Forgot your password?
typodupeerror

Comment: Re:I wonder who was targeted? (Score 1) 39

Re "I wonder who was targeted?"
When different network where still needed experts did find a few interesting past projects:
Greek wiretapping case 2004–05 https://en.wikipedia.org/wiki/...–05
The SISMI-Telecom scandal in Italy found in 2006 https://en.wikipedia.org/wiki/...

Comment: Re:Anti-virus/malware? (Score 1) 39

The code is of a quality set per user depending on OS, installed AV and all other understood networking conditions.
A consumer OS with standard trusted consumer AV and trustred normal OS updates?
A well understood open source install that a user looks over deeper OS level logs everyday?
The presence of unique new code a user "installed" and "allowed" is not going to report on huge anti-virus and anti-malware lists.
Will well understood behavior analysis on consumer grade AV be looking in the correct place?
Gov and mil know all about what AV can do and how unique code for one computer has to be installed so it is not really going to be found by consumer AV products.

Comment: Re:Nation uses malware to spy on ISP Customers... (Score 1) 131

by AHuxley (#48445809) Attached to: Highly Advanced Backdoor Trojan Cased High-Profile Targets For Years
Lots of nations can try. Italy had its SISMI-Telecom scandal https://en.wikipedia.org/wiki/...
Greece had the wiretapping case 2004–05 https://en.wikipedia.org/wiki/...–05
Now the world is seeing more software efforts beyond the expected gov tapping hardware and software.
So many staff around the world have done legitimate tapping for their govs and mil for generations.
Tame computer systems, networks have crypto that is well understood and of a weak international standard. Signals intelligence is great to sell to govs and mil. Ex staff, former staff and govs are all happy to see what they can get.

Comment: Re:Police legal authority (Score 2) 157

by AHuxley (#48442791) Attached to: Judge Unseals 500+ Stingray Records
Re 'Either the contents are not sensitive"
Think back to the early cell standards. Who set them and why? Emerging cell networks had to be safer from random strangers but totally open in real time to govs and mil needs.
Cost, time and who works on the telco networks can also be important to local law enforcement officials.
Why risk a computer database entry or tracked code change in a national or global telco system? A number or location is now been tracked.
Who at the telco has seen or can track the local or national law enforcement sensitive database changes?
Local law enforcement officials become the telco connection in an area for a time and the only people who have full details on who is been tracked.
No courts, no requests to telco staff or vast databases, no lawyers later, media, FOIA for paper work at a city or state level. Just all the call data.

Comment: Re:Consent of the Governed (Score 1) 157

by AHuxley (#48442773) Attached to: Judge Unseals 500+ Stingray Records
Re Need to keep things secret?
Thats what the release of the records will show. Legal teams can go over past cases and talk about what was done to the press.
Issues of parallel construction, what legal teams saw or where not allowed to see and when can be talked about to the press.
Legal teams can then talk to the press about the use of a IMSI catcher, IMSI catcher like devices with denial-of-service attack options, location monitoring, transceiver amplifiers.
Meet the machines that steal your phone’s data (Sept 26 2013)
http://arstechnica.com/tech-po...
If the US wants a secret court it can talk to all the legal teams and find cleared legal staff and experts depending on the case.

Comment: Re:Not all spooks are bad (Score 1) 109

by AHuxley (#48439511) Attached to: Top NSA Official Raised Alarm About Metadata Program In 2009
Re "Thanks to the influence of such groups as the NSA your mobile phone transmits it's data in an easily readable format instead of something encrypted such as was first proposed for the devices"
Thats the idea. Fill the gps logs with random trips to locations that fit in well with the non fiction "story" on a networked computer.
Who was that journalists phone around or who did it stop near? How would it fit in with a story been worked on? So many new digital hops to follow up on thanks to one random drive and a long coffee. Keep adding to that non fiction "story" on the networked computer every few days. Start a new story.
Once people know they are been watched they can change. The old idea was never to talk about tracking. Now terms like cell-site simulator and IMSI catcher are in the local press.

Comment: Re:Not all spooks are bad (Score 1) 109

by AHuxley (#48437345) Attached to: Top NSA Official Raised Alarm About Metadata Program In 2009
Re continued, and expanded
With domestic surveillance now been talked about more in public the press now understands what keywords and interviews will result in.
The media can wait to type a report into a networked computer just before publication.
A journalist can also fill their networked computer with a lot of non fiction that reads like a real story thats been worked on.
Drive out with a phone on to meet a person with more information.
All the domestic surveillance teams have is networking. The connected computer, the phone, the operating system, the logs over years.
Once a journalist understands that part of domestic surveillance they can shape it.

Comment: Re:If only... (Score 1) 109

by AHuxley (#48437279) Attached to: Top NSA Official Raised Alarm About Metadata Program In 2009
Yes it goes back to the Trailblazer Project https://en.wikipedia.org/wiki/...
ThinThread https://en.wikipedia.org/wiki/...
Before that was Main Core https://en.wikipedia.org/wiki/...
Recall Project MINARET https://en.wikipedia.org/wiki/...
and going way back to the The Armed Forces Security Agency (AFSA) with Project SHAMROCK https://en.wikipedia.org/wiki/...

Comment: Re:Nothing I'd like better... (Score 1) 106

by AHuxley (#48409123) Attached to: Tor Eyes Crowdfunding Campaign To Upgrade Its Hidden Services
Re "So stop being paranoid. The FBI isn't going to after every donor to a project like this."
Recall "The NSA Is Targeting Users of Privacy Services, Leaked Code Shows" (07.03.14)
http://www.wired.com/2014/07/n...
"The rules indicate that the NSA tracks any IP address that connects to the Tor web site or any IP address that contacts a server that is used for an anonymous email service..."
"The NSA is also tracking anyone who visits the popular online Linux publication, ....., which the NSA refers to as an “extremist forum” in the source code."

Comment: Re:non-issue? (Score 1) 74

by AHuxley (#48400705) Attached to: Machine Learning Used To Predict Military Suicides
It depends how the US military is counted. A huge number of civilian like staff, air force, army... could be used to hide deep counts.
So what can be counted on? The Air Force has very expensive equipment to look after. So great care is taken to only allow selected, well tested people near that equipment.
That would sort out most of the human issues long term and offer amazing statistics.
Other areas of the US mil may also like to have well tested people near some of the more interesting systems. Great numbers again due to expert testing and constant staff sorting.
The real issue is the head injury or meds used during long occupation tours.
Keep the best staff looked after and try and see what is left over for the rest.

Comment: Re:If I was running counter-intelligence for the C (Score 2) 340

by AHuxley (#48395287) Attached to: Alleged Satellite Photo Says Ukraine Shootdown of MH17
Re "I'd put together a fake image which looks good enough to pass the sniff test for a day or two, but which is designed to "go off" shortly after when the public gets a chance to deconstruct it."
Some interesting ways to track this.
MI6 or CIA got something found in Russia and it was rushed out to the media. FSB just watched to track the origins, publication and expected Western media results.
Russia released the image internally to follow the image to expose some internal NGO or other well funded networks.
Limited hangout.
ie just to see something internal to Russia been activated.
Some other group set this in play and Russia, the US and UK are just interested to see where it tracks back and why.
So the value was not in the poor fake but its origins.

Comment: Re:The NSA knowingly breaks the law and lies (Score 1) 127

by AHuxley (#48381325) Attached to: Senate May Vote On NSA Reform As Soon As Next Week
Re "What good is a law pertaining to" The good news is that the US legal system now has to hold any mil or gov action in pubic courts to be legal.
Its a bit like a digital or legal Berlin Wall. Once the US mil and gov put that parallel construction into the public court system all legal teams and the press will know.
What are the options for the USA? Sealed security courts for all? People and lawyers at a federal and state level will begin to notice that change.
The other option is to make the domestic surveillance state legal. Vast collections of stored data about net use, calls, driving habits, spending, reading lists, media consumption, location, travel can be now be presented from a "locked box" in open court without question.
When that is done every legal team is going to see the same pattern. You where on the internet. You where on the phone. Your digital life is in open court. All the US gov now has is the hope that all the connections will always be a call, digital or on the internet and be easy to collect.
Even defence lawyer will have to start writing on note pads and been very careful about how they talk to their clients and what files they keep.
Every scape of digital information is now in play.

Eureka! -- Archimedes

Working...