Forgot your password?

Comment: Re:The data rate (Score 1) 89

by AHuxley (#48465149) Attached to: New Snowden Docs Show GCHQ Paid Telcos For Cable Taps
Re "unless anything in the Snowden leaks suggests that Public Key encryption no longer works? Yes, I know it's hard. Oh well: It's necessary."
If you are found to be using encryption you become interesting. Create too much interest and your computer gets a visit?
The issue of international standards and tame academics can hold back more positive infrastructure changes.

Comment: Re:At least they paid (Score 3, Informative) 89

by AHuxley (#48465035) Attached to: New Snowden Docs Show GCHQ Paid Telcos For Cable Taps
That goes back years. The UK faced the same with the interception of international telegrams and telexes (cable vetting, the D-Notice affair) in 1967.
The GCHQ was getting a copy of international telegrams and telexes.
D-notice affair
The tradition of looking at all international telegrams went back to WW1.
Now its all optical :)

Comment: Re:Bandwidth (Score 2) 89

by AHuxley (#48464901) Attached to: New Snowden Docs Show GCHQ Paid Telcos For Cable Taps
Why bother recording everything when that's already done by the telcos?
In the past the NSA and GCHQ could only store so much information. The idea was to collect all, sort and remove as much data as possible very quickly.
The Dictionary system using keywords and predesignated phrases would try and find new people of interest.
Later the cost of storage was so low that it was more simple just to collect and store it all.
The ability to track a message end to end and store that result for long term computer retrieval was ready for US use in the 1970's.
The UK would have had the same new options after its Cray upgrades from IBM-700 by the late 1970's.
The need to record everything is so the UK gov has its own copy. The UK could not trust that the US would keep its own data or data of interest to the UK long term.
That also helps with tracking UK gov staff and their personnel files long term. Internal UK security enquiries can then recall a lot of data without having to ask the US for help.
Every aspect of all network use is kept, everyone has a file.

Comment: The data rate (Score 3, Insightful) 89

by AHuxley (#48464695) Attached to: New Snowden Docs Show GCHQ Paid Telcos For Cable Taps
Thats the interesting new part "1,693 10-gigabit connections and increasing egress capacity to 390"
Collect it all is back in the news.
A select few nations and their friends have total mastery over much of the telco networks. What if the other nations of interest stop using telco networks or just provide well created disinformation?

Comment: Re:Bound to fail (Score 1) 116

by AHuxley (#48454485) Attached to: How the Pentagon's Robots Would Automate War
Yes a community know their local sounds. The 4x4, bikes, luxury cars. They all have distinctive sounds and the local population are aware of any changes.
When an army of occupation or their local death squads move into an area that news travels fast.
Special forces try to blend in. Local death squads use what they are given. New machines with loud new distinctive sounds will stand out in open areas.
Counterinsurgency is now going to be robotic? An endless war of robot patrols and local robot checkpoint?
Divide a country up and pack the civilians into safe areas "refugee camps" to win hearts and minds?
Most people found outside a camp can then be tracked and questioned?
Back to a scorched earth policy with big numbers of new robots. Great news for the robot makers.

Comment: Re:I wonder who was targeted? (Score 2) 129

Re "I wonder who was targeted?"
When different network where still needed experts did find a few interesting past projects:
Greek wiretapping case 2004–05–05
The SISMI-Telecom scandal in Italy found in 2006

Comment: Re:Anti-virus/malware? (Score 2) 129

The code is of a quality set per user depending on OS, installed AV and all other understood networking conditions.
A consumer OS with standard trusted consumer AV and trustred normal OS updates?
A well understood open source install that a user looks over deeper OS level logs everyday?
The presence of unique new code a user "installed" and "allowed" is not going to report on huge anti-virus and anti-malware lists.
Will well understood behavior analysis on consumer grade AV be looking in the correct place?
Gov and mil know all about what AV can do and how unique code for one computer has to be installed so it is not really going to be found by consumer AV products.

Comment: Re:Nation uses malware to spy on ISP Customers... (Score 1) 142

by AHuxley (#48445809) Attached to: Highly Advanced Backdoor Trojan Cased High-Profile Targets For Years
Lots of nations can try. Italy had its SISMI-Telecom scandal
Greece had the wiretapping case 2004–05–05
Now the world is seeing more software efforts beyond the expected gov tapping hardware and software.
So many staff around the world have done legitimate tapping for their govs and mil for generations.
Tame computer systems, networks have crypto that is well understood and of a weak international standard. Signals intelligence is great to sell to govs and mil. Ex staff, former staff and govs are all happy to see what they can get.

Comment: Re:Police legal authority (Score 2) 164

by AHuxley (#48442791) Attached to: Judge Unseals 500+ Stingray Records
Re 'Either the contents are not sensitive"
Think back to the early cell standards. Who set them and why? Emerging cell networks had to be safer from random strangers but totally open in real time to govs and mil needs.
Cost, time and who works on the telco networks can also be important to local law enforcement officials.
Why risk a computer database entry or tracked code change in a national or global telco system? A number or location is now been tracked.
Who at the telco has seen or can track the local or national law enforcement sensitive database changes?
Local law enforcement officials become the telco connection in an area for a time and the only people who have full details on who is been tracked.
No courts, no requests to telco staff or vast databases, no lawyers later, media, FOIA for paper work at a city or state level. Just all the call data.

Comment: Re:Consent of the Governed (Score 1) 164

by AHuxley (#48442773) Attached to: Judge Unseals 500+ Stingray Records
Re Need to keep things secret?
Thats what the release of the records will show. Legal teams can go over past cases and talk about what was done to the press.
Issues of parallel construction, what legal teams saw or where not allowed to see and when can be talked about to the press.
Legal teams can then talk to the press about the use of a IMSI catcher, IMSI catcher like devices with denial-of-service attack options, location monitoring, transceiver amplifiers.
Meet the machines that steal your phone’s data (Sept 26 2013)
If the US wants a secret court it can talk to all the legal teams and find cleared legal staff and experts depending on the case.

Comment: Re:Not all spooks are bad (Score 1) 110

by AHuxley (#48439511) Attached to: Top NSA Official Raised Alarm About Metadata Program In 2009
Re "Thanks to the influence of such groups as the NSA your mobile phone transmits it's data in an easily readable format instead of something encrypted such as was first proposed for the devices"
Thats the idea. Fill the gps logs with random trips to locations that fit in well with the non fiction "story" on a networked computer.
Who was that journalists phone around or who did it stop near? How would it fit in with a story been worked on? So many new digital hops to follow up on thanks to one random drive and a long coffee. Keep adding to that non fiction "story" on the networked computer every few days. Start a new story.
Once people know they are been watched they can change. The old idea was never to talk about tracking. Now terms like cell-site simulator and IMSI catcher are in the local press.

Comment: Re:Not all spooks are bad (Score 1) 110

by AHuxley (#48437345) Attached to: Top NSA Official Raised Alarm About Metadata Program In 2009
Re continued, and expanded
With domestic surveillance now been talked about more in public the press now understands what keywords and interviews will result in.
The media can wait to type a report into a networked computer just before publication.
A journalist can also fill their networked computer with a lot of non fiction that reads like a real story thats been worked on.
Drive out with a phone on to meet a person with more information.
All the domestic surveillance teams have is networking. The connected computer, the phone, the operating system, the logs over years.
Once a journalist understands that part of domestic surveillance they can shape it.

The world is no nursery. - Sigmund Freud