HongPong writes: "In a continuation of the excitement around Microsoft's confidential Law Enforcement guide hitting Cryptome.org, now several more Law Enforcement Sensitive PDFs about Windows 7 have been posted, including a lot of detailed information about examining BitLocker drive encryption and potentially cracking it: "We can also see the Recovery Key ID number" and a series of hex addresses, it says (win7-bit-spy.pdf p 67). With all the guides Cryptome has posted for PayPal, MySpace, AOL, SKype, Yahoo! & others, one can certainly get a clearer picture of implementations of government demands, but also these training manuals created by the companies clearly illuminate their own intent. Also, who else has had this information? Isn't it deceptive marketing to peddle products with such backdoors or intended weaknesses?" Link to Original Source
HongPong writes: "This sounds pretty crazy, but hey: I stumbled across 1000+ pages from the Minnesota Department of Transportation, which basically entirely spell out the NASCO/Lockheed plan to 'militarize' I-35 and I-94 by building the NAFTRACS tracking system. MnDOT released documents that pretty much show how Lockheed setup NASCO to host NAFTRACS (controlling the contracts), cloning the current military container tracking system, and implementing it right down I-35 via RFID. Yep!
They want to set up the "Presence" which would run from "Total Domain Awareness Centers of Excellence." Really! This is all about militarization — it's really a crazy batch of stuff. Full of ugly terms and creepy RFID schemes. Lockheed explicitly would market all the supply-chain data generated. Everything released from MnDot is about 60 MB in PDFs (ZIP). What a weird thing to find, thought everyone should know. [and... I would never have understood such things without/.]" Link to Original Source