Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror
×

Comment Re:What does it matter? (Score 1) 191

Dude, do you know who Steven Aftergood is? You might want to look into his background. He's the Director of the Federation of American Scientists Project on Government Secrecy and the last person who is going to inappropriately defend government for trying to keep something secret. And yes, Sen. Wyden was trying to get the DNI to reveal currently and properly classified information in open session.*

The fact of the matter is that for at least the last 35 years, phone call records, as a "business record" provided to a third party, do NOT have an expectation of privacy and are NOT covered by the Fourth Amendment. Unless and until the Supreme Court reverses Smith, that is the standing, factual law of the land.

Furthermore, the entire purpose of the BR FISA metadata collection isn't to "spy on Americans" -- it is to "collect the haystack", so to speak, that may LAWFULLY be collected, in order to have access to it when searching for bad foreign actors who may be physically operating within the US on US wireless carriers. And every query against that data requires a reasonable, articulable, and specific foreign intelligence nexus, with its own separate FISA order.

It's not NSA's job to second guess the law or its authorities. Its entire purpose is FOREIGN signals intelligence, and the fact that some people simply can't accept that won't be changed by any amount of commentary in forums like this. Foreign targets now exist in the same sea of global digital communications as you and everyone else â" there is no way to have the technical capability to target the one without having the same capability to target them all.

Which is why, again, in a democratic society based on the rule of law, it is what the LAW says that is paramount.

* For what it's worth, my own personal view is that Clapper wasn't even thinking of the phone metadata program when asked that question. He was thinking more broadly in terms of the foreign intelligence collection missions of 17 IC agencies, which can, do, and always will sometimes encounter the communications content of Americans during the execution of their duties. And the fact is, no matter how many little pissant isolated examples of someone intentionally abusing something, there is no systemic, policy, or enabling environment to illegally spy on Americans. If you want to believe there is, then there won't be any useful discussion between us. Is there room for improvement and transparency on some fronts? Sure. But intelligence requires secrecy in order to be effective, even in free and open societies.

Comment Re:What does it matter? (Score 1) 191

But you can never "know" the discovery was incidental, under any construct, because you can always assume the government is lying -- with or without the Snowden disclosures. And we didn't learn from Snowden how collection is defined in a SIGINT context; electronic collection has been defined that way since at least 1982. I agree that the FBI (or any government agency) cannot engage another agency/country/etc. in order to skirt US laws...and I didn't say they should be able to, nor do I believe they did.

Furthermore, metadata is not content -- and even that data is only queried for specifically articulated counterterrorism purposes, which means it would have nothing to do with this case. Even now, no one has ANY idea whether NSA or any other agency was involved...the FBI could be hiding its own sources and methods, or could have even omitted information or made a mistake.

And the program has been challenged, and may ultimately make its way to the Supreme Court, which may decide that technology has changed so much since 1979 that this interpretation of the Smith v Maryland ruling is no longer a valid interpretation in the context of the Fourth Amendment. But unless and until that happens, it is factual to say that phone call records, as a "business record" provided to a third party, do not have an expectation of privacy and are not protected by the Fourth Amendment. That's not a value judgment, or an opinion, it is a legal fact.

And it's not NSA's job to second guess its own legal authorities (even though it extensively does that); its job is to conduct its missions, in what I would hope would be the most aggressive way possible within the law. Its mission isn't to figure out ways around the law, or the Constitution, or to spy on Americans without warrants. Its mission is to conduct FOREIGN SIGINT against US adversaries, nearly all of whom are non-US Persons outside the US, and the reality is that these targets coexist with innocent Americans and everyone else in the global web of digital communications. There is no way to avoid this reality.

Comment Re:What does it matter? (Score 1) 191

Parallel construction isn't only about the NSA...it is any alternative construction of evidence to conceal a sensitive source or method that may have led to and/or assisted in the investigation. It's very old, and the only thing some legal experts say about it is that it MAY -- key word being may -- run afoul of evidentiary rules and discovery procedures. It's a very old concept, and as long as the alternate chain of evidence is completely supportable and nothing illegal occurred* to initiate the investigation in the first place, there is nothing at all wrong with it.

* Even IF it was NSA collection that led to the FBI tip, the incidental discovery of international narcotics trafficking, when discovered, is exempt. Furthermore, it doesn't necessarily need to be an NSA "tip"; it could be that they also brought an NSA (or other IC/DOD agency) resource to bear on the issue, and don't want to reveal that because it would reveal a sensitive intelligence capability, technique, source, or method. That, too, is not illegal. So while it's an interesting story, it is just that.

Comment What does it matter? (Score 1) 191

So-called "parallel construction" isn't illegal or unconstitutional, and even IF -- and that's a very big if -- the initial tip came from "NSA", keep in mind that there has been a decades-old exemption for things like international terrorism and international narcotics trafficking when discovered during the course of legitimate foreign signals intelligence collection.

So, while you may not like it, nothing that is illegal or unconstitutional occurred here, and it is not the result of post-9/11 laws, or "new ways of interpreting the law", or anything else.

The simple fact is that legitimate foreign intelligence targets, to include terrorists and US adversaries who are mostly non-US Persons physically outside the US, share and use the same systems, networks, services, devices, software, tools, operating systems, encryption standards, and so on, as Americans and much of the rest of the world.

This is a simple, undeniable truth, and the only thing differentiating such traffic in the digital world is the status of the person(s) in communication -- i.e., whether they are or are not a US Person. That's it.

And guess what? The communications of US Persons WILL be encountered, and always have been, and we have a legal construct for how to deal with that, and that legal construct factually includes exemptions, again, for things like international terrorism and international narcotics trafficking.

And all of this is even IF it was "NSA" that tipped off anyone; it still could just be FBI somewhat clumsily protecting its own sources and methods...it doesn't have to be "spooks". In a free society governed by the rule of law, it is the LAW, not the capability, that is paramount.

And speaking of the law, the only person doing anything illegal here -- under our system and body of law, whether anyone agrees with it or not -- was Ulbricht.

Comment Re:What real name policy? (Score 2) 280

then don't fucking announce it in a public forum.

Utter nonsense: Anonymity is a requirement for true free speech. Much of the muckraking done to start the American Revolution was done anonymously because the authors of the papers didn't want to be hung by British loyalists. Ditto France. Ditto most major popular revolutions in truly oppressive countries: The real "thought leaders" publish anonymously to keep themselves alive.

"Free speech" is meaningless if there isn't a way to publish something without your name on it--requiring a "real name" for someone's expression to be considered valid negates free speech because it creates a weapon for the powerful to punish people with the "wrong" opinion. Yes, part of free speech is taking responsibility for what you've said, but I'm not sure it's reasonable for that to include the concept that you should be willing to be executed or murdered for publishing your anti-government opinion, and if you're not, you're too much of a pussy for your opinion to matter.

Comment Probably capable of more than Reddit (Score 2) 172

What's even more interesting is that it gets the IP address of a valid command and control (C&C) server from a post on popular news site Reddit. The malware is capable of discovering what other software is installed on the machine, opening a port on it, and sending a query to a web server to acquire the addresses of the C&C servers.

It's a likely bet that it's been configured to find valid C&C IP addresses from other sites, too--Reddit is a high-volume user generated content site, with a lot of existing spam/troll fighting technology in place. So it's pretty likely this avenue will get blocked soon (if Reddit isn't working on it already) and the next large public-site gets rolled over to.

It's devious and brilliant, to use a public site... More devious if they built it smart enough that Reddit can't block it programatically.

Comment Re:Reverse discrimination is still discrimination (Score 1) 280

I see no reason why any person with a private Facebook page should be given special status or exemptions from the rules just because of some arbitrary, momentarily popular PC BS category.

"Momentarily popular?" Are you joking? Men dressing as women has been part of the theatre since... since there was a theatre. Drag is a performance art, dude, and just because you don't personally like or approve of it doesn't delegitimize it as an art form, or magically erase the real physical danger drag queens in certain intolerant societies actually face.

Comment Re:What real name policy? (Score 4, Interesting) 280

I dare bet fake names also account for a disproportionally large amount of activity.
Why would you bother signing up a fake account if you're not going to use the account?

Anonymity is part of the Internet--it creates problems, sure, but it also allows people to say what they actually think without fear of being punished for having the "Wrong" viewpoint. For example, your bleeding heart liberal ways will likely run afoul of your boss' staunch conservatism, and if he's a jerk, might damage your career if he knew about it.

There's nothing wrong with having any specific point of view, but about having the ability to selectively determine who knows you have this belief without being constrained about expressing it.

Comment Windows 10 = iPhone 6 (Score 2) 644

Wait... what? Multiple desktops, same apps behave properly as fullscreen tablet apps or desktop windows, snapping control, hybrid menus, launch/switch/end gestures (copied from WebOS and Unity), a task view with app and desktop preview... Every single one of these features has been out for years on Linux (and most on Android or OS X), in much more polished form. It's 2014 and the Windows team is just now figuring out how to have two window managers co-exist? How very retro!

Windows 10 vs. Linux Mint/Ubuntu/Fedora/etc = iPhone 6 vs. Samsung Galaxy/Note series...
The dominant/big-name brand is _years_ behind and floating forward on market momentum.

Comment No sensible person ever though it was impossible (Score 2, Informative) 174

But even here, again, when you look at a typical OS X desktop system, now many people:

1. Have apache enabled AND exposed to the public internet (i.e., not behind a NAT router, firewall, etc)?

2. Even have apache or any other services enabled at all?

...both of which would be required for this exploit. The answer? Vanishingly small to be almost zero.

So, in the context of OS X, it's yet another theoretical exploit; "theoretical" in the sense that it effects essentially zero conventional OS X desktop users. Could there have been a worm or other attack vector which then exploited the bash vulnerability on OS X? Sure, I suppose. But there wasn't, and it's a moot point since a patch is now available within days of the disclosure.

And people running OS X as web servers exposed to the public internet, with the demise of the standalone Mac OS X Server products as of 10.6, is almost a thing of yesteryear itself.

Nothing has changed since that era: all OSes have always been vulnerable to attacks, both via local and remote by various means, and there have been any number of vulnerabilities that have only impacted UN*X systems, Linux and OS X included, and not Windows, over very many years. So yeah, nothing has changed, and OS X (and iOS) is still a very secure OS, by any definition or viewpoint of the definition of "secure", when viewed alongside Windows (and Android).

Comment shared wonder at the bigness and oldness of it all (Score 1, Insightful) 173

The key part: "darkness was over the surface of the deep, and the spirit was hovering over the waters. And God said, “Let there be light,” and there was light." I'm the last person to push theology, and not remotely christian, but that's... poetically pretty.

Yes, the waters were here long before us, before the earth, before (our) star. I don't have to agree with anyone's religious tales to appreciate and share a sense of wonder at the bigness and oldness of it all.

Comment overthinking the problem (Score 1) 138

They're overthinking the problem. It's in Georgia. All's ya need to do is give BillyBob's thousand-year-old grampy a decent slingshot and a bucket of marbles, and tell him you'll pay him $250 every time he can hit one of those tiny little gummint spy planes.

Better yet, get him to tell his fishing buddies about the prize, and his buddies, etc... until you have a low level permeation thru the community. Just remember to pay 'em (and pay out of the set's lunch fund on an obfuscated line item that says something suitably snarky like "humble pie" or "tasty crow".) Oh, and tell 'em old guys: you can't eat what you catch, but you can resell the parts on ebay.... :)

Comment Re:Is minecraft really 'creative'? (Score 1) 174

Oh, wow, dude... Calm down. Have some water.
I gotta say, "goosestepping neckbeard" is the best thing I've been called in weeks. And no, a low UID only means I showed up. Just like you did.

I could type something nice about Minecraft, but I already did in another thread today: stuff about minecraft being an excellent UI for 3D printer data.

And try not to lunge so hard at obvious trollage. :)

Slashdot Top Deals

UNIX is hot. It's more than hot. It's steaming. It's quicksilver lightning with a laserbeam kicker. -- Michael Jay Tucker

Working...