Forgot your password?
typodupeerror

Comment: Re:News for whom? (Score 1) 370

by AHuxley (#47546193) Attached to: Satellite Images Show Russians Shelling Ukraine
Some AC sockpuppets really, really want another long war somewhere. Iraq, Somalia, what was Yugoslavia, Pakistan, Libya, Afghanistan with occupations, drones, shared sites, pirate/rebel hunt, training missions, pipeline protection, base help just will not keep the gov and private military industrial complex going. They need to sell and rent seek on an endless "Cold" war scale again.
So expect to see a flood of perfectly packaged news stories from different regions hinting at the need for constant support, spending, supplies, experts and boots on the ground for decades.

Comment: Re:How would that be even helpful? (Score 1) 109

Re "plant from the early 60s relates here"
Plants often come form nuclear reactor designs and prototypes from the 1950's and 1960's.
We are now seeing the results of a very old sector trying to rebuild itself with new parts. Replacement steam generator plugging (failed pressure test and needed to be plugged). We have seen issues with air tightness of the reactor containments, issues in the re circulation pipe systems, cracks in the core shroud.
Then you have the complex costs of cleaning out a boiling water reactor and a pressurized water reactor ie radioactive steam moves via the entire plant system, tritium leaks, spent fuel storage costs vs limited decommissioning funds. Moving to dry storage and then moving all the regular waste from decommissioning and dismantlement (disposal license). The old plants waste size adds up and all you have a few Class A waste sites? Class B and C waste with more long-lived and short-lived radionuclides can just wait? Weld anomalies, through wall corrosion, corrosion of steel containments, walls of steel containments below the minimum design thickness. The old plants have containment degradation, metal pressure boundary corrosion incidents. Add in the fun of uprated license extensions to 2040+ with a power increase (Stretched Power Uprate).

+ - Nuclear Plants Should Focus on Risks Posed by External Events-> 1

Submitted by mdsolar
mdsolar (1045926) writes ""Engineers at American nuclear plants have been much better at calculating the risk of an internal problem that would lead to an accident than they have at figuring the probability and consequences of accidents caused by events outside a plant, a report released Thursday by the National Academy of Science said.

Accidents that American reactors are designed to withstand, like a major pipe break, are “stylized” and do not reflect the bigger source of risk, which is external, according to the study. That conclusion is one of the major lessons from the Fukushima Daiichi nuclear accident in Japan in 2011, which began after an earthquake at sea caused a tsunami."

NAS Report: http://www.nap.edu/catalog.php..."

Link to Original Source

Comment: Re:Secret evidence for secret trials (Score 1) 118

by AHuxley (#47542059) Attached to: When Spies and Crime-Fighters Squabble Over How They Spy On You
Re "Doesn't sound very constitutional to me. What have we become?"
In the past the GCHQ would do everything it could to stay out of court closed or open. No methods, no logs, no experts with no pasts to confirm documents as found, decrypted.
Any information gathered would have to be undergo parallel construction by other services or methods to remove any signal or decoding aspects.
The problem for the US is the very public talk of " all the phone records into a lockbox" to be reconstructed anytime over a persons life.
Within the US there is limited access to the top political policy setting. Other groups within the US domestic and more international law enforcement may not like a signals conversation with the public.
What the GCHQ only had to fend off every few decades in the UK with policy makers is now very public in the USA - total mastery of global telecommunications network with generational storage.
Slowly the other aspect is becoming more public too: "European Court Says CIA Ran Secret Jail in a Polish Forest" (July 24, 2014)
http://www.nytimes.com/reuters...
Its the age old use of signals intelligence - never tell the public and it is perfect. The problem for the USA is so many groups are now using signals intelligence that they all want the big wins in public and closed trials.
The problem is once signals intelligence gets out in court at a city, state, federal level - the magic stops. Every court connected member of the press, legal profession, law enforcement suddenly has a story to sell, tell or whisper.
Anybody who needs to know about crime and signals intelligence can then just buy the methods and drop out.
What did the UK learn early on? Dont give political leaders raw information about the Soviet Union - ever. Dont go to court over spies - ever. Dont go to court over leaks, whistleblowers or tell all books or for peace activists.
The UK knows the stories then just drop away from the front pages and drift off into academic books with very limited print runs.
The real unknown is the US cyber industrial complex with products to sell, rent and look after in every city and state if lobbied.
The West has become one big signals intelligence marketplace and laws need to be relaxed to enjoy new sales :)

Comment: Re:Goddammit Tony Abbott (Score 2) 119

The US has its own plans http://judiciary.house.gov/ind... (Jul 24 2014)
Read what the US gov could do in the first 10 page pdf:
"amend the law to create a felony penalty for unauthorized Internet streaming. Specifically, we recommend the creation of legislation to establish a felony charge for infringement through unauthorised public performances conducted for commercial advantage or private financial gain,”"
and for the international friends:
"diplomatic and trade-based pressure"

Comment: Re:AU needs an occupy movement (Score 1) 119

All that happened in the USA was the protest leaders where identified, set up or turned. The rest is just busy work.
COINTELPRO has never worked so well. https://en.wikipedia.org/wiki/...
As for Australia, watching all law reform groups is trivial for the police and security services.
The traction the anti Vietnam war draft movement had in Australia will never be allowed to build for any issue.

Comment: Re:Goddammit Tony Abbott (Score 2) 119

I thought ASIO malware was only going to be reserved for the "suspected terrorists and other security interests" and only "...used in extremely limited circumstances and only when explicitly approved by the Attorney-General through a warrant."
One Australia wide warrant for all p2p users then?
Be fun to see how the mass use of state sanction zero day malware interacts with average consumer grade heuristic analysis in your average consumer antivirus program?
Will all the AV brands selling in Australia be expected to whitelist for ASIO?

Comment: Re:Goddammit Tony Abbott (Score 4, Interesting) 119

How will it work? A national block on a huge set of p2p index sites? A national block on a huge set of download link index sites?
What more can an isp be commanded do? Deep packet inspection for rar files as downloaded?
The long term logging of all users by isp to be automatically cross referenced with p2p tracking industry groups?
Issue a decree that Australian banks and related credit card products are not to pay for VPN or other encrypted services that hide users from their Australian isp?
Then have laws ready to send end users identified by the tame isp after the 2nd letter for state-mandated copyright awareness counseling?
A ban on the internet for users caught again? Or users kept away from the internet for a few months or years?
After all that hard legal work why not just allow other US or UK streaming media services into Australia? Let Australians buy access to any US or UK show, movie as in US or UK? Let them pay per show or per season from any US media provider they like.

+ - Australian government moving forward with website blocks to fight piracy->

Submitted by angry tapir
angry tapir (1463043) writes "Australia is moving closer to a regime under which ISPs will be forced to block access to websites whose "dominant purpose" is to facilitate copyright violations. A secret government discussion paper (PDF) has been leaked and proposes a system of website blocking and expanded liability for ISPs when it comes to "reasonable steps that can be taken ... to discourage or reduce online copyright infringement"."
Link to Original Source

Comment: Re:Why? (Score 1) 133

Who gets extra "privacy" from drone use?
The main fear is US state based "Ag-gag" anti-whistleblower laws eg Animal and Ecological Terrorism Act https://en.wikipedia.org/wiki/... getting media attention.
The price of getting videos showing animal cruelty is dropping.
The price of getting videos showing hydraulic fracturing or "fracking" pollution dropping.
A lot of US states are trying to use laws like: 'Commerce Protection Act", "an act relating to agricultural facility fraud", "Livestock Operation Interference Act", "Animal and Ecological Terrorism Act", "Farm Animal and Research Facilities Protection Act", “visual or audio experience occurring at [an] animal facility.”
Just talking about federal law enforcement views around drones, HD media, size of drones, drone costs could alert national and state media to local stories as filler.
The best way out for the FBI is to redact all, no story, no media interest, no local press on their states expanding ag gag laws.

Comment: Re:TOR is a US-backed project (Score 1) 95

by AHuxley (#47535693) Attached to: Russia Posts $110,000 Bounty For Cracking Tor's Privacy
Re the AC ' I do admit though that spies could also take advantage of it"
Read the origin papers the grants and funding:
http://www.onion-router.net/Sp...
https://www.torproject.org/abo...
"It was originally developed with the U.S. Navy in mind, for the primary purpose of protecting government communications."
The origins are Office of Naval Research and DARPA. Have a read of http://www.onion-router.net/Pu... AC.
ie bi-directional gov/spy communication that would hide the source and destination from another gov or telco in the middle ie intelligence usage, security technology.
But once a system like that is seen in the wild, it is trackable. You need to hide that under huge amounts of people seeking free speech in oppressive regimes.
Follow the early no-bid federal contract, non-profit, pass through funding or gov funding.

Comment: Re:USA beat them to it (Score 1) 95

by AHuxley (#47535577) Attached to: Russia Posts $110,000 Bounty For Cracking Tor's Privacy
Re How the West could do it:
You need trust that the exit nodes are fast, well funded and NGO like. You need national level mastery of all packet traffic in and out of every tame provider.
Think of the cost of setting and funding per month a really good set of TOR servers/nodes.
You would really want the commanding height of the fastest say top 5 exit relays, then a larger pool of a good few 10's of other relays.
This would herd and make clear most traffic in a larger nation.
To cover this project set up as many NGO, friendly "person" like fronts as you can to do the heavy lifting. You have to win the packet race with all other server products in the domestic and international interconnect locations every hour. No hard, just ensure your nations telco network has a lot of end points that peers all telco plans to say an east and west coast or big main city. Get the young intelligence community staff to hold "crypto parties" where other real NGO's can put a friendly face to the new big servers. This builds confidence that its a nice real person working with some of more big tor exits. Add in some work colleges of the young intelligence community staff to set up Tor nodes and a country will soon have real faces to a lot of the back end hardware.
As for price? Think back to the GCHQ's 2006 programmes around the SIGMod (sigint modernisation) initiative and a nation can get Tempora http://www.wired.co.uk/news/ar... (24 June 2013)
Once you have every packet moving in and out of a nation, just sort deep over time.
After that you have the telco net down the the users and can get unique hardware/software layer information per user, no matter the ip or provider like with p2p and classic MAC addresses.
The honeypot aspect was talked about in 1997.

+ - Compromise struck on cellphone unlocking bill->

Submitted by NotSanguine
NotSanguine (1917456) writes "The US Senate has passed a bill (S.517) today allowing users to unlock their phones when moving to another provider.

From a recent article at thehill.com:

“Consumers should be able to use their existing cell phones when they move their service to a new wireless provider,” Leahy said in a statement. “Our laws should not prohibit consumers from carrying their cell phones to a new network, and we should promote and protect competition in the wireless marketplace,” he said. Grassley called the bipartisan compromise “an important step forward in ensuring that there is competition in the industry and in safeguarding options for consumers as they look at new cell phone contracts.” “Empowering people with the freedom to use the carrier of their choice after complying with their original terms of service is the right thing to do,” he said. The House in February passed a companion bill sponsored on cellphone unlocking from House Judiciary Committee Chairman Bob Goodlatte (R-Va.).

"

Link to Original Source

+ - Congressman Mistakes U.S. Officials For Indian Ones->

Submitted by PolygamousRanchKid
PolygamousRanchKid (1290638) writes "Rep. Curt Clawson, a freshman Republican congressman from Florida, mistook two senior U.S. officials for representatives of the Indian government during a House hearing on Friday.

“I am familiar with your country, I love your country,” Clawson said to Nisha Biswal and Arun Kumar, addressing fellow U.S. citizens who hold high-ranking positions in the State Department and Commerce Department, respectively.

After a lingering silence, Clawson smiles slowly. Kumar appears to grin, while Biswal echoes Clawson’s sentiment, informing him it should probably be directed to the Indian government. It’s unclear whether Clawson realized his error."

Link to Original Source

You see but you do not observe. Sir Arthur Conan Doyle, in "The Memoirs of Sherlock Holmes"

Working...