Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror
×

Comment Re:So they'll suffer from TMI (Score 2) 267

Nations can just use their number stations. One time pads and decades of very safe trusted sleeper agents are promoted.
Signals gathering expects the world to be using this generations ww2 ENIGMA like network over decades - tame telco crypto networks and internet will bring back lots of useful data as all other nations are not careful.
The interview with whistleblower William Binney: 'The NSA's main motives: power and money' (19.08.2014)
http://www.dw.de/binney-the-ns...
"Money. It takes a lot of money, you have to build up Bluffdale [the location of the NSA's data storage center, in Utah] to store all the data. If you collect all the data, you've got to store it, you have to hire more people to analyze it, you have to hire more contractors, managers to manage the flow. You have to start a big data initiative. It's an empire. Look at what they've built!"
Face to face, holidays, dual citizens, smart people invited in by rushed digital clearances. Clearances issued for a contractor to bring in expert staff.
Other nations have no need for their own to use the "Treasure Mapped" internet in any interesting ways.

Comment Re:it's over: the media (in the US) have moved on. (Score 4, Informative) 267

The good news is people meeting the press are more aware of having their cell phone on or powered and with them.
The press can now understand that turning off a phone can be seen as getting ready to meet a contact.
Anyone in the same area at the same time who turns off their phone might be that contact. Kind of a short list :)
The press is more aware of been under constant surveillance.
Treasure Map just adds to the collect it all idea and that digital entry or exit points can be fully reconstructed or are always been tracked.
Thats a lot of expensive effort to put into signals intelligence considering what most skilled nations fully understood about global telephone and computer networks going back over decades.

Comment Re:capabilities (Score 1) 286

Slashdot users may recall news from 2008 "Let’s Monitor All P2P" (April 17, 2008)
http://www.dailytech.com/Senat...
"Agents then track the offender on a “daily” basis, identifying them by their IP address and, in some cases, a “unique serial number” sourced from offender’s computer."
"Investigators have recorded almost 1.3 million of the unique serial numbers thus far, with about half of them residing in the United States – and that number is steadily increasing each month due to “extensive capturing” conducted since October 2005."

Comment Re:NSA's exhaustive Search .. (Score 1) 4

Mil and gov have two options:
The classic: dont connect the network with the files on during the day of the search.
Enter a few narrowly defined legal terms and get no results back from a total network search.
Other options can be water damage to files, loss due the hardware issues, a computer crashed... the selection of operating systems understood to totally reuse very limited backup storage.

Comment What the meaning of the words 'concerns' is? (Score 1) 4

Recall the "NSA Releases Snowden Email, Says He Raised No Concerns About Spying" (05.29.14)
".... the NSA released a statement and a copy of the only email it says it found from Snowden.
That email, the agency says, asked a question about legal authority and hierarchy but did not raise any concerns."
Now its just about FIOA requests finding more or wondering what was held back as as the gov felt it "did not raise any concerns"....
From no emails to one email found back to none under a definition of what identify is felt to find?

Comment Re:capabilities (Score 1) 286

That has been going on for many, many years. Every file of interest to law enforcement globally is logged and tracked over many different kinds of networks, p2p like networks in real time.
All users moving any known file have unique data about their network and computers used (beyond MAC, ip) recorded as the file is networked.
The US gov could have looked at all networks and then sorted for gov and mil workers legally. Or had the mil sort for on base networking connections on a base or mil network.
Or looked at gov/mil issued computer hardware, software and for network misuse on mil sites.
Instead the US mil collected all and then tried to sort out all people not part of any mil base.... or gov....

Submission + - New Details About NSA's Exhaustive Search of Edward Snowden's Emails (vice.com) 4

An anonymous reader writes: Vice News reports, "The NSA disclosed these new details about its investigation into Snowden in response to a FOIA lawsuit VICE News filed against the NSA earlier this year seeking copies of emails in which Snowden raised concerns about spy programs he believed were unconstitutional..... As part of this investigation, the Agency collected and searched all of Mr. Snowden's email available on NSA's classified and unclassified system. This included sent, received, and deleted email, both in his inboxes still on the networks and email obtained by restoring back-up tapes from Agency networks. Multiple members of the Associate Directorate for Security and Counterintelligence read all of the collected email. Additionally, given that organizational designators appear for each NSA sender and recipient for email transmitted on NSA's classified and unclassified systems, searches of Mr. Snowden's collected email also were done using the organizational designators for the offices most likely to have been recipients of any email written raising concerns about an NSA signals intelligence program. ... Those offices included the NSA's Office of General Counsel, the Office of the Comptroller, and the Signals Intelligence Directorate Office of Oversight and Compliance. Moreover, Sherman said, the NSA tasked the Office of General Counsel, the Office of Inspector General, and the Office of the Director of Compliance to "search for communications to or from Mr. Snowden in which he may have raised concerns about NSA programs." ..."The search did not identify any email written by Mr. Snowden in which he contacted Agency officials to raise concerns about NSA programs," ..."

Comment Re:Whenever I read stuff like this (Score 3, Insightful) 223

Re 'change in our freedoms?"
"It takes a lot of money, you have to build up Bluffdale [the location of the NSA's data storage center, in Utah] to store all the data. If you collect all the data, you've got to store it, you have to hire more people to analyze it, you have to hire more contractors, managers to manage the flow. You have to start a big data initiative. It's an empire. Look at what they've built!"
Binney: 'The NSA's main motives: power and money'
http://www.dw.de/binney-the-ns... (9.08.2014)

Signals intelligence was to "collect it all" and then sort. The next step was some lock box law for phone records to get around parallel construction in open US courts.
The UK understood if people know about signals intelligence they can move away from telco products.
The US seems to hope that all people will enjoy the freedom of buying and using that next tame consumer grade telco product.

Submission + - U.S. threatened massive fine to force Yahoo to release data (washingtonpost.com) 1

Advocatus Diaboli writes: The U.S. government threatened to fine Yahoo $250,000 a day in 2008 if it failed to comply with a broad demand to hand over user data that the company believed was unconstitutional, according to court documents unsealed Thursday that illuminate how federal officials forced American tech companies to participate in the NSA’s controversial PRISM program. The documents, roughly 1,500 pages worth, outline a secret and ultimately unsuccessful legal battle by Yahoo to resist the government’s demands. The company’s loss required Yahoo to become one of the first to begin providing information to PRISM, a program that gave the National Security Agency extensive access to records of online communications by users of Yahoo and other U.S.-based technology firms.

Comment Re:What's in it for the Democrats? (Score 1) 540

Re: the generations of embargo and The Bay of Pigs.
Something really interesting must have happened in the past with events surrounding the Bay of Pigs invasion and its CIA backers.
"CIA SUCCESSFULLY CONCEALS BAY OF PIGS HISTORY
D.C. CIRCUIT SPLIT DECISION RULES CIA DRAFT HISTORY CAN BE KEPT SECRET INDEFINITELY"
http://www2.gwu.edu/~nsarchiv/... (May 21, 2014)
""expose an agency's decision making process in such a way as to discourage candid discussion within the agency and thereby undermine the agency's ability to perform its functions.""
So if that is kind of passion a CIA draft can invoke years later, the need for an endless embargo seems to still hold sway.
Its just part of a long list of Covert United States foreign regime change actions https://en.wikipedia.org/wiki/... but there seems to be something special about Cuba for the US political elite.

Comment Re:Snowden (Score 1) 499

Yes it would seem new background investigations are getting access to larger all digital databases by skilled staff or real people are been interviewed about a persons past again.
This would show a change from the mostly digital state and federal search to a more intensive look at schooling, friends, family, teachers, reading material, net use, local court paper files and other local non digital investigations.
This would show a lot more funding is now been pushed into rebuilding peoples entire life story.
Why the sudden change? The US was very happy to rapidly expand its gov staff, contractors with needed skills and trust in digital databases.
If the US gets too interested in the pasts of needed staff it will fail to hire the best or fail to find the perfect penetration agent.
A penetration agent would have the perfect gov cleared parents, good schooling, good grades, no issues but deep inside be a dual citizen, cult member, faith based person reporting to another country over decades. If they past that new real world intensive look what would stop them?
That would need teams that where not just looking at signals intelligence or file handling. The US would have to fully track all its staff over years.
The UK faced down that issue by offering great pay, better conditions and keeping its trusted staff happy and only seeking the best per generation.
The US has a vast structure of contractors, gov workers and public private aspects that would all need looking at considering the rapid growth of new cleared staff in the past years.

Slashdot Top Deals

I program, therefore I am.

Working...