Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×

Comment Re:Crooked politicians. (Score 1) 60

Yes people who are interested in a free internet will just pay under say $7-$20 a month for an encrypted network out of Canada.
All the Canadian provider and gov will see is a stream of encrypted data every month to an ip out of Canada.
The Canadian ISP is happy to block sites, the VPN is very happy with the new user, the user is enjoying the wider internet as normal.
A newer law to block any VPN provider getting funding from a Canadian bank or credit card?

Comment Re:Knew it was too good to be true. (Score 1) 161

The good part is people now know understand the junk encryption, the junk hardware as shipped, the software that is wide open to governments as designed.
People also have the option not to buy or support the big bands that have failed to secure their expensive systems over generations and decades.
Everyone can see the digital Berlin wall and who funded it and supports it.
Return to the number pad, number station, support people and buy from brands that warned generations of users.
The "toy" is a digital key to most big brand servers sold and installed globally.
The vast illegal domestic surveillance network keeps it funding and contractors but the rest of the world will just route around the junk standards.

Comment Re:Fear of the past (Score 1) 136

How far back do you want to go? France had a very good understanding with Germany in WW2 after its surrender. France worked well with and helped Germany under occupation. The US also had Operation Paperclip and other technical needs that where filled by Germans after WW2.
The US was also aware of some early French atomic power work and patents from the 1940's that would have made total US control of post war nuclear power interesting. The US was not going to allow France get into the lucrative post war nuclear age with early French nuclear patents.
The US interest in French codes goes back to the TICOM https://en.wikipedia.org/wiki/... efforts at the end of ww2 to see what France (and free French during ww2) was going to do after ww2. The US and UK found a unit of Italian code experts that had an understanding of French methods in the 1940's and used them (under TICOM) to break French diplomatic traffic after ww2.
As France was rebuilding this flow of embassy traffic was vital to the US and UK as they got product from French embassies in eastern Europe.
At some point France finally worked out it was losing all its embassy traffic to the US and UK and finally worked out how to shield some of its crypto hardware (total tempest leaking is not good).
Into the 1950's the US put massive efforts into French product. By the early 1970's France was working well with the UK (at a JIC level) and US in all military and crypto areas.
France worked well with the UK over the Falklands, offering all technical details to the UK on systems delivered. The 1987 Libya and Chad boarder war saw the French, CIA and UK work very well together.
The US fear is that quality French brands and products will sell well at a good price and be in demand around the world. South America, Africa, Asia. All parts of the world the US expects to push new US products and services into.
So France and its top exporters are under constant surveillance by the US gov until the US can capture all French export markets.

Comment Re:How is this considered private data? (Score 1) 131

It depends on who gets to see the data and why over time.
The political power structure in a city or county may not like protests by unions, human rights groups, peace protesters, people of faith or local bitter clingers out in public.
By collecting all data about transport in the area at the time a of a first amendment event a list of local people can be considered for visits or chat downs by local law enforcement.
Been seen with a DSLR or other HD video like camera on public land? Are you out of state press, a real journalist? Tame local press? A citizen journalist? On some first amendment audit? Doing another FOIA like state public records/open records request?
Just re play the local plate collection as see who was driving or who picked the person of interest up if they walked away.
The consensual contact with local law enforcement can then be shaped from no contact needed to a request to show ID or a more direct chat down until photo ID is "voluntarily" shown.
The other use of well funded cameras locally is to get a nice picture of the passenger and driver on select/the only main road. Add that with cell phone information (stingray) and a nice database can be constructed with federal grants at a very local level.

Submission + - Why the US Navy warfare systems command is paying millions to stick with Win XP (computerworld.com.au)

angry tapir writes: The U.S. Navy is paying Microsoft millions of dollars to keep up to 100,000 computers afloat because it has yet to transition away from Windows XP. The Space and Naval Warfare Systems Command, which runs the Navy's communications and information networks, signed a US$9.1 million contract earlier this month for continued access to security patches for Windows XP, Office 2003, Exchange 2003 and Windows Server 2003.

Comment Re:How long will it take? (Score 1) 83

Re: "How long will it take before people finally see":
Internally the 1980's trade union ban was telling and the public could see the marching by UK staff to keep their union membership.
The union ban stayed in place for years and reflected on hours, working conditions and how the UK gov treated its own trusted security cleared staff.
The wider public and security researchers now fully understand cell-site tracking, dirtboxes, voice prints, junk global encryption standards, efforts against VPN, efforts to contain all security software, total recall of all networked communications within or out of the UK.
What seems to be new is understanding of the change from just total network collection to use of sock puppets and tracking of "thinking" or talking to the press or publishing domestically.
Methods once hinted at been reserved for foreign journalists or gov officials is now understood to be in use domestically for any domestic thought crime.
The methods seem to be reverting back to a 1920-50's idea to have total control over the press, new media and people using the domestic media.
People where much more easy to track if they thought they where "free" like in the and the UK gov fully understood that.
Once people understand the networks are all been tracked they will just stop using the effortless digital networks.
The UK will then be back to the expensive problem of having to use very traditional methods.

Submission + - China Allows Foreigners To Own E-Commerce, Companies Leaving New York (barrons.com)

hackingbear writes: China has decided to give foreign investors greater freedom in the booming e-commerce industry by allowing them to fully own e-commerce companies in the country, the Ministry of Industry and Information Technology (MIIT) announced Friday. No longer needing the cumbersome VIE structure, an offshore special purpose vehicle that simultaneously allows foreign ownership and domestic operation, and considering Chinese Internet companies trade at an average of 150 times in the mainland, Chinese companies listed in the U.S., most of those are actually owned by foreigners like Yahoo, are receiving management-led buyout offers at record pace, the latest being Qihoo 360 (QIHU), which needs a whopping $7 billion financing package to complete the deal. Valuation differential with China aside, Chinese companies are also subject to short seller attacks. For instance, J Capital last week wrote a short report on JD, which Jefferies brushed aside as non-sense.

Submission + - US, UK Intel agencies worked to subvert antivirus tools to aid hacking (arstechnica.com)

An anonymous reader writes: Documents from the National Security Agency and the United Kingdom's Government Communications Headquarters (GCHQ) obtained by former NSA contractor Edward Snowden reveal that the two agencies—and GCHQ in particular—targeted antivirus software developers in an attempt to subvert their tools to assure success in computer network exploitation attacks on intelligence targets. Chief among their targets was Kaspersky Labs, the Russian antivirus software company, according to a report by The Intercept's Andrew Fishman and First Look Media Director of Security Morgan Marquis-Boire.

Submission + - Controversial GCHQ Unit Engaged in Domestic Law Enforcement, Online propaganda (firstlook.org)

Advocatus Diaboli writes: The spy unit responsible for some of the United Kingdom’s most controversial tactics of surveillance, online propaganda and deceit focuses extensively on traditional law enforcement and domestic activities — even though officials typically justify its activities by emphasizing foreign intelligence and counter-terrorism operations. Documents published today by The Intercept demonstrate how the Joint Threat Research Intelligence Group (JTRIG), a unit of the signals intelligence agency Government Communications Headquarters (GCHQ), is involved in efforts against political groups it considers “extremist,” Islamist activity in schools, the drug trade, online fraud, and financial scams. Though its existence was secret until last year, JTRIG quickly developed a distinctive profile in the public understanding, after documents from NSA whistleblower Edward Snowden revealed that the unit had engaged in “dirty tricks” like deploying sexual “honey traps” designed to discredit targets, launching denial-of-service attacks to shut down internet chat rooms, pushing veiled propaganda onto social networks, and generally warping discourse online.

Comment Re:Warrant not required to seize phone. (Score 1) 509

Get a person with a video camera talking, to try and talk a person into showing photo id during a chat down or track until a license plate is seen.
A lot of local effort is put in to find out if the person is real journalist doing real work on an emerging or local story or has some out of state journalist like id on them.
A tame journalist phones ahead and is given a press release.
Questions can range from asking about profession or the "why camera in use", what is/has been recorded, what is of any interest in the local area, to try and get a person talking and then induce a photo id or press id to be given.
A very effective method is to suggest things seen from public on public land cannot not be seen by the public for some legally vague federal or state reason.
That induces a long quality chat, more questions, statements about rights at a state and federal level.
Another method is to surround a person with a camera and get them to face different styles of questions until they show state/press photo id or are 'free' to walk to their car.
Licence plate recognition, voice print and facial recognition is the real tool at local level and would be very easy with a few friendly lines about been on public, enjoying photography and staying on public land.
The problem with the cell phone is: was it steaming, will it be locked when examined and the later press optics of a hand moving to grab a phone.

Comment Re:Problem only for now (Score 1) 509

It really depends where the data ends up too. Live stream to a public server with other people seeing and making a copy in real time?
Streaming to a file that one person has to connect to later?
A copy kept in the device.
If its to a public, live service then the material exists globally from that device.
A request could be made to hand over all passwords related to the device and service.
If the device is examined and found to be a protected upload site with a file, that could get interesting before a lawyer can get to their client.
A local copy in the device could just fail at some point and be unrecoverable.
Ensure any streaming service is useful and seen in realtime.

Comment Re:Riiight... (Score 1) 82

It depends how the US saw its needs been met for a massive in flow of university skill sets over decades.
Every applicant would face same database search- state and federal, a interview with family, friends depending on the position, contractor, gov, mil.
Historically that could be done as part of the draft or national service 'testing' for math, languages in some countries.
Other nations just had vast university networks to feed in their maths, science, anthropology, language, computer science, psychology skill sets as needed.
Nations my opt to use front companies or cut outs of keep skill sets in a business, faith, academic or telco setting.
The other option is just to have national advertising that shows the clandestine services are looking for staff, have a go with your life story and you might make the interview stage. Top public service wages and condition mentioned, broad areas of interest to the gov (languages, math) but few other details.
The good news about that massive approach is it keeps everybody guessing as to the final intake needs for that year or decade.
The US seems to have two huge issues. Attracting the very top university students and keeping them over decades.
Wages and good conditions where something the US could always offer and the UK had to learn to offer beyond the 1970's.
The other issue is ensuring enough publicity as students exit an academic setting and enter the wider US work force. The US crypto and other US mil/gov related clandestine services have to position themselves as been a well paying, long term alternative to anything in the public or private sector and ensure a lot of students saw that message every year..
The massive needs for the US gov and mil to draw new people in with needed skills, other nations ideas about using hidden methods to suggest options in the gov/mil as part of an academic setting.
Part of that would be a new social media and contractor based employment network to show how fun and easy changing jobs, contractors could be. Word would spread that getting a clearance was not very hard, that listing work done was allowed and opened up a lot of new opportunities.
The US had a different way of creating interest in and keeping a flow of expert staff for its clandestine services.

Slashdot Top Deals

Never test for an error condition you don't know how to handle. -- Steinbach

Working...