Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror
×

Comment What the meaning of the words 'concerns' is? (Score 4, Insightful) 200

Recall the "NSA Releases Snowden Email, Says He Raised No Concerns About Spying" (05.29.14)
http://www.wired.com/2014/05/s...
".... the NSA released a statement and a copy of the only email it says it found from Snowden.
That email, the agency says, asked a question about legal authority and hierarchy but did not raise any concerns."
Now its just about FIOA requests finding more or wondering what was held back as as the gov felt it "did not raise any concerns"....
From no emails to one email found back to none under a definition of what "identify" is going to find?
The other option is to only look for a few narrow legal terms that would constitute a formal complaint and not find one.

Comment Re:it's over: the media (in the US) have moved on. (Score 3, Interesting) 267

Depends on the phone used, telco and gov. Just pressing off might be the only option with some tame telco products. Removing a battery might be an option with other telco products.
A gov or mil may wish to map out the path taken by a member of the press A person turns their phone off in the same area and then both phones are turned on again moving away from each other later?
Kind of easy to track the members of the press still covering gov and mil stories in person per city.
If one person left their phone battery in thats a live malware or telco activated mic in real time. Treasure Map would be fun for the office computer, home computer, any devices on the move.

Comment Re:Past all the NATed machines. hmm (Score 1) 267

The content can be sorted, saved once a person is found to be interesting. The ip, MAC and other data around all network use is the Treasure Map prize.
What network data a business, university or household sends can be looked at in real time for keywords, voice prints or people been tracked.
Treasure Map provides a much better/deeper understanding of the local network than just ending at an .edu or .com with a lot of users per day on different networks.
Tame software, tame hardware, junk weak crypto, the tame admin staff member "invited" into a gov public private security partnership could open a lot of the networks expected to be difficult.
That laptop might drift from a dorm room to free wifi to a home to friends house. A lot of different networks but thanks to public private partnerships not every network is difficult anymore.

Submission + - Aussie state cops outed as Finfisher law enforcement malware users

Bismillah writes: Wikileaks latest release of documents shows the the Australian New South Wales police force has spent millions on licenses for the FinFisher set of law enforcement spy- and malware tools — and still has active licenses. What it uses FinFisher, which has been deployed against dissidents by oppressive regimes, for is yet to be revealed.

Comment Re:Technical Perspective (Score 1) 267

Average nations internet service providers can keep ip, time and user name for a few years at a low cost?
Average phone companies can keep all details on all calls connected over many years.
Nations have the data split in real time, the ip, get help from the tame telcos and fully understand the internet crypto as used.
Collect everything surrounding all message, keywords and usage, save and sort. Find people been tracked connecting to new people, trace the hops and then add in all the new people to trace.
Storage is now cheap, cpu speed is cheap to sort hops, compression keeps pace over years.
Voice prints, keywords, phone numbers called all worked well in the past but no need to be so selective with the data around a call, message, fax, email, chat, web 2.0 use.
eg voice print information will will ensure any call connected with that person globally is kept.
A new person or people already in the system? Keyword use look into every message so all network users can be sorted, added.
1960's tech for calls made, numbers used. Voice prints are not new. Massive domestic surveillance exposed in 1970's has been in news a lot.

Comment Re:So they'll suffer from TMI (Score 2) 267

Nations can just use their number stations. One time pads and decades of very safe trusted sleeper agents are promoted.
Signals gathering expects the world to be using this generations ww2 ENIGMA like network over decades - tame telco crypto networks and internet will bring back lots of useful data as all other nations are not careful.
The interview with whistleblower William Binney: 'The NSA's main motives: power and money' (19.08.2014)
http://www.dw.de/binney-the-ns...
"Money. It takes a lot of money, you have to build up Bluffdale [the location of the NSA's data storage center, in Utah] to store all the data. If you collect all the data, you've got to store it, you have to hire more people to analyze it, you have to hire more contractors, managers to manage the flow. You have to start a big data initiative. It's an empire. Look at what they've built!"
Face to face, holidays, dual citizens, smart people invited in by rushed digital clearances. Clearances issued for a contractor to bring in expert staff.
Other nations have no need for their own to use the "Treasure Mapped" internet in any interesting ways.

Comment Re:it's over: the media (in the US) have moved on. (Score 4, Informative) 267

The good news is people meeting the press are more aware of having their cell phone on or powered and with them.
The press can now understand that turning off a phone can be seen as getting ready to meet a contact.
Anyone in the same area at the same time who turns off their phone might be that contact. Kind of a short list :)
The press is more aware of been under constant surveillance.
Treasure Map just adds to the collect it all idea and that digital entry or exit points can be fully reconstructed or are always been tracked.
Thats a lot of expensive effort to put into signals intelligence considering what most skilled nations fully understood about global telephone and computer networks going back over decades.

Comment Re:capabilities (Score 1) 286

Slashdot users may recall news from 2008 "Let’s Monitor All P2P" (April 17, 2008)
http://www.dailytech.com/Senat...
"Agents then track the offender on a “daily” basis, identifying them by their IP address and, in some cases, a “unique serial number” sourced from offender’s computer."
"Investigators have recorded almost 1.3 million of the unique serial numbers thus far, with about half of them residing in the United States – and that number is steadily increasing each month due to “extensive capturing” conducted since October 2005."

Comment Re:NSA's exhaustive Search .. (Score 1) 4

Mil and gov have two options:
The classic: dont connect the network with the files on during the day of the search.
Enter a few narrowly defined legal terms and get no results back from a total network search.
Other options can be water damage to files, loss due the hardware issues, a computer crashed... the selection of operating systems understood to totally reuse very limited backup storage.

Comment What the meaning of the words 'concerns' is? (Score 1) 4

Recall the "NSA Releases Snowden Email, Says He Raised No Concerns About Spying" (05.29.14)
".... the NSA released a statement and a copy of the only email it says it found from Snowden.
That email, the agency says, asked a question about legal authority and hierarchy but did not raise any concerns."
Now its just about FIOA requests finding more or wondering what was held back as as the gov felt it "did not raise any concerns"....
From no emails to one email found back to none under a definition of what identify is felt to find?

Comment Re:capabilities (Score 1) 286

That has been going on for many, many years. Every file of interest to law enforcement globally is logged and tracked over many different kinds of networks, p2p like networks in real time.
All users moving any known file have unique data about their network and computers used (beyond MAC, ip) recorded as the file is networked.
The US gov could have looked at all networks and then sorted for gov and mil workers legally. Or had the mil sort for on base networking connections on a base or mil network.
Or looked at gov/mil issued computer hardware, software and for network misuse on mil sites.
Instead the US mil collected all and then tried to sort out all people not part of any mil base.... or gov....

Submission + - New Details About NSA's Exhaustive Search of Edward Snowden's Emails (vice.com) 4

An anonymous reader writes: Vice News reports, "The NSA disclosed these new details about its investigation into Snowden in response to a FOIA lawsuit VICE News filed against the NSA earlier this year seeking copies of emails in which Snowden raised concerns about spy programs he believed were unconstitutional..... As part of this investigation, the Agency collected and searched all of Mr. Snowden's email available on NSA's classified and unclassified system. This included sent, received, and deleted email, both in his inboxes still on the networks and email obtained by restoring back-up tapes from Agency networks. Multiple members of the Associate Directorate for Security and Counterintelligence read all of the collected email. Additionally, given that organizational designators appear for each NSA sender and recipient for email transmitted on NSA's classified and unclassified systems, searches of Mr. Snowden's collected email also were done using the organizational designators for the offices most likely to have been recipients of any email written raising concerns about an NSA signals intelligence program. ... Those offices included the NSA's Office of General Counsel, the Office of the Comptroller, and the Signals Intelligence Directorate Office of Oversight and Compliance. Moreover, Sherman said, the NSA tasked the Office of General Counsel, the Office of Inspector General, and the Office of the Director of Compliance to "search for communications to or from Mr. Snowden in which he may have raised concerns about NSA programs." ..."The search did not identify any email written by Mr. Snowden in which he contacted Agency officials to raise concerns about NSA programs," ..."

Comment Re:Whenever I read stuff like this (Score 3, Insightful) 223

Re 'change in our freedoms?"
"It takes a lot of money, you have to build up Bluffdale [the location of the NSA's data storage center, in Utah] to store all the data. If you collect all the data, you've got to store it, you have to hire more people to analyze it, you have to hire more contractors, managers to manage the flow. You have to start a big data initiative. It's an empire. Look at what they've built!"
Binney: 'The NSA's main motives: power and money'
http://www.dw.de/binney-the-ns... (9.08.2014)

Signals intelligence was to "collect it all" and then sort. The next step was some lock box law for phone records to get around parallel construction in open US courts.
The UK understood if people know about signals intelligence they can move away from telco products.
The US seems to hope that all people will enjoy the freedom of buying and using that next tame consumer grade telco product.

Slashdot Top Deals

Software production is assumed to be a line function, but it is run like a staff function. -- Paul Licker

Working...