Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror
×

Comment Re:If you want someone who *did* compromise securi (Score 1) 183

If you think the Valerie Plame saga is worth flogging compared to Snowden you have a very serious gap in your judgment and sense of proportionality.

But if you want to continue, maybe you should get it right.

Valerie Plame

On July 14, 2003, Washington Post journalist Robert Novak, using information obtained from Richard Armitage at the US State Department, effectively ended Valerie Plame's career with the CIA

And no, "Richard Armitage" isn't an anagram for Richard Cheney.

Comment Re:The sad part is... (Score 1) 183

I don't think they're idiots. I think that they think we are idiots.

When massive amounts of detailed information on intelligence programs and alliances is stolen and released to all comers and people try to claim that it doesn't cause any harm, as many here do, they might have a case to describe some of those people as "idiots."

Al-Qaeda's Embrace Of Encryption Technology - Part II: 2011-2014, And The Impact Of Edward Snowden

This issue of Inspire, the first since the Edward Snowden affair, includes a focus on Internet security. Most significantly, it notes on the first page, in all-capital letters: "DUE TO TECHNICAL AND SECURITY REASONS, WE HAVE SUSPENDED OUR EMAIL ADDRESSES TEMPORARILY." Since, as mentioned, Inspire has always provided email addresses and encryption information for readers wishing to contact it, and, as a major part of its outreach efforts, urged readers to write in, its decision to suspend its email is meaningful.

It is worth noting that this issue includes praise for Snowden, as well as for other Western leakers such as Bradley/Chelsea Manning and Julian Assange. It notes under the heading "Questions We Should Be Asking": "If those making blasphemy against Islam have the right to express themselves, why aren't the actions of Assange, Snowden, Manning and Hammond considered freedom of expression?"

The cover story, "Shattered: A Story About Change," by Abu Abdillah Almoravid, who also authored an article in the previous issue of Inspire, focuses on the immoral nature of America and, in another mention of Edward Snowden, how he helped unmask it. ...

Praise for Snowden can also be found in Issue III of the English-language online Taliban magazine Azan, released August 26, 2013 ....

Also following the Snowden leaks, on August 30, 2013, Mula'ib Al-Assinnah, a senior member of the leading jihadi forum Shumoukh Al-Islam warned online jihadis not to use Google's Gmail because Google is part of the National Security Agency (NSA). ...

Comment Re:At some point us intelligence changed (Score 1) 183

While I agree, I'm not sure how much of a transformation happened. If you look at the origins of the CIA, they were about making the world safe for American business pretty much from the beginning. That's not all they did, or do of course. But Allen and John Foster were Wall Street lawyers after all.

The CIA was about having an American intelligence agency suitable to face the challenge of the Cold War: the enormously powerful and dangerous Communist bloc lead by the nuclear armed Soviet Union which was further fortified by the Warsaw Pact nations, Communist China, and the growing number of Communist insurgencies across the world. Trying to explain the CIA as "making the world safe for American business" is silly.

The Communists killed 100,000,000 people in the last century in all manner of cruel tortures, executions, forced starvations, and many other crimes against humanity. Why wouldn't countries want to prevent that from befalling their people? Of course! The real danger is "Wall Street bankers and lawyers!" Please.

The Soviet Story - trailer

Comment Re:The sad part is... (Score 1) 183

Are the new communication methods adopted by jihadists since Snowden's disclosures more effective against surveillance?

Yes.

If you can't show the superiority of these new methods over the old, then Snowden's disclosures didn't really cause any harm in this area.

It's demonstrable.

How Al-Qaeda Uses Encryption Post-Snowden (Part 2) – New Analysis in Collaboration With ReversingLabs

Comment Re:The sad part is... (Score 1) 183

Terrorist groups ... The United States National Security Agency, the US Military, and other terrorist operations ...

I'm pretty sure that nobody from the US National Security Agency is going to come and detonate a suicide vest while you are in a shopping mall or buying groceries whereas Isis will do that if they can.

The report is a lie.

Well, it certainly doesn't discuss all the facts, it's basically a white wash on Snowden's behalf.

Washington Post: The Volokh Conspiracy - As evidence mounts, it’s getting harder to defend Edward Snowden

Cloud

Once Vehicles Are Connected To the Internet of Things, Who Guards Your Privacy? 130

Lucas123 (935744) writes Carmakers already remotely collect data from their vehicles, unbeknownst to most drivers, but once connected via in-car routers or mobile devices to the Internet, and to roadway infrastructure and other vehicles around them, that information would be accessible by the government or other undesired entities. Location data, which is routinely collected by GPS providers and makers of telematics systems, is among the most sensitive pieces of information that can be collected, according to Nate Cardozo, an attorney with the Electronic Frontier Foundation. "Not having knowledge that a third party is collecting that data on us and with whom they are sharing that data with is extremely troubling," Cardozo said. in-vehicle diagnostics data could also be used by government agencies to track driver behavior. Nightmare scenarios could include traffic violations being issued without law enforcement officers on the scene or federal agencies having the ability to track your every move in a car. That there could be useful data in all that personally identifiable bits made me think of Peter Wayner's "Translucent Databases."

Comment Re:The sad part is... (Score 1) 183

No matter how conclusively this is proven, these idiot officials will continue to use Snowden as their scapegoat.

No matter how conclusively it is proven that Snowden caused harm there will be people that continue to proclaim Snowden their hero.

Washington Post: The Volokh Conspiracy - As evidence mounts, it’s getting harder to defend Edward Snowden

Comment Re:I have a nasty, cynical mind (Score 1) 165

If I was a member of a spy/security agency who wanted more than anything to wipe away the last, feeble laws protecting the privacy and freedom of my country's sheeple, this is precisely the kind of operation I'd set up. All it would take is a few words whispered in the right ear.

The problem is that there is no shortage of extremists around the world that actually want to do this sort of thing, and they actually have caused enormous problems for many governments.

One of the problems with "cynicism" is not knowing where to stop, or when you've gone too far. Then you end up being a kook.

Comment The view from Recorded Future (Score 2, Interesting) 183

How Al-Qaeda Uses Encryption Post-Snowden (Part 1)

Analysis Summary

Since 2007, Al-Qaeda’s use of encryption technology has been based on the Mujahideen Secrets platform which has developed to include support for mobile, instant messaging, and Macs.

Following the June 2013 Edward Snowden leaks we observe an increased pace of innovation, specifically new competing jihadist platforms and three (3) major new encryption tools from three (3) different organizations – GIMF, Al-Fajr Technical Committee, and ISIS – within a three to five-month time frame of the leaks.

Washington Post: The Volokh Conspiracy - As evidence mounts, it’s getting harder to defend Edward Snowden

Comment Re:Why VPN? (Score 1) 238

> I agree. I've been running a similar set up on a PIII-100 (remember those?) with 96MB RAM and a 200MB disk for almost twenty years.

--Dude, how high is your electric bill? o_O

--If you hook up a kill-a-watt to that beast, you might want to consider replacing that ancient machine with something like a Raspberry Pi / Cubietruck / Atom box - it will likely pay for itself within a year due to the power savings...

TS-836A Plug Power Meter = ~$16 on Amazon

Submission + - NASA awards "space taxi" contracts to both Boeing and SpaceX (reuters.com)

ugen writes: Contrary to the rumor posted on Slashdot earlier today, "NASA will partner with Boeing and SpaceX to build commercially owned and operated "space taxis" to fly astronauts to the International Space Station, ending U.S. dependence on Russia for rides, officials said on Tuesday... Boeing was awarded $4.2 billion to SpaceX's $2.6 billion. "

Slashdot Top Deals

And it should be the law: If you use the word `paradigm' without knowing what the dictionary says it means, you go to jail. No exceptions. -- David Jones

Working...