Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×

Comment Re:If you want someone who *did* compromise securi (Score 1) 183

If you think the Valerie Plame saga is worth flogging compared to Snowden you have a very serious gap in your judgment and sense of proportionality.

But if you want to continue, maybe you should get it right.

Valerie Plame

On July 14, 2003, Washington Post journalist Robert Novak, using information obtained from Richard Armitage at the US State Department, effectively ended Valerie Plame's career with the CIA

And no, "Richard Armitage" isn't an anagram for Richard Cheney.

Comment Re:The sad part is... (Score 1) 183

I don't think they're idiots. I think that they think we are idiots.

When massive amounts of detailed information on intelligence programs and alliances is stolen and released to all comers and people try to claim that it doesn't cause any harm, as many here do, they might have a case to describe some of those people as "idiots."

Al-Qaeda's Embrace Of Encryption Technology - Part II: 2011-2014, And The Impact Of Edward Snowden

This issue of Inspire, the first since the Edward Snowden affair, includes a focus on Internet security. Most significantly, it notes on the first page, in all-capital letters: "DUE TO TECHNICAL AND SECURITY REASONS, WE HAVE SUSPENDED OUR EMAIL ADDRESSES TEMPORARILY." Since, as mentioned, Inspire has always provided email addresses and encryption information for readers wishing to contact it, and, as a major part of its outreach efforts, urged readers to write in, its decision to suspend its email is meaningful.

It is worth noting that this issue includes praise for Snowden, as well as for other Western leakers such as Bradley/Chelsea Manning and Julian Assange. It notes under the heading "Questions We Should Be Asking": "If those making blasphemy against Islam have the right to express themselves, why aren't the actions of Assange, Snowden, Manning and Hammond considered freedom of expression?"

The cover story, "Shattered: A Story About Change," by Abu Abdillah Almoravid, who also authored an article in the previous issue of Inspire, focuses on the immoral nature of America and, in another mention of Edward Snowden, how he helped unmask it. ...

Praise for Snowden can also be found in Issue III of the English-language online Taliban magazine Azan, released August 26, 2013 ....

Also following the Snowden leaks, on August 30, 2013, Mula'ib Al-Assinnah, a senior member of the leading jihadi forum Shumoukh Al-Islam warned online jihadis not to use Google's Gmail because Google is part of the National Security Agency (NSA). ...

Comment Re:At some point us intelligence changed (Score 1) 183

While I agree, I'm not sure how much of a transformation happened. If you look at the origins of the CIA, they were about making the world safe for American business pretty much from the beginning. That's not all they did, or do of course. But Allen and John Foster were Wall Street lawyers after all.

The CIA was about having an American intelligence agency suitable to face the challenge of the Cold War: the enormously powerful and dangerous Communist bloc lead by the nuclear armed Soviet Union which was further fortified by the Warsaw Pact nations, Communist China, and the growing number of Communist insurgencies across the world. Trying to explain the CIA as "making the world safe for American business" is silly.

The Communists killed 100,000,000 people in the last century in all manner of cruel tortures, executions, forced starvations, and many other crimes against humanity. Why wouldn't countries want to prevent that from befalling their people? Of course! The real danger is "Wall Street bankers and lawyers!" Please.

The Soviet Story - trailer

Comment Re:I have a phone in my pocket (Score 1) 130

What you say may well be correct, but not necessarily relevant. You always have a choice to turn off your phone, or at least turn off GPS and other location services.

These insidious "connected" vehicles will not give a choice. Want to travel by car? Get tracked or get out.

No thanks.

Comment Re:The sad part is... (Score 1) 183

Are the new communication methods adopted by jihadists since Snowden's disclosures more effective against surveillance?

Yes.

If you can't show the superiority of these new methods over the old, then Snowden's disclosures didn't really cause any harm in this area.

It's demonstrable.

How Al-Qaeda Uses Encryption Post-Snowden (Part 2) – New Analysis in Collaboration With ReversingLabs

Comment Re:In before... (Score 1) 326

Can we quibble about the statistical method to use after we've settled the basic cause and effect relationships? Here's the retired TED talk: Religions and Babies.

I think the title is supposed to be provocative but I find it has the opposite effect (two things young men don't want to talk about...) - it's really about assumptions underling the modeling of world population.

Comment Re:The sad part is... (Score 1) 183

Terrorist groups ... The United States National Security Agency, the US Military, and other terrorist operations ...

I'm pretty sure that nobody from the US National Security Agency is going to come and detonate a suicide vest while you are in a shopping mall or buying groceries whereas Isis will do that if they can.

The report is a lie.

Well, it certainly doesn't discuss all the facts, it's basically a white wash on Snowden's behalf.

Washington Post: The Volokh Conspiracy - As evidence mounts, it’s getting harder to defend Edward Snowden

Comment Re:The sad part is... (Score 1) 183

No matter how conclusively this is proven, these idiot officials will continue to use Snowden as their scapegoat.

No matter how conclusively it is proven that Snowden caused harm there will be people that continue to proclaim Snowden their hero.

Washington Post: The Volokh Conspiracy - As evidence mounts, it’s getting harder to defend Edward Snowden

Comment Re:I have a nasty, cynical mind (Score 1) 165

If I was a member of a spy/security agency who wanted more than anything to wipe away the last, feeble laws protecting the privacy and freedom of my country's sheeple, this is precisely the kind of operation I'd set up. All it would take is a few words whispered in the right ear.

The problem is that there is no shortage of extremists around the world that actually want to do this sort of thing, and they actually have caused enormous problems for many governments.

One of the problems with "cynicism" is not knowing where to stop, or when you've gone too far. Then you end up being a kook.

Comment The view from Recorded Future (Score 2, Interesting) 183

How Al-Qaeda Uses Encryption Post-Snowden (Part 1)

Analysis Summary

Since 2007, Al-Qaeda’s use of encryption technology has been based on the Mujahideen Secrets platform which has developed to include support for mobile, instant messaging, and Macs.

Following the June 2013 Edward Snowden leaks we observe an increased pace of innovation, specifically new competing jihadist platforms and three (3) major new encryption tools from three (3) different organizations – GIMF, Al-Fajr Technical Committee, and ISIS – within a three to five-month time frame of the leaks.

Washington Post: The Volokh Conspiracy - As evidence mounts, it’s getting harder to defend Edward Snowden

Slashdot Top Deals

It is easier to write an incorrect program than understand a correct one.

Working...