Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×

Comment Re:What puzzles me is... (Score 1) 140

Consider the origins, contractors, new cash flows and other cell projects in the USA
CIA Worked With DOJ To Re-Purpose Foreign Surveillance Airborne Cell Tower Spoofers For Domestic Use (2015/03/10)
https://www.techdirt.com/artic...
"developed technology to locate specific cellphones in the U.S. through an airborne device that mimics a cellphone tower"
Products and services that was in use during the occupations and in other roles in South America are now back for domestic use and funding.
The only puzzle is how to keep the funding flowing at a city and state level.

Comment Re:4 words (Score 1) 140

If a journalist, citizen journalist, local lawyer gets to near some local towns paper, digital records about the costs or use of a device...
A Freedom of Information Act cant find records that got moved around the USA that night :)
Walk in requests by journalists, citizen journalists, local lawyers could find hardware funding or upgrade requests in that community.

Comment Re:Perhaps these devices can be identified... (Score 2) 140

For the next gen? It would give out an exact network like any other branded tower in the area.
A few pretty vans, trucks and your town has a new small cell tower. Connects on fast networks, all protocols as expected.
Is it a real tower or not? Who is paying to connect all the calls as a real telco would?
It still has to work as a normal tower for all devices connected over months?
That "nice software defined radio chip could create a nice monitoring network in your hometown" gets interesting :)

Comment Re:Whitelisting real mobile carrier towers (Score 1) 140

re "Like I think you're saying, the "need" comes from":
Why risk an unsafe court setting that can face a legal challenge? The new IMSI-catcher hardware could have been detected in an area.
The parallel construction may not hold up under legal questions in open court.
All law enforcement officials have to do is get rubber stamped court papers to watch over a person to build a case that will hold in any open court.
The need to keep IMSI-catcher like systems away from courts, cleared lawyers and trusted domestic telcos shows a lack of trust with the paper work when requesting such services?
Have the logging, tracking databases or telco staff leaked case details to outside groups?
So yes ""the perceived need of those implementing it"" seem to want their own telco IMSI-catcher network that only they can use or track with away from any oversight.

Comment Re:Whitelisting real mobile carrier towers (Score 1) 140

It depends on what the next gen can do. The change of cell phone coverage patterns was a tell in the past that an app could detect, map and share.
How smart will the next modded smartphone have to be to detect expected local network changes?
Some ability to map normal for the area and then look for changes? The interesting part is a permanent site would be given settings that would be seen as a new normal.
Looks like a new smaller cell site with urban features, connects like a cell site, passes all types of data to and from a phone like all other normal cell sites.
The problem the US legal systems seems to have is that of telco trust. Why not just use the telco sites with local telco experts?
What has the US legal systems found out over the years about national, multinational or foreign telco databases and tracking cell numbers and users that it has to go with its own special hardware?
The need to keep IMSI-catcher like systems away from courts, cleared lawyers and trusted domestic telcos systems is telling.

Comment Re:Current news... (Score 1) 50

How many people where seen in all weather conditions per area?
For the price where the drone sensors on offer useful for the tasks and areas covered?
How many drones contracts would have been needed for a total 24/7 look down over the entire border area of interest?
How did that flow and direction of people, vehicles spotted fit with existing data from traditional counts?
What other data was collected? Look down mapping on a small section of a state? Add in driver, passenger faces, plate number (back and front), voice print from a "random" check point chat down with drone data, all cell phone data collected?
Cost per coverage area with optical and other systems state wide, border wide?
A nice deep sealed digital wall beyond the border areas.

Comment Re:Going to be a noob (Score 1) 213

It depends on how interesting you are and who you work for or where you travel.
Or the resale or fun of getting massive amounts of account logins.
Security services, federal, state gov, a local court, local gov, a private group that works for local gov, staff that has local gov access, a private group that works for contractors with access, a person who can afford to request the account be found, tracking a journalist who had a email from that brand of email provider.
Tracking back that persons phone gets to be interesting for anyone interested in that person or just after seeing their email used in public online.
What the security services can do with malware like tools should be well understood in 2015.
News about telco keeping phone logs over decades is now public.
The social engineering, honeytrap of a person, 'perfect' new friend getting near the phone?
Seen walking or driving near a protest away from the First Amendment zones, been near a journalist? When does a phone and all its accounts become interesting?
The "sandbox architecture provide enough of a firewall" exists for keeping other end users out.

Submission + - FBI's Big Plan To Expand Its Hacking Powers

Presto Vivace writes: DefenseOne reports:

the rule change, as requested by the department, would allow judges to grant warrants for remote searches of computers located outside their district or when the location is unknown.

The government has defended the maneuver as a necessary update of protocol intended to modernize criminal procedure to address the increasingly complex digital realities of the 21st century. The FBI wants the expanded authority, which would allow it to more easily infiltrate computer networks to install malicious tracking software. This way, investigators can better monitor suspected criminals who use technology to conceal their identity.

But the plan has been widely opposed by privacy advocates, such as the American Civil Liberties Union, as well as some technologists, who say it amounts to a substantial rewriting of the rule and not just a procedural tweak. Such a change could threaten the Fourth Amendment’s protections against unreasonable search and seizures, they warn, and possibly allow the FBI to violate the sovereignty of foreign nations. The rule change also could let the agency simultaneously target millions of computers at once, even potentially those belonging to users who aren’t suspected of any wrongdoing.

Comment Re:Let's tie my comm links unseparably together (Score 1) 213

The problem long term is people feel very secure with a phone and fancy new code.
Only the site sending the code and 'the users' phone will ever know :)
The phone is on all day, the logs are kept for years, lots of different groups might get the logs in bulk for official use or even local legal issues.
Thats a very long term record of a username, when created and all connected phone activity, movements over many years.
The mutitude of passwords and logins do offer a user the ability to only keep data with a desktop or a device or one company.

Comment Re:Mostly academic... (Score 1) 68

GCHQ staff teach 'future spies' in schools (9 March 2011)
http://www.bbc.com/news/educat...
"It is this decline which prompted GCHQ to start visiting schools to promote languages and also science and technology."
The option to use a chipset that was gaining traction in the media for eduction would have been a consideration.
Good optics and branding with a happy all UK message.

Comment Re:No Easy Solution (Score 1) 273

Re "I love the flip-flop from "war is wrong" to "to the winner go the spoils" without the least hint of cognitive dissonance."
Vietnam won its freedom from France, Japan and US backed coups. It can now do what it wants with its own sites and offer deals to any other nation it likes.
Vietnam can now also trade with or accept help from any nation it likes.
Vietnam no longer has a US back junta in power. The US seems just as up set with the UK over the Asia Infrastructure Investment Bank issue.
Support for China-led development bank grows despite US opposition (13 mar 2015)
http://www.theguardian.com/wor...

Comment Re:Beat Your Plowshares Into Swords (Score 1) 123

That would go a long way to counter the open and closed systems that ship with a few encryption standards that they all share and have been set for use over the years.
Only now are a new generation of crypto experts finally understanding what can be done to compilers, crypto, telco, networks, OS and applications when a gov asks, funds or requests.

Slashdot Top Deals

"Kill the Wabbit, Kill the Wabbit, Kill the Wabbit!" -- Looney Tunes, "What's Opera Doc?" (1957, Chuck Jones)

Working...