top Govt Docs Reveal Canadian Telcos Promise Surveillance Ready Networks
Xipher, if I understand CALEA correctly, it applies to the hardware manufacturers and covers voice, VOIP, and broadband internet. Does CALEA apply to the USER of the hardware. That is, if a person roots his phone and installs an encryption app, does CALEA apply?
top US Intelligence Unit Launches $50k Speech Recognition Competition
I agree. Check out
top Researchers Simulate Monster EF5 Tornado
Wonderful, Orp. Absolutely beautiful work. Kudos.
about a month and a half ago
top The Argument For a Hypersonic Missile Testing Ban
The Russian version has a terminal speed of over Mach 4. A few meters over the water with jinking.
top The Argument For a Hypersonic Missile Testing Ban
Rather neat video of Yakhont launch:
top The High-Tech Warfare Behind the Israel - Hamas Conflict
George Friedman of Stratfor has an excellent analysis of the situation. His opening statement is, "We have long argued that the Arab-Israeli conflict is inherently insoluble." Definitely worth a read.
top Russia Wants To Replace US Computer Chips With Local Processors
top The Sci-Fi Myth of Killer Machines
top DOJ Requests More Power To Hack Remote Computers
"And now I'd like to entertain everybody with some fancy pageant walkin' "
top Man Builds DIY Cellphone Using Raspberry Pi
Lovely! Linux with complete access to the mic and speaker. Should be able to pair these up and have reasonably secure scrambled voice communications.
top NSA Confirms It Has Been Searching US Citizens' Data Without a Warrant
Trogre, you have asked the right question, "Now what, O citizen, are you going to do about it?" The best answer I can see is this: we techheads need to work towards end-to-end encryption in every project we touch. This includes phone conversations. Let the NSA eat static.
top White House To Propose Ending NSA Phone Records Collection
"For it was said they had become like those peculiar demons, which dwell in matter but in whom no light may be found."
... An obvious reference to the NSA!
top The NSA Has an Advice Columnist
I have pondered long and hard about how to characterize you NSA-Types. And, then it came to me in a flash: You guys are the weasels in "Who Framed Roger Rabbit". That's it! From now on, when one of you starts spouting off I will instantly form an image of those slimy bastards! Thanks for your inspirational posting, TrekkieGod!
top Schneier: Break Up the NSA
"Their systems aren't set up to intercept your calls. It's metadata only."
Johnny, do you honestly expect anyone on Slashdot to believe that?
top Can Commercial Storage Services Handle the NSA's Metadata?
I absolutely argree! Consider a few numbers. Assume 3 phone calls per person per day in U.S. Then, the number of calls is
Number Calls = (330 X 10^6 People) X (3 Calls / Person / Day) = 1 X 10^9 Calls / Day
Assume each call lasts for 1 minute.
Seconds of Content = (1 X 10^9 Calls / Day) X (1 Minute / Call) X (60 Seconds / Minute) = 60 x 10^9 Seconds
Call audio data can be handled with a 4 KHz cutoff. It takes two samples per Hz to capture this data. Assume 2 Bytes per sample (actually too high).
Bytes per Day = (60 X 10^9 Seconds of Content) X (4 X 10^3 / Second) X (2 Samples) X (2 Bytes / Sample) = 9.6 X 10^14
Or, about 10^15 Bytes per Day to store raw content. One PetaByte. For perspective, this is just 1000 1 TB hard drives. The Utah facility has a capacity of about 30 ExaBytes, or 30 X 10^18 Bytes. This means that Utah could save about 30,000 days of U.S. content.
top Snowden Says His Mission Is Accomplished
One of Snoiwden's coworkers told him that they were processing as much data as in the Library of Congress every 14.4 seconds. Sources say that the Library of Congress has 235 TBytes of data.
(235 [TByte] / 14.4 [sec]) X 60 [sec/min] X 60 [min/hr] X 24 [hr/day] = 1.4 X10^18 [Bytes/day] = 1.4 [Exabytes/day]
top Snowden Document Says Dutch Secret Service Hacks Internet Forums
"Mass interception of telecommunications, for example by means of satellites, does not require the approval of the minister, because its content is not being processed and thus -according to the law- does not infringe the secrecy of correspondence, which includes telephone and telegraph. "
Basically, they are saying that they can intercept everything and store it in the haystack, and as long as it is not processed, no privacy has been violated. They use the analysis of metadata to obtain targeted approval from the ministry to extract the relavent stored content. I suspect that the NSA uses a similar distorted reasoning in their bulk interception and examination of our phone calls. The only way we will ever defeat these clowns is to encrypt EVERYTHING. And, we will need to be diligent in our search for hard and soft backdoors.
top Intelligence Officials Fear Snowden's 'Doomsday' Cache
This was covered earlier in
B: 49Gb http://wlstorage.net/torrent/wlinsurance-20130815-B.aes256.torrent [wlstorage.net]
C: 349GB http://wlstorage.net/torrent/wlinsurance-20130815-C.aes256.torrent [wlstorage.net]
I think we all can agree that 3.6GB was within Snowden's opportunity and ability to gather. But, 49GB and 349GB ?!! That is a LOT of data to quietly move to USB sticks. If the last two truely are Snowden files, then it looks to me like he may have had an accomplice. Wouldn't it be so cool if there is a freedom-loving mole in a high position of the NSA?
top NSA Chief Keith Alexander Takes His PRISM Pitch To YouTube
At 16:17 in the video notice that Alexander says, "no content in the metadata program." He could have said, "no content" to the question of collecting phone content. Instead he had to add, "in the metadata program." This begs the question: Is there some other program under which the NSA is collecting the content of our phone calls?
top Did NIST Cripple SHA-3?
It appears that the most difficult part of cryptography is key management. One thing that might help is to distribute public keys on social media. As much as I dislike Facebook, they do have "Notes" where you can post text. I tested this, and it looks like the notes will hold at least several hundred bytes of text. I did not try copy and paste editing, but I assume that these would work. The posted key would need to be in hex so that the user could copy and paste it into an application which converts the hex string into raw bytes. I'm sure there are some weaknesses in this, but it seems to me that it would be more trustworthy than depending upon a CA.
bigfoottoo hasn't submitted any stories.
bigfoottoo has no journal entries.