Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror
×

Comment Re:Whitelisting real mobile carrier towers (Score 1) 140

It depends on what the next gen can do. The change of cell phone coverage patterns was a tell in the past that an app could detect, map and share.
How smart will the next modded smartphone have to be to detect expected local network changes?
Some ability to map normal for the area and then look for changes? The interesting part is a permanent site would be given settings that would be seen as a new normal.
Looks like a new smaller cell site with urban features, connects like a cell site, passes all types of data to and from a phone like all other normal cell sites.
The problem the US legal systems seems to have is that of telco trust. Why not just use the telco sites with local telco experts?
What has the US legal systems found out over the years about national, multinational or foreign telco databases and tracking cell numbers and users that it has to go with its own special hardware?
The need to keep IMSI-catcher like systems away from courts, cleared lawyers and trusted domestic telcos systems is telling.

Comment Re:Current news... (Score 1) 50

How many people where seen in all weather conditions per area?
For the price where the drone sensors on offer useful for the tasks and areas covered?
How many drones contracts would have been needed for a total 24/7 look down over the entire border area of interest?
How did that flow and direction of people, vehicles spotted fit with existing data from traditional counts?
What other data was collected? Look down mapping on a small section of a state? Add in driver, passenger faces, plate number (back and front), voice print from a "random" check point chat down with drone data, all cell phone data collected?
Cost per coverage area with optical and other systems state wide, border wide?
A nice deep sealed digital wall beyond the border areas.

Comment Re:Going to be a noob (Score 1) 213

It depends on how interesting you are and who you work for or where you travel.
Or the resale or fun of getting massive amounts of account logins.
Security services, federal, state gov, a local court, local gov, a private group that works for local gov, staff that has local gov access, a private group that works for contractors with access, a person who can afford to request the account be found, tracking a journalist who had a email from that brand of email provider.
Tracking back that persons phone gets to be interesting for anyone interested in that person or just after seeing their email used in public online.
What the security services can do with malware like tools should be well understood in 2015.
News about telco keeping phone logs over decades is now public.
The social engineering, honeytrap of a person, 'perfect' new friend getting near the phone?
Seen walking or driving near a protest away from the First Amendment zones, been near a journalist? When does a phone and all its accounts become interesting?
The "sandbox architecture provide enough of a firewall" exists for keeping other end users out.

Submission + - FBI's Big Plan To Expand Its Hacking Powers

Presto Vivace writes: DefenseOne reports:

the rule change, as requested by the department, would allow judges to grant warrants for remote searches of computers located outside their district or when the location is unknown.

The government has defended the maneuver as a necessary update of protocol intended to modernize criminal procedure to address the increasingly complex digital realities of the 21st century. The FBI wants the expanded authority, which would allow it to more easily infiltrate computer networks to install malicious tracking software. This way, investigators can better monitor suspected criminals who use technology to conceal their identity.

But the plan has been widely opposed by privacy advocates, such as the American Civil Liberties Union, as well as some technologists, who say it amounts to a substantial rewriting of the rule and not just a procedural tweak. Such a change could threaten the Fourth Amendment’s protections against unreasonable search and seizures, they warn, and possibly allow the FBI to violate the sovereignty of foreign nations. The rule change also could let the agency simultaneously target millions of computers at once, even potentially those belonging to users who aren’t suspected of any wrongdoing.

Comment Re:Let's tie my comm links unseparably together (Score 1) 213

The problem long term is people feel very secure with a phone and fancy new code.
Only the site sending the code and 'the users' phone will ever know :)
The phone is on all day, the logs are kept for years, lots of different groups might get the logs in bulk for official use or even local legal issues.
Thats a very long term record of a username, when created and all connected phone activity, movements over many years.
The mutitude of passwords and logins do offer a user the ability to only keep data with a desktop or a device or one company.

Comment Re:Mostly academic... (Score 1) 68

GCHQ staff teach 'future spies' in schools (9 March 2011)
http://www.bbc.com/news/educat...
"It is this decline which prompted GCHQ to start visiting schools to promote languages and also science and technology."
The option to use a chipset that was gaining traction in the media for eduction would have been a consideration.
Good optics and branding with a happy all UK message.

Comment Re:No Easy Solution (Score 1) 273

Re "I love the flip-flop from "war is wrong" to "to the winner go the spoils" without the least hint of cognitive dissonance."
Vietnam won its freedom from France, Japan and US backed coups. It can now do what it wants with its own sites and offer deals to any other nation it likes.
Vietnam can now also trade with or accept help from any nation it likes.
Vietnam no longer has a US back junta in power. The US seems just as up set with the UK over the Asia Infrastructure Investment Bank issue.
Support for China-led development bank grows despite US opposition (13 mar 2015)
http://www.theguardian.com/wor...

Comment Re:Beat Your Plowshares Into Swords (Score 1) 123

That would go a long way to counter the open and closed systems that ship with a few encryption standards that they all share and have been set for use over the years.
Only now are a new generation of crypto experts finally understanding what can be done to compilers, crypto, telco, networks, OS and applications when a gov asks, funds or requests.

Comment Re:depressed (Score 1) 123

Be aware of the boondoggle and rent seeking contractors and brands they front for or watch over for mil and gov interests.
The mainstream phone ecosystem is now well understood to track, gps, record, locate and log all material for later review over years.
So keep that phone when just working or walking.
If your meeting a journalist be aware of what kind of tracking they bring to a meeting and the tracking you will face after that meeting.
Rethink any mainstream phone devices during that contact and be aware of CCTV and all other tracking systems in the area.
Re "bit of space to myself" really depends on the activity. Surfing the web now and been logged then been found talking to a member of the press in a few years?
The use of Informants online? Be aware of new online friends that just keep chatting.
For anything else use one time pads and number stations. Expect every network and computer like device sold to be crypto aware and leak plain text by default as shipped.

Comment Re:The Big News (Score 1) 119

Re: "They probably also write some of the more popular free games/apps out there as well. Not a great way of bugging a phone but still a way of getting their malware out there. Or at least it wouldn't hurt..."
The telco network tracks a person, the soft glowing power down and sealed battery design ensure a device is always network ready, the hardware is mic, text, gps gov wiretap friendly as designed. Games help keep a person wanting to ensure the device is powered and in use during the day and into the night :)

Comment Re:Compiler compromise (Score 1) 119

How many methods can ensure every product ships with a tame always ready trap door and back door for the US gov?
The US gov has a few options as the public history of the NSA and GCHQ shows.
Ensure the product design is set to a standard thats open to the security services.
Generations of brand staff help the security services with every product and network as developed.
The security services set up their own front company and sell to the world over decades setting tame junk standards.
Any other method will require a change in the software or hardware after shipping that would make a device unique.
If every device from a brand is crypto junk as shipped, a user can swap, rebuild, buy or upgrade all they like.
The security services will be back with that connection and user of interest no matter the brand, product, year, version or upgrade.

Comment Re:How does stingray connect to the wider network? (Score 1) 90

The value for this kind of interception is it gets the call details, voice print, location, unique id and numbers of interest with only law enforcement knowing.
The interception side will not need a telco database, any telco legal oversight, any staff at a telco understanding what cell users are of interest to law enforcement officials. No telco costs to a city or state, no other staff or teams to see the legal requests in advance or databases been set up to log users.
Has the US gov found leaks in the way local or national telcos log or store details about users under legal court surveillance?
No comment about discovery to a legal team before or during trial. A vast local and federal database can be constructed of calls, voice prints, locations, text and transcripts.
The published or in public court telecommunications providers assistance to law enforcement officials stats and costs look the same every year.

Comment Re:New Zealand spies... (Score 1) 129

Trade, aid and diplomatic cables. Anything that could degrade NZ standing in the region and have it replaced by a France, EU, Japan or China.
NZ can also trade its geographic location to the US and UK to offer them full civil, naval and military satellite intercepts in the region.
For that NZ gets huge hardware and software upgrades it could never afford and gets to share in the raw material of interest to NZ.
US and UK staff also get to be "attached" to the NZ effort and can see the world and help with collection around the world. Generations of staff get an understanding of regional telco systems and bulk US/UK collection globally. NZ faced new cypher machines in Japan and had to work hard with the US and UK to get back in the 1980's.
NZ is looking for everything in real time just like the US and UK. Different diplomatic cables might be of more interest but NZ is getting everything in the region and beyond. The prestige of raw traffic.

Slashdot Top Deals

You knew the job was dangerous when you took it, Fred. -- Superchicken

Working...