Advocatus Diaboli (1627651) writes "One of our biggest concerns about NGI has been the fact that it will include non-criminal as well as criminal face images. We now know that FBI projects that by 2015, the database will include 4.3 million images taken for non-criminal purposes. Currently, if you apply for any type of job that requires fingerprinting or a background check, your prints are sent to and stored by the FBI in its civil print database. However, the FBI has never before collected a photograph along with those prints. This is changing with NGI. Now an employer could require you to provide a “mug shot” photo along with your fingerprints. If that’s the case, then the FBI will store both your face print and your fingerprints along with your biographic data." Link to Original Source top
Utah cops warrantlessly search prescription drug records
Advocatus Diaboli (1627651) writes "The warrantless search of Utah's database chronicling every controlled substance dispensed by a pharmacist resulted in charges against one paramedic that have nothing to do with the original investigation. Instead, the authorities discovered an employee whose records exhibited "the appearance of Opioid dependence" and lodged prescription fraud charges against paramedic Ryan Pyle. Now Pyle faces a maximum five-year prison sentence if convicted of the felony. "To me, it's outrageous government conduct," Pyle's attorney, Rebecca Skordas, said in a telephone interview Monday." Link to Original Source top
Advocatus Diaboli (1627651) writes "Facebook is taking its standalone app strategy to a new extreme today. It’s starting to notify users they’ll no longer have the option to send and receive messages in Facebook for iOS and Android, and will instead have to download Facebook Messenger to chat on mobile. Facebook’s main apps have always included a full-featured messaging tab. Then a few months ago, users who also had Facebook’s standalone Messenger app installed had the chat tab of their main apps replaced with a hotlink button that would open Messenger. But this was optional. If you wanted to message inside Facebook for iOS or Android, you just didn’t download Messenger. That’s not going to be an option anymore." Link to Original Source top
Advocatus Diaboli (1627651) writes "These ideas–discussions of how to exploit the internet, specifically social media, to surreptitiously disseminate viewpoints friendly to western interests and spread false or damaging information about targets–appear repeatedly throughout the archive of materials provided by NSA whistleblower Edward Snowden. Documents prepared by NSA and its British counterpart GCHQ–and previously published by The Intercept as well as some by NBC News–detailed several of those programs, including a unit devoted in part to “discrediting” the agency’s enemies with false information spread online.
The documents in the archive show that the British are particularly aggressive and eager in this regard, and formally shared their methods with their U.S. counterparts. One previously undisclosed top-secret document–prepared by GCHQ for the 2010 annual “SIGDEV” gathering of the “Five Eyes” surveillance alliance comprising the UK, Canada, New Zealand, Australia, and the U.S.–explicitly discusses ways to exploit Twitter, Facebook, YouTube, and other social media as secret platforms for propaganda." Link to Original Source top
NSA infiltrated RSA security more deeply than thought
Advocatus Diaboli (1627651) writes "A group of professors from Johns Hopkins, the University of Wisconsin, the University of Illinois and elsewhere now say they have discovered that a second NSA tool exacerbated the RSA software's vulnerability. The professors found that the tool, known as the "Extended Random" extension for secure websites, could help crack a version of RSA's Dual Elliptic Curve software tens of thousands of times faster, according to an advance copy of their research shared with Reuters." Link to Original Source top
Dropbox's new policy of scanning files for DMCA issues
Advocatus Diaboli (1627651) writes "This weekend, though, a small corner of the Internet exploded with concern that Dropbox was going too far, actually scanning users' private and directly peer-shared files for potential copyright issues. What's actually going on is a little more complicated than that, but shows that sharing a file on Dropbox isn't always the same as sharing that file directly from your hard drive over something like e-mail or instant messenger. The whole kerfuffle started yesterday evening, when one Darrell Whitelaw tweeted a picture of an error he received when trying to share a link to a Dropbox file with a friend via IM. The Dropbox web page warned him and his friend that "certain files in this folder can't be shared due to a takedown request in accordance with the DMCA."" Link to Original Source top
Advocatus Diaboli (1627651) writes "That cooperation with law enforcement also extended to a senior MIT network engineer who monitored traffic to and from Swartz’s laptop and appeared to be looking to Pickett for instructions. On Jan. 5, having collected 70 gigabytes of network traffic, he e-mailed the agent, “I was just wondering what the next step is.” Swartz’s lawyers argued that MIT, by monitoring Swartz and turning over materials to law enforcement without a court order, violated his Fourth Amendment rights. Abelson, who wrote MIT’s own review, disagreed, and legal experts interviewed by the Globe differed on whether those arguments had merit. They were never ruled on by the judge in the case." Link to Original Source top
Advocatus Diaboli (1627651) writes "Documents show that Britain's GCHQ intelligence service infiltrated German Internet firms and America's NSA obtained a court order to spy on Germany and collected information about the chancellor in a special database. Is it time for the country to open a formal espionage investigation? The headquarters of Stellar, a company based in the town of Hürth near Cologne, are visible from a distance. Seventy-five white antennas dominate the landscape. The biggest are 16 meters (52 feet) tall and kept in place by steel anchors. It is an impressive sight and serves as a popular backdrop for scenes in TV shows, including the German action series "Cobra 11."
Also see this post
NSA Put Merkel on List of 122 Targeted Leaders (https://firstlook.org/theintercept/article/2014/03/29/der-spiegel-nsa-ghcq-hacked-german-companies-put-merkel-list-122-targeted-leaders/)" Link to Original Source top
Feds want an expanded ability to hack criminal suspects' computers
"The U.S. Department of Justice is pushing to make it easier for law enforcement to get warrants to hack into the computers of criminal suspects across the country. The move, which would alter federal court rules governing search warrants, comes amid increases in cases related to computer crimes. Investigators say they need more flexibility to get warrants to allow hacking in such cases, especially when multiple computers are involved or the government doesn’t know where the suspect’s computer is physically located."" Link to Original Source top
Inside the NSA's Secret Efforts to Hunt and Hack System Administrators
Advocatus Diaboli (1627651) writes "Across the world, people who work as system administrators keep computer networks in order – and this has turned them into unwitting targets of the National Security Agency for simply doing their jobs. According to a secret document provided by NSA whistleblower Edward Snowden, the agency tracks down the private email and Facebook accounts of system administrators (or sys admins, as they are often called), before hacking their computers to gain access to the networks they control. The document consists of several posts – one of them is titled “I hunt sys admins” – that were published in 2012 on an internal discussion board hosted on the agency’s classified servers. They were written by an NSA official involved in the agency’s effort to break into foreign network routers, the devices that connect computer networks and transport data across the Internet. By infiltrating the computers of system administrators who work for foreign phone and Internet companies, the NSA can gain access to the calls and emails that flow over their networks." Link to Original Source top
US tech giants knew of NSA data collection, agency's top lawyer insists
Advocatus Diaboli (1627651) writes "The senior lawyer for the National Security Agency stated unequivocally on Wednesday that US technology companies were fully aware of the surveillance agency’s widespread collection of data, contradicting months of angry denials from the firms. Rajesh De, the NSA general counsel, said all communications content and associated metadata harvested by the NSA under a 2008 surveillance law occurred with the knowledge of the companies – both for the internet collection program known as Prism and for the so-called “upstream” collection of communications moving across the internet." Link to Original Source top
Homeland Security is seeking a national license plate tracking system
Advocatus Diaboli (1627651) writes "The Department of Homeland Security wants a private company to provide a national license-plate tracking system that would give the agency access to vast amounts of information from commercial and law enforcement tag readers, according to a government proposal that does not specify what privacy safeguards would be put in place. The national license-plate recognition database, which would draw data from readers that scan the tags of every vehicle crossing their paths, would help catch fugitive illegal immigrants, according to a DHS solicitation. But the database could easily contain more than 1 billion records and could be shared with other law enforcement agencies, raising concerns that the movements of ordinary citizens who are under no criminal suspicion could be scrutinized.
Also see this..
Reports of the Death of a National License-Plate Tracking Database Have Been Greatly Exaggerated (https://firstlook.org/theintercept/2014/03/17/1756license-plate-tracking-database/)" Link to Original Source top
Advocatus Diaboli (1627651) writes "The National Security Agency has built a surveillance system capable of recording “100 percent” of a foreign country’s telephone calls, enabling the agency to rewind and review conversations as long as a month after they take place, according to people with direct knowledge of the effort and documents supplied by former contractor Edward Snowden. A senior manager for the program compares it to a time machine — one that can replay the voices from any call without requiring that a person be identified in advance for surveillance." Link to Original Source top
Engine data reveals that Flight 370 flew on for hours after it "disappeared".
Advocatus Diaboli (1627651) writes ""Aviation investigators and national security officials believe the plane flew for a total of five hours based on data automatically downloaded and sent to the ground from the Boeing Co. 777's engines as part of a routine maintenance and monitoring program."
"As part of its maintenance agreements, Malaysia Airlines transmits its engine data live to Rolls-Royce for analysis. The system compiles data from inside the 777's two Trent 800 engines and transmits snapshots of performance, as well as the altitude and speed of the jet. Those snippets are compiled and transmitted in 30-minute increments, said one person familiar with the system."" Link to Original Source top
How the NSA Plans to Infect 'Millions' of Computers with Malware
Advocatus Diaboli (1627651) writes "Top-secret documents reveal that the National Security Agency is dramatically expanding its ability to covertly hack into computers on a mass scale by using automated systems that reduce the level of human oversight in the process. The classified files – provided previously by NSA whistleblower Edward Snowden – contain new details about groundbreaking surveillance technology the agency has developed to infect potentially millions of computers worldwide with malware “implants.” The clandestine initiative enables the NSA to break into targeted computers and to siphon out data from foreign Internet and phone networks." Link to Original Source top
Surveillance and Dirty Tricks by GCHQ against Hacktivist Organisations
Advocatus Diaboli (1627651) writes "One of the many pressing stories that remains to be told from the Snowden archive is how western intelligence agencies are attempting to manipulate and control online discourse with extreme tactics of deception and reputation-destruction. It’s time to tell a chunk of that story, complete with the relevant documents..
Among the core self-identified purposes of JTRIG are two tactics: (1) to inject all sorts of false material onto the internet in order to destroy the reputation of its targets; and (2) to use social sciences and other techniques to manipulate online discourse and activism to generate outcomes it considers desirable. To see how extremist these programs are, just consider the tactics they boast of using to achieve those ends: “false flag operations” (posting material to the internet and falsely attributing it to someone else), fake victim blog posts (pretending to be a victim of the individual whose reputation they want to destroy), and posting “negative information” on various forums." Link to Original Source top
Speculation About The Feasibility of India's 2013 Mars Mission
Advocatus Diaboli (1627651) writes "Last week, I read about some morons in UK get all bitchy about an official announcement regarding India plan to launch an unmanned orbiter probe to mars during late 2013. While this project has been known to exist since 2010, most people outside ISRO never thought that it would be followed up so vigorously. This belief is understandable since Indian politicians and bureaucrats, who control the purse strings of government projects, are rightly seen as morons who drive out competent Indian scientists or destroy their dreams. However this post is not about the state of politics and governance in India, which almost every Indian has had considerable experience with. The post is about whether such a probe is feasible and deliverable within the set time-frame, with available funding using available technology. The post also briefly recounts previous unmanned orbital missions to Mars by NASA and the ESA and compares them to the proposed Indian mission." Link to Original Source top
Advocatus Diaboli (1627651) writes "You might have wondered about the reasons and forces behind a series of poor decisions made by Google within the last two years. From the gaffes of former CEO Eric Schmidt, Chrome OS debacle, Chrome OS netbook debacle, half-assed development of Android OS, building the ghost town known as Google + to its recent change in policies regarding pseudonym use and recent changes in user agreements.
Why would a company which was once so innovative and capable of getting things right lapse into such a pathetic state of affairs?
Advocatus Diaboli (1627651) writes "We no longer live in the era of ‘plantation-type’ movie studios or recording houses. However large private companies still have considerable power over content production, distribution and promotion. Technology has been slowly changing this state of affairs for almost 30-40 years, however certain new technological advances, enabling systems and cost considerations WILL change the entertainment industry as we know it -within 5 years." Link to Original Source top
Advocatus Diaboli (1627651) writes "I got over 5,000 views (with 24 hours) for a short video I reuploaded on youtube. It shows a chatroulette session (most likely partially faked) of two girls not flashing their boobs to stop a chick from being eaten by a python.
My guess the prerecorded python clip was stopped before the chick gets eaten if the gals flashed their boobs. If they did not, the clip was run till the end and they saw the bird being eaten.
Maybe.. something similar could be done with newborn bunny rabbits and pythons.
Note that I did not promote it beyond facebook, my blog and a couple of other blogs. Most views came from people searching for that clip and forwarding it to others.
Nobody went broke by appealing to the lowest common denominator.