Now that we xenophobically blocked Syrian refugees, now the Governors have announced they will keep Amierica safe by banning cell phones. "The terrorists used cell phones and this new technology they learned from Snowden (aka Moldemort) called SMS. We must not be threatened by this illegal usage of dangerous technology." Rumor has it they're going after books next and plan big book burnings and witch drownings. "I know at least one of those ISIS phuckers read a Harry Potter book," Texas governor was overheard saying.
For the people asking why intel communities aren't shutting them down: They're intel sources. Why would you shut down accounts when they tell you TTPs, SOPs, areas of influence, capabilities, locations (eg. idiot Twitters a pic of the ISIS HQ, which is then bombed within 24 hours), etc. Besides, no manning for this as there's no DoD or IC requirements to "shut down propaganda accounts."
Because in Europe, they'll pull you over for not passing, while cruising in the left lane. I drove a rental around Belgium and Germany, and was warned by quite a few people to stay out of the left two lanes (assuming 3+ lane) I've watched CHP (California Highway Patrol) roll up on a left lane squatter, cruise for about 1-2 miles behind, and then pass on the right. Which, technically, I think passing on the right is also illegal to go along with the impeding. The only place I've seen here enforce is CHP up north, around Monterey, where retirees in motorhome back up 4+ cars going up hills.
Of course the exception to this that in some cases, when you are in jail you're not allowed to write books and make money off your crimes. Free speech would be you talking to someone about it, but you would not be allowed to detail the crime and make money from it.
The original question isn't about freedoms really, but more about ethics. The data is stolen. You shouldn't be looking at stolen data, or even pseudo-copies. We see with Snowden that even large media companies makes mistakes with release and redacted information (e.g. revealed ISIS current intel because they didn't properly block out a PowerPoint slide). Perhaps you'll feel differently when you see someone who's stolen your name, address, DOB, SSN, work history, history of living, interviews of friends, financial information and a trove of other information put out on the internet, and then have someone do "analysis" of your stolen information. No, this hasn't happened YET. But if the Guardian can do it with stolen documents from a business, there's no barrier to doing it with a person.
Late-2012 Mac Mini
2.5GHz dual-core Intel Core i5
OWC 500Mb SSD drive
16 Gb memory (upgrade from OWC)
Intel HD Graphics 4000
Toshiba 32" TV as the monitor
El Gato HD game capture for streaming XBOX360 on Twitch.TV ( Johnny4848 )
No problems to date. Of course, use Magic Trackpad and Apple wireless keyboard with it.
Besides, cops seem all geared up in tactical battle rattle (stun grenades on occasion, multiple sets of cuffs, body armor, etc), what's another 12 oz external Lithium Ion battery pack?
If I break into your house, and then walk into your main hallway, and then say, "There is a security flaw in your home! From this point in your hallway I can listen to any room, or walk down freely into any room." As you're looking at your front door splintered from the battering ram I hit it with to get in, would you call it a "hack," a flaw or something to be concerned about how your hallway(s) go through your house? No, you'd say, "The hallway is fine, I need a stronger front door. BTW, the Glock I'm holding is loaded."
When I start to read, "SS7 was designed in the 80s," I already know I'm dealing wtih a mental midget. Actually, SS7 begain due to the first ever hackers. Remember 2600? As in, 2600 Hz was the signaling frequency for a landline switch. Throw that tone, and you could make calls (for free if it was a payphone). Hence, telecoms came up with an idea to do out of band signaling, which eventually became SS7. So, saying you can "hack" SS7 is very misleading because all SS7 does is coordinate call set up. That "ringing" you hear as you wait for the far, distant switch to reply that the called line is available, is a "comfort tone," as SS7 does it's work. Besides cutting down on fraud, SS7 keeps circuits available, because if the called number is busy, or unavailable, there's no point in setting up a line between your local switch and the switch at the far end.
In the deepest bowels of a switching office, usually near the back, you'll see SS7 racks. These connect from and between local, long-distance and other switches. It's what you'd call, "Back Office," network, similar to the network used by the telecoms to manage their servers your traffic go across but you'll never touch. Such as 3G data going through PCF after it's left the mobile switch, and before it hits an internet backbone ATM. So in simple terms, you'd have to break in, figure out the network, and then figure out a 2nd break in to get to the SS7, and then you'd be in a very small part of the network.
Honestly, if you're going to be doing that much effort, you're NOT going after SS7. Just hack the 3-letter agencies or other LEO server for court-approved wiretapping that is hanging off the switching network and you're in anything, everything, anywhere.
Besides, we also have recent precedence on this. There are laws which prohibited certain anti-competitive behavior for newspapers. If you stifle the channels of communication, say the printing press in the 1800s, then you control the narrative(s). Today, the Internet is uniquely in that very same position. If you allow a privately owned organization to take self-serving priorities, with no competitive alternatives available, then you are again in a position where the narrative is dictated. Let's say Comcast buys Fox, and now only Fox content streams quickly. A Comcast subscriber decides to hear the alternative side of the narrative, say from MSNBC or CNN, but they get constant "spinning wheels," as they wait. Occasionally they get resets (as ISPs have been caught doing to P2P), or accidental DNS redirects to blackholes.
Also, the Internet was originally developed by the government and universities, and did not prioritize traffic. Imagine, for example, if GPS were to be "bought" by GE. You can only get fine positioning if you pay $x a month, but if you don't, you get 200m accuracy. Maybe this is your street to turn on, maybe it was a block back.
"Why waste negative entropy on comments, when you could use the same entropy to create bugs instead?" -- Steve Elias