#801 2015-06-02 03:07:52
According to the law, three sections of the USA PATRIOT act have now expired. The question is, will anyone bother to follow the law now, or as it is enacted in the future?
"My time on the intelligence committee has taught me to always be vigilant for secret interpretations of the law and new surveillance techniques that Congress doesn't know about," [Senator Ron] Wyden, a member of the intelligence committee, told the Guardian.
"Americans were rightly outraged when they learned that US intelligence agencies relied on secret law to monitor millions of law-abiding US citizens. The American people are now on high alert for new secret interpretations of the law, and intelligence agencies and the Justice Department would do well to keep that lesson in mind."
The USA Freedom Act is supposed to prevent what Wyden calls "secret law". It contains a provision requiring congressional notification in the event of a novel legal interpretation presented to the secret Fisa court overseeing surveillance.
Yet in recent memory, the US government permitted the NSA to circumvent the Fisa court entirely. Not a single Fisa court judge was aware of Stellar Wind, the NSA's post-9/11 constellation of bulk surveillance programs, from 2001 to 2004.
Auto-edited on 2020-08-02 to update URLs
Offline
#803 2015-06-04 23:39:19
Keep pushing the envelope.
Without public notice or debate, the Obama administration has expanded the National Security Agency's warrantless surveillance of Americans' international Internet traffic to search for evidence of malicious computer hacking, according to classified NSA documents.
In mid-2012, Justice Department lawyers wrote two secret memos permitting the spy agency to begin hunting on Internet cables, without a warrant and on American soil, for data linked to computer intrusions originating abroad--including traffic that flows to suspicious Internet addresses or contains malware, the documents show.
Offline
#804 2015-06-05 19:42:58
N.S.A. and the Patriot Act. Unanswered questions.
http://www.newyorker.com/news/news-desk … act-powers
Offline
#805 2015-06-09 11:57:52
#806 2015-06-10 03:29:22
Quiz time:
Can you tell the difference between the Foreign Intelligence Surveillance Court and the court in Kafka's The Trial?
Are there any differences in what Bush and Obama have to say about the USA PATRIOT Act?
(Found via Schneier.)
Offline
#807 2015-06-10 10:38:14
square wrote:
Are there any differences in what Bush and Obama have to say about the USA PATRIOT Act?
Nope, two sides of the same coin.
Offline
#808 2015-06-10 20:09:50
#809 2015-06-14 08:30:43
#811 2015-06-14 19:55:30
choad wrote:
Spies Fan Snowden Disinformation
Who was hurt? "no evidence"
Proof? None.
Mr Snowden is believed to have downloaded 1.7 million secret documents before he left the US.
A number that was just completely fucking made up.
Offline
#813 2015-06-16 08:30:02
square wrote:
choad wrote:
Spies Fan Snowden Disinformation
Who was hurt? "no evidence"
Proof? None.Mr Snowden is believed to have downloaded 1.7 million secret documents before he left the US.
A number that was just completely fucking made up.
...aaaand the rest of this "news article" is completely dismantled.
Offline
#814 2015-06-16 10:15:18
Who watches the watcher-watchers?
The government's handling of documents first became an issue during the evidence-gathering stage of [Thomas] Drake's prosecution, when his criminal defense lawyers sought records related to his whistleblower cooperation with the Pentagon inspector general's office in order to defend him.
At the time, the Justice Department told the judge that most of the "hard copy documents" related to the Pentagon inspector general's office audit that Drake had cooperated with couldn't be provided to the defense because they'd been destroyed "pursuant to a standard document destruction policy." . . .
Drake's lawyers wrote that the Pentagon inspector general's office destroyed the documents "outside of normal policy and to impede . . . the criminal case."
The allegations arose out of a series of still-secret complaints filed by multiple former and current officials in the Pentagon inspector general's office about the office's handling of whistleblower cases, including Drake's.
Offline
#815 2015-06-16 10:50:20
square wrote:
square wrote:
choad wrote:
Spies Fan Snowden Disinformation
Who was hurt? "no evidence"
Proof? None.Mr Snowden is believed to have downloaded 1.7 million secret documents before he left the US.
A number that was just completely fucking made up.
...aaaand the rest of this "news article" is completely dismantled.
So, now we're using one "news"/opinion agency to tear down the credibility of another "news"/opinion agency?
Offline
#816 2015-07-08 17:34:37
Dickless Senator says encrypting user data impedes corporate and law enforcement spying without permission, threatening Americans' safety.
Yes, to answer the obvious question, the Senator has no dick.
Offline
#817 2015-07-08 18:33:21
choad wrote:
Dickless Senator says encrypting user data impedes corporate and law enforcement spying without permission, threatening Americans' safety.
Yes, to answer the obvious question, the Senator has no dick.
dickless wrote:
companies must be able to decrypt information for police officers in case "someone with a white van kidnaps a young girl."
He's pretty specific about that...
Offline
#818 2015-07-08 18:44:07
"Oh, contraire, there is a huge Security Risk", says everybody who actually fucking knows anything about backdoor decryption.
Offline
#819 2015-07-14 06:30:09
As Crypto War II gets into full swing, a detailed review of what's happening and past battles.
Offline
#820 2015-07-31 00:10:45
When the NSA is too busy jerking off over its own furtiveness to bother using intelligence it already has, why do they need to track your phone calls and mine?
But according to some former senior NSA officials, the agency did have the technical capability in 2000 to determine that the calls to bin Laden's operations center came from California. "They're trying to cover up the failure of the NSA," said J. Kirk Wiebe, a former senior analyst who worked at the NSA for 32 years, until October 2001. "And I think they're embarrassed by that." . . .
In an agency filled with secrets, the NSA's failure to detect the 9/11 plot or help other agencies do so is probably its deepest and darkest. For years, rather than reveal the true nature of the blunder, the agency has instead propagated the fable that it missed that San Diego call in 2000 for technical reasons. Consequently, the Bush and Obama administrations conducted what amounted to ironclad surveillance of Americans' phone activity for more than a decade.
Offline
#821 2015-07-31 00:33:13
square wrote:
For years, rather than reveal the true nature of the blunder, the agency has instead propagated the fable that it missed that San Diego call in 2000 for technical reasons
Can we just go ahead and go with basic procedural blunderance? Technical failure of the non-IT sort...
Offline
#822 2015-07-31 06:38:48
Fuck the fatherland. They're our streetwalkers.
Auto-edited on 2020-08-02 to update URLs
Offline
#823 2015-08-01 01:19:34
#824 2015-08-04 14:19:38
Offline
#825 2015-08-06 23:50:54
ECHELON lives! Four decades of internal surveillance and persecution of those who reveal it using ridiculous secrets.
As our trial started, witness after witness from security sites tried to claim that openly published information was in fact secret. In a typical interchange, one Sigint unit chief was shown a road sign outside his base:
Q: Is that the name of your unit?
A: I cannot answer that question, that is a secret.
Q: Is that the board which passers-by on the main road see outside your unit's base?
A: Yes.
Q: Read it out to the jury, please.
A: I cannot do that. It is a secret.
Also: oops, don't admit it's torture.
Offline
#826 2015-08-07 00:12:43
Loved that article
Offline
#827 2015-08-07 06:40:56
Emmeran wrote:
Loved that article
It made feel all warm and fuzzy inside.
Offline
#828 2015-08-08 03:51:53
#829 2015-08-13 08:16:13
#830 2015-08-13 12:54:00
Here, beat cops, detectives and even school police officers have been using hand-held devices to create a vast database of tens of thousands of photos
Talk about going way over the line...
Auto-edited on 2020-08-02 to update URLs
Offline
#831 2015-08-16 02:28:28
Apparently they do care after all.
While it has been long known that American telecommunications companies worked closely with the spy agency, newly disclosed NSA documents show that the relationship with AT&T has been considered unique and especially productive. One document described it as "highly collaborative," while another lauded the company's "extreme willingness to help."
Auto-edited on 2020-08-02 to update URLs
Offline
#832 2015-08-28 00:48:22
If stingrays are perfectly fine and legal technology, why do the cops feel the need to lie about using them so often?
Defense attorneys assigned to many of those cases said they did not know a stingray had been used until USA TODAY contacted them, even though state law requires that they be told about electronic surveillance.
"I am astounded at the extent to which police have been so aggressively using this technology, how long they've been using it and the extent to which they have gone to create ruses to shield that use," Stephen Mercer, the chief of forensics for Maryland's public defenders, said.
Prosecutors said they, too, are sometimes left in the dark. "When our prosecutors are made aware that a detective used a cell-site stimulator, it is disclosed; however we rely upon the Police Department to provide us with that information," said Tammy Brown, a spokeswoman for the Baltimore's State's Attorney.
Offline
#833 2015-08-28 01:32:10
Orwell was an optimist.
Appointed after concern about surveillance and privacy following the Edward Snowden revelations, [UN special rapporteur on privacy Joseph] Cannataci agreed that his notion of a new universal law on surveillance could embarrass those who may not sign up to it. "Some people may not want to buy into it," he acknowledged. "But you know, if one takes the attitude that some countries will not play ball, then, for example, the chemical weapons agreement would never have come about." . . .
But for Cannataci - well-known for having a mind of his own - it is not America but Britain that he singles out as having the weakest oversight in the western world: "That is precisely one of the problems we have to tackle. That if your oversight mechanism's a joke, and a rather bad joke at its citizens' expense, for how long can you laugh it off as a joke?"
Offline
#834 2015-08-28 01:51:23
choad wrote:
Fuck the fatherland. They're our streetwalkers.
Sure, sell out your countrymen for some cool toys.
The April 2013 document called "Terms of Reference," which ZEIT ONLINE and DIE ZEIT has been able to review, is more than enlightening. It shows for the first time what Germany's domestic intelligence agency promised their American counterparts in exchange for the use of the coveted software program. "The BfV will: To the maximum extent possible share all data relevant to NSA's mission," the paper reads. Such was the arrangement: data in exchange for software. . . .
It was a good deal for the BfV. Being given the software was a "proof of trust," one BfV agent exulted. Another called XKeyscore a "cool system." Politically and legally, however, the accord is extremely delicate. Nobody outside of the BfV oversees what data is sent to the NSA in accordance with the "Terms of Reference," a situation that remains unchanged today. Neither Germany's data protection commissioner nor the Parliamentary Control Panel, which is responsible for oversight of the BfV, has been fully informed about the deal.
Offline
#835 2015-09-12 21:20:17
#836 2015-09-12 21:37:54
Surprise: Federal use of stingrays will now require a warrant (in most cases).
First off, the DOJ states that any IMSI catcher used by a covered agency must be set up to comply with pen register orders, i.e., no interception of communications. This includes the interception of text messages, emails or any other data that can be gathered from a nearby cellphone.
While the policies require restricting the device to information comparable to that received through pen register orders (if you don't count all the other cellphone connections harvested during the deployment of the device), law enforcement agencies won't be able to use these orders to permit deployment of IMSI catchers. Instead, they'll have to seek actual warrants.
Of course this does nothing with regard to state and local use. They'll continue to do so in secret to protect "Beach at End of a Street" from terrorism.
Last edited by square (2015-09-12 21:39:00)
Offline
#837 2015-09-12 23:48:07
#838 2015-09-13 02:19:11
Shed a tear for the poor government agencies who are getting mean treatment when all they want to do is help.
"I have something on my mind that affects all the work we do as an intelligence community," [FBI Director James] Comey said in his opening remarks. "I think that citizens should be skeptical of government power. But I fear it's bled over to cynicism. It is something that is getting in the way of reasoned discussion, and I'm very concerned about how to change that trend of cynicism."
You see, when they pressure you to shut down perfectly legal anonymity software, they're just doing it for your own good.
After Macrina conducted a privacy training session at the Kilton library in May, she talked to the librarian about also setting up a Tor relay, the mechanism by which users across the Internet can hide their identity.
The library board of trustees unanimously approved the plan at its meeting in June, and the relay was set up in July. But after ArsTechnica wrote about the pilot project and Macrina's plan to install Tor relays in libraries across the nation, law enforcement got involved.
A special agent in a Boston DHS office forwarded the article to the New Hampshire police, who forwarded it to a sergeant at the Lebanon Police Department.
Offline
#839 2015-09-13 06:51:59
square wrote:
The library board of trustees unanimously approved the plan at its meeting in June, and the relay was set up in July. But after ArsTechnica wrote about the pilot project and Macrina's plan to install Tor relays in libraries across the nation, law enforcement got involved.
A special agent in a Boston DHS office forwarded the article to the New Hampshire police, who forwarded it to a sergeant at the Lebanon Police Department.
I worked the other side of the river for the VT Dept of Libraries, back when "computers" were these arthritic critters, introduced in 1963 and still in wide use 20 years later.
Anyway, ArsTechnica, Lebanon's librarian, and most especially the pilot project coordinator, are fucking idiots. Lebanon is a stone's throw from Dartmouth College's Animal Houses, a leafy redoubt inhabited by affluent retirees and my own parents not too long ago. I can't imagine any effort more vulnerable and doomed to fail.
Hosted by the People's Republic of Burlington? Maybe. If they keep their mouths shut. Better idea is to seduce and sway disgruntled state gumbies employed by the state library system, with regional branches scattered everywhere.
Auto-edited on 2020-08-02 to update URLs
Last edited by choad (2015-09-13 07:06:17)
Offline
#840 2015-09-19 21:22:39
#841 2015-09-19 21:30:33
A diamond is forever, but national security letters shouldn't be.
In 2007, an anonymous ISP owner fought back, speaking out against the whole gag order thing, but not even being able to say what ISP he was associated with, because of that gag order. In 2010, Nicholas Merrill, of Calyx Internet Access, was finally able to admit that he was the one fighting the gag order -- after reaching an agreement with the government (and that was after a number of trips back and forth between the district and appeals courts). Now, five years later, a federal court has finally ruled that the gag order, which was issued back in 2004, should be lifted, because the government has no "good reason" for keeping it in place and keeping the gag order would violate the First Amendment.
Offline
#842 2015-09-19 21:47:28
U.S. intelligence: let's hope for a terrorist attack.
White House officials have backed away from seeking a legislative fix to deal with the rise of encryption on communication devices, and they are even weighing whether to publicly reject a law requiring firms to be able to unlock their customers' smartphones and apps under court order. . . .
Privately, law enforcement officials have acknowledged that prospects for congressional action this year are remote. Although "the legislative environment is very hostile today," the intelligence community's top lawyer, Robert S. Litt, said to colleagues in an August e-mail, which was obtained by The Post, "it could turn in the event of a terrorist attack or criminal event where strong encryption can be shown to have hindered law enforcement."
There is value, he said, in "keeping our options open for such a situation."
Offline
#843 2015-09-26 17:58:29
Everyone's got a dossier. The geezers here may remember when "population-scale" surveillance was the province of evil communist regimes.
A huge volume of the Internet data [British spy agency] GCHQ collects flows directly into a massive repository named Black Hole, which is at the core of the agency's online spying operations, storing raw logs of intercepted material before it has been subject to analysis.
Black Hole contains data collected by GCHQ as part of bulk "unselected" surveillance, meaning it is not focused on particular "selected" targets and instead includes troves of data indiscriminately swept up about ordinary people's online activities. Between August 2007 and March 2009, GCHQ documents say that Black Hole was used to store more than 1.1 trillion "events" -- a term the agency uses to refer to metadata records -- with about 10 billion new entries added every day.
As of March 2009, the largest slice of data Black Hole held -- 41 percent -- was about people's Internet browsing histories. The rest included a combination of email and instant messenger records, details about search engine queries, information about social media activity, logs related to hacking operations, and data on people's use of tools to browse the Internet anonymously. . . .
By 2010, according to the documents, GCHQ was logging 30 billion metadata records per day. By 2012, collection had increased to 50 billion per day, and work was underway to double capacity to 100 billion. The agency was developing "unprecedented" techniques to perform what it called "population-scale" data mining, monitoring all communications across entire countries in an effort to detect patterns or behaviors deemed suspicious. It was creating what it said would be, by 2013, "the world's biggest" surveillance engine "to run cyber operations and to access better, more valued data for customers to make a real world difference."
The agency operates a bewildering array of other eavesdropping systems, each serving its own specific purpose and designated a unique code name, such as: SOCIAL ANTHROPOID, which is used to analyze metadata on emails, instant messenger chats, social media connections and conversations, plus "telephony" metadata about phone calls, cell phone locations, text and multimedia messages; MEMORY HOLE, which logs queries entered into search engines and associates each search with an IP address; MARBLED GECKO, which sifts through details about searches people have entered into Google Maps and Google Earth; and INFINITE MONKEYS, which analyzes data about the usage of online bulletin boards and forums. . . .
One secret policy paper dated from January 2010 lists the wide range of information the agency classes as metadata -- including location data that could be used to track your movements, your email, instant messenger, and social networking "buddy lists," logs showing who you have communicated with by phone or email, the passwords you use to access "communications services" (such as an email account), and information about websites you have viewed.
Auto-edited on 2020-08-02 to update URLs
Offline
#844 2015-10-03 23:30:38
Auto-edited on 2020-08-02 to update URLs
Last edited by sigmoid freud (2015-10-03 23:31:14)
Offline
#845 2015-10-09 00:27:48
They can definitely hear you now. Can you guess who will be piggybacking on this?
Verizon is giving a new mission to its controversial hidden identifier that tracks users of mobile devices. Verizon said in a little-noticed announcement that it will soon begin sharing the profiles with AOL's ad network, which in turn monitors users across a large swath of the Internet.
That means AOL's ad network will be able to match millions of Internet users to their real-world details gathered by Verizon, including -- "your gender, age range and interests." AOL's network is on 40 percent of websites, including on ProPublica.
At least you can opt out.
In order for Verizon users to opt-out, they have to log into their account or call 866-211-0874.
Offline
#846 2015-10-09 00:30:02
Academic freedom? We've heard of it.
On September 24, I gave a keynote presentation at Purdue University about the NSA, Edward Snowden, and national security journalism in the age of surveillance. It was part of the excellent Dawn or Doom colloquium, which I greatly enjoyed. The organizers live-streamed my talk and promised to provide me with a permalink to share. . . .
It turns out that Purdue has wiped all copies of my video and slides from university servers, on grounds that I displayed classified documents briefly on-screen. A breach report was filed with the university's Research Information Assurance Officer, also known as the Site Security Officer, under the terms of Defense Department Operating Manual 5220.22-M. I am told that Purdue briefly considered, among other things, whether to destroy the projector I borrowed, lest contaminants remain.
Of course the lawyers see no problem.
"We don't view this episode as any sort of compromise of Purdue's commitment to free and open inquiry," Steve Schultz, Purdue's legal counsel, said in a statement emailed to Inside Higher Ed.
Offline
#847 2015-10-10 04:29:34
Obama administration still wants encryption backdoors, but instead of being forthright, will try to make backroom deals with companies to sneak them in.
After months of deliberation, the Obama administration has made a long-awaited decision on the thorny issue of how to deal with encrypted communications: It will not -- for now -- call for legislation requiring companies to decode messages for law enforcement.
Rather, the administration will continue trying to persuade companies that have moved to encrypt their customers' data to create a way for the government to still peer into people's data when needed for criminal or terrorism investigations.
Offline
#848 2015-10-11 10:57:22
square wrote:
Obama administration still wants encryption backdoors, but instead of being forthright, will try to make backroom deals with companies to sneak them in.
After months of deliberation, the Obama administration has made a long-awaited decision on the thorny issue of how to deal with encrypted communications: It will not -- for now -- call for legislation requiring companies to decode messages for law enforcement.
Rather, the administration will continue trying to persuade companies that have moved to encrypt their customers' data to create a way for the government to still peer into people's data when needed for criminal or terrorism investigations.
Good, glad to see we're back to politics as usual.
Offline
#849 2015-10-12 23:10:47
Considering collaborating with those involved in shady dealings? Beware, sometimes things do catch up with you.
A former CIA officer convicted for her role in the kidnapping of a terrorism suspect in Milan was detained for one day in Portugal earlier this week, and now waits to learn whether she will be returned to Italy serve her prison sentence. . . .
"I didn't want to sneak into the country. I've got nothing to hide. This thing needs to be resolved," she said. "This has gone on for 10 years. It's impacted my life. I've got relatives in Europe, and I don't see any reason to give that up. The rendition should have never taken place, and we were all thrown under the bus for it."
Offline
#850 2015-10-13 06:25:53
square wrote:
I've got relatives in Europe, and I don't see any reason to give that up. The rendition should have never taken place, and we were all thrown under the bus for it."
Shameless and ignorant.
Abu Omar was stopped on a street in Milan, thrown into van, taken to a U.S. air base in Italy and ultimately flown to Egypt, where, according to his wife and Italian prosecutors, he was beaten and given electric shocks to his genitals.
Pray the Portuguese plug her ass into a wall socket and see what more she knows.
Offline