while been at war. If you got your tank repaired you then faced a loss of fuel or ammo supplies and no air cover or flak..
Over many battles just getting working tanks with fuel and ammo became very difficult for Germany. The US tanks where less complex, had huge production line like repair support with parts just waiting. The lack of good design in UK and US tanks ensured a poor combat experience but numbers lost vs Germany resupply ensured victory..
The US mil took home a lot of new ideas about engineering, design and training - not ready for Korea but later showed a total change in outlook and new "German' methods.

about two weeks ago
top

Book Review: How I Discovered World War II's Greatest Spy

AHuxley Re:David Kahn and the NSA (102 comments)

Yes much more was slowly entering the history books. Germany broke some interesting US and UK codes at different times but always lost its easy way in due to UK upgrades.
The US was lost in its own world with the Army and Navy working on Japan as different teams early on. US codes where often old, badly used. Italy made some great human efforts too.
The UK was really the master, breaking most of the diverse 1920-30's European countires code efforts and learning from what their spies well placed where feeding back to their respective govs. Russia seemed to have some well placed spies in Germany but no real luck with Enigma. Finland, Poland, France also had some amazing people beyond the Enigma efforts.
Some great historical reading at http://chris-intel-corner.blog... fills in the gaps many WW2 'books' just never get to or where not allowed to mention.
The US and UK where able to pick up a lot of skilled experts before, during and after WW2 - easy papers for many top staff at just the right time.
The real fear most authors seem to face is that the NSA and GCHQ did not want a wider group of crypto experts and academics understanding the ability to gather most of Germany and Japans codes in realtime. After WW2 the funding mix was difficult in the US and UK but the vision was the same - get everything in realtime.

about two weeks ago
top

NASA Halts Non-ISS Work With Russia Over Ukraine Crisis

AHuxley Re:Yes...but no (291 comments)

Re "But, the US Russian space cooperation was first initiated as a sign of good will." The deal between the US and Russia about space was a pact that both sides really needed.
The US could keep expert Russian skills in Russia and away from Brazil, China, India and other very well educated emerging space nations.
Russia got to keep its best staff with generational skills that would be costly to have to re create decades later - stay with funding in Russia and could pass their skills on to next generations.
Working with complex metals and other materials took decades to get to a production stage.
As for "sanctions" try and understand the German view of its energy needs and exports:
"German Executives Denounce EU/US Leaders Over Russia Confrontation"
http://www.zerohedge.com/news/...
In countries with less debt, real exports, real jobs, real energy needs and real growth - they do not have the luxury to be been seen "in front ".

about two weeks ago
top

Senate Report Says CIA Misled Government About Interrogation Methods

AHuxley Re:[sarc]How wonderfully counter-productive![/sarc (207 comments)

Its seems like different factions of contractors (interesting backgrounds, citizenships), varied control over US gov/mil ranks and location allowed for legal advice outside the expected:
Request more FBI experts who could help, wanted to help and had years of real US legal expertise.
Many nations tried hard to move beyond legal torture after the 1975 ++ Helsinki Accords. In 2014 the final US gov reports will be historically interesting when released.

about two weeks ago
top

Senate Report Says CIA Misled Government About Interrogation Methods

AHuxley Re:WaPo still won't use word "torture" (207 comments)

The US is been careful with words in other ways too
"....says that the DoD termed those involved in interrogation "safety officers" rather than doctors. "
"CIA made doctors torture suspected terrorists after 9/11, taskforce finds" (4 November 2013)
http://www.theguardian.com/wor...
Also see the Task Force on Psychological Ethics and National Security (PENS)

about two weeks ago
top

NSA Infiltrated RSA Deeper Than Imagined

AHuxley Re:Desensitizing the masses (168 comments)

That was the long issue of tension between the NSA and GCHQ. The UK wanted it all kept very much out anything public: no books, no news, no helping sealed courts and no scientific review.
The NSA seems to have more of a story to share to ensure standing and funding in the USA - they needed winning press to out flank other aspects of the US mil and gov getting material to political leaders.
The UK saw great harm in hinting at a global domestic and international surveillance networks - i.e. seamless tracking within the UK and around the world.
The US view saw no escape from surveillance so why not use the material in domestic courts via parallel construction, lock box of all calls over a lifetime, weak domestic oversight.

about two weeks ago
top

NSA Infiltrated RSA Deeper Than Imagined

AHuxley Re:If you can't beat 'em, join 'em (168 comments)

Re how do you know this.
Think back to how many firms had total control over emerging telco standards and the UK and US gov deep interest in emerging export/domestic standards crypto - Clipper, Public Key Cryptography. Key Recovery and the few very public legal cases.
Then nothing, you could just have it all...
Then Communications Assistance for Law Enforcement Act (CALEA) ensured US crypto law enforcement hardware access as a world wide standard as to not hurt US telco exports.
Then nothing, you could have even more new devices/software with very few limits... Many bought into some review of public and private standards for crypto. The idea that no brand would risk its image with weak crypto, political leaders would not risk their nations science standards trust, the press would find out, lawyers would find out, experts doing deep reviews would find out.
The fact the US gov and UK gov gave up on crypto export laws was telling. Then Communications Assistance for Law Enforcement Act (CALEA) was telling.
A generation of experts trusted in the skills of their peers to review cryptography and now everybody can understand where the maths left us and gov moved in.
Just as a set of trusted computer brands where shown to be of interest to the US gov via Prism and many other efforts, expect the same for many trusted telco brands in the 1970's or emerging in the 1980's.
The long decades old idea is the same - plain text will emerge - via junk encryption, via a software layer, or hardware layer. The only trick is getting the public to buy now "cheap" hardware from trusted brands globally.

about two weeks ago
top

NSA Infiltrated RSA Deeper Than Imagined

AHuxley Re:Surprise surprise, they lied and it's still the (168 comments)

Re: WHY DO THEY GO ON RECORD
If you make a fuss you join
"Only One Big Telecom CEO Refused To Give The NSA The Access It Wanted... And He's Been In Jail For 4 Years"
http://www.businessinsider.com...
Former CEO Says U.S. Punished Phone Firm
http://www.washingtonpost.com/...
NSA Domestic Surveillance Began 7 Months Before 9/11, Convicted Qwest CEO Claims
http://www.wired.com/2007/10/n...

about two weeks ago
top

GCHQ and NSA Targeted World Leaders, Private German Companies

AHuxley Re:I should hope so (145 comments)

"agrees to it or likes it" is kind of hard to work via German telcos without local support. Long term its down to the elected political leaders of Germany to ponder their exports role.
As for other "exporters" you may recall http://en.wikipedia.org/wiki/L... or
Domestic audiences in the EU want their value added high skilled export jobs. They are tired of seeing their very public expensive trade missions return empty handed.

about three weeks ago
top

Apple, Google Go On Trial For Wage Fixing On May 27

AHuxley Re:Seriously? (148 comments)

The production is done via just in time in ~Asia with long complex cheap supply chains.
The only aspect to "avoiding spiraling costs" would be with very skilled US staff who could move up between brands until wages matched the staff real value.
Smart new firms will find staff anywhere else. Older firms will be left with trapped staff worried about their wages and prospects vs been productive.
Guilds, serfdom and indentured workers have all be tried. If you cant keep staff, perhaps the best staff know next gen growth is difficult with living on gov contracts and advertising via safe expected product lines.

about three weeks ago

Submissions

top

The US legal system and secret laws: FOIA vs OLC, FBI, CIA?

AHuxley AHuxley writes  |  about 3 months ago

AHuxley (892839) writes "Follow the ongoing EFF work on obtaining a document FOIA (Freedom of Information Act) requests have found to be exempt under "internal deliberations".
Are secret laws been used to provide more cover for a CIA's $10 million telco record deal?
Welcome to the world of past telco exigent letters and National Security Letters.
"FBI Replaced Legal Process with Post-It Notes to Obtain Phone Records"
https://www.eff.org/deeplinks/2010/01/fbi-replaced-legal-process-post-it-notes-obtain-ph
http://www.techdirt.com/articles/20131107/13445725172/so-much-nsa-chiefs-offer-to-store-data-neutral-site-att-receiving-10-millionyr-cia-phone-records.shtml
http://www.techdirt.com/articles/20100121/1418107862.shtml http://www.techdirt.com/articles/20100121/1418107862.shtml"

Link to Original Source
top

Mystery of 1000's of FBI documents posted to US press in 1971 solved

AHuxley AHuxley writes  |  about 3 months ago

AHuxley (892839) writes "A team of eight antiwar activists broke into an FBI office in Media, Pennsylvania and removed at least 1000 documents.
Once removed and sorted, the bulk of the files showed FBI spying on US political groups. Cointelpro had been found.
43 year later more details about how the anonymously packages ended up with select US reporters weeks later.
Years later the full extent of COINTELPRO (COunter INTELligence PROgram) was finally understood.
http://en.wikipedia.org/wiki/COINTELPRO"

Link to Original Source
top

US mil drone visions to 2038: groups, more AI, lower costs, exports.

AHuxley AHuxley writes  |  about 3 months ago

AHuxley (892839) writes "The US Department of Defense (DoD) has released a 150 page document covering its vision for the future role of unmanned systems.
The report mostly covers drones (unmanned aerial systems) use but offers insight into land, and sea technology too.
Pre-programmed tasks, new algorithms, more sensors, and complex machine learning will be advanced to help try and reduce projected funding needs. For example humans will not be needed for the duration of the mission until a drone swarm is released. The need to shape cultural hurdles, standards, and export regulations around the use of drones will also be worked on.
pdf at http://www.defense.gov/news/newsarticle.aspx?id=121392 or
http://publicintelligence.net/dod-unmanned-systems-2013/"

Link to Original Source
top

US federal judge on laptop search laws at U.S. borders

AHuxley AHuxley writes  |  about 4 months ago

AHuxley (892839) writes "The American Civil Liberties Union sought to challenge the Ul legal "border exemption" three years ago.
Can your laptop be seized and searched at the border?
A 32 page decision provides new legal insight into legal thinking around suspicion less searches, making copies, keeping copies.
"think twice about the information you carry on your laptop.."
“Is it really necessary to have so much information accessible to you on your computer?”
i.e. your electronic devices searchable and sizeable for any reason at the U.S. border.
ACLU may appeal. The decision: https://www.aclu.org/sites/default/files/assets/abidor_decision.pdf Also note the Kool-Aid comment."

Link to Original Source
top

Pentagon could remove US Cyber Command from the NSA

AHuxley AHuxley writes  |  about 5 months ago

AHuxley (892839) writes "USCYBERCOM was a powerful new command to conduct full spectrum military cyberspace operations created in 2006 and reached full operational capability by late 2010.
Could CYBERCOM be returning to its US military origin away from public spotlight of its more civilian setting in the NSA via the Director of National Intelligence (DNI)?
The NSA may have its powers returned to that of keeping US codes safe, ensuring international cryptography is useless, spying and its ongoing US domestic surveillance duties. The newer, coveted global operations role hidden before more relations by Snowden, other whistleblowers or investigative journalists induce public hearings?
Cyber Commands “offensive” operations on the Internet would then be secure form hearings, investigations or any new laws or limits.
Will part of the US mil get their offensive cyber warfare role back from an agency that gained many new roles in a very short time frame and much publicly?
Expect to see the spin of many classic sock puppets with good news stories about why the NSA needs its new powers to reach out globally and within the USA e.g.
http://www.zerohedge.com/news/2013-10-31/document-reveals-official-nsa-talking-points-use-911-attacks-sound-bite
Some links about the role, formation and use of Cyber Command can be found at https://en.wikipedia.org/wiki/United_States_Cyber_Command"

Link to Original Source
top

Thomas Drake NSA whistleblower on allies and US rights

AHuxley AHuxley writes  |  about 6 months ago

AHuxley (892839) writes "Thomas Drake a decorated United States air force, navy veteran and whistleblower from a position as a senior executive at America's National Security Agency.
His views on the 4th amendment, the foreign intelligence surveillance act and the role of an extraordinarily broad dragnet of electronic surveillance in the US.
The interview talks about countries going along with US surveillance as they feel they will never be caught and the telco tech is in place."

Link to Original Source
top

NSA Cold War domestic operations declassified

AHuxley AHuxley writes  |  about 7 months ago

AHuxley (892839) writes "With the US trying to understand the domestic role of their foreign intelligence and counterintelligence services in 2013, what can a declassified look back into the 1960's and 1970's add to the ongoing legal debate? Welcome to the world of Interagency Security Classification Appeals Panel and the work done by the National Security Archive at George Washington University. Read about prominent anti-war critics and US senators been tracked and who was on the late 1960's NSA watch list. From Rev. Martin Luther King to civil rights leader Whitney Young, boxer Muhammad Ali, Tom Wicker, the Washington bureau chief and Washington Post columnist Art Buchwald, Sen. Howard Baker (R-Tenn.). The NSA was aware of the legality of its work and removed all logos or classification markings, using the term 'For Background Use Only". Even back then NSA director at the time, Lew Allen noted: “appeared to be a possible violation of constitutional guarantees,” page 86:
via http://www2.gwu.edu/~nsarchiv/NSAEBB/NSAEBB441/docs/doc%205%202008-021%20Burr%20Release%20Document%202%20-%20Part%20B.pdf
What did the NSA think about signals intelligence sites in your country? See if your country makes the "indefinite" list on page 392:
http://www2.gwu.edu/~nsarchiv/NSAEBB/NSAEBB441/docs/doc%201%202008-021%20Burr%20Release%20Document%201%20-%20Part%20A2.pdf"

Link to Original Source
top

Australia, NZ to get NSA GCHQ net encryption access too

AHuxley AHuxley writes  |  about 7 months ago

AHuxley (892839) writes "Slashdot readers have seen and commented on the news surrounding internet encryption and who can get access.
The Sydney Morning Herald is reporting that the Australian Signals Directorate (was Defence Signals Directorate, DSD) and New Zealand's GCSB are expected to invited into the same initiative."

Link to Original Source
top

Australian gov Ok with NSA spying

AHuxley AHuxley writes  |  about 10 months ago

AHuxley (892839) writes "Australia’s Foreign Minister Bob Carr seems to be fine with US international data collection (spying) with the help of US consumer hardware, telcos and software vendors by the NSA (National Security Agency). It would seem the protections offered to all US citizens under the US "Bill of Rights and its Supreme Court, on where individuals stand in relationship to Government" will some how be offered to or balance out Australian law on privacy and data protection. Will a "lively political system" in the USA look after the privacy of Australians?
Network Ten’s Meet the Press program has the text of the interview here http://resources.news.com.au/files/2013/06/09/1226660/835253-meet-the-press-transcript.pdf"

Link to Original Source
top

Using social media about military operations make you a target?

AHuxley AHuxley writes  |  about a year ago

AHuxley (892839) writes "Could using social media or blog comments about any military operation make you a legal military target? Australian army Land Warfare Studies Centre analyst Chloe Diggins looks at what could make a web 2.0 user a combatant.
The Geneva Convention protecting civilians could be removed if a power feels uploading, downloading or sharing is part of the fight. How long before "knowingly providing material support or resources to an entity that has been designated as Foreign Terrorist Organizations under section 219 of the Immigration and Nationality Act." becomes just "providing material support or resources to an entity that has been designated""

Link to Original Source
top

US seeking a 15.7% levy on submarine cable operators

AHuxley AHuxley writes  |  about 2 years ago

AHuxley (892839) writes "The US Federal Communications Commission (FCC) is considering an expansion to the Universal Service Fund. Submarine cable operators with landings in the United States could face a 15.7 percent levy on quarterly revenues. Some history on US telco rates can be found at: http://www.commsday.com/commsday/2012/comment-bad-timing-proposed-undersea-cable-tax/"
Link to Original Source
top

OzLog: unlimited private data retention for Oz law

AHuxley AHuxley writes  |  more than 2 years ago

AHuxley (892839) writes "delimiter.com.au has news on ISP data retention ideas in Australia.
Australia would like to follow the EU down the "European Directive on Data Retention" path.
Australian law enforcement agencies may have the option to request a log of all a users of interest telco usage without any review or time limits.
Another option would be for local politics eg. an activist community. Data retention over a postcode (suburb).
The data collection could also be out sourced to private contractors."

Link to Original Source
top

What did your telco sell in Bahrain?

AHuxley AHuxley writes  |  more than 2 years ago

AHuxley (892839) writes "Follow the trial of interception technology as it is exported and supported around the world.
Documentation is divested and NDA's protect the deals done by telcos. Western-made and supported surveillance software offers tracking and transcripts that end in windowless rooms and torture."

Link to Original Source
top

RIM CEO on BBC: India and Middle East

AHuxley AHuxley writes  |  about 3 years ago

AHuxley (892839) writes "Recall:
http://mobile.slashdot.org/story/10/10/08/1454237/UAE-Says-RIM-Played-Ball-Will-Maintain-Service
http://mobile.slashdot.org/story/10/08/27/2137241/BlackBerry-Battle-In-India-Going-Down-To-the-Wire
http://yro.slashdot.org/story/10/08/07/1625245/Saudi-Says-RIM-Deal-Reached-BlackBerry-OK-If-We-Can-Read-the-Messages
http://yro.slashdot.org/story/10/08/07/1625245/Saudi-Says-RIM-Deal-Reached-BlackBerry-OK-If-We-Can-Read-the-Messages ?
Well try to forget, its really really unfair and a matter of national security."

Link to Original Source
top

The top 100 IT suppliers to the UK gov for 2009-10

AHuxley AHuxley writes  |  more than 3 years ago

AHuxley (892839) writes "Using Freedom of Information requests the Guardian has listed how the UK are spending £42bn on IT.
12 departments and two non-departmental bodies.
On the top are BAE Systems and Detica. Hewlett Packard is third getting £1.63bn from five departments. GCHQ has an exemption."

Link to Original Source
top

NSA jobs vs Silicon Valley over the next 10 years?

AHuxley AHuxley writes  |  more than 2 years ago

AHuxley (892839) writes "The hometownannapolis reports on a new cyber curriculum at a local high school to feed the ever growing needs of the NSA and Cyber Command.
A quote from Dutch Ruppersberger (D-MD) about job growth in the local national security sector stands out: “In 10 years, we will be larger than Silicon Valley,” Could the new funding for the expansion of the National Security Agency and the Army's new Cyber Command be the next big growth area for the US?"

Link to Original Source
top

Lockheed Martin's secret UK Census building

AHuxley AHuxley writes  |  more than 3 years ago

AHuxley (892839) writes "secret-bases.co.uk reports: Back in early 2010, Lockheed Martin – the prime contractor for the UK Census programme starting on 27th March 2011 – acquired a "secret" building on a 30-month lease for use as the data processing centre for uploaded census forms. The location was found after a senior Lockheed Martin / UK Data Capture employee registered an associated domain on a server whose IP address network, belonging to Lockheed Martin, was itself registered to the precise address of the building. The US spelling of "centre" was also noted."
Link to Original Source
top

US/UK helped Egypt shut down web, find dissidents

AHuxley AHuxley writes  |  more than 3 years ago

AHuxley (892839) writes "U.S., U.K. companies helped Egypt shut down telecommunications and identify dissidents. Support for deep packet inspection, texting via cell phones tracked to identify dissidents and routers that that filter and spy. Kill switch support for the larger joint venture cell phone communications.
The same options are been offered to the US gov via the "Protecting Cyberspace as a National Asset Act" introduced by Senators Lieberman (ID-Conn) and Collins (R-Me). http://hsgac.senate.gov/public/index.cfm?FuseAction=Press.MajorityNews&ContentRecord_id=227d9e1e-5056-8059-765f-2239d301fb7f"

Link to Original Source
top

TSA roadside internal US checkpoints

AHuxley AHuxley writes  |  more than 3 years ago

AHuxley (892839) writes "Inspectors from the Transportation Security Administration (TSA) will more involved in roadside inspections of commercial vehicles, according to TSA officials.
VIPR (Visible Intermodal Prevention and Response) started in the aviation sector and has now been expanded into surface transportation, bus terminals and train stations.
VIPR operations are conducted at weigh stations, rest areas with truck stop under consideration. Backscatter x-ray devices will be used on the trucks."

Link to Original Source

Journals

top

Glenn Greenwald Keynote 30c3

AHuxley AHuxley writes  |  about 4 months ago http://www.dw.de/glenn-greenwald-calls-for-snowden-asylum-at-chaos-computer-club-congress/a-17327867
https://soundcloud.com/dlf-wissenschaft/keynote-glenn-greenwald-30c3
Into details of Hong kong - understanding TrueCrypt use.
World understanding about protecting own security, notes more PGP use in his email.
Limits on US surveillance, debate, political, legal reform - PR.
Secret court oversight - rubber stamp, role of generations of gov loyalists.
Hope with skills of the developers of encryption to protect communications - slows down rate of privacy loss.
PR of been seen at hacker events by US gov officials.
Will **you** work to help destroy privacy?
Act of conscience is spreading - Chelsea Manning, Daniel Ellsberg, wikileaks,
Price of transparency - gov punishment vs growing lists of whistleblowers -effective use of fear
Inspiration of more whistleblowers?
EU leaders greatly helped by Snowden news but not willing to help Snowden.
New book - role of free press vs tame US/UK media, gov false claims to public
Iraq war reflections, Snowden first doc.
http://en.wikipedia.org/wiki/Boundless_Informant
Tame media, no oversight, US/UK media
Five eyes - no more privacy globally for electronic communications.
Q&A:
All communications tracked by govs, motivation - economic, politically - down to one goal: power.
What to release - powerful debate, interest - 6 months into, more on way.
True face of UK gov vs press freedom - now a joke.
German gov support of NSA - no change to German policy

top

Australian intelligence on cyber security, data acquisition, the private sector.

AHuxley AHuxley writes  |  more than 2 years ago http://www.asio.gov.au/Publications/Public-Statements/2012/24-Jan-2012-Sydney-Institute.html An interesting paper on the "malicious by-product, of the information technology age"
Are the Australian public gradually become aware of their own privacy as they use information technology?

top

NewsRight and your next /. story link?

AHuxley AHuxley writes  |  more than 2 years ago With http://paidcontent.org/article/419-newsright-launches-with-29-publishers-not-a-litigation-shop/ seeking to set up "business relationships and contracts" for their online content.
Could it be time for a link database to see if a link been posted goes back to a NewsRight member?

top

Bungies 1998 Myth 2 (private) beta Linux testing

AHuxley AHuxley writes  |  more than 2 years ago http://tain.totalcodex.net/forum/viewtopic.php?f=2&t=5451#p53236
Myth 2 was a 1998 real-time tactics computer game for the PC/Macintosh (and in the past Linux).
A new native Linux executable version of 1.7.2 (current Mac/Win) seems to be in testing.

top

Kentucky police search homes without a warrant based on smell/sounds

AHuxley AHuxley writes  |  more than 3 years ago The nytimes reports on how Justices Look Again at How Police May Search Homes after a case in Kentucky where police smelled burning marijuana coming from an apartment and kicked the door in.
Justice Kagan said, âoeis going to enable the police to penetrate the home, to search the home, without a warrant, without going to see a magistrate, in a very wide variety of cases.â
"He said a sensible criminal would answer the door but decline to let the police enter without a warrant."

top

New zero-day hole in Flash Player

AHuxley AHuxley writes  |  more than 3 years ago http://news.cnet.com/8301-27080_3-20016301-245.html
A new zero-day hole in Flash Player that reportedly is being exploited in the wild and could allow an attacker to take control of a computer.
The critical vulnerability affects Adobe Flash Player 10.1.82.76 and earlier versions for Windows, Mac, Linux, Solaris, and Android.
It also affects Adobe Reader 9.3.4 and earlier version for Windows, Mac, and Unix and Adobe Acrobat 9.3.4 and earlier versions for Windows and Mac.

top

Apple's Facetime Open standards, closed link?

AHuxley AHuxley writes  |  more than 3 years ago Was just reading http://herot.typepad.com/cherot/2010/06/iphone-facetime-protocol.html that links to
http://www.packetstan.com/2010/07/special-look-face-time-part-1.html
http://www.packetstan.com/2010/07/special-look-face-time-part-2-sip-and.html
http://www.packetstan.com/2010/07/special-look-face-time-part-3-call.html
The "client-side SSL certificate, giving Apple the ability to grant or deny access on a per-device basis" is known, but has anything changed with the new touch?

top

OS X, Disk Utility and the 3 strange ip's

AHuxley AHuxley writes  |  more than 3 years ago Last night I was reading http://www.theregister.co.uk/2010/09/09/ios_4_dot_1_jailbreak/
I clicked on the " was first announced by" link to http://twitter.com/pod2g/status/23950781610
Suddenly "Disk Utility" starts up and Little Snitch shows connections to "business.twitter.com" and the 3 ip's
128.242.245.116, 128.242.245.20, 128.242.245.212
http://img138.imageshack.us/img138/6296/duip.jpg
2010-09-09 22:12:32 +0930: Checksumming âoe23950781610â using UDIF-CRC32 was also recorded in the Disk Utility log.
Disk Utility is a utility created by Apple for performing disk-related tasks in Mac OS X.
Little Snitch is a software outgoing firewall for Mac OS X.
Any ideas? Thanks.

top

Legality of Oz net filter trials?

AHuxley AHuxley writes  |  more than 3 years ago http://www.zdnet.com.au/net-filter-trials-unlawful-claims-engineer-339304184.htm

An Australia network engineer Mark Newton has been asking about the intercepted customers' internet traffic aspect of the Australian filter trial. Australia seems to be using a Marshall R3000 series for web monitoring, filtering and reporting.
This may breached section 7(1)(b) of the Telecommunications (Interception and Access) Act 1979. by "authorising, suffering or permitting said equipment to be used in that manner".
""A copy of every single packet of data generated by an end user and sent to the internet is supplied to a network switch's 'mirrored port' and forwarded to whatever device is connected to it," Newton told the department. "Although the vendor makes the unverified claim that the R3000 only 'inspects' outgoing web requests and, in those requests, only examines destination URLs, a complete transcript of all internet data is nevertheless supplied to the R3000 for monitoring."
" The department continues to believe its internet filtering live trials had not breached the Act.
More on the filter trail tech used in Australia http://www.arnnet.com.au/article/307138/internet_filter_isps_reveal_clean-filter_technologies/?fp=16&fpid=1

top

Oz telco network maps a security risk

AHuxley AHuxley writes  |  more than 3 years ago zdnet writes Telstra and Optus say a proposal by the Australian Competition and Consumer Commission (ACCC) to publish infrastructure location information could be a risk to security.
Telstra said in its response to the discussion that only limited infrastructure information should be published to carriers and carriage service providers and should not be given to the general public.
Telstra notes "persons â" both within Australia and overseas â" determined to assault the public health and safety of Australian people and institutions, could access publicly available certain telecommunications network information to precisely identify points of access to the network."
Is someone worried the public will add up the costs of a low redundancy choke points in the telco network and ask where all the cash went? Does Australia need a Sean Gorman to map our networks?
http://www.wired.com/wired/archive/12.01/start.html?pg=10

top

Pentagon tries mind-control in Afghanistan

AHuxley AHuxley writes  |  more than 3 years ago http://www.wired.com/dangerroom/2010/06/to-reach-afghans-pentagon-drafts-mimes-storytellers-wizard-of-oz/#more-26471
Mind-control and social engineering keeps the masses in the USA passive and stuck in their own little worlds.
So the Pentagon is trying to convince Afghanistan to accept endless advertising, mass media, polls, celebrities and sports figures in a culturally-specific narrative.
Pentagon-funded researchers are building computer models of how the societies of Afghanistan and Iraq work http://www.wired.com/dangerroom/2009/03/darpas-social-s/
and releasing neuroscientists, artificial intelligence specialists, and gadgeteers for real world testing.
A demo will start vis Wizard of Oz and then allow the US to roll out ideas for grass roots organizing and collective decision making.
Someone dust off the Vietnam era http://en.wikipedia.org/wiki/Civil_Operations_and_Revolutionary_Development_Support for the web 2.0 generation?

top

Police push to continue warrantless cell tracking

AHuxley AHuxley writes  |  more than 3 years ago http://news.cnet.com/8301-31921_3-20008941-281.html
"A law requiring police to obtain a search warrant before tracking Americans' cell phones may imperil criminal investigations and endanger children's lives, a law enforcement representative told Congress this week."
"Obtaining a search warrant when monitoring the whereabouts of someone "who may be attempting to victimize a child over the Internet will have a significant slowing effect on the processing of child exploitation leads," said Richard Littlehale of the Tennessee Bureau of Investigation. "If that is acceptable, so be it, but it is a downstream effect that must be considered.""
"Connecticut federal judge shows that the FBI monitored the whereabouts of about 180 cell phones--without a warrant--while conducting surveillance of two men suspected of robbing local banks."

top

Windows Messenger 4: No video for you!

AHuxley AHuxley writes  |  more than 3 years ago http://arstechnica.com/microsoft/news/2010/06/windows-live-messenger-wave-4-almost-excellent-fatally-flawed.ars
"Video Call" is obviously more limited. If one party has no webcam, there's no Video Call option. If one party doesn't want to broadcast their webcam, or their microphone, video call isn't an option. And yet the new Messenger discards the basic webcam features. It's video call or nothing. I have nothing against Video Calls, and use the feature from time to time. But I use the basic webcam capabilities more. It's not a bug. It's not an accidental omission. It's a deliberate decision by Microsoft: the new Messenger will have only one webcam mode, and it's Video Call. The company claims that by concentrating on one webcam mode they can make it better. Apparently the picture quality is improved." Why not just use a mic icon if you have sound only? Yahoo, tinychat ect let the users use any audio, visual or text chat they like and it all works fine from adsl 2+ to 56k, 1 on 1 or groups.

top

Bing-Zune integration still not working

AHuxley AHuxley writes  |  more than 3 years ago http://news.cnet.com/8301-13526_3-20008931-27.html
"this time, the player told me that I needed to enable application storage in my version of the Silverlight player. (Silverlight is a Microsoft platform for creating rich Internet applications, like audio and video, and basically competes with Adobe's Flash.) A casual user would have given up, but having a professional interest in the feature, I followed the instructions on the screen, only to find that my copy of Silverlight already had the box checked to enable application storage. Sigh. I unchecked and rechecked it. Still no luck. "

top

More on Google remote app wipe

AHuxley AHuxley writes  |  more than 3 years ago http://news.cnet.com/8301-27080_3-20008922-245.html
Google has remotely removed two free apps from several hundred Android phones because the apps misrepresented their purpose and thus violated Android developer policies, according to a company spokesman.
"The apps "were not designed to be used maliciously, and did not have permission to access private data--or system resources" beyond accessing the Internet, Rich Cannings, Android Security Lead, wrote in at http://android-developers.blogspot.com/2010/06/exercising-our-remote-application.html

top

Stephen Conroy saved by by sensitive negotiations?

AHuxley AHuxley writes  |  more than 3 years ago http://www.crn.com.au/News/217702,ludlam-change-in-comms-ministry-unlikely.aspx
From Communications spokesperson Senator Scott Ludlam "a change in Communications Ministers is "really unlikely".., due to difficulties in handing over the Department of Broadband, Communications and the Digital Economy (DBCDE) while significant, sensitive Telstra and NBN Co dealings take place."

top

You Don’t Want ISPs to Innovate

AHuxley AHuxley writes  |  more than 3 years ago http://www.wired.com/epicenter/2010/06/you-dont-want-isps-to-innovate/
"Building out infrastructure means redirecting stock-dividend dollars and putting them back into the company, which Wall Street punishes companies for â" and which hurts the massive stock packages of telecom executives. Itâ(TM)s literally not in telecom executivesâ(TM) best interest to invest in broadband and solid networks."

top

Next WikiLeaks Release May Involve ECHELON

AHuxley AHuxley writes  |  more than 3 years ago

http://www.abc.net.au/news/stories/2010/06/22/2933892.htm
He agreed it would be of the "calibre" of publishing information about the way the top secret Echelon system - the US-UK electronic spying network which eavesdrops on worldwide communications traffic - had been used.

top

Australian Greens to host anti-filter forum

AHuxley AHuxley writes  |  more than 3 years ago

http://www.itnews.com.au/News/217576,greens-to-host-anti-filter-forum.aspx

top

Fears internet costs will rise due to NBN

AHuxley AHuxley writes  |  more than 3 years ago

http://www.theaustralian.com.au/news/nation/fears-internet-costs-will-rise-due-to-nbn/story-e6frg6nf-1225882485870
"This deal between the NBN and Telstra could make broadband prices much worse for consumers if the NBN Co only decides to lease backhaul from Telstra and leaves the other backhaul providers stranded,"
Great backhaul lock in from one old monopoly to another.

Slashdot Account

Need an Account?

Forgot your password?

Don't worry, we never post anything without your permission.

Submission Text Formatting Tips

We support a small subset of HTML, namely these tags:

  • b
  • i
  • p
  • br
  • a
  • ol
  • ul
  • li
  • dl
  • dt
  • dd
  • em
  • strong
  • tt
  • blockquote
  • div
  • quote
  • ecode

"ecode" can be used for code snippets, for example:

<ecode>    while(1) { do_something(); } </ecode>
Sign up for Slashdot Newsletters
Create a Slashdot Account

Loading...