Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×

Comment Courts, medical teams, camps are ready (Score 1) 279

What are the options for the USA?
Got that negative pressure or half-facepiece respirator ready, full facepiece or hood or helmet per medial team member?
Or is the just in time supply track on the way with more expensive kit?
How many negative-pressure airborne infection isolation rooms are ready per city, state?
With all that potential for aerosolising fluids the infection-control teams really have to start thinking fast per city.
Home stay with a box of food and expert medical care visit per home per city?
Big new tent outside a regional teaching hospital? Your local Care Camp is ready too ie a drip and a camp bed.
Then you have the contractors to clean up the used camp bed and get that hermetically sealed casket.
The legal system is ready per state. The expert camp contractors are ready to feed, wash, clean and care for huge numbers of people at short notice. The caskets have always been ready.
The only question is are people ready to stay home, hope that powered air-purifying respirator was fitted correctly every day for all staff or wait for the legal order to get ready for that local camp?
So dont worry, the state and federal legal system will get people into well funded camps. The contractors have all the quality hermetically sealed caskets needed per camp.

Comment Re:The real space shuttle (Score 1) 81

Just as the tame telcos have been very helpful so have Western shipping firms ;) Lots of interesting container ships around and into China :)
The space plane is just another way of keeping the cash flowing to contractors and keeping old space related jobs safe.
Keep the expensive skill sets with a few more projects and generations.

Comment Re:The real space shuttle (Score 1) 81

Re optics of a military spy satellite... how handy would that be?
Many nations that would be interesting to a military spy satellite would have the ability to track this and over time every other US spy satellite.
The selling point of this project would have been to remove all the limitations of a traditional, trackable path of a hardware limited military spy satellite.
Other nations know its up, know kit can be swapped out, know it is a bit different and have taken simple, very low cost steps to avoid any new US spy efforts.
The handy aspect is the US tooling, profits, jobs, ongoing development boondoggle at a state and national level.
Most nations understand and track all US spy satellites, ships, aircraft new and old.
Container ships and then containers with a signals package moving deep in country would be more creative and unexpected that another expensive, trackable military spy in the sky :)
Other nations just ensure the US has something to see 24/7 from space. A bit harder now than than classic warm shadows. Lined up in neat rows and countable.

Comment Standardize one-time pads (Score 1) 210

The problem is text is decrypted back to plain text looking for advertising on the free email services after they offer their free new https all the way.
The message is then seen as classic random numbers and is then flagged at some stage as using encryption and further sorting by gov/mil.
The gov/mil does not care what is in your message but the slightest hint that any person is using crpyto like numbers or letters in bulk would ensure any ip, user, isp is noted.
That message glows.
Expect 3-4 level of hops to all other communications to be looked at retroactively and users listed for future tracking. Friends of friends going back. "Collect it all" gets it all and can then be given a sorting task.
The good news is the one time pad works. The fun part is getting the format to look very normal and be machine readable for advertizing.
The bad news is random numbers stand out, the path of the message stands out and will ensure a lot of interest from gov/mil with global reach and years of storage.

Comment Re:No Google (Score 1) 210

FBI quietly forms secretive Net-surveillance unit (May 22, 2012)
http://www.cnet.com/news/fbi-q...
Somewhere between a tame telco, tame hardware, tame software and the "Communications Assistance for Law Enforcement Act" https://en.wikipedia.org/wiki/...
an average users gps, voice, text, images, voice print and all other cell related data will be as easy to get as always.
An average user might be sold on the idea that some user data is protected from wider outside network man in the middle efforts but that will not help with CALEA and a tame brand having to sell compliant telco products in the USA over generations.
Staff often then move into the private sector and then contract methods and skill sets back at a city and state level. Thats a lot of people with the keys to consumer grade telco standards.

Comment Re:our american friends (Score 1) 228

re 'It is difficult to compromise open source crypto."
If the crypto is quality and correctly used every time, just follow the use down the tame network to the tame operating system or charm, make friends with the users.
Over time the message entry and decryption side reverts to plain text, thanks to understood OS, tame network, turned staff, users with new friends, new staff, malware or physical access.

Comment Re:our american friends (Score 1) 228

There is not much any nation can do anymore. All the top staff gov or mil crypto staff are of the same mind set going back to the 1950's. Thats generations that got cleared by the US and where educated into UK and US methods in West Germany. They then ensured like minded West German staff where selected to replace them years later.
They all know how to keep the optical sites running data to the US and UK. They know how to pass crypto that is just good enough for German use but is open to the US and UK as used and is kept degraded over decades.
Crypto at an international and US domestic level seems to be favoured front companies, tame staff, turned staff or have staff trained to a mid or top level over years.
Products sold or pushed on a US domestic or for international standards would seem to be safe from man in the middle efforts but very open to the US, UK, cleared staff, ex staff, former staff.
Germany would need to find staff not tainted, trained, cleared or selected by the US and UK with the skills to create new German crypto.
Word would get around within the German academic community and the US and UK would ensure any such effort was tamed or defunded.
Back to face to face meetings or one time pads.

Comment Re:DOJ Oaths (Score 3, Interesting) 112

It really depends on the quality of parallel construction needed and what has to be presented in an open US court.
"Feds reviewing DEA policy of counterfeiting Facebook profiles" (Oct 9 2014)
http://arstechnica.com/tech-po...
"Twitter says gag on surveillance scope is illegal “prior restraint”" (Oct 8 2014)
http://arstechnica.com/tech-po...
US says it can hack into foreign-based servers without warrants (Oct 8 2014)
http://arstechnica.com/tech-po...
It seems the NSL aspect is just one aspect a very complex, hidden way of getting and using data for later use in the US legal system.
In the past other surveillance programs like FAIRVIEW, OAKSTAR, RAMPART-A and WINDSTOP could bring in the data locally, globally via friendly nations and tame trusted big brands.
The NSL seems to just fit in between a global sorting and direct use in the US legal system.
It really depends how this plays out. Will the classic GCHQ view of not going to court so people feel like nothing telco related is going on?
Or the new US idea that surveillance is now of such a global reach and low cost that US courts can know and and will have to just understand "collect it all"?
The keys to a server and all users over time are now in play even if its just for legally finding one user for one case.
Once your servers are part of a case, who can legally say that case has stopped? Weeks, months, years of no crypto and all logs. All very legal now? Soon?

Comment What, wait?! (Score 1) 78

RE 'US doesn't even trust the other Five Eyes nations' spy agencies to be able to do this?*"
Some data is kept private for 5 Eye political leaders and policy formation over decades or longer.
Some information needs to be laundered in public in the short term to ensure good public relations spin, good news for sock puppets on social media or new public funding for gov/mil.
The press finds a new story.

Comment who is doing the spying? (Score 1) 72

Depends on the city, state or federal funding. In the past 10 or so years huge amounts of funding, contractors and quickly cleared staff having been moving around all over the USA.
Products have been sold, technical support and maintenance is in place for years covering federal and state needs.
Now its up to the locals to find something to do with the cell phone data, maps, voice prints, credit card usage, cctv, gunshot location systems and keystroke-capturing.
The information sorting is done by local or federal staff and then presented to local or federal officials to then put in for more funding or to buy in more private sector systems once new local patterns are found.
The only trick is to keep people buying cell phones and enjoying social media in near real time over decades.
The tracking systems are now in place down to the town, city and state level. The public just has to keep on having tame telco products on them at all times.

Comment FBI hidden agenda (Score 1) 78

Follow the press and PR. The US was finding and stopping computer issues around the world in public.
The US was finding out about computer networks around the world.
Information was flowing back to the US using consumer grade networks and tools found in the wild using the pubic as cover.
Recall Operation CHAOS (or Operation MHCHAOS) https://en.wikipedia.org/wiki/... and COINTELPRO https://en.wikipedia.org/wiki/...
Just like now domestic groups where needed with liaison services.

Comment Re:Malware infection vector? (Score 1) 31

A person at a cafe, gym gets near a person who has clearance, a file worked on at home is infected, a well crafted email that is opened on an internal network.
With wireless, huge internal networks and new staff been security cleared for very sensitive positions over the past decade... it more connecting a project to staff to a location and working the needed code in.
Internal networks are well understood as they are the same product sold around the world, trusted or been expanded with security to be upgraded when done.
Ideas around cloud, sharing data, regional and national searching is also a new aspect to what was one air gapped. Contractors are also happy to suggest wider networking, upsell their network security and onging network support.

Slashdot Top Deals

He has not acquired a fortune; the fortune has acquired him. -- Bion

Working...