Forgot your password?

Comment: G00gle: Self appointed jury, judge and custodian (Score 1) 144

by Trachman (#48133495) Attached to: Google Rejects 58% of "Right To Be Forgotten" Requests

They can do this until they get another legal spank once again. Who is Google anyway to decide the "public interest"? Since when the public interest trumps the private interest and how and why Google self-appointed to be the judge and the jury to decide what is relevant or what is not?

Comment: Saboteurs? More like daily bread and butter (Score 2) 228

by Trachman (#48119255) Attached to: Core Secrets: NSA Saboteurs In China and Germany

This is a classic way technical intelligence specialists operate. Lets analyze practical example: the target is a database. The potential attack vectors are following (but obviously not limited to): a)compromised hardware which allows to download data from the server b) compromised software which allows to download data from the server c) compromised specialist (s) which download the data d) intercepted communications,

Rule #1: any gathered data is verified by comparing it to independent source. Rule #2: the sources cannot know about each other. Only if these two rules are met the data can be considered as data which has passed basic verification. "Physical subversion", "blackmail", "infiltration" are day to day activities, the bread and butter, for all those agencies.

+ - For those who have nothing to hide, there is something you can lose->

Submitted by Trachman
Trachman (3499895) writes "Everytime there is a discussion about pervasive surveillance there is an undertone injected to the discussion: if you have nothing to hide then one has nothing to fear. We have learned about DEA using NSA capabilities for the parallel construction of the case. Washington Post has article about those who had nothing to fear and paid dearly —"
Link to Original Source

+ - Popular Science Magazine: About the Cell towers->

Submitted by Trachman
Trachman (3499895) writes "Popular Science magazine has published an article about a network of cell towers that are owned not by telecommunication companies but by internal US agencies that are, well... gathering, data of US citizens. Many of them are built in US military bases. The revelation states that individual users are being tracked without court order or any warrant nor the knowledge of cell service providers and are built with the sole purpose of .... data gathering (spying, monitoring)."
Link to Original Source

Comment: Amtrak informant is just one source (Score 1) 127

by Trachman (#47655531) Attached to: DEA Paid Amtrak Employee To Pilfer Passenger Lists
Amtrak is just a one source, of many. Intelligence agencies not only get the information, but also get this information via different channels to have redundancy and to verify those copies against each other. Sources do not know about each other. That is basic rule in operations against the enemy. To begin with, most likely Amtrak serves have been hacked by NSA long time ago and they have the information directly. In addition to that they have insiders, on the payroll, to get the same data as well as interpretations on the data. Call it "customer" support. There is the last avenue, "constitutional", is to go and get subpoenas or other boring methods. Such redundancy was needed to give impression that the public has "privacy". Spying was performed first and, later, when the case was built, "different" sources were shown. All for the appearance of "privacy". Greyhound buses, Urban transit, Amazon, Ebay, iTunes, Fedex, USPS, EZ pass,: everyone has a "file" recorded in relationship databases available for query.

+ - Verizon Rewards Customers for Their Data->

Submitted by Trachman
Trachman (3499895) writes "Communication companies saw valuable data and have finally figured out how to monetize. For a token compensation (not even a cash money) of "10,000" points people will be giving away another source of information about themselves.

Should we expect that ISP's will soon start offering one or two percent discount in exchange for giving away your internet searches."

Link to Original Source

+ - Magnetic Field of Earth Weakening a Sign Poles Are Flipping->

Submitted by Trachman
Trachman (3499895) writes "The magnetic field of Earth is weakening more rapidly than many scientists thought it would, a sign that Earth’s magnetic poles might flip within a few hundred years as opposed to thousands of years. Data collected from Swarm, the collective name for three European Space Agency (ESA) satellites, confirms that Earth’s magnetic field is weakening, something which has led to many past switches in Earth’s magnetic poles.Deep ocean core studies have confirmed, according to NASA, that the Earth’s magnetic poles reverse on a relatively frequent basis. They usually switch anywhere from 200,000 to 300,000 years. As it has been 700,000 years or so since a flip has taken place, Earth is overdue for one. The weakening magnetic field might be a sign that the switch will occur sooner, rather than later. Scientists, according to a report by LiveScience, had thought that Earth’s magnetic field was weakening by about five percent every hundred years. At that rate, they calculated that a flip in the Earth’s magnetic fields would not happen for around another 2,000 years. However, the new data from Swarm indicates that Earth’s magnetic field is actually currently weakening at a rate of five percent every decade instead of century. That rate is 10 times faster than the scientists had allowed for in their calculations about when the next flip would happen. That being said, we know that the Earth's magnetic field is primary protecting shield from cosmic particles and, consequently, is a primary factor to the Earth's temperature.

My Scoop is following: At the risk of being not popular here at Slashdot I dare to ask: can magnetic field changes and climate changes be connected and analyzed in concert?"

Link to Original Source

Comment: Golden era for intelligence agencies wordwide (Score 1) 143

by Trachman (#47435613) Attached to: Chinese State Media Declares iPhone a Threat To National Security
Imagine Chinese have the ability not only to track location of every phone, but also to activate at will. In the past intelligence operations took year to find important targets, establish contacts, recruiting and learning about inner working of organizations of interests. In order to spy now all you need is a telephone # or email. That being said, would you be comfortable if you knew that Chinese have a capacity to listen not only the phone calls but also to record conversations near the phone at any time. Perhaps there are many professions where it does not matter what the telephone holder is talking about, but there are plenty of professions that can have a profound impact to security: military, intelligence, scientific areas for example. The truth is people are conditioned to assume that it is ok if someone listens, but it is also truth that every government have state secrets and China is no exception.

Comment: They are sending home the wrong man (Score 1) 219

by Trachman (#47427391) Attached to: After NSA Spying Flap, Germany Asks CIA Station Chief to Depart
I think that Germany is sending the wrong man home. If US has any specialists worth their salt, then their station chief will be the driver, security guard. A cook perhaps, or public relations officer. If you remember from recent Snowden's revelations, officers are given made up identities. That being said, what is wrong with these Germans? The last time we have checked, Germany is an occupied nation since WW2 , it has occupiers' army and some must have forgotten who is the boss.

Comment: It should be the other way around (Score 1) 78

by Trachman (#47414175) Attached to: Buzz Aldrin Pressures Obama For New Space Exploration Initiative
Some politicians would benefit from returning from the moon to earth, and not thinking about traveling from earth to the space. There are many issues that are many times cheaper to resolve, and would improve the world, the real world, in a meaningful way. I am all for the space exploration and new technologies. All of such endeavors need to be financed with private voluntary contributions.

Comment: Can anyone guess when cavity searches will be norm (Score 1) 702

by Trachman (#47412557) Attached to: TSA Prohibits Taking Discharged Electronic Devices Onto Planes
I wanted to guess when anal and vaginal searches will become new normal, standard procedure. Sorry for direct and not necessarily tasteful reference here. I am sure that bearded men, sitting in the caves, will spread the new gossip about devices in bod cavities and will watch in disbelief what people in US allow for TSA personnel to do on themselves.

+ - Airport Security will not allow to have discharged electronic device. What's nex-> 2

Submitted by Trachman
Trachman (3499895) writes "Latest news to the travelers flying into the US: you will discover that getting through security will become even more time-consuming and stressful. The US Transport Security Administration revealed on Sunday that enhanced security procedures on flights coming to the US now include not allowing uncharged cell phones and other devices onto planes.

Let's think about it. In the next decade some perverted heads will announce anal and vaginal devices as the next transportation threat. How far Americans are willing to go, how many liberties to lose for the sense of security."

Link to Original Source

Comment: Information collection via power lines from PC's (Score 1) 109

by Trachman (#47381075) Attached to: Can the NSA Really Track You Through Power Lines?
Information collection via power lines has been developed a long time ago against hard to reach targets, such as, for example adversary's strategic forces (icbm), nuclear plants and warehouse, headquarters and other similar high value targets. Many times such objects are disconnected from internet (but have local computers) and if such targeted computers are using electricity, then they can be targeted. If you remember, a while ago, there was DSL internet delivered via power lines. Be sure that such internet delivered via power lines is one additional avenue, a tool, in NSA's toolbox. One of many

You know that feeling when you're leaning back on a stool and it starts to tip over? Well, that's how I feel all the time. -- Steven Wright