US Intelligence Unit Launches $50k Speech Recognition Competition
I agree. Check out http://www.youtube.com/watch?v...
Researchers Simulate Monster EF5 Tornado
Wonderful, Orp. Absolutely beautiful work. Kudos.
The Argument For a Hypersonic Missile Testing Ban
Another video: https://www.youtube.com/watch?...
The Russian version has a terminal speed of over Mach 4. A few meters over the water with jinking.
The Argument For a Hypersonic Missile Testing Ban
Rather neat video of Yakhont launch:
The High-Tech Warfare Behind the Israel - Hamas Conflict
George Friedman of Stratfor has an excellent analysis of the situation. His opening statement is, "We have long argued that the Arab-Israeli conflict is inherently insoluble." Definitely worth a read.
Russia Wants To Replace US Computer Chips With Local Processors
The Sci-Fi Myth of Killer Machines
DOJ Requests More Power To Hack Remote Computers
"And now I'd like to entertain everybody with some fancy pageant walkin' "
Man Builds DIY Cellphone Using Raspberry Pi
Lovely! Linux with complete access to the mic and speaker. Should be able to pair these up and have reasonably secure scrambled voice communications.
NSA Confirms It Has Been Searching US Citizens' Data Without a Warrant
Trogre, you have asked the right question, "Now what, O citizen, are you going to do about it?" The best answer I can see is this: we techheads need to work towards end-to-end encryption in every project we touch. This includes phone conversations. Let the NSA eat static.
White House To Propose Ending NSA Phone Records Collection
"For it was said they had become like those peculiar demons, which dwell in matter but in whom no light may be found." ... An obvious reference to the NSA!
The NSA Has an Advice Columnist
I have pondered long and hard about how to characterize you NSA-Types. And, then it came to me in a flash: You guys are the weasels in "Who Framed Roger Rabbit". That's it! From now on, when one of you starts spouting off I will instantly form an image of those slimy bastards! Thanks for your inspirational posting, TrekkieGod!
Schneier: Break Up the NSA
"Their systems aren't set up to intercept your calls. It's metadata only."
Johnny, do you honestly expect anyone on Slashdot to believe that?
Can Commercial Storage Services Handle the NSA's Metadata?
I absolutely argree! Consider a few numbers. Assume 3 phone calls per person per day in U.S. Then, the number of calls is
Number Calls = (330 X 10^6 People) X (3 Calls / Person / Day) = 1 X 10^9 Calls / Day
Assume each call lasts for 1 minute.
Seconds of Content = (1 X 10^9 Calls / Day) X (1 Minute / Call) X (60 Seconds / Minute) = 60 x 10^9 Seconds
Call audio data can be handled with a 4 KHz cutoff. It takes two samples per Hz to capture this data. Assume 2 Bytes per sample (actually too high).
Bytes per Day = (60 X 10^9 Seconds of Content) X (4 X 10^3 / Second) X (2 Samples) X (2 Bytes / Sample) = 9.6 X 10^14
Or, about 10^15 Bytes per Day to store raw content. One PetaByte. For perspective, this is just 1000 1 TB hard drives. The Utah facility has a capacity of about 30 ExaBytes, or 30 X 10^18 Bytes. This means that Utah could save about 30,000 days of U.S. content.
Snowden Says His Mission Is Accomplished
One of Snoiwden's coworkers told him that they were processing as much data as in the Library of Congress every 14.4 seconds. Sources say that the Library of Congress has 235 TBytes of data.
(235 [TByte] / 14.4 [sec]) X 60 [sec/min] X 60 [min/hr] X 24 [hr/day] = 1.4 X10^18 [Bytes/day] = 1.4 [Exabytes/day]
Snowden Document Says Dutch Secret Service Hacks Internet Forums
"Mass interception of telecommunications, for example by means of satellites, does not require the approval of the minister, because its content is not being processed and thus -according to the law- does not infringe the secrecy of correspondence, which includes telephone and telegraph. "
Basically, they are saying that they can intercept everything and store it in the haystack, and as long as it is not processed, no privacy has been violated. They use the analysis of metadata to obtain targeted approval from the ministry to extract the relavent stored content. I suspect that the NSA uses a similar distorted reasoning in their bulk interception and examination of our phone calls. The only way we will ever defeat these clowns is to encrypt EVERYTHING. And, we will need to be diligent in our search for hard and soft backdoors.
Intelligence Officials Fear Snowden's 'Doomsday' Cache
This was covered earlier in
A: 3.6Gb http://wlstorage.net/torrent/wlinsurance-20130815-A.aes256.torrent [wlstorage.net]
B: 49Gb http://wlstorage.net/torrent/wlinsurance-20130815-B.aes256.torrent [wlstorage.net]
C: 349GB http://wlstorage.net/torrent/wlinsurance-20130815-C.aes256.torrent [wlstorage.net]
I think we all can agree that 3.6GB was within Snowden's opportunity and ability to gather. But, 49GB and 349GB ?!! That is a LOT of data to quietly move to USB sticks. If the last two truely are Snowden files, then it looks to me like he may have had an accomplice. Wouldn't it be so cool if there is a freedom-loving mole in a high position of the NSA?
NSA Chief Keith Alexander Takes His PRISM Pitch To YouTube
At 16:17 in the video notice that Alexander says, "no content in the metadata program." He could have said, "no content" to the question of collecting phone content. Instead he had to add, "in the metadata program." This begs the question: Is there some other program under which the NSA is collecting the content of our phone calls?
Did NIST Cripple SHA-3?
It appears that the most difficult part of cryptography is key management. One thing that might help is to distribute public keys on social media. As much as I dislike Facebook, they do have "Notes" where you can post text. I tested this, and it looks like the notes will hold at least several hundred bytes of text. I did not try copy and paste editing, but I assume that these would work. The posted key would need to be in hex so that the user could copy and paste it into an application which converts the hex string into raw bytes. I'm sure there are some weaknesses in this, but it seems to me that it would be more trustworthy than depending upon a CA.
Senators Push To Preserve NSA Phone Surveillance
This comes from the NYTimes opinion page:
Airborne Toxic Event is always fun. It's also the name of a sick rock band. We're out of fertilizer–see if Home Depot has any ammonium nitrate. Careful loading it up–that stuff leaks. Q: Who'd win in a gunfight? The Taliban, FARC, Hezbollah, or Hamas? The catch: No suicide bombers.
bigfoottoo hasn't submitted any stories.
bigfoottoo has no journal entries.