Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror
×

Comment Re:Warrant not required to seize phone. (Score 1) 509

Get a person with a video camera talking, to try and talk a person into showing photo id during a chat down or track until a license plate is seen.
A lot of local effort is put in to find out if the person is real journalist doing real work on an emerging or local story or has some out of state journalist like id on them.
A tame journalist phones ahead and is given a press release.
Questions can range from asking about profession or the "why camera in use", what is/has been recorded, what is of any interest in the local area, to try and get a person talking and then induce a photo id or press id to be given.
A very effective method is to suggest things seen from public on public land cannot not be seen by the public for some legally vague federal or state reason.
That induces a long quality chat, more questions, statements about rights at a state and federal level.
Another method is to surround a person with a camera and get them to face different styles of questions until they show state/press photo id or are 'free' to walk to their car.
Licence plate recognition, voice print and facial recognition is the real tool at local level and would be very easy with a few friendly lines about been on public, enjoying photography and staying on public land.
The problem with the cell phone is: was it steaming, will it be locked when examined and the later press optics of a hand moving to grab a phone.

Comment Re:Problem only for now (Score 1) 509

It really depends where the data ends up too. Live stream to a public server with other people seeing and making a copy in real time?
Streaming to a file that one person has to connect to later?
A copy kept in the device.
If its to a public, live service then the material exists globally from that device.
A request could be made to hand over all passwords related to the device and service.
If the device is examined and found to be a protected upload site with a file, that could get interesting before a lawyer can get to their client.
A local copy in the device could just fail at some point and be unrecoverable.
Ensure any streaming service is useful and seen in realtime.

Comment Re:Riiight... (Score 1) 82

It depends how the US saw its needs been met for a massive in flow of university skill sets over decades.
Every applicant would face same database search- state and federal, a interview with family, friends depending on the position, contractor, gov, mil.
Historically that could be done as part of the draft or national service 'testing' for math, languages in some countries.
Other nations just had vast university networks to feed in their maths, science, anthropology, language, computer science, psychology skill sets as needed.
Nations my opt to use front companies or cut outs of keep skill sets in a business, faith, academic or telco setting.
The other option is just to have national advertising that shows the clandestine services are looking for staff, have a go with your life story and you might make the interview stage. Top public service wages and condition mentioned, broad areas of interest to the gov (languages, math) but few other details.
The good news about that massive approach is it keeps everybody guessing as to the final intake needs for that year or decade.
The US seems to have two huge issues. Attracting the very top university students and keeping them over decades.
Wages and good conditions where something the US could always offer and the UK had to learn to offer beyond the 1970's.
The other issue is ensuring enough publicity as students exit an academic setting and enter the wider US work force. The US crypto and other US mil/gov related clandestine services have to position themselves as been a well paying, long term alternative to anything in the public or private sector and ensure a lot of students saw that message every year..
The massive needs for the US gov and mil to draw new people in with needed skills, other nations ideas about using hidden methods to suggest options in the gov/mil as part of an academic setting.
Part of that would be a new social media and contractor based employment network to show how fun and easy changing jobs, contractors could be. Word would spread that getting a clearance was not very hard, that listing work done was allowed and opened up a lot of new opportunities.
The US had a different way of creating interest in and keeping a flow of expert staff for its clandestine services.

Comment Re:The thing to say is (Score 1) 3

Many great apps for that now and over the years.
Bambuser, GotYa! for when a phone is been unlocked via front facing camera.
The only thing a gov can do soon is block cell towers, wifi in entire areas and hope to collect all devices in that area.
The other aspect is asking a person to unlock any and all accounts from that phone a few hours later and remove the uploaded copy before any legal team is notified or the person gets back to any computer.
23h later a lawyer sits down and its a matter of classic written notes.
That would depend on where the file is streamed and who has access over time.
A public live site would be good :)

Comment Just use the towers... (Score 1) 1

Feds gather phone data from the sky with aircraft mimicking cell towers (Nov 14, 2014)
From http://arstechnica.com/tech-po...
What was once used for " Spy-in-sky patrols over British cities in hunt for Taliban fighters" voice prints ( 3 August 2008) http://www.dailymail.co.uk/new... is now for collecting everything over a city.
The real new lower cost funding idea is the voice print use at a city and state level. Journalists would be easy to track as they phone in details about their day on any phone. Any phone near/meeting a journalists phone would be tracked. The ability to map put movements over days, weeks, who meets who, what phone is turned on when, who uses it, numbers, images, video all gets logged.
Why is the US using flights that can be seen? People look up and see/hear the changes and start chatting about the flights.
Why did the US not just stay with the existing cell towers, they are law enforcement ready by design and would pick up every call, voice, text, image, video as used. Why the lack of cell tower use if its just for passive mapping, tracking, collection?
Flights with cell phone simulators over areas with voice print access have been in popular culture for years since the 1990's in movies, books, fiction, newspapers, historical and open court documents...
Wifi use?

Submission + - Meet The FBI's Secret 'Eye In The Sky' Overseeing The Baltimore Riots (zerohedge.com) 1

schwit1 writes: As Benjamin Shayne settled into his back yard to listen to the Orioles game on the radio Saturday night, he noticed a small plane looping low and tight over West Baltimore — almost exactly above where rioting had erupted several days earlier, in the aftermath of the death of a black man, Freddie Gray, in police custody.

The plane appeared to be a small Cessna, but little else was clear. The sun had already set, making traditional visual surveillance difficult. So, perplexed, Shayne tweeted: “Anyone know who has been flying the light plane in circles above the city for the last few nights?”

That was 9:14 p.m. Seven minutes later came a startling reply. One of Shayne’s nearly 600 followers tweeted back a screen shot of the Cessna 182T’s exact flight path and also the registered owner of the plane: NG Research, based in Bristow, Va.

As it turns out, Shayne had unwittingly uncovered a secret FBI overhead surveillance campaign carried out over Baltimore during the riots that set the city ablaze late last month. The operation involved two planes circling the city, and as WaPo notes, if equipped with the latest technology, the aircraft would have been capable of monitoring “dozens of city blocks” at a time. The revelations have prompted the ACLU to demand answers as to the legality of what an unnamed official calls FBI “aerial support”

Submission + - LinkedIn used to create database of 27,000 US Intelligence personnel (zdnet.com)

An anonymous reader writes: A new group, Transparency Toolkit, has mined LinkedIn to reveal and analyse the resumes of over 27,000 people in the US intelligence community. In the process, Transparency Toolkit said it found previously unknown secret codewords and references to surveillance technologies and projects. It aims to use the database for crowd-sourced data mining to "watch the watchers".

Comment Re:*Why* there is too much noise (Score 1) 56

The other change beyond the funding quantity was the prestige of advancement beyond just been invited in for signals support or an archive function for other expert mil and gov work.
Real time work, setting policy was the new upgrade. New systems, contractors, linguistics, networks.
The domestic and international telco networks as they have existed and exist now are not a problem in terms of scale or access for the NSA and GCHQ.
Collect it all has always worked well given the all digital systems and funding.
Bulk collection has never been a problem since the 1930's for the USA. The UK and US did have a few Russian and Korean language issues back in the 1950's due to all the information been collected. That was quickly fixed.
The only question that has existed is what the press and historians understand. The UK view was that no signals collection material was to ever to been seen in any public court setting or commented on. Collect it all would not exist in the UK as public policy. The US is now talking of public lock boxes for all telco use been open to courts and devices sold with gov backdoors, trapdoors to reverse any crypto as used.
Watching the Soviet Union was not never a problem of how or been in need of more equipment. Understanding all US domestic and international calls was never a problem over many decades. The real question was the use of the result (ever more closed court use) or and who in mil/gov gets to set and shape policy.
Who will see the better result?
The classic UK view of letting people just use the telephone and networks as normal while collecting all? The results been used with great care as to never offer any public insight into what was done..
Or the US public talk of gov keys kept for consumer crypto and huge telco databases open to courts over decades? The public fully understanding their new phone/crypto is a tool of the gov/mil as sold.

Comment Re:TLDR (Score 1) 17

A digital Berlin wall to find whistleblowers on any network and a new generation of private company boondoggle funding.
Contractors and mil systems that once faced the Soviet Union are now invited in for domestic use via new "portals".
Some Freedom of Information Act provision might allow for talking about projects historically but less of the secure in papers, and effects, against unreasonable searches domestically.
The collective agencies are free from antitrust scrutiny, liability and are free use the cyberthreat, cybercrime aspects as desired domestically.

Submission + - Obama unveils 6-year-old report on NSA surveillance (ap.org)

schwit1 writes: With debate gearing up over the coming expiration of the Patriot Act surveillance law, the Obama administration on Saturday unveiled a 6-year-old report examining the once-secret program to collect information on Americans' calls and emails.

They found that while many senior intelligence officials believe the program filled a gap by increasing access to international communications, others including FBI agents, CIA analysts and managers "had difficulty evaluating the precise contribution of the PSP to counterterrorism efforts because it was most often viewed as one source among many available analytic and intelligence-gathering tools in these efforts."

Comment The future? (Score 1) 225

Infiltration worked so well. Cooperation, leniency for working with the gov. Years of free charming, charismatic chatroom leaders and their accomplishments, forums and gov funded onion networks.
Once a person and all their data is lost the only hope is a "security check" word, phrase. Something that can be added or left out that shows duress or coercion.
That was the past.
Now with OS, hardware and telco collaboration expect every consumer device to have a backdoor or trap door as sold.
The backdoor or trap door would have been expected for the security services at a national level.
Now that same level of expert contractor is ready for state, city and local law enforcement use on any device recovered.
The same offer of cooperation, leniency, working with the gov will be made and a 'show' about needing the passwords over hours and much longer.
The device, network is open in seconds and the isolated holding time is been put to use.
The new trend is movement around a city with no access to any lawyer for many hours..
Just before some legal time limit for court documentation a person is released or the lawyer is finally allowed access for the first formal recorded interview.

Comment Re:This is so much cheaper for the US (Score 2) 80

The US West German and German links go back generations.
https://en.wikipedia.org/wiki/...
https://en.wikipedia.org/wiki/...
After the 1970's East Germany was not of any new interest to the UK and USA as all Soviet and East German signals where fully tracked. West Germany policy on the US and UK was of more interest to the US and UK.
Tornado jet sales, the UK East German diplomatic recognition, West German political moves surrounding the UK role in the Common Market.
Generations of West German experts helped the US and UK find out what was needed over many decades in West Germany.
The next move by the NSA and GCHQ was to pull West Germany deeper into a "third party" collection into the 1980's.
West Germany would get US export grade mil systems in exchange for all US/UK access to emerging West Germany telco networks.
What Germany now has is the product of past ww2 politics and generations of total telco collaboration by West/Germans for the US and UK.
Tame crypto and all political telco networks totally linked to the US and UK.

Comment Re:What new challenges? (Score 1) 230

Access to voice, text, location, ip is all that is needed. The ability to collect it all is a given over decades in real time for the UK. Interception techniques have kept pace thanks to sigint modernisation like programmes.
What a network looks like the public or is said in public has no relation to any telco network that is totally open to the security services by design.

Slashdot Top Deals

This file will self-destruct in five minutes.

Working...