Catch up on stories from the past week (and beyond) at the Slashdot story archive


Forgot your password?

Slashdot videos: Now with more Slashdot!

  • View

  • Discuss

  • Share

We've improved Slashdot's video section; now you can view our video interviews, product close-ups and site visits with all the usual Slashdot options to comment, share, etc. No more walled garden! It's a work in progress -- we hope you'll check it out (Learn more about the recent updates).


Comment: Re:Why are they using SIMS this way? (Score 1) 155

by AHuxley (#49115051) Attached to: NSA, GHCQ Implicated In SIM Encryption Hack
Price and the design of the cell networks going back many years. The security services had a list of needs going back into the 1980's and for the UK it was all network use in Ireland.
As cell and sim systems advanced the security services just kept up with having total mastery of every aspect of all the different telco networks.
Now users and telcos have to consider who else has the security services methods? Ex staff, former staff, dual citizens, contractors, foreign contractors. People cults and brands able to pay for the skill sets of ex staff, former staff? Once a telco network is fully open to the security services other groups can buy or are given the same methods over the years.

Comment: Re:Counting Alarmist Sheep (Score 2) 192

by AHuxley (#49092349) Attached to: How NSA Spies Stole the Keys To the Encryption Castle
The problem is tame junk encryption is really open to many ex staff, former staff, other nations, cults, faiths, rich people, political groups, anyone with lots of cash and a few contacts.
SISMI-Telecom scandal
Greek wiretapping case 2004–05–05
Cell networks have a very low standard of local encryption thanks to weak junk international standards been set over many years. The results can now be see and understood.

Comment: Re:Where does Snowden get all this information fro (Score 3, Informative) 192

by AHuxley (#49092261) Attached to: How NSA Spies Stole the Keys To the Encryption Castle
Re "If he was sitting on this information, then why wait so long to release it? "
All the material is now in the hands of the press. The press can release the material in any way it wants or needs to.
Re "Could someone explain where Edward Snowden is getting these kind of leaks and infos from, so long after he fled the NSA?"
The material released by the press is long term generational projects staff get read into as they need to work on the same projects or with staff who do.
Re the how "Edward Snowden: I was a high-tech spy for the CIA and NSA" (28 May 2014)
"...he said he had worked for the CIA and NSA undercover, overseas, and lectured at the Defense Intelligence Agency."

Comment: Re:So what, exactly, does the FBI do? (Score 1) 85

by AHuxley (#49026989) Attached to: FBI Attempts To Prevent Disclosure of Stingray Use By Local Cops
Re "... but do they have any other ability to use the data?"
Parallel construction or just keeping up on slag, street crime, terms, faces, people, voice prints, images sent, gps, serial numbers in each photo or video uploaded? A vast database of interaction, who is smart and turns their phone off, two people walking towards each other who turn their phones off before a meeting but where not understood to be connected until that deeper data mining uncovered their cell logs.
Locals find the locations, federal computers look over years of huge telco logs. Funding is hidden from a local walk in FOIA at a city and state level.

Comment: Re:How is this even necessary? (Score 1) 85

by AHuxley (#49026977) Attached to: FBI Attempts To Prevent Disclosure of Stingray Use By Local Cops
The cost of asking the phone company?
Letting a phone company flag or set a number been logged in a database. If staff or other nations have access to that phone company database then all legal wiretaps might get seen by a few different people or other intelligence agencies. The US seems to have found out over the years that it cannot trust its own tame telcos internal networking.

Comment: Re:Do Nothing (Score 1) 239

by AHuxley (#49024201) Attached to: Ask Slashdot: What Will It Take To End Mass Surveillance?
+1 for this. Divest from the tame brands that fooled generations with junk encryption.
Teach about the one time pad, number stations and other good encryption that works.
The whistleblowers over the decades have offered insights into how the telco networks work and how weak encryption standards are kept in place for generations.
"So long as the tame brands pretend to encrypt for us, we will pretend to communicate."
Get creative with local political issues and long emails to the local press. Fill the text with past stories about local events.
Drive around with an older working cell phone on random local events.

Comment: Re:And this is interesting becase? (Score 1) 215

by AHuxley (#49014257) Attached to: Silk Road Drug Dealer Pleads Guilty After Federal Sting
The part about a system of computer networks that protect dissidents, journalists, NGO's, faith groups, freedom seekers and other color revolution efforts could be open to law enforcement officials at a funding and skill well below an intelligence agency level.
If the anonymity and privacy on offer by onion routing for dissidents, journalists, NGO is trackable on domestic local enforcement budget then what are other well funded nations doing on their internal telco networks?
If the US at a police level can track all users on onion routing other what kinds of lists do other nations have or what have their domestic intelligence agencies found?
Public news like this sheds light on the low costs and ability to track onion routing. Down from intelligence agency to a state or city?

Comment: Re:I don't think this is really true. (Score 1) 153

by AHuxley (#49004333) Attached to: Facebook Will Soon Be Able To ID You In Any Photo
1+ for easily and percisely tag almost all photos we were able to stuff in it. In microseconds.
This tech is old for the 2d face work. Its fast for local police Privacy concerns? UK police test 'faster-than-ever' facial recognition software (July 16, 2014)
Or just read the public info on records per second in the 10,000 records/sec

Comment: Re:Secretive courts? (Score 1) 44

Re How in hell the voters from Britain as well as from America allow such things to happen in the first place??
Addiction. For the UK it goes back to the Defence of the Realm Act 1914 with the
"To prevent persons communicating with the enemy or obtaining information for that purpose..."
During and after ww1 the constant flow of new information became totally addictive to generations of UK governments. New laws to ensure funding continued.
Tempora is just this decades reflection of generations of networking and communications efforts

"You know, we've won awards for this crap." -- David Letterman