Follow Slashdot stories on Twitter


Forgot your password?

Slashdot videos: Now with more Slashdot!

  • View

  • Discuss

  • Share

We've improved Slashdot's video section; now you can view our video interviews, product close-ups and site visits with all the usual Slashdot options to comment, share, etc. No more walled garden! It's a work in progress -- we hope you'll check it out (Learn more about the recent updates).


Comment: Re:How does stingray connect to the wider network? (Score 1) 88

by AHuxley (#49192023) Attached to: US Marshals Service Refuses To Release Already-Published Stingray Info
The value for this kind of interception is it gets the call details, voice print, location, unique id and numbers of interest with only law enforcement knowing.
The interception side will not need a telco database, any telco legal oversight, any staff at a telco understanding what cell users are of interest to law enforcement officials. No telco costs to a city or state, no other staff or teams to see the legal requests in advance or databases been set up to log users.
Has the US gov found leaks in the way local or national telcos log or store details about users under legal court surveillance?
No comment about discovery to a legal team before or during trial. A vast local and federal database can be constructed of calls, voice prints, locations, text and transcripts.
The published or in public court telecommunications providers assistance to law enforcement officials stats and costs look the same every year.

Comment: Re:New Zealand spies... (Score 1) 125

by AHuxley (#49184169) Attached to: New Zealand Spied On Nearly Two Dozen Pacific Countries
Trade, aid and diplomatic cables. Anything that could degrade NZ standing in the region and have it replaced by a France, EU, Japan or China.
NZ can also trade its geographic location to the US and UK to offer them full civil, naval and military satellite intercepts in the region.
For that NZ gets huge hardware and software upgrades it could never afford and gets to share in the raw material of interest to NZ.
US and UK staff also get to be "attached" to the NZ effort and can see the world and help with collection around the world. Generations of staff get an understanding of regional telco systems and bulk US/UK collection globally. NZ faced new cypher machines in Japan and had to work hard with the US and UK to get back in the 1980's.
NZ is looking for everything in real time just like the US and UK. Different diplomatic cables might be of more interest but NZ is getting everything in the region and beyond. The prestige of raw traffic.

Comment: Re:First "Full Take" Confirmation? (Score 1) 125

by AHuxley (#49184077) Attached to: New Zealand Spied On Nearly Two Dozen Pacific Countries
The personal papers of a former NZ Prime Minister did have a top secret report about what NZ was doing in the 1980's.
Lange's secrets (15 January 2006)
Of interest to NZ where Japanese and Philippines diplomatic cables, the government communications of Fiji, the Solomons, Tonga, "international organisations operating in the Pacific" and UN diplomatic cables.
It was interesting to see terms like "most of the raw traffic used" "South Pacific telex messages on satellite communications", "The raw traffic for this reporting provided by NSA the US National Security Agency).""
Japanese diplomatic cables, French Pacific satellite intercept, "French South Pacific civil, naval and military; French Antarctic civil; Vietnamese diplomatic; North Korean diplomatic; Egyptian diplomatic; Soviet merchant and scientific research shipping; Soviet Antarctic civil. Soviet fisheries; Argentine naval; Non-Soviet Antarctic civil; East German diplomatic; Japanese diplomatic; Philippine diplomatic; South African Armed Forces; Laotian diplomatic (and) UN diplomatic."
So the world has had some look at what NZ was interested in and how it was done in bulk years ago.

Comment: Re:Stating the obvious (Score 1) 130

by AHuxley (#49178737) Attached to: Schneier: Either Everyone Is Cyber-secure Or No One Is
Each generation has its own ability to set aside the way a telco network can be used domestically.
The use was only for ww1, ww2, the Soviet Union, Russia, China, distant wars and long occupations.
Tame brands, academics, political leaders all thought their generation of secure hardware and software was been looked after by different brands, legal teams, oversight or respected international standards.
With the news of weak standards, academics been unaware or unsure where to look, brands letting other outside gov or mil networks just enter their internal secure networks people can grasp what weak security is over many generations.

Comment: Re:New ways to protect privacy are needed! (Score 1) 194

by AHuxley (#49167619) Attached to: Feds Admit Stingray Can Disrupt Bystanders' Communications
The cell phone is now a beacon, gps tracker, facial recognition system, keeps text and offers voice prints.
If a person is a journalist or meeting a journalist understand that just been near a journalist with a connected cell phone can be useful to track that meeting.
The ability to turn on the microphone is another issue.

Comment: Re:Stingray detector? (Score 1) 194

by AHuxley (#49167555) Attached to: Feds Admit Stingray Can Disrupt Bystanders' Communications
In the past the local network dropped to an older standard depending on the version of the IMSI catcher and the network standard it used?
A few projects have been mentioned to help understand the local network conditions and then show the user changes.
Phone Firewall Identifies Rogue Cell Towers Trying To Intercept Your Calls (09.03.14)

Comment: Re:Why are they using SIMS this way? (Score 1) 155

by AHuxley (#49115051) Attached to: NSA, GHCQ Implicated In SIM Encryption Hack
Price and the design of the cell networks going back many years. The security services had a list of needs going back into the 1980's and for the UK it was all network use in Ireland.
As cell and sim systems advanced the security services just kept up with having total mastery of every aspect of all the different telco networks.
Now users and telcos have to consider who else has the security services methods? Ex staff, former staff, dual citizens, contractors, foreign contractors. People cults and brands able to pay for the skill sets of ex staff, former staff? Once a telco network is fully open to the security services other groups can buy or are given the same methods over the years.

Comment: Re:Counting Alarmist Sheep (Score 2) 192

by AHuxley (#49092349) Attached to: How NSA Spies Stole the Keys To the Encryption Castle
The problem is tame junk encryption is really open to many ex staff, former staff, other nations, cults, faiths, rich people, political groups, anyone with lots of cash and a few contacts.
SISMI-Telecom scandal
Greek wiretapping case 2004–05–05
Cell networks have a very low standard of local encryption thanks to weak junk international standards been set over many years. The results can now be see and understood.

Comment: Re:Where does Snowden get all this information fro (Score 3, Informative) 192

by AHuxley (#49092261) Attached to: How NSA Spies Stole the Keys To the Encryption Castle
Re "If he was sitting on this information, then why wait so long to release it? "
All the material is now in the hands of the press. The press can release the material in any way it wants or needs to.
Re "Could someone explain where Edward Snowden is getting these kind of leaks and infos from, so long after he fled the NSA?"
The material released by the press is long term generational projects staff get read into as they need to work on the same projects or with staff who do.
Re the how "Edward Snowden: I was a high-tech spy for the CIA and NSA" (28 May 2014)
"...he said he had worked for the CIA and NSA undercover, overseas, and lectured at the Defense Intelligence Agency."

Comment: Re:So what, exactly, does the FBI do? (Score 1) 85

by AHuxley (#49026989) Attached to: FBI Attempts To Prevent Disclosure of Stingray Use By Local Cops
Re "... but do they have any other ability to use the data?"
Parallel construction or just keeping up on slag, street crime, terms, faces, people, voice prints, images sent, gps, serial numbers in each photo or video uploaded? A vast database of interaction, who is smart and turns their phone off, two people walking towards each other who turn their phones off before a meeting but where not understood to be connected until that deeper data mining uncovered their cell logs.
Locals find the locations, federal computers look over years of huge telco logs. Funding is hidden from a local walk in FOIA at a city and state level.

core error - bus dumped