At a gov level: if you have an embassy revert to onetime pads and physical diplomatic bag/pouch. Make sure your staff understand the country they are working in - stop all political appointees for embassy staff - they are useless, the locals dislike them and don't reflect well on the embassy and its efforts.
No fancy encryption fax machines, next gen encryption phones or tested encryption computers for fast "important" chats or documents.
Remember if one nation can read your communications, their intelligence service might have staff with different faiths, in cults, varied politics i.e. a few other nations might get the your communications too
If your a company - make sure your staff travel with clean hardware that never get back to the company after that one trip.
If your writing some form of memoir find a good typewriter.
Think of all the domestic and international offices, embassies, banks, govs, telcos, firms, brands, NGO's, police forces, armies, secretaries.. spreadsheets, crypto that has been sold or given as aid or for cooperation that provides a way in over decades.
Spread wide and have a way in and out as needed i.e. the " installer" is the OS, the daily productivity applications, networking software.
Why social engineer one firm when you can get a nations firms to install and update mandated junk encryption or OS or applications. Exchanges get an amazing digital upgrade with cheap international peering not national telco can resist...
So many ways in, so few skilled experts per nation wondering why its all so cheap and they cant test it...
With the lists of weak software encryption, junk hardware, telcos splitting - just another way in?
Some Russian firms have a great track record of finding varied gov backed malware deep in computer systems around the world and then telling the world of their findings.
US software groups doing the same work might face the reality of national security letters, sealed courts or a gov chat.
Recall the Magic Lantern, Carnivore and antivirus vendor efforts http://en.wikipedia.org/wiki/M... in the news years ago
Most data that people have on their hard drives can be readily re-obtained via BitTorrent or in other ways. The simple and probably best strategy is to figure out the 500 GB or less that is actually irreplaceable, and make several copies of that. I have three or more copies of my most important data.
Or, looking at the problem another way, 4 TB hard drives are selling for $160 right now including shipping. A complete insurance policy would cost $800 plus your time. What I would have done if I just had to save everything would be to simply copy all of the data in 4 TB hunks, and put each hard drive one by one into a fireproof safe, or in a safe-deposit box at the bank. A second RAID would be complete overkill, unless time to recovery is of the essence or the data churn rate is high. More than 90% of my data simply accretes over the years, and I'm sure that is true for most people.
$800 is a small price to pay for your data. I seem to recall that it cost a company I worked for over $1,000 to recover a 9 GB IBM hard drive that failed about 15 years ago.
According to this article, Seagate is promising 20 TB hard drives by 2020:
@ a few $100 per drive or less depending on MTBF, 5 year support, brand vs tape or a second set of HDs
Korea was a another few years re learning basic interception and plotting (ie having to be helped by the GCHQ/UK).
Near the end of Vietnam some real amazing efforts in interception, understanding and plotting Soviet tech in Asia seemed to finally be ready.
Most of the NSA efforts seem to be around selling/setting junk crypto hardware/software standards for decades or listening to the Soviet Union.
The CIA did great with its overfights and digging under embassy telco efforts.
As for the post cold war turf war - the NSA seemed to want a real vote on many issues rather than been called in as tech experts when needed. Offensive operations on the NSA terms vs helping the CIA when requested..
As for the CIA and interrogation reports:
Whats left will tell of the use of foreign nationals, dual nationals and US contractors, gov workers... medical and legal professionals.
ie the correct use of US gov experts from the FBI or try other methods in other parts of the world with other expensive contract staff or staff with ideas....
International conventions and professional standards... its all going to make the US press.
It really depends how many files where kept.
Recently, governments have shifted their talking points from claiming they only use mass surveillance for "national security" purposes to the more nebulous "valid foreign intelligence purposes." I suggest this committee consider that this rhetorical shift is a tacit acknowledgment by governments that they recognize they have crossed beyond the boundaries of justifiable activities.."
Link to Original Source
* Again, lest we summon a certain someone
I don't come to your Winblows forums and waste your time, or post on digg. WTF do you (collective version) think it is OK to come to a Linux site and then act like a clueless computer nube?
"Which is great if you don't want to do any name resolution on computers in your home network."
This is slashdot. Run your own BIND server, or beat it.